This morning we are continuing to see attacks from one of the major contenders in the Ransomware game, TeslaCrypt. TeslaCrypt began its career back in February of 2015, fresh on the heels of another popular piece of Ransonmware known as CryptoLocker. Most often delivered via the Angler Exploit Toolkit, we most often see Tesla infecting websites to deliver drive-by downloads to those unlucky enough to stumble upon these websites. Recently, however, new versions of this malware have begun to be use botnet delivered email as a means of delivering its payload to its victims.
In its inception, TeslaCrypt targeted gamers by not only encrypting photos and documents, but also targeting saved game files and Steam activation keys. Since then this family of malware has moved on to corporate targets and now on to whomever it can find.
AppRiver does have you covered for these attacks, but remain aware and vigilant as these Ransomware attacks show no real sign of slowing down, in fact they seem to be highly effective. In order to protect yourselves and to send a message to the attackers, it is imperative that users are aware that these are out there in full force, systems should be backed up often, and these ransoms should not be paid, nor will they have to be if you have followed this advice and have a proper backup strategy in place. Also, backup your files. Did I mention, you should probably perform regular backups? Do it! Backups.