A Peek Inside TeslaCrypt Ransomware
Criminals offer online help over Tor network
The security research firm FireEye has released a study into the activities of the criminal group behind the TeslaCrypt ransomware tool. Like other ransomware variants, TeslaCrypt encrypts the data on the victim's computer then posts a notice demanding that the victim pay money to get their data back. TeslaCrypt, which is distributed via the Angler exploit kit, demands a payment in the range of $150 to $1,000 – preferably in Bitcoins.
FireEye tracked the payment through Bitcoin reporting mechanisms. The TeslaCrypt gang encrypted 1,231 systems between February and April 2015 and extracted payment from 163 victims for a total revenue of $76,522. More interesting than the financial data are the examples of correspondence between the criminals and the victims. TeslaCrypt appears to place a high value on “user-friendliness,” with an interactive customer support channel for users who have questions about how to pay the ransom. The correspondence reads almost like a Kafka-inspired parody of customer service – with the criminals helping victims through the steps of obtaining Bitcoins and letting them upload one file for decryption as a “free sample.”
A team at Cisco figured out how to break the TeslaCrypt encryption and released the solution on April 27.
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.
News
-
Keep Android Open
Google has announced that, soon, anyone looking to develop Android apps will have to first register centrally with Google.
-
Kernel 7.0 Now in Testing
Linus Torvalds has announced the first Release Candidate (RC) for the 7.x kernel is available for those who want to test it.
-
Introducing matrixOS, an Immutable Gentoo-Based Linux Distro
It was only a matter of time before a developer decided one of the most challenging Linux distributions needed to be immutable.
-
Chaos Comes to KDE in KaOS
KaOS devs are making a major change to the distribution, and it all comes down to one system.
-
New Linux Botnet Discovered
The SSHStalker botnet uses IRC C2 to control systems via legacy Linux kernel exploits.
-
The Next Linux Kernel Turns 7.0
Linus Torvalds has announced that after Linux kernel 6.19, we'll finally reach the 7.0 iteration stage.
-
Linux From Scratch Drops SysVinit Support
LFS will no longer support SysVinit.
-
LibreOffice 26.2 Now Available
With new features, improvements, and bug fixes, LibreOffice 26.2 delivers a modern, polished office suite without compromise.
-
Linux Kernel Project Releases Project Continuity Document
What happens to Linux when there's no Linus? It's a question many of us have asked over the years, and it seems it's also on the minds of the Linux kernel project.
-
Mecha Systems Introduces Linux Handheld
Mecha Systems has revealed its Mecha Comet, a new handheld computer powered by – you guessed it – Linux.
