Thursday, April 7, 2016

Soft2Secure explains TeslaCrypt ransomware


You may remember the news story that broke about two months ago about a large hospital in Los Angeles paid a $17,000 ransom in bitcoins to hackers in order recover its files and computer systems.

Since then, there’s been more bad news. Several more medical centers in California, Indiana and Maryland have all been the victim of cyberattacks, many of them using ransomware.

One of the malicious programs being used by the hackers is TeslaCrypt 3.0, which encrypts important files on a target computer and sets a price tag to obtain the private key that will unlock them. Once inside a target computer, the malware scans hard drives, USB memory sticks, shared network drives and even off-site storage sites such as Dropbox.

A detailed description posted on the Soft2Secure website says “TeslaCrypt 3.0 encodes the objects found during the scan using AES-256 standard, as opposed to asymmetric RSA algorithm used by the bulk of ransom trojans on the loose. The malware then launches an application that informs the victim about what happened and instructs them on further action to recover the locked data.”

Soft2Secure also provides more details about TeslaCrypt and other malware programs and has a Windows utility that the company says will remove the malicious program.


Written by

Follow me on Twitter @ricmanning and read my technology columns at My Well Being.



© 2013-2017 All rights resevered. Designed by Templateism Templateism

Back To Top