It is bad enough when a ransomware infection encrypts your data and demands a ransom, but it's even worse when shoddy programming destroys it instead. This is what happened in a new variant of the Power Worm ransomware where bad programming encrypts your data using AES encryption and then throws away the key
A new version of TeslaCrypt has been released that is now using the ccc extension when encrypting files. This version utilizes the same payment site as previous variants and requires a 2 bitcoin, or approximately $500 USD, ransom in order to decrypt your files.
A new file-encrypting ransomware has been discovered that appears to be installed via targeted Remote Desktop or Terminal Service attacks. This ransomware, which we call LowLevel4, encrypts your data with AES encryption and then demands 4 Bitcoins to get your files back.
Microsoft recently announced that they have updated their malicious removal tool to detect and remediate the TeslaCrypt ransomware infection due to the increased distribution and activity detected in August. This announcement just means that Microsoft has added further detection for this ransomware and will remove it via MSRT.