TeslaCrypt Ransomware Developers Retire, Release Master Decryption Key

B
BakerHostetler

Contributor

BakerHostetler logo
Recognized as one of the top firms for client service, BakerHostetler is a leading national law firm that helps clients around the world address their most complex and critical business and regulatory issues. With five core national practice groups — Business, Labor and Employment, Intellectual Property, Litigation, and Tax — the firm has more than 970 lawyers located in 14 offices coast to coast. BakerHostetler is widely regarded as having one of the country’s top 10 tax practices, a nationally recognized litigation practice, an award-winning data privacy practice and an industry-leading business practice. The firm is also recognized internationally for its groundbreaking work recovering more than $13 billion in the Madoff Recovery Initiative, representing the SIPA Trustee for the liquidation of Bernard L. Madoff Investment Securities LLC. Visit bakerlaw.com
Ransomware is a particularly nefarious type of malware that hijacks computers and forces victims to pay a ransom in order to access their files.
United States Privacy

Ransomware is a particularly nefarious type of malware that hijacks computers and forces victims to pay a ransom in order to access their files. One of the reasons it is so successful is because ransomware developers use strong encryption that is virtually unbreakable without a decryption key. As a result, individuals and businesses without a backup must either pay the ransom or risk losing their documents forever. This tactic has proven to be very effective based on reports by the FBI estimating that cyber criminals have extorted over $209 million in the first three months of 2016 alone. Recently, ransomware made headlines when it shut down hospitals in Los Angeles, Kentucky and Washington, D.C.

In a surprise turn of events, at least one ransomware developer has had a change of heart. For several weeks, a security researcher at ESET noticed that the developers of the TeslaCrypt ransomware were slowly shutting down their operations. The researcher reached out and asked if they were willing to release the master decryption key, which they did. A note posted to the former TeslaCrypt payment site now reads:

"Project closed! Master key for decrypt: 440A241DD80FCC5664E861989DB716E08CE627D8D40C7EA360AE855C727A49EE. Wait for other people make universal decrypt software. We are sorry!"

With the release of the master decryption key, victims can now download a tool from ESET to decrypt files encrypted by TeslaCrypt without paying the ransom.

While this is certainly a happy ending for those infected with the TeslaCrypt, ransomware remains a persistent threat, and organizations should take steps to safeguard against ransomware of all types. At a minimum, this development highlights the importance of preserving files encrypted by ransomware, even if you choose not to pay the ransom or are unable to decrypt the files.

TeslaDecoder from ESET http://support.eset.com/kb6051/?viewlocale=en_US

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More