After a recent spike in Windows Infections, Microsoft released a tool for thousands of Windows Machines that were infected in August by the notorious Teslacrypt Ransomware, along with yesterday's patch Tuesday updates. Microsoft also updated it's Malicious Malware Removal Tool to tackle Teslacrypt, or Tescrypt as it refers to it.
Microsoft's Windows telemetry data picked up a large spike in detections for TeslaCrypt in late August, jumping from below 1,000 detections per day earlier that month to over 3,500 on August 24.
"After the spike, detections spiked and fell but overall have remained higher than before that first peak in late August," Microsoft noted.
The malware is typically delivered in the payload of several exploit kits, including Angler, the estimated $60m-a-year automated hacking operation that Cisco disrupted earlier this month.
The August spike coincided with a report from security firm Malwarebytes detailing a widespread ad-malware, or malvertising, campaign in late August, which served up the Angler exploit kit to visitors of a number of popular news websites, including Microsoft's MSN.com.
TeslaCrypt appeared on the radar in early 2015, gaining notoriety for targeting gamers. After an infection, TeslaCrypt searches for specific file types and then encrypts them with AES 256 encryption and demands payment in Bitcoin in exchange for a key to unlock the files.
As Microsoft notes, what separates TeslaCrypt from other ransomware is that it also targets files related to financial and tax software.
Microsoft's September data shows that the US has the largest number of TeslaCrypt infections, accounting for 39 percent, followed by the UK, which represents 6.5 percent, and Canada at 5.9 percent.
However, Microsoft noted that earlier variants of TeslaCrypt stored the private key as a file on the machine itself, allowing victims to use Cisco's Talos TeslaCrypt Decryption Tool to decrypt their files with the locally-stored private key.
But recent variants store the key in the registry as binary data, it added. This shift in tactic was noted by Kaspersky in a detailed report on TeslaCrypt version 2.0, which presents itself to victims as CryptoWall - probably, Kaspersky researchers guessed, to spook victims into paying since files encrypted with CryptoWall still cannot be decrypted.
Microsoft emphasized that the best defence against ransomware is 'pre-defence', meaning backing up files in disconnected or remote storage.
Copied from the news site I recently visited, so it's not my info. This is for discussion/chat.
Edited by CodeSmasha, 14 October 2015 - 06:59 AM.