Your Package Has Been Successfully Encrypted: TeslaCrypt 4.1A and the Malware Attack Chain
Gregory Alan Bolcer stashed this in Security
Stashed in: Cyberwar!
To save this post, select a stash from drop-down menu or type in a new one:
TeslaCrypt has nothing to do with Tesla.
Let's fight RansomWare:
Ransomware quickly gained national headlines in February after the Hollywood Presbyterian Medical Center in Los Angeles paid $17,000 in bitcoins to regain access to its systems. Since then, other hospitals have similarly been attacked with ransomware, leading some industry experts to proclaim it an industry-specific crisis. Although it is commonly associated with directed campaigns aimed at high-value targets such as hospitals, ransomware is actually becoming less targeted and more omnidirectional. As our latest research on TeslaCrypt demonstrates, ransomware not only is becoming more widespread, but it is also becoming more sophisticated and adaptable. TeslaCrypt 4.1A is only a week old and contains an even greater variety of stealth and obfuscation techniques than its previous variants, the earliest of which is just over a year old. Organizations and individuals alike must be aware ransomware is equally likely to be found in personal networks as in critical infrastructure networks, and that its rapid transformation and growing sophistication presents significant challenges to the security community and significant threats to users of all kinds.
How often are perpetrators caught? Do they serve significant prison time?
I'm not sure they've ever been caught. They're international.