<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p>The notorious <strong>TeslaCrypt</strong> ransomware has wreaked havoc on victims since its emergence in 2015. In March of this year,&nbsp;<a href="https://blog.fortinet.com/2016/03/08/cryptowall-teslacrypt-and-locky-a-statistical-perspective">Fortinet</a>&nbsp;ranked it as the third biggest player in the ransomware scene, after <strong>CryptoWall</strong> and <strong>Locky</strong>. <strong>TeslaCrypt</strong> was originally used to target gamers by encrypting files of popular games such as League of Legends, Call of Duty, World of Warcraft, etc. It has since evolved to become an extremely powerful ransomware&nbsp;with particularly caustic capabilities including anti-debugging and anti-monitoring features,&nbsp;string obfuscation, entrenchment, and more.</p> <!--more--><p>Researchers at ESET recently noticed that <strong>TeslaCrypt</strong> activity is slowing and possibly coming to a halt. One ESET researcher contacted <strong>TeslaCrypt</strong>'s customer support on the payment website and asked if they would consider releasing the master decryption key. In an extremely surprising move, the <strong>TeslaCrypt</strong> actors did just that.</p> <p>The payment function of the site was closed, and a message was released stating:</p> <p>"Project closed! Master key for decrypt: 440A241DD80FCC5664E861989DB716E08CE627D8D40C7EA360AE855C727A49EE. Wait for other people make universal decrypt software. We are sorry!"</p> <p>After this shocking turn of events, it seems that many threat actors have switched from <strong>TeslaCrypt</strong> to using <strong>CryptXXX</strong> as their new, preferred ransomware according to <a href="http://www.scmagazine.com/cryptxxx-looks-to-fill-void-after-teslacrypts-departure-from-ransomware/article/498287/">TrendMicro</a>. This new ransomware, which came out in April, was decrypted twice within the course of one month as its first two versions were not strong enough. Today, version 3.0 is prevalent and uses anti-sandboxing features and a watchdog process to avoid detection or termination.</p> <p>A number of decryption tools are available online for the various <strong>TeslaCrypt</strong> versions.</p> <p>ThreatSTOP customers are protected from <strong>TeslaCrypt</strong>.</p></span>