The First Ransomware to Exploit Telegram Cracked and Decryptor Published

By David Balaban

A security researcher whose name is Nathan Scott managed to break the encryption model employed by the Telecrypt ransomware. The unusual characteristic that made this virus to stand out was the server-client connection method. This time ransomware creators decided to make use of the Telegram protocol, as opposed to HTTPS or HTTP like the majority of ransomware does nowadays. Also Read: 7 Cases When Victims Paid Ransom to stop cyber attacks Since it is dependent upon Telegram, Telecrypt requires an […]

This is a post from HackRead.com Read the original post: The First Ransomware to Exploit Telegram Cracked and Decryptor Published

Continue reading The First Ransomware to Exploit Telegram Cracked and Decryptor Published

The First Ransomware to Exploit Telegram Cracked and Decryptor Published

By David Balaban

A security researcher whose name is Nathan Scott managed to break the encryption model employed by the Telecrypt ransomware. The unusual characteristic that made this virus to stand out was the server-client connection method. This time ransomware creators decided to make use of the Telegram protocol, as opposed to HTTPS or HTTP like the majority of ransomware does nowadays. Also Read: 7 Cases When Victims Paid Ransom to stop cyber attacks Since it is dependent upon Telegram, Telecrypt requires an […]

This is a post from HackRead.com Read the original post: The First Ransomware to Exploit Telegram Cracked and Decryptor Published

Continue reading The First Ransomware to Exploit Telegram Cracked and Decryptor Published

TeleCrypt – the ransomware abusing Telegram API – defeated!

A new ransomware, TeleCrypt appeared recently carrying some new ideas. Telecrypt abuses the API of a popular messenger, Telegram.Categories: Malware
Threat analysisTags: malwareransomwareTeleCryptTeleCrypt DecryptorTelegram API(Read more…) Continue reading TeleCrypt – the ransomware abusing Telegram API – defeated!