First cases of TeslaCrypt 3.0 have been acknowledged in Italy by TG Soft's Research Centre (C.R.A.M.). This cryptomalware encrypts files adding its signature .micro extension and asks for a ransom to have them encrypted. |
INDEX==> TeslaCrypt 3.0 behaviour==> Cryptomalwares: what they are and how they work ==> How to stay safe from cryptomalware attacks with Vir.IT eXplorer PRO technologies |
|
Between late November and early December 2015, TeslaCrypt had spread massively, via email, hitting and doing damage to a great number of computers. | ![]() |
Now TeslaCrypt is striking back, with a brand new core (version 3.0). Computers are being infected by TeslaCrypt in two ways:
|
TeslaCrypt AttackFlowchart![]() |
Once the javascript file has been executed, it will download and start the TeslaCrypt executable file. Below are some details on the executable. <random>he45.exe
TeslaCrypt also alters a registry key, in order to be executed at every login: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run [zsevice-455] = C:\USERS\<username>\APPDATA\ROAMING\<random>HE45.EXE The encryption algorithm used by TeslaCrypt is a 256 bit AES CBC. The encryption key is not stored in the attacked computer, but it is sent to a server via TOR-Onion network. To generate the public key, this cryptomalware uses ECDH (Ellipitc Curve Cryptography Diffie-Hellman) algorith. It is still impossible to decrypt encrypted files, unless the private 256 bit key is known. |
![]() Click here to show the picture fullscreen |
![]() |
__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#!__!@#!@#! __!@#!@#! NOT YOUR LANGUAGE? USE https://translate.google.com What happened to your files ? All of your files were protected by a strong encryption with RSA-4096. More information about the encryption keys using RSA-4096 can be found here: http://en.wikipedia.org/wiki/RSA_(cryptosystem) How did this happen ? !!! Specially for your PC was generated personal RSA-4096 KEY, both public and private. !!! ALL YOUR FILES were encrypted with the public key, which has been transferred to your computer via the Internet. Decrypting of your files is only possible with the help of the private key and decrypt program, which is on our secret server. What do I do ? So, there are two ways you can choose: wait for a miracle and get your price doubled, or start obtaining BTC NOW, and restore your data easy way. If You have really valuable data, you better not waste your time, because there is no other way to get your files, except make a payment. For more specific instructions, please visit your personal home page, there are a few different addresses pointing to your page below: 1. http://kjsdfuo9ndskj4.flueymari.com/690D17425F15A49 2. http://p5vnwj4nfszlk.chamablunk.com/690D17425F15A49 3. http://g4nsjn45nldflef.polypdicot.com/690D17425F15A49 If for some reasons the addresses are not available, follow these steps: 1. Download and install tor-browser: http://www.torproject.org/projects/torbrowser.html.en 2. After a successful installation, run the browser and wait for initialization. 3. Type in the address bar: 4nauizsaaopuj3qj.onion/690D17425F15A49 4. Follow the instructions on the site. !!! IMPORTANT INFORMATION: !!! Your personal pages: http://kjsdfuo9ndskj4.flueymari.com/690D17425F15A49 http://p5vnwj4nfszlk.chamablunk.com/690D17425F15A49 http://g4nsjn45nldflef.polypdicot.com/690D17425F15A49 !!! Your personal page in TOR Browser: 4nauizsaaopuj3qj.onion/690D17425F15A49 !!! Your personal identification ID: 690D17425F15A49 11111111111111111111111111111111111111111111111111111 |
In our 26/11/2015 bulletin, we tried to describe those technologies built into Vir.IT eXplorer PRO and how to use them properly.
TG Soft's Research Centre (C.R.A.M.) has been analyzing the most widespread cryptomalware types for three years, and has developed two technologies:
|
![]() ![]() ![]() 99,63%* Mean percentage of files protected from encryption thanks to Vir.IT eXplorer PRO |
![]() |
If Vir.IT eXplorer PRO has been correctly set up, it is possible to save up to 100% of data in case of cryptomalware. Those file that may have been encrypted in the early stages of the attack can be restored thanks to Vir.IT BackUp, thus reducing the loss to 15/20 files - in the case they were created/edited before a new backup could be made.
|
The necessary cookies help make the website usable by enabling basic functions such as page navigation. The website cannot function properly without these cookies.
Cookie necessary to make certain specific contents usable such as: access to protected areas of the site, sending requests or subscribing to newsletters. The specific features of these sections will not be usable without this cookie.