July 17, 2015 By Douglas Bonderud 2 min read

While TeslaCrypt doesn’t have the name recognition of CryptoWall or the clout of its parent program CryptoLocker, the malware nonetheless made waves earlier this year by ransoming unique targets such as avid gamers’ saved files for their favorite titles. Now, Threatpost reports that TeslaCrypt authors have upped their game with new encryption protocols that make it more difficult — if not impossible — to fully recover data.

Small Potatoes

According to The Register, the original TeslaCrypt series generated more than $76,000 in bitcoins for its makers between February and April 2015. This is a far cry from the $3 million taken by CryptoLocker just a few years ago, but speaks to a decent rate of return; 163 victims out of approximately 1,200 total paid the ransom, for a success rate hovering around 13 percent. By distributing the malware among U.S. businesses and individual users and relying on the AES-256 encryption algorithm, the ransomware was able to lock file formats tied to productivity suites, video games and creative applications.

TeslaCrypt went the extra step of creating a tech department that provided users information on how to obtain bitcoins and even offered to decrypt single files as a show of good faith. The malware’s market share dried up when Cisco released a decryption tool based on hidden code in the malware itself, allowing users to bypass demands for bitcoins.

Big Dreams for Encryption Methods

Now TeslaCrypt is back with Version 2.0.0. According to SC Magazine, it is also trading on another name: When infected, users are taken to an HTML page copied from CryptoWall, and under this guise, the malware demands payment in bitcoin. The only difference here is the destination — if users pay up, the money is sent to TeslaCrypt’s Tor-based servers.

Researchers aren’t sure why TeslaCrypt chose to stand on the shoulders of other code; Fedor Sinitsyn of Kaspersky Lab wrote in an analysis on Securelist that “perhaps the attackers wanted to impress the gravity of the situation on their victims.” With many CryptoWall files still unrecoverable, there’s a good chance he’s right.

But that’s not the only change for TeslaCrypt. Version 2.0.0 comes with an updated encryption method using the AES-256-CBC algorithm with session_priv as the key. What’s more, the use of an ECDH algorithm lets the malware-makers decrypt all files with a single master key.

Security firms looking for another hidden decryption mechanism are out of luck — the file that saved all encrypted data along with this code has been removed in Version 2.0.0., meaning critical files aren’t just locked down but actually removed from a user’s machine altogether. Nonpayment, therefore, comes with significant risk.

However, TeslaCrypt’s new version isn’t quite the predator it seems at first glance. While security firms haven’t cracked the decryption code just yet, the malware authors’ reliance on name-dropping better-constructed code means they’re not entirely confident in the form or function of TelsaCrypt. In other words, it’s just a matter of time until Version 2.0.0 gives up its secrets.

In the meantime, both avid gamers and responsible corporations should take the time to ensure backup copies are up-to-date, accessible and ready at a moment’s notice. TeslaCrypt has leveled up, but it’s not game over yet — Version 2.0.0 is part substance but largely smoke.

More from

Government cybersecurity in 2025: Former Principal Deputy National Cyber Director weighs in

4 min read - As 2024 comes to an end, it’s time to look ahead to the state of public cybersecurity in 2025.The good news is this: Cybersecurity will be an ongoing concern for the government regardless of the party in power, as many current cybersecurity initiatives are bipartisan. But what will government cybersecurity look like in 2025?Will the country be better off than they are today? What are the positive signs that could signal a good year for national cybersecurity? And what threats should…

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

2024 trends: Were they accurate?

4 min read - The new year always kicks off with a flood of prediction articles; then, 12 months later, our newsfeed is filled with wrap-up articles. But we are often left to wonder if experts got it right in January about how the year would unfold. As we close out 2024, let’s take a moment to go back and see if the crystal balls were working about how the year would play out in cybersecurity.Here are five trends that were often predicted for…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today