Cybercriminals have always been smart, fast, and incredibly adaptive. Just as you’re constantly looking for new ways to improve workflow and productivity with technology while keeping data safe, they’re always looking for new ways to do harm and compromise your business.
- We’ve all heard of ransomware – it’s a form of malware that infects your network or device and encrypts files, demanding a ransom for victims to retrieve their data. Over the past several years, it’s grown more and more common.
- Recently a new version of TelsaCrypt has been discovered, which now uses the ccc extension when encrypting files. This version uses the same payment site as older variants and demands approximately $500 (in BitCoins) to decrypt files.
How Do You Decrypt Your Files?
The worst part is that there’s currently no way to decrypt this version for free because of how the private decryption keys are generated.
It’s a long, confusing processes – essentially, the files continue to encrypt themselves and the key you need to restore your files is incredibly hard to generate.
So, What Can You Do?
Be vigilant! Always be cautious when you’re exchanging and opening Emails: ensure you know the senders, and never click on links or download attachments that you weren’t expecting. It’s never a bad idea to call a client or co-worker to verify that they sent over files – your livelihood could be on the line.
Get in touch with CTECH Consulting Group to learn more about TelsaCrypt and how to protect yourself against other dangerous online threats. Contact our technology professionals at firstname.lastname@example.org or (403) 457-1478 .