Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


My files are encrypted with TeslaCrypt 4.0 - can anyone help me?

  • This topic is locked This topic is locked
2 replies to this topic

#1 Slowie


  • Members
  • 1 posts
  • Local time:11:07 PM

Posted 16 May 2016 - 03:54 AM



As stated in topic, I have foolishly been attacked by virus that succesfully encrypted all my files. I said foolishly mainly because I haven't got any backup copies. So all my archive files are locked.

I of course have NO intention of paying the ransom to those evil people, so I suppose this will be a very hard lesson for me...


Ever since the attack I have been following your efforts and I want to express my respect to all af you that are willing to deal with this kind of crime and trying to save lots of people and organizations all over the world. The fact is, that we are only humans and therefore vulnerable - the more good it is inside us, the more vulnerable we are. I even read that the virus actually attacked some hospitals and other similar organizations that are here to help and support social enviroment - and they actually had to PAY! It's so hard to believe that...


Anyway, in the bottom of message there is link to Sendspace, where I uploaded zip file of samples of my encrypted *.jpg files, in case anyone would be willing to help. If not, I will have to deal with the fact that I am a victim of my own ignorance... However, my personal loss will still be small comparing to the loss of mentioned organizations.... Sad.


Cheers and keep up the good work!





BC AdBot (Login to Remove)


#2 al1963


  • Members
  • 887 posts
  • Local time:03:07 AM

Posted 16 May 2016 - 04:23 AM


on Teslacrypt 4 contact here,


#3 quietman7


    Bleepin' Janitor

  • Global Moderator
  • 51,773 posts
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:07 PM

Posted 16 May 2016 - 05:59 AM

Currently, there is no way of decrypting TeslaCrypt 4.0 or TeslaCrypt 3.0 .xxx, .ttt, .micro, .mp3 variants unless you pay the ransom since they use a different protection/key exchange algorithm, a different method of key storage and the key for them cannot be recovered. The .xxx, .ttt, micro and .mp3 variants do not have a SharedSecret*PrivateKey so they are not supported by the current version of TeslaViewer. The tool can decrypt TeslaCrypt 3.0/4.0 files only if you have the private key acquired from the malware developer after paying the ransom. If infected with any of these extensions, backup all your encrypted files and wait for a possible solution.

Support for TeslaCrypt 3.0/4.0 is provided in this topic where you can ask questions and seek further assistance but as noted above there is no solution to fix your encrypted files yet.When or if a solution is found, that information will be provided in the support topic and you will receive notification if subscribed to it. In addition, a news article most likely will be posted on the BleepingComputer front page.

Rather than have everyone with individual topics, it would be best (and more manageable for staff) if you posted any more questions, comments or requests for assistance in the support topic discussion...it includes experiences by experts, a variety of IT consultants, end users and company reps who have been affected by ransomware infections. Doing that will also ensure you receive proper assistance from our crypto malware experts since they may not see this thread. To avoid unnecessary confusion, this topic is closed.

The BC Staff
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users