{"id":12160,"date":"2016-05-19T09:00:43","date_gmt":"2016-05-19T13:00:43","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=12160"},"modified":"2017-09-24T08:05:42","modified_gmt":"2017-09-24T12:05:42","slug":"teslacrypt-master-key","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/teslacrypt-master-key\/12160\/","title":{"rendered":"Bye-bye, TeslaCrypt: Grand finale"},"content":{"rendered":"<p>According to the theory of probability, strange things have to happen every now and then: There is a small chance that a particular strange thing might happen and an infinite number of things or events that we would probably call strange. Sometimes these strange things are rather good \u2014 like, for example, the news that the cybercriminals behind the TeslaCrypt ransomware <a href=\"http:\/\/www.bleepingcomputer.com\/news\/security\/teslacrypt-shuts-down-and-releases-master-decryption-key\/?utm_content=buffer01c5a&amp;utm_medium=social&amp;utm_source=twitter.com&amp;utm_campaign=buffer\" target=\"_blank\" rel=\"noopener nofollow\">suddenly released<\/a> the master key. Using that master key, anyone can decrypt the files that were encrypted by every version of TeslaCrypt. Just, wow.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/05\/06022207\/teslacrypt-master-key-FB.jpg\"><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/05\/06022207\/teslacrypt-master-key-FB.jpg\" alt=\"Bye-bye, TeslaCrypt: Grand finale\" width=\"1280\" height=\"1280\" class=\"aligncenter size-full wp-image-12161\"><\/a><\/p>\n<p>It seems that for some reason the cybercriminals have decided to stop distributing TeslaCrypt \u2014 ransomware that was considered one of the worst so far of its kind. The distribution campaigns that used to bring TeslaCrypt to the victims switched to carrying CryptXXX instead (for which Kaspersky Lab has developed a cure).<\/p>\n<p>Once the security researchers at ESET noticed that, they decided to use the TeslaCrypt\u2019s TOR support site to ask if the cybercriminals would kindly release the master key \u2026 and they agreed. The now-defunct support site features the master key and notes \u201cProject closed\u201d and \u201cwe are sorry!\u201d<\/p>\n<p>http:\/\/www.bleepstatic.com\/images\/news\/ransomware\/t\/teslacrypt\/teslacrypt-closed\/teslacrypt-closed.png<\/p>\n<p>But for an average computer user, the key is of no use without some code. That\u2019s why BleepingComputer user BloodDolly, who had previously tried to make decryption utilities for TeslaCrypt, has used the key to update his TeslaDecoder.<\/p>\n<p>The utility is rather easy to use. To decrypt your files, you\u2019ll have to enter the key, select the file extension that TeslaCrypt used to encrypt your files, and then choose the destination folder with encrypted files \u2014 or just allow the utility to scan your whole hard drive.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Master decryption key released for <a href=\"https:\/\/twitter.com\/hashtag\/TeslaCrypt?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TeslaCrypt<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/ransomware?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#ransomware<\/a> via <a href=\"https:\/\/twitter.com\/threatpost?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">@threatpost<\/a> <a href=\"https:\/\/t.co\/YTqlZeYZ6z\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/YTqlZeYZ6z<\/a> <a href=\"https:\/\/t.co\/I9wsK2cq3J\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/I9wsK2cq3J<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/733337632135073794?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">May 19, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>You can download BloodDolly\u2019s TeslaDecoder from <a href=\"http:\/\/download.bleepingcomputer.com\/BloodDolly\/TeslaDecoder.zip\" target=\"_blank\" rel=\"noopener nofollow\">BleepingComputer<\/a>.<\/p>\n<p>The demise of TeslaCrypt is especially good news because the ransomware\u2019s encryption methods were constantly evolving since its release in February 2015. We at Kaspersky Daily have <a href=\"https:\/\/www.kaspersky.com\/blog\/teslacrypt-ransomware-targets-gamers\/8021\/\" target=\"_blank\" rel=\"noopener nofollow\">covered<\/a> <a href=\"https:\/\/www.kaspersky.com\/blog\/teslacrypt-20-ransomware\/9314\/\" target=\"_blank\" rel=\"noopener nofollow\">three different<\/a> <a href=\"https:\/\/www.kaspersky.com\/blog\/teslacrypt-strikes-again\/10860\/\" target=\"_blank\" rel=\"noopener nofollow\">versions of TeslaCrypt<\/a>. Although the researchers were able to find the cure for the first one, they hadn\u2019t managed to achieve the same result with the second and third versions. But with the release of the master key, it finally became possible.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/TeslaCrypt?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#TeslaCrypt<\/a>: Round Three \u2013 <a href=\"https:\/\/t.co\/LAPH359dZp\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/LAPH359dZp<\/a>  <a href=\"https:\/\/twitter.com\/hashtag\/ransomware?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#ransomware<\/a> <a href=\"https:\/\/t.co\/6m1MdgfmSz\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/6m1MdgfmSz<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/676774484158881792?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">December 15, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Although cases in which criminals realize that they\u2019ve done real harm to people and decide to change are rather rare, we hope this won\u2019t be the last case of ransomware makers ceasing their bad works and trying to mend the damage they\u2019ve done. There\u2019s a lot of different ransomware and a small chance that at least one more cybercriminal will realize that they are doing harm. A lot of small chances sum into something bigger, so our hopes aren\u2019t groundless.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>All files encrypted with TeslaCrypt ransomware can now be decrypted \u2026 thanks to its creators<\/p>\n","protected":false},"author":696,"featured_media":12162,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2683],"tags":[1733,420,1106,1627],"class_list":{"0":"post-12160","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-decryptors","10":"tag-ransomware","11":"tag-teslacrypt","12":"tag-utilities"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/teslacrypt-master-key\/12160\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/teslacrypt-master-key\/7167\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/teslacrypt-master-key\/7222\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/teslacrypt-master-key\/7148\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/teslacrypt-master-key\/8355\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/teslacrypt-master-key\/8221\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/teslacrypt-master-key\/11979\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/teslacrypt-master-key\/2085\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/teslacrypt-master-key\/5688\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/teslacrypt-master-key\/7722\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/teslacrypt-master-key\/11443\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/teslacrypt-master-key\/11979\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/teslacrypt-master-key\/12160\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/teslacrypt-master-key\/12160\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/decryptors\/","name":"decryptors"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12160","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/696"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=12160"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12160\/revisions"}],"predecessor-version":[{"id":18820,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/12160\/revisions\/18820"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/12162"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=12160"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=12160"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=12160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}