Teslacrypt 3.0 now appends .mp3 to the names of all encrypted files. Basically, it is the same virus that changes its minor features. The just-surfaced version of this ransomware comes up with its original names of the ransom notes: H_e_l_p_RECOVER_INSTRUCTIONS+[3-characters].png H_e_l_p_RECOVER_INSTRUCTIONS+[3-characters].txt H_e_l_p_RECOVER_INSTRUCTIONS+[3-characters].HTML Teslacrypt 3.0 holds data stored in a computer system for ransom. The data remains on a host machine. The virus applies a sophisticated encryption so that any application cannot read the affected files. To render files with .mp3 extension into a readable format, a victim is told to pay a certain amount. The amount is payable in bitcoins and via TOR network. The scam is an ongoing affair. The ransomware in question is but one of a number of counterparts. They differ by the encryption method applied, prevailing propagation schemes, ransom, amount. etc. Within its variety, Teslacrypt 3.0 modifications undergo continuous improvements to complicate the removal of this virus and the recovery of files with .mp3 extension. That sounds too dull for a victim. Let us consider it from another angle, though. As the ransomware requires constant approval and updating it has multiple vulnerabilities. Even if you get your data encrypted and the value of thus affected information is very high, please do not rush into paying the ransom. Most likely, a ransom-free solution for your case is available. There are plenty of data recovery tools. Some of them are tailored to handle the data encrypted for ransom. Most likely, such tools would perform a satisfactory backup. In order to restore complete access to the latest editions of the encrypted files, relevant decryption key shall apply. Once inside a computer system, the virus completes its installation. The successful installation enables the infection to scan any drive available from the affected machine. That extends to any mapped drives, including network and web-hosted sources. The detected items cover nearly any files on scanned drives. That is, the rogue applies a very broad filter. It detects files with specific extensions. The extensions include virtually any existing variants. The data detected by Teslacrypt 3.0 is modified using a sophisticated decryption technique. A private key is used and dispatched to a remote server. Victims are presented with a relevant ransom note that details the method and terms of payment and other applicable conditions. Its language may vary from case to case ranging from rather flattering to rather threatening and mocking. Indeed, unless you acquire the private key, the decryption of .mp3 files is not feasible. Fortunately, cases have been reported of releasing thousands of keys by white hat hackers and cyber police. Hopefully, that is to be the case for the ransomware in question, too. Again, as stated above, there are a number of approaches enabling sufficient backups for ransomed data. If hit by the virus, kindly apply the backup solutions rather than providing further incentives to the crooks by transferring the amount claimed. It is also important to note that a victim needs to get rid of Teslacrypt 3.0 upon completing required recovery actions. Failure to remove Teslacrypt 3.0 may entail further damages. Removal of .mp3 file extension virus disables the option of applying the decryption key.