An ‘Encrypted’ Encryptor Menaces Gamers: TeslaCrypt 2.0 Conceals its Identity to Demand a $500 Ransom

Kaspersky Lab has detected curious behaviour in a new threat from the TeslaCrypt ransomware encryptor family. In version 2.0 of the Trojan notorious for infecting computer gamers, it displays a HTML page in the web browser which is an exact copy of CryptoWall 3.0, another notorious ransomware program. Perhaps the criminals are doing this as a statement of intent: so far, many files encrypted by CryptoWall could not be decrypted, which is not the case with many past cases of TeslaCrypt infection. After a successful infection, the malicious program demands a $500 ransom for the decryption key; if the victim delays, the ransom doubles.

Early samples of TeslaCrypt were detected in February 2015 and the new ransomware Trojan gained immediate notoriety as a menace to computer gamers. Amongst other types of target files, it tries to infect typical gaming files: game saves, user profiles, recoded replays etc. That said, TeslaCrypt does not encrypt files that are larger than 268 MB.

Mechanism of Infection

When TeslaCrypt infects a new victim, it generates a new unique Bitcoin address to receive the victim’s ransom payment and a secret key to withdraw it. TeslaCrypt’s C&C servers are located in the Tor network. The Trojan’s version 2.0 uses two sets of keys: one set is unique within one infected system, the other is generated repeatedly each time the malicious program is re-launched in the system. Moreover, the secret key with which user files get encrypted is not saved on the hard drive, which makes the process of decrypting the user files significantly more complicated.

Programs from the TeslaCrypt malware family were observed to propagate via the Angler, Sweet Orange and Nuclear exploit kits. Under this malware propagation mechanism, the victim visits an infected website and the exploit’s malicious code uses browser vulnerabilities, most typically in plugins, to install the dedicated malware on the target computer.

“TeslaCrypt, a hunter of gamers, is designed to deceive and intimidate users. For example, its previous version displayed a message to the victim saying that his/her files were encrypted with the famous RSA-2048 encryption algorithm, and thus demonstrated there was no option but to pay the ransom. In reality, the cybercriminals did not use this algorithm. In its latest modification, TeslaCrypt convinces victims they are dealing with CryptoWall – once the latter encrypts user files, there is no way to have them decrypted. However, all links lead to a TeslaCrypt server – apparently, the malware authors have no intention of giving their victims’ money away to a competitor,” said Fedor Sinitsyn, Senior Malware Analyst at Kaspersky Lab.

Recommendations to users

  • Create backup copies of all your important files on a regular basis. Copies should be kept on media that are physically disconnected immediately after the backup copying is completed.
  • It is crucially important to update your software in a timely fashion, especially the web browser and its plugins.
  • Should a malicious program still land on your system, it will be best addressed by the latest version of a security product with updated databases and activated security modules.

Kaspersky Lab’s products detect this malicious program as Trojan-Ransom.Win32.Bitman.tk, and successfully protect users against this threat.

Kaspersky Lab’s products detect this malicious program as Trojan-Ransom.Win32.Bitman.tk and successfully protect users against this threat. In addition, a Cryptomalware Countermeasure Subsystem is implemented in Kaspersky Lab’s solutions. This registers activity when suspicious applications attempt to open a user’s personal files and immediately makes local protected backup copies of them. If the application is then judged to be malicious, it automatically rollbacks unsolicited changes by replacing those files with copies. In this way, users are protected from yet unknown cryptomalware.

A complete version of this report is available at securelist.com.

Kaspersky Lab works hard to protect users of Internet against ransomware. In April in conjunction with The National High Tech Crime Unit of the Netherlands the company launched The Ransomware Decryptor website. This helps victims of infamous CoinVault ransomware to retrieve their data without paying the criminals.

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Most cyber attacks in Middle East involve spyware

Positive Technologies has analysed the attacks carried out on individuals in Middle Eastern countries between 2022…

Trellix expands their XDR platform

Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), has announced the expansion of its XDR platform.

Nozomi reveal global cyber threat in latest report

The latest report from Nozomi Networks Labs finds malware, botnet activity and the Russia/Ukraine war impacted the threat landscape in 2022. 
malware

Peer Software will monitor malware patterns

Peer Software today announced the formation of a strategic alliance with Pulsar Security to continuously analyse malware attack patterns.

Peer Software will monitor malware patterns

Peer Software today announced the formation of a strategic alliance with Pulsar Security to continuously analyse malware attack patterns.
Cybereason

Cybereason identifies new malware variants

Cybereason, the XDR company, announced that it has discovered previously unidentified malware variants being leveraged in two separate Iranian
Malware Detection

Qualys adds Malware Detection

Qualys, cloud-based IT, security and compliance solutions,  announced it has added malware detection to its cloud-based Remote Endpoint Protection offer
shutterstock_437844922

Financial threats in 2020: These are the key predictions from Kaspersky

In 2020, financially motivated cyberthreat actors may start to target investment apps and other areas according to Kaspersky in the financial sector

Financial threats in 2020: These are the key predictions from Kaspersky

In 2020, financially motivated cyberthreat actors may start to target investment apps and other areas according to Kaspersky in the financial sector
Scroll to Top