The new
variant of TeslaCrypt ransomware was released with some slight changes. But
still it’s version number is 3.0. but ransom notes is renamed and the file
extension for encrypted files is now .MP3. Unfortunately now there is no
way to decrypt the latest version of TeslaCrypt.
The
new ransom note filenames are in format _H_e_l_p_RECOVER_INSTRUCTIONS+[3-characters].png, _H_e_l_p_RECOVER_INSTRUCTIONS+[3-characters].txt,
and _H_e_l_p_RECOVER_INSTRUCTIONS+[3-characters].HTML.
But
this ransomware works the same way as other ransomware virus does.
TeslaCrypt
Ransom Note
The
biggest change of this threat is that it current encrypts data files with .MP3 extension.
This means that if you filename is test.jpg, then after encrypting
it will change it to test.jpg.mp3.
The
‘.mp3 File Extension’ Ransomware is the newest and updated variant of
TeslaCrypt. This virus continues employing same data-barricading encryption
attacks similarly like its predecessor, and prevent you from reading and
accessing your files. Your backup file is the best weapon against this attack.
Last Sound You Want to Hear
This
is the new variant of TeslaCrypt threat but it have all the past features that
is seen in Trojan, like scanning your hard drive for particular formats,
running suitable data via personalized encryption routine. It is effectively
unbreakable without key generated by it.
Muting Ransom there’s No Need to Pay
As you
know that it is closely related to the previously-examined threats thus the solutions
for resolving ‘.mp3 File Extension’ is the same. Having the backup in non-local
storage like cloud server, can help you to restore encrypted files without
paying to ‘.mp3 File Extension’ Ransomware’s fees.
Files Encrypted with.MP3 Extension
Unfortunately,
there is no verified decryptors for ‘.mp3 File Extension’ Ransomware.
It is
always advised to have a backup so that if you are stuck in situation like this
then you can easily restore the data from it without losing them paying the
crooks. Always use well-known and reputable PC security software.
0 comments:
Post a Comment