If nothing else, ransomware hackers have good Customer Support!

300DDR

Well-Known Member
Reaction score
247
Location
Los Angeles, CA
A ransomware tale:

We had a 2 drive Drobo NAS with Tesla 4.x ransomware virus (no way to decrypt without paying, yet). *I found out what version virus it had using this website: https://id-ransomware.malwarehunterteam.com/identify.php.

Trying to access the Tor link referenced in the "decrypt info" .txt files failed. It seems that either the Drobo was encrypted twice (but the .txt file with URL/payment information wasn't updated/changed) or there was a bug in the virus that entered the wrong key/personal ID. With no way to access the link, there was no way to pay, and impossible to recover the files. :(

So, with no other options available, I used a "personal ID" from an older ransomware virus we had, in which we were able to decrypt without paying the ransom. I got access to the Tor site, but it wasn't the site specifically for the Drobo (it was for the old case). Therefore, the time period to pay the ransom had expired (it was $1000) and according to the website text, the key was already deleted.

I chatted with "support" from the Tor site for over 3 days and got them to:
1) Confirm they could still decrypt the data (even though the "key was deleted" and the "decrypt 1 file for free" option failed to work, since again, it was for a different drive with a different key)
2) Lower the price from $1000 to $800

I paid the fee and got the key the next day, but as I had feared, it failed to work.

Contacted support again. They told me to upload 1 encrypted file to sendspace.com and send link. Next day I had a new key and it worked! All data recovered.

Very interesting. It seems to suggest that either this same hacker group was responsible for the ransomware virus we got in last month (a completely different version) and/or had access to it's key. And/or, it means that they have the ability to decrypt any Tesla 4.x infected file using just the information from the headers of the encrypted files.
 
this was a amzing story, in a way I'm not surprised that better customer support, there techs make more than the average vendor's callcenter cubicle peon.
But so far I haven't heard of anyone who has paid and not getting their data back.
makes me surprised that the FBI and others are warning not pay them
On one hand the ransomeware makes me feel like the world is a cold hard place, but it's heartwarming to know that there really is honor among thieves
 
On one hand the ransomeware makes me feel like the world is a cold hard place, but it's heartwarming to know that there really is honor among thieves
I suspect they're not helping just to be nice/fair.

People wouldn't pay if there was a high risk of not getting their files decrypted after payment.
 
Last edited:
I was just going to post about that as well, but yeah, if they get a reputation for not being able to decrypt then everyone stops paying them.
 
Back
Top