"We are sorry!" TeslaCrypt ransomware authors release decryption key

russian hackers
The developers of the notorious TeslaCrypt ransomware have called it a day and released a master decryption key for all of their victims to retrieve their encrypted files.

Security researchers at ESET had been tracking the number of infections at the hands of TeslaCrypt, which is a piece of ransomware that encrypts the users’ files and holds them up for a bitcoin ransom. But the researchers noticed a considerable dip in TeslaCrypt cases, with other forms of ransomware becoming more prevalent like CryptXXX.

According to a report from BleepingComputer, the makers of TeslaCrypt operated a support chat service, a peculiar service that a number of cybercriminals have actually been using. The researcher contacted TeslaCrypt’s authors through this feature and much to his surprise, they happily handed over the decryption key for free.

The decryption details have now been posted on the webpage that previously hosted the payment details for victims with the message, “we are sorry!”

teslacrypt-decryption

Using the details that they retrieved from the decryption key, ESET has now released a decryption tool for TeslaCrypt victims to guide them through the decryption process and get their data back.

ESET is keen to point out that decryption software like this isn’t a silver bullet to ransomware.

“We must stress that ransomware remains one of the most dangerous computer threats at this moment, and prevention is essential to keep users safe,” said ESET in its announcement. “Therefore, they should keep operating systems and software updated, use reliable security solutions with multiple layers of protection, and regularly back up all important and valuable data at an offline location (such as external storage).”

Users are also advised to stay wary of suspicious looking links in their browsers or emails from unknown sources, which may be vehicles used to distribute the ransomware.

Cases of ransomware have become more and more notorious in recent months with a number of high profile cases and several new variants of the viruses making the rounds, so users should stay vigilant.

Web

Shutdown makes dozens of .gov websites insecure due to expired TLS certificates

The US government shutdown is causing trouble in internet security. As the shutdown enters day 22, dozens of government websites have been rendered insecure or inaccessible due to expired transport layer security (TLS) certificates.
Mobile

We tried all the latest and greatest smartphones to find the best of 2019

Smartphones are perhaps the most important and personal piece of tech on the planet. That’s why it’s important to pick the best phone for your individual needs. Here are the best smartphones you can buy.
Computing

Secure your Excel documents with a password by following these quick steps

Excel documents are used by people and businesses all over the world. Given how often they contain sensitive information, it makes sense to keep them from the wrong eyes. Thankfully, it's easy to secure them with a password.
Computing

Protecting your PDF with a password isn't difficult. Just follow these steps

If you need to learn how to password protect a PDF, you have come to the right place. This guide will walk you through the process of protecting your documents step-by-step, whether you're running a MacOS or Windows machine.
Computing

This ‘computer mouse’ sets the new size standard for portable computing

The Raspberry Pi is an amazingly capable little computer and it's small enough that it can fit just about anywhere. Even in a computer mouse — if you're willing to build a custom chassis for it.
Computing

Change your mouse cursor in Windows with these quick tips

The standard mouse cursor is boring, so change it! With this guide on how to change your mouse cursor in Windows, you can choose to use one of Microsoft's pre-installed cursors or download something a bit more extravagant.
Computing

Go hands-free in Windows 10 with speech-to-text support

Looking for the dictation, speech-to-text, and voice control options in Windows 10? Here's how to set up Speech Recognition in Windows 10 and use it to go hands-free in a variety of different tasks and applications within Windows.
Computing

Printing to PDF in Windows is easy, no matter which method you use

Microsoft's latest operating system makes it easier than ever to print to PDF in Windows, but there are alternative methods for doing so, even if you want to forgo Adobe Acrobat. Here's how.
Computing

Changing a PDF into an EPUB file is easier than you might think

If you like to read on a tablet or ebook reader, you'll find that ePUB files offer a number of advantages over PDFs. With this guide, we'll show you how to convert a PDF to EPUB in a few quick steps.
Computing

Need to combine a PDF? Here's how to get it done on both Windows and Mac

Sometimes juggling multiple files at once is more of a hassle than a convenience, especially when a single file would do. This quick guide will teach you how to combine PDF files on Windows, MacOS, or with online tools.
Computing

Don’t even bother with the rest. Here are the only laptop brands that matter

If you want to buy your next laptop based around a specific brand, it helps to know which the best brands of laptops are. This list will give you a good grounding in the most reliable, quality laptop manufacturers today.
Computing

Style up your MacBook Air with one of these great cases or sleeves

Whether you’re looking for added protection or a stylish flourish, you’re in the right place for the best MacBook Air cases. We have form-hugging cases, luxurious covers and padded sleeves priced from $10 to $130. Happy shopping!
Computing

Getting Windows 10 updated doesn't have to be so painful

Windows update not working? It's a more common problem than you might think. Fortunately, there are a few steps you can take to troubleshoot it and in this guide we'll break them down for you step by step.
Computing

Reluctant to give your email address away? Here's how to make a disposable one

Want to sign up for a service without the risk of flooding your inbox with copious amounts of spam and unwanted email? You might want to consider using disposable email addresses via one of these handy services.