TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Threat Spotlight: TeslaCrypt – Decrypt It Yourself

26 pointsby Errorcod3about 10 years ago

3 comments

Errorcod3about 10 years ago
TeslaCrypt, the latest-and-greatest ransomware branch off of the CryptoWall family, claims to the unwitting user that his&#x2F;her documents are encrypted with &quot;a unique public key generated for this computer&quot;. This coudn&#x27;t be farther from truth. In actuality, the developers of this malware appear to have been lazy and implemented encryption using symmetric AES256 with a decryption key generated on the user&#x27;s machine.<p>If any of your machines are afflicted, Talos has developed a tool that can be used to generate the user&#x27;s machine&#x27;s symmetric key and decrypt all of the ransomed files. (From citpyrc - Slashdot)
danbrucabout 10 years ago
Luckily at least some malware authors suck at cryptography, too. Generate a random symmetric key, encrypt all files with this key, encrypt the symmetric key with an asymmetric public key included in the malware. Game over. At least until someone manages to obtain the private key.
评论 #9452648 未加载
malwareformeabout 10 years ago
Post analyzing a recent sample of TeslaCrypt here: <a href="http:&#x2F;&#x2F;www.malwarefor.me&#x2F;2015-04-27-angler-ek-pushes-teslacrypt-0-3-6-ransomware&#x2F;" rel="nofollow">http:&#x2F;&#x2F;www.malwarefor.me&#x2F;2015-04-27-angler-ek-pushes-teslacr...</a>