It has been discovered that attack groups behind the ransomware known as TeslaCrypt (Trojan.Cryptolocker.N) have ramped up activity in the past two weeks, sending out massive volumes of spam emails containing the hidden malware. TeslaCrypt uses strong encryption to encrypt a wide range of files on the victim’s computer, then demanding a ransom from their victim in order to get their files back. Its creators have continually tweaked the malware and the strategy used to distribute it to help it hide from antivirus detection, therefore making it one of the more dangerous threats currently in circulation. A telltale sign of the malware is that each spam email contains an attachment with a file name using common words such as “invoice”, “doc” or “info” in addition to random characters. The attachment may have a file extension of .zip or may have no file extension at all.
Once the attachment is opened, it will download and install the ransomware on their computer. The ransomware will then encrypt the user’s files and then create two files on the computer, which both contain instructions on how to pay the ransom and receive a decryption key.
TeslaCrypt is malware that can be purchased on the underground black market. Attack groups pay TeslaCrypt’s authors for use of the malware and possibly also for access to various distribution channels, such as spam botnets or exploit kits. Because of this, it is difficult to identify anyone perpetrator responsible.
However, Symantec’s findings show that one group, in particular, is behind most of the recent spike in TeslaCrypt activity and it appears to be using spam email as its main distribution method.
Protection
Given that this group using TeslaCrypt has been highly active in recent weeks, businesses and users should be on their guard. Norton.com/setup Security protects against TeslaCrypt.
In addition to the protection Norton.com/setup offers, there are still some extra practices users can take to stay protected from this threat:
- Keep Internet security software regularly updated. Norton.com/setup is always up-to-date, other solutions may not be, so be sure to check if your solution is updated.
- Keep your operating systems and software up-to-date with the latest patches.
- Use caution when opening emails from unfamiliar sources especially with attachments or links. Do not click on unsolicited web links in email messages or submit any information to webpages in links.
- Users should also regularly back up any files stored on their computers. Once backed up, be sure to keep the backup device unplugged from the computer, as it is still susceptible to infection if connected. If a computer is compromised with ransomware, then these files can be restored once the malware is removed from the computer.
Further reading
If you would like to find out more about the threat posed by ransomware, you can read our whitepaper: The Evolution of Ransomware as well as Norton.com/setup support’s self-help page for ransomware.
No comments:
Post a Comment