ESET® released
decryptor for recent variants of TeslaCrypt ransomware. If you have been
infected by one of the new variants (v3 or v4) of notorious ransomware
TeslaCrypt and encrypted files files had the extensions .xxx, .ttt, .micro,
.mp3 or left unchanged, then ESET has good news for you.
Recently, TeslaCrypt’s operators have announced they are wrapping up their malevolent activities. On this occasion one of ESET’s analysts anonymously contacted the group, using the official support channel offered to the ransomware victims by the TeslaCrypt’s operators and requested the universal master decryption key. Surprisingly, they made it public.
This has allowed ESET to promptly create a free decrypting tool able to
unlock files affected by all variants of this ransomware. For instructions on
how to use the decryptor, please visit ESET
Knowledgebase website.
We need to stress that, ransomware stays one
of the largest threats at this moment and prevention is essential to keep users
safe. Therefore, they should keep operating system and software updated, use
a reliable
security solution with multiple layers of protection, and
regularly backup all important and valuable data at an offline location (such
as external storage).
We also advise all users to be very careful
when clicking on links or files in their email or browser. Especially, if they
have received a message from an unknown source or it looks otherwise
suspicious.