Friday, September 4, 2020

Massive Ransomware Campaign Using TeslaCrypt Discovered

 

It has been discovered that attack groups behind the ransomware known as TeslaCrypt (Trojan.Cryptolocker.N) have ramped up activity in the past two weeks, sending out massive volumes of spam emails containing the hidden malware. TeslaCrypt uses strong encryption to encrypt a wide range of files on the victim’s computer, then demanding a ransom from their victim in order to get their files back. Its creators have continually tweaked the malware and the strategy used to distribute it to help it hide from antivirus detection, therefore making it one of the more dangerous threats currently in circulation. A telltale sign of the malware is that each spam email contains an attachment with a file name using common words such as “invoice”, “doc” or “info” in addition to random characters. The attachment may have a file extension of .zip or may have no file extension at all.

Much of the current campaign of TeslaCrypt attacks involve spam emails using a range of social engineering techniques to lure the user into opening them. Examples of the subject lines used in these emails include:
Would you be so kind as to tell me if the items listed in the invoice are correct?
Please accept our congratulations on a successful purchase and best wishes.
Would you be nice enough to provide us with a wire transfer confirmation.

Once the attachment is opened, it will download and install the ransomware on their computer. The ransomware will then encrypt the user’s files and then create two files on the computer, which both contain instructions on how to pay the ransom and receive a decryption key. 

TeslaCrypt is malware that can be purchased on the underground black market. Attack groups pay TeslaCrypt’s authors for use of the malware and possibly also for access to various distribution channels, such as spam botnets or exploit kits. Because of this, it is difficult to identify anyone perpetrator responsible.

However, Symantec’s findings show that one group, in particular, is behind most of the recent spike in TeslaCrypt activity and it appears to be using spam email as its main distribution method.

Protection

Given that this group using TeslaCrypt has been highly active in recent weeks, businesses and users should be on their guard. Norton.com/setup Security protects against TeslaCrypt.

In addition to the protection Norton.com/setup offers, there are still some extra practices users can take to stay protected from this threat:

  • Keep Internet security software regularly updated. Norton.com/setup is always up-to-date, other solutions may not be, so be sure to check if your solution is updated.
  • Keep your operating systems and software up-to-date with the latest patches.
  • Use caution when opening emails from unfamiliar sources especially with attachments or links. Do not click on unsolicited web links in email messages or submit any information to webpages in links.
  • Users should also regularly back up any files stored on their computers. Once backed up, be sure to keep the backup device unplugged from the computer, as it is still susceptible to infection if connected. If a computer is compromised with ransomware, then these files can be restored once the malware is removed from the computer.

Further reading

If you would like to find out more about the threat posed by ransomware, you can read our whitepaper: The Evolution of Ransomware as well as Norton.com/setup support’s self-help page for ransomware.

No comments:

Post a Comment