![]() ![]() One of the latest variants is called TeslaCrypt and appears to be a derivative of the original Cryptolocker ransomware. ![]() Although it is possible that these multiple variants are sponsored by the same threat actor, the most likely conclusion is that multiple threat actors are jumping in to claim a portion of an ever increasing ransomware market. Ransomware is becoming an extremely lucrative business, leading to many variants and campaigns targeting even localized regions in their own specific languages. Cryptowall 2 introduced “features” such as advanced anti-debugging techniques, only to have many of those features removed in Cryptowall 3. Update : We’ve released a tool to decrypt any TeslaCrypt VersionĪfter the takedown of Cryptolocker, we have seen the rise of Cryptowall. Update 5/8: We’ve made the source code available via Github here Update 4/28: Windows files recompiled with backward compatibility in Visual Studio 2008 This post was authored by: Andrea Allievi, Earl Carter & Emmanuel Tacheau ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |