BlackMamba Ransomware

Posted: December 23, 2020 | Category: Ransomware
The BlackMamba Ransomware is a file-locking Trojan without an attached family or Ransomware-as-a-Service. The BlackMamba Ransomware blocks the user's media files by encrypting them and creates pop-ups that ask for ransoms to its Bitcoin wallet for a recovery service. Users should have a backup to prevent any need of decrypting its attack for data retrieval and let high-quality security services remove the BlackMamba Ransomware as they detect it. First available in threat databases as the...

Gac Ransomware

Posted: December 22, 2020 | Category: Ransomware
The Gac Ransomware is a file-locking Trojan from the Dharma Ransomware (or Crysis Ransomware) family. As part of a Ransomware-as-a-Service, it may use difficult-to-predict infection methods but always attacks the user's media files by encrypting them so that they can't open. Besides possessing backups for data recovery, users can protect their Windows PCs with standard security solutions to detect and delete the Gac Ransomware. The Ransomware-as-a-Service that begins with early variants...

cuteRansomware Ransomware

Posted: December 22, 2020 | Category: Ransomware
The cuteRansomware Ransomware is a file-locking Trojan without a family that blocks data on Windows systems. Like most threats that use encryption features for blocking files, it is most likely to target documents and other personal media. Users should have backups for recovering without paying the ransom. Most PC security products with threat-detecting features should delete the cuteRansomware Ransomware beforehand and are dependable disinfection solutions. As part of an irregular trickle...

Rastar Ransomware

Posted: December 21, 2020 | Category: Ransomware
Ransomware threats are designed to cause long-lasting damage to the files found on infected machines. The authors of these threats often claim to possess a working decryption tool, which victims can obtain by paying some Bitcoin. The authors of the newly identified Rastar Ransomware are no different, and they promise to help all victims who agree to pay a ransom fee. The Rastar Ransomware is being spread via fake downloads, corrupted emails and other deceptive content. It is best to protect...

VIAM Ransomware

Posted: December 21, 2020 | Category: Ransomware
The VIAM Ransomware is a file-locker Trojan that can take data like documents hostage by encrypting it. It also extorts money from victims with ransom notes similar to those of Ryuk Ransomware's family. Users should protect any files by keeping backups on other devices and disinfect their computers through comprehensive anti-malware scans that remove the VIAM Ransomware and other threats. A file-locking Trojan that malware experts rate as unrelated to other known families currently is...

21btc Ransomware

Posted: December 21, 2020 | Category: Ransomware
The 21btc Ransomware is a file-locking Trojan that's part of Dharma Ransomware's family, a Ransomware-as-a-Service for hire by other threat actors. It can impede users' access to their files, media like documents mainly by encrypting them, remove local backups and deliver ransom demands through pop-ups. Users should withhold ransoms and use superior recovery options when available after removing the 21btc Ransomware through a dedicated anti-malware product. Extending its variant...

RIP Lmao Ransomware

Posted: December 18, 2020 | Category: Ransomware
The RIP Lmao Ransomware is a file-locking Trojan that's independent of any family or group. It blocks work and personal files on Windows environments and holds them as hostages until the victim pays its ransom. All Windows users should have backups for general protection and let their anti-malware solutions remove the RIP Lmao Ransomware on detection. Plunders of free programming resources and 'rented' Ransomware-as-a-Services make up most of the file-locking Trojan industry, but not all...

Legend Ransomware

Posted: December 18, 2020 | Category: Ransomware
The Legend Ransomware is a file-locking Trojan from the VoidCrypt Ransomware family, which blocks the user's files for extorting a ransom. Along with converting files to non-opening ones with its encryption, the Legend Ransomware can create ransom notes in HTA formats, stop some file-managing programs and change the extensions on files' names. Users should protect their work with appropriate backup standards and let a dedicated security solution remove the Legend Ransomware promptly....

Cyberpunk 2077 Android Ransomware

Posted: December 17, 2020 | Category: Ransomware
The Cyberpunk 2077 Android Ransomware is a file-locking Trojan and Android port of CoderWare Ransomware. Like the first program, it blocks the user's files with secure encryption, creates ransom notes for recovery that ask for Bitcoins and uses a Cyberpunk 2077 video game theme. Users should have an Android-compatible security service to remove the Cyberpunk 2077 Android Ransomware for their safety and restore files from a backup. The first version of the CoderWare Ransomware campaign got...

Kobos Ransomware

Posted: December 17, 2020 | Category: Ransomware
Kobos is the name of a ransomware application designed to cause damage to the files it finds on infected systems. Threats of this sort have become the #1 hacking tool in the arsenal of cybercriminals, and, unfortunately, it may often be a very difficult task to recover from their attacks. The Kobos Ransomware appears to use a well-made file-encryption algorithm, which cannot be cracked via free utilities. This means that victims of the attack will need to use alternative file recovery...

Mifr Ransomware

Posted: December 15, 2020 | Category: Ransomware
The Mifr Ransomware is a file-locker designed to encrypt important files it finds on infected machines. The authors of this file-encryption Trojan might be using different strategies to propagate it online – email spam, fake social media posts, torrent trackers, and pirated content are just some of the opportunities that Mifr Ransomware's creators may explore. If the Mifr Ransomware ends up running on your machine, it may render many of your files inaccessible. It does this by encrypting...

PLEASE_READ_ME Ransomware

Posted: December 15, 2020 | Category: Ransomware
The PLEASE_READ_ME Ransomware is a campaign that targets weakly-protected MySQL servers and collects their databases, holding them for ransom on the threat actor's website. Unlike most ransomware attacks, these steps don't involve a threatening program that modifies or blocks the files. MySQL server admins should ignore the ransom and keep backups of their files elsewhere to prevent the PLEASE_READ_ME Ransomware attacks from succeeding at the extortion. While most 'ransomware' involves...

Genesis Ransomware

Posted: December 14, 2020 | Category: Ransomware
The Genesis Ransomware is a file-encryption Trojan designed to cause long-term damage to the files it accesses on the compromised system. The files, which this ransomware locks will be tagged with the '.genesis' extension at the end of their original names. Another change that the Genesis Ransomware brings is the creation of the document '!HELP!.txt,' which is usually stored on the desktop after the attack is executed. The destructive nature of Genesis Ransomware is not a surprise because...

Leitkcad Ransomware

Posted: December 14, 2020 | Category: Ransomware
The Leitkcad Ransomware is a file-encryption Trojan, which shares significant similarities with the file-locker family known as the Prometey Ransomware. Sadly, neither the Prometey Ransomware nor the newly identified Leitkcad Ransomware are decryptable via free utilities. If the latter has infiltrated your computer, you can probably not use your important files like documents, spreadsheets, videos, music, and more. This is because the contents of these files were encrypted by the Leitkcad...

Snopy Ransomware

Posted: December 11, 2020 | Category: Ransomware
The authors of the Snopy Ransomware are extorting their victims for a ransom payment of $20. They hope to convince their victims to purchase a decryption tool, which will help them restore the files that were damaged during the Snopy Ransomware attack. The good news is that paying this small sum may not be necessary. This is because the Snopy Ransomware uses the file-encryption algorithm and features found in the Xorist Ransomware family, a low-quality piece of threatening software whose...
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 375