Thursday 12 May 2016

New TeslaCrypt variant now uses the .MP3 Extension


The new variant of TeslaCrypt ransomware was released with some slight changes. But still it’s version number is 3.0. but ransom notes is renamed and the file extension for encrypted files is now .MP3. Unfortunately now there is no way to decrypt the latest version of TeslaCrypt.


The new ransom note filenames are in format _H_e_l_p_RECOVER_INSTRUCTIONS+[3-characters].png_H_e_l_p_RECOVER_INSTRUCTIONS+[3-characters].txt, and _H_e_l_p_RECOVER_INSTRUCTIONS+[3-characters].HTML.

But this ransomware works the same way as other ransomware virus does.
TeslaCrypt Ransom Note

The biggest change of this threat is that it current encrypts data files with .MP3 extension. This means that if you filename is test.jpg, then after encrypting it will change it to test.jpg.mp3.

The ‘.mp3 File Extension’ Ransomware is the newest and updated variant of TeslaCrypt. This virus continues employing same data-barricading encryption attacks similarly like its predecessor, and prevent you from reading and accessing your files. Your backup file is the best weapon against this attack.

Last Sound You Want to Hear


This is the new variant of TeslaCrypt threat but it have all the past features that is seen in Trojan, like scanning your hard drive for particular formats, running suitable data via personalized encryption routine. It is effectively unbreakable without key generated by it.

Muting Ransom there’s No Need to Pay


As you know that it is closely related to the previously-examined threats thus the solutions for resolving ‘.mp3 File Extension’ is the same. Having the backup in non-local storage like cloud server, can help you to restore encrypted files without paying to ‘.mp3 File Extension’ Ransomware’s fees.

Files Encrypted with.MP3 Extension


Unfortunately, there is no verified decryptors for ‘.mp3 File Extension’ Ransomware.

It is always advised to have a backup so that if you are stuck in situation like this then you can easily restore the data from it without losing them paying the crooks. Always use well-known and reputable PC security software. 

0 comments:

Post a Comment