Lumension® Endpoint Intelligence Center

Intelligence Center » News Archive » TeslaCrypt 2.0 makes it impossible to decrypt affected files

TeslaCrypt 2.0 makes it impossible to decrypt affected files

2015/07/15

Help Net Security - (International) Security researchers at Kaspersky Lab discovered that recent TeslaCrypt version 2.0 ransomware infections display a Cryptowall 3.0 Web page, possibly in an attempt to convince victims that the malware uses more robust encryption than it actually does.

Source: http://www.net-security.org/malware_news.php?id=3075

Note: This news synopsis is taken from the DHS Daily Open Source Infrastructure Report, a daily [Monday through Friday, except US Federal holidays] summary of open-source published information concerning significant critical infrastructure issues; a 10-day archive of the DOSIR can be found at: http://www.dhs.gov/dhs-daily-open-source-infrastructure-report.


Last Updated: 27 May 2016 10:24:43