Blog
Rajiv Singha

Decryption Tool for TeslaCrypt Ransomware Infection

January 19, 2016
23
Estimated reading time: 2 minutes

If our readers can recall, in an earliest post we had discussed TeslaCrypt – what it is and what it does. This post has some important information related to recent findings from our Labs. Read on to know more.

First, a brief flashback!

TeslaCrypt belongs to the family of ransomware; it was detected in February 2015. Once inside the system, it starts looking for information including images, docs, spreadsheets, PowerPoint presentations, etc. However, unlike others ransomware, it also seeks out saved game files (replays, maps, configurations, profiles, etc.) in the infected computer. Once the files are found, the malware begins encrypting them (converting data into an unreadable form, which can only be read with the help of a private key). And to get this key, the victim has to pay a ransom.

Current Situation
Although downright evil and malicious, malware authors are ambitious. If you thought that the TeslaCrypt authors stopped working after creating the first version of this malware, then you would be wrong. The latest version of this malware, reportedly released in November 2015, is known as ‘v8’ or ‘v2.2.0’. While it is not certain how many variants of this malware have been spawned since its inception, the latest version clearly states that the hackers have been keeping themselves busy.

The Quick Heal Threat Research Labs was recently reported about 60+ cases of TeslaCrypt infection. Apparently and fortunately, the encryption tool used by this particular variant is weak and can be broken to reveal the key that is required for decrypting the locked data.

Below is a link to a free tool that can be used by those who fell victim to the latest TeslaCrypt infection and their files were encrypted.

https://github.com/Googulator/TeslaCrack

Note:
TeslaCrypt 2.0 infection can be recognized from the extension “.vvv” added to the names of the encrypted files.

• The recovery process takes a good amount of time so one needs to be patient; also, this tool does not guarantee the recovery of files in all cases.

A word of advice
The steps described for using this tool are not meant for novice users. So, if you are not sure about them, consider seeking assistance from a computer technician or a friendly neighbor who happens to be a computer geek.

To conclude, here are some safety measures to stay away from ransomware attacks:

  1. Never download attachments or click on links in emails received from unwanted or unexpected sources, even if the source looks familiar.
  2. Don’t respond to pop-up ads or alerts while visiting unfamiliar websites.
  3. Apply all necessary security updates to your OS, software, and Internet browsers. Always keep automatic updates ON.
  4. Have a security software installed in your PC that efficiently blocks spam and malicious emails, and automatically restricts access to malicious websites.

And, the most crucial step – while doing this will not save you from a ransomware infection, but will certainly help you recover. Take regular data backups. Ransomware goes after your data, and then threatens you to pay up in exchange for the data. So, if you have a backup, then you are guarded against extortion – which is, in fact, the most important part here.

We will keep you posted if we come across anymore important findings about TeslaCrypt or any of its nasty family members. Stay tuned to our blog, and stay safe!

Have something to add to this story? Share it in the comments.

Rajiv Singha
About Rajiv Singha
Rajiv is an IT security news junkie and a computer security blogger at Quick Heal. He is passionate about promoting cybersecurity awareness, content and digital...
Articles by Rajiv Singha »

23 Comments

Your email address will not be published.

CAPTCHA Image

  1. Jayant D KogekarJanuary 20, 2016 at 6:03 PM

    I had written about this to the Quick Heal support team a few days ago.
    Unfortunately there was no reply.
    I had to format my PC to get out of the situation.
    Hopefully this article of yours would help, if someone in my contacts faces the same problem.

    Reply
  2. BOMAN E AMARIAJanuary 20, 2016 at 6:36 PM

    Team QuickHeal,
    Thanks my PC is safe. But copying docs from PC into a Folder in my Pen Drive for printing outside, all docs in that folder got corrupted due infection. Can neither open nor delete them. Advised 2 format PenDrive.
    Now most UNUSUAL your QuickHeal on my PC as well at printing place does NOT DETECT the infection; as next time printing fm another folder with same vendor another 3-4 docs got corrupted nor able to delete.
    Since I am in Pune Camp I can bring over the infected Pen Drive for your investigation. Since it is something Unique and worth investigation.
    contact – 9822319994 or 020-26137938

    Reply
  3. sahil baviskarJanuary 20, 2016 at 6:59 PM

    actually this is not a comment
    but a question
    a few days before i had downloaded a software unintentionally from a site which was unknown to me since i was surfing in the search of an e-book. And in that case it got downloaded by me bcoz i thought that it would help me but it was useless.
    Now the problem is that now whenever i open my web browser viz. chrome or mozilla a search engine named “yousearching.com” displays its window and also a green colour border appears surrounding the browser..
    What should I do?
    pls i need the answer
    bcoz i suppose that it slows down my internet’s speed i mean my surfing speed in spite the data transfer rate of the net is having great speed..

    Reply
  4. KAMENDRA,MyJanuary 20, 2016 at 7:48 PM

    Dear Sir,

    My stem infected with cryptolocker, all the xl, word, pdf etc files changed to unknown format. Please help.

    Regards,
    Kamendra

    Reply
  5. agrawal pharmaceuticalsJanuary 21, 2016 at 8:09 AM

    i lost my product key

    Reply
  6. Nageswara RaoJanuary 21, 2016 at 3:14 PM

    Hello

    Is there any solution to decrypt the files affected with cryptowall ransomware?

    Reply
  7. kelly kelvinJanuary 21, 2016 at 4:12 PM

    very very helpful

    Reply
  8. Sharad Kumar JainJanuary 22, 2016 at 9:33 AM

    I have a subscription of Total Security since 03/11/2011 and validity till 03/01/2019. It works wonderful but from few days It is unable to take updates. I called to Customer care for the same problem. It has been suggested to download the updates. I did the same but the quick heal is not updating self and mannualy. the last database is of 12 dec 2015.
    Plz suggest and rectify the problem.

    Reply
  9. i want to advice you that do not download anything from softanic because it contains malivare

    Reply
  10. my computer is infected with cryptowall plz help me

    Reply
  11. MD ABDUR RAHMANAugust 15, 2016 at 9:48 PM

    Dear Sir,

    My stem infected with Cerber2, all the video,imeages, xl, word, pdf etc files changed to cerber2 format. Please help.

    Regards,
    MD ABDUR RAHMAN

    Reply
  12. Hi,
    my pc infected by cerber ransomware , my jpegs, pdf & doccuments converted in .B2ed extension , plz help me. i am using quick heal since last year,

    Reply