July 17, 2015 By Douglas Bonderud 2 min read

While TeslaCrypt doesn’t have the name recognition of CryptoWall or the clout of its parent program CryptoLocker, the malware nonetheless made waves earlier this year by ransoming unique targets such as avid gamers’ saved files for their favorite titles. Now, Threatpost reports that TeslaCrypt authors have upped their game with new encryption protocols that make it more difficult — if not impossible — to fully recover data.

Small Potatoes

According to The Register, the original TeslaCrypt series generated more than $76,000 in bitcoins for its makers between February and April 2015. This is a far cry from the $3 million taken by CryptoLocker just a few years ago, but speaks to a decent rate of return; 163 victims out of approximately 1,200 total paid the ransom, for a success rate hovering around 13 percent. By distributing the malware among U.S. businesses and individual users and relying on the AES-256 encryption algorithm, the ransomware was able to lock file formats tied to productivity suites, video games and creative applications.

TeslaCrypt went the extra step of creating a tech department that provided users information on how to obtain bitcoins and even offered to decrypt single files as a show of good faith. The malware’s market share dried up when Cisco released a decryption tool based on hidden code in the malware itself, allowing users to bypass demands for bitcoins.

Big Dreams for Encryption Methods

Now TeslaCrypt is back with Version 2.0.0. According to SC Magazine, it is also trading on another name: When infected, users are taken to an HTML page copied from CryptoWall, and under this guise, the malware demands payment in bitcoin. The only difference here is the destination — if users pay up, the money is sent to TeslaCrypt’s Tor-based servers.

Researchers aren’t sure why TeslaCrypt chose to stand on the shoulders of other code; Fedor Sinitsyn of Kaspersky Lab wrote in an analysis on Securelist that “perhaps the attackers wanted to impress the gravity of the situation on their victims.” With many CryptoWall files still unrecoverable, there’s a good chance he’s right.

But that’s not the only change for TeslaCrypt. Version 2.0.0 comes with an updated encryption method using the AES-256-CBC algorithm with session_priv as the key. What’s more, the use of an ECDH algorithm lets the malware-makers decrypt all files with a single master key.

Security firms looking for another hidden decryption mechanism are out of luck — the file that saved all encrypted data along with this code has been removed in Version 2.0.0., meaning critical files aren’t just locked down but actually removed from a user’s machine altogether. Nonpayment, therefore, comes with significant risk.

However, TeslaCrypt’s new version isn’t quite the predator it seems at first glance. While security firms haven’t cracked the decryption code just yet, the malware authors’ reliance on name-dropping better-constructed code means they’re not entirely confident in the form or function of TelsaCrypt. In other words, it’s just a matter of time until Version 2.0.0 gives up its secrets.

In the meantime, both avid gamers and responsible corporations should take the time to ensure backup copies are up-to-date, accessible and ready at a moment’s notice. TeslaCrypt has leveled up, but it’s not game over yet — Version 2.0.0 is part substance but largely smoke.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today