{"id":1537,"date":"2016-03-21T16:00:31","date_gmt":"2016-03-21T15:00:31","guid":{"rendered":"http:\/\/www.satinfo.es\/noticies\/?p=1537"},"modified":"2016-03-21T16:00:31","modified_gmt":"2016-03-21T15:00:31","slug":"nueva-version-de-sproces-8-8-para-controlar-nueva-variante-de-teslacrypt","status":"publish","type":"post","link":"https:\/\/www.satinfo.es\/noticies\/2016\/nueva-version-de-sproces-8-8-para-controlar-nueva-variante-de-teslacrypt\/","title":{"rendered":"Nueva versi\u00f3n de Sproces 8.8 para controlar nueva variante de Teslacrypt"},"content":{"rendered":"<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">Dado que hay variantes de TESLACRYPT-V, que no sobrescriben ni el nombre ni la extensi\u00f3n del fichero que codifican con RSA4096, conviene saber que donde ha cifrado ficheros ha dejado su huella en tres ficheros de nombre <\/span><\/span><\/p>\n<ul>\n<li>\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">RECOVERxxxxx.txt<\/span><\/span><\/p>\n<\/li>\n<li>\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">RECOVERxxxxx.png<\/span><\/span><\/p>\n<\/li>\n<li>\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">RECOVERxxxxx.html<\/span><\/span><\/p>\n<\/li>\n<\/ul>\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">cuyo contenido t\u00edpico es el siguiente:<\/span><\/span><\/p>\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">___________<\/span><\/span><\/p>\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><i>NOT YOUR LANGUAGE? USE https:\/\/translate.google.com<\/i><\/span><\/span><\/p>\n<p align=\"left\">\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><i>What&#8217;s the matter with your files?<\/i><\/span><\/span><\/p>\n<p align=\"left\">\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><i>Your data was secured using a strong encryption with RSA4096.<\/i><\/span><\/span><\/p>\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><i>Use the link down below to find additional information on the encryption keys using RSA4096:https:\/\/en.wikipedia.org\/wiki\/RSA_(cryptosystem) <\/i><\/span><\/span><\/p>\n<p align=\"left\">\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><i>What exactly that means?<\/i><\/span><\/span><\/p>\n<p align=\"left\">\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><i>It means that on a structural level your files have been transformed. You won&#8217;t be able to use, read, see or work with them anymore.<\/i><\/span><\/span><\/p>\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><i>In other words they are useless, however, there is a possibility to restore them with our help.<\/i><\/span><\/span><\/p>\n<p align=\"left\">\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><i>What exactly happened to your files?<\/i><\/span><\/span><\/p>\n<p align=\"left\">\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><i>*** Two personal RSA4096 keys were generated for your PC\/Laptop; one key is public, another key is private.<\/i><\/span><\/span><\/p>\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><i>*** All your data and files were encrypted by the means of the public key, which you received over the web.<\/i><\/span><\/span><\/p>\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><i>*** In order to decrypt your data and gain access to your computer you need a private key and a decryption software, which can be found on one of our secret servers.<\/i><\/span><\/span><\/p>\n<p align=\"left\">\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><i>What should you do next?<\/i><\/span><\/span><\/p>\n<p align=\"left\">\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><i>There are several options for you to consider:<\/i><\/span><\/span><\/p>\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><i>1. You can wait for a while until the price of a private key will raise, so you will have to pay twice as much to access your files or<\/i><\/span><\/span><\/p>\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><i>2. You can start getting BitCoins right now and get access to your data quite fast.<\/i><\/span><\/span><\/p>\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><i>In case you have valuable files, we advise you to act fast as there is no other option rather than paying in order to get back your data.<\/i><\/span><\/span><\/p>\n<p align=\"left\">\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><i>In order to obtain specific instructions, please access your personal homepage by choosing one of the few addresses down below:<\/i><\/span><\/span><\/p>\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><i>http:\/\/kkr4hbwdklf234bfl84uoqleflqwrfqw &#8230; xxxxxxxxxx<\/i><\/span><\/span><\/p>\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><i>http:\/\/974gfbjhb23hbfkyfaby3byqlyuebvly &#8230; xxxxxxxxxx<\/i><\/span><\/span><\/p>\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><i>http:\/\/a64gfdsjhb4htbiwaysbdvukyft5q.zo &#8230; xxxxxxxxxx<\/i><\/span><\/span><\/p>\n<p align=\"left\">\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><i>If you can&#8217;t access your personal homepage or the addresses are not working, complete the following steps:<\/i><\/span><\/span><\/p>\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><i>1 Download TOR Browser &#8211; http:\/\/www.torproject.org\/projects\/torbrowser.html.en<\/i><\/span><\/span><\/p>\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><i>2 Install TOR Browser<\/i><\/span><\/span><\/p>\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><i>3 Open TOR Browser<\/i><\/span><\/span><\/p>\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><i>4 Insert the following link in the address bar: k7tlx3ghr3m4n2tu.onion\/xxxxxxxxxxxxxxxx<\/i><\/span><\/span><\/p>\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><i>5 Follow the steps on your screen<\/i><\/span><\/span><\/p>\n<p align=\"left\">\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><i>IMPORTANT INFORMATION<\/i><\/span><\/span><\/p>\n<p align=\"left\">\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><i>Your personal homepages:<\/i><\/span><\/span><\/p>\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><i>http:\/\/kkr4hbwdklf234bfl84uoqleflqwrfqw &#8230; xxxxxxxxxx<\/i><\/span><\/span><\/p>\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><i>http:\/\/974gfbjhb23hbfkyfaby3byqlyuebvly &#8230; xxxxxxxxxx<\/i><\/span><\/span><\/p>\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><i>http:\/\/a64gfdsjhb4htbiwaysbdvukyft5q.zo &#8230; xxxxxxxxxx<\/i><\/span><\/span><\/p>\n<p align=\"left\">\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><i>Your personal page Tor-Browser k7tlx3ghr3m4n2tu.onion\/xxxxxxxxxxxxxxxx<\/i><\/span><\/span><\/p>\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\"><i>Your personal identification ID: xxxxxxxxxxxxxxxx<\/i><\/span><\/span><\/p>\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">_______________<\/span><\/span><\/p>\n<p align=\"left\">\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">Con el actual ELISTARA vamos implementando las modificaciones para poder detectar y eliminar las nuevas variantes que van apareciendo, si bien en algunos casos no crean clave de lanzamiento para pr\u00f3ximos reinicios, ni el fichero malware en ruta t\u00edpica donde acostumbran a ser ubicados, sino que el fichero lo descargan en \u201cMis documentos\u201d, quedando all\u00ed aparcado hasta que un d\u00eda el mismo usuario lo ejecute y vuelva a cifrar los ficheros de datos&#8230;<\/span><\/span><\/p>\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">Es por ello, que para quien haya sufrido un TESLACRYPT y el ELISTARA no haya encontrado la clave indicada ni el fichero en cuesti\u00f3n, se ha a\u00f1adido a la versi\u00f3n 8.8 del SPROCES (que ya est\u00e1 disponible) un listado de los ficheros EXE que haya en dicha carpeta, para poder pedir los sospechosos, para analizarlos y controlarlos, si procede.<\/span><\/span><\/p>\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">De otra forma, podr\u00edan quedar malwares aparcados que podr\u00edan ser ejecutados<\/span><\/span><\/p>\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">Con todo ello esperamos que, entre el ELISTARA, el SPROCES y nuestros t\u00e9cnicos, se puedan evitar cat\u00e1strofes desesperar\u00edan a mas de uno.<\/span><\/span><\/p>\n<p align=\"left\">\n<p align=\"left\"><span style=\"color: #000000;\"><span style=\"font-size: small;\">A PESAR DE ELLO, MUCHO CUIDADO Y RECORDAR NO EJECUTAR FICHEROS NI LINKS ANEXADOS A MAILS NO SOLICITADOS !!!<\/span><\/span><\/p>\n<p align=\"left\">\n<p class=\"western\" align=\"left\">\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium;\"><span style=\"color: #0000ff;\"><span style=\"font-size: small;\"><span lang=\"es-ES\"><b><br \/>\nSATINFO<\/b><\/span><\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>, <\/b><\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>SERVICIO DE ASISTENCIA T\u00c9CNICA INFORMATICA<\/b><\/span><\/span><b> <\/b><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>2<\/b><\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>1<\/b><\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\"><b> de <\/b><\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>Marzo<\/b><\/span><\/span><b> <\/b><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>de 201<\/b><\/span><\/span><span style=\"font-size: small;\"><span lang=\"es-ES\"><b>6<\/b><\/span><\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dado que hay variantes de TESLACRYPT-V, que no sobrescriben ni el nombre ni la extensi\u00f3n del fichero que codifican con RSA4096, conviene saber que donde ha cifrado ficheros ha dejado su huella en tres ficheros de nombre RECOVERxxxxx.txt RECOVERxxxxx.png RECOVERxxxxx.html cuyo contenido t\u00edpico es el siguiente: ___________ NOT YOUR LANGUAGE? USE https:\/\/translate.google.com What&#8217;s the matter <a href='https:\/\/www.satinfo.es\/noticies\/2016\/nueva-version-de-sproces-8-8-para-controlar-nueva-variante-de-teslacrypt\/' class='excerpt-more'>[&#8230;]<\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[822,891,892],"tags":[10,721],"class_list":["post-1537","post","type-post","status-publish","format-standard","hentry","category-822","category-otros","category-todos","tag-sproces","tag-teslacrypt","category-822-id","category-891-id","category-892-id","post-seq-1","post-parity-odd","meta-position-corners","fix"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts\/1537","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/comments?post=1537"}],"version-history":[{"count":0,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/posts\/1537\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/media?parent=1537"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/categories?post=1537"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.satinfo.es\/noticies\/wp-json\/wp\/v2\/tags?post=1537"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}