Cybercriminals have always been smart, fast, and incredibly adaptive. Just as you’re constantly looking for new ways to improve workflow and productivity with technology while keeping data safe, they’re always looking for new ways to do harm and compromise your business.

teslacrypt

What’s New?

  • We’ve all heard of ransomware – it’s a form of malware that infects your network or device and encrypts files, demanding a ransom for victims to retrieve their data. Over the past several years, it’s grown more and more common.
  • Recently a new version of TelsaCrypt has been discovered, which now uses the ccc extension when encrypting files. This version uses the same payment site as older variants and demands approximately $500 (in BitCoins) to decrypt files.

How Do You Decrypt Your Files?

The worst part is that there’s currently no way to decrypt this version for free because of how the private decryption keys are generated.

It’s a long, confusing processes – essentially, the files continue to encrypt themselves and the key you need to restore your files is incredibly hard to generate.

So, What Can You Do?

Be vigilant! Always be cautious when you’re exchanging and opening Emails: ensure you know the senders, and never click on links or download attachments that you weren’t expecting. It’s never a bad idea to call a client or co-worker to verify that they sent over files – your livelihood could be on the line.

Get in touch with Fuelled Networks to learn more about TelsaCrypt and how to protect yourself against other dangerous online threats. Contact our technology professionals at info@fuellednetworks.com or (613) 828-1384.

Latest Blog Posts

AI Policy Creation & Distribution in 2026
AI Policy Creation & Distribution in 2026
Read More
What Does Your Organization’s Security Strategy Look Like For 2026?
What Does Your Organization’s Security Strategy Look Like For 2026?
Read More
Why Your Business Must Have A Technology Strategy For 2026
Why Your Business Must Have A Technology Strategy For 2026
Read More
Read The Tech Blog