TeslaRVNG1.5 Ransomware
The TeslaRVNG1.5 Ransomware is a new file-locker, which is based on a well-known file-locker called Ouroboros. Unfortunately, neither of these file-encryption Trojans are compatible with free decryption tools. Their victims may need to resort to alternative data recovery software and methods, which might not always work flawlessly. When the TeslaRVNG1.5 Ransomware takes over a computer, it will aim to encrypt files that the victim is likely to use on a daily basis – documents, archives, databases, media and more. The locked files are renamed by using the following pattern 'id[<VICTIM ID>].[tesla369@cock.li].<ORIGINAL FILENAME>.teslarvng1.5.'
The attack usually ends with the creation of the ransom note 'teslarvng1.5.hta', which contains a short message from the perpetrators. They ask the victim to message them via the emails tesla369@cock.li and teslacrypt369@cyberfear.com.
Get in touch with ransomware creators is never recommended because most of the time, they will not fulfill their part of the deal if you send them the money. The authors of the TeslaRVNG1.5 Ransomware do not provide proof that they have a working decryptor. It is recommended to remove the TeslaRVNG1.5 Ransomware with the use of a reputable anti-malware application. After this, victims need to try and restore their files – this can be done through a backup or by using alternative data recovery and restoration software.
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.