Chekyshka Ransomware

Posted: July 2, 2019 | Category: Ransomware
The Chekyshka Ransomware is a file-locking Trojan that can block your media content with encryption-based attacks. It's not a part of a well-known family like Hidden Tear, and its decryption potential remains unknown. Using appropriate security standards for your backups can keep them safe from this threat's payload, and conventional anti-malware services should handle uninstalling the Chekyshka Ransomware appropriately. A file-locking Trojan with a Russia-inspired brand and an English ransom note is in the wild and attacking users' NAS or network-attached storage. Its campaign could be...

Cago Ransomware

Posted: July 2, 2019 | Category: Ransomware
The Cago Ransomware is a file-locking Trojan that can block your PC's content, such as documents, image galleries, or music, by encrypting the files. Although its family, if any, isn't known, encryption is easily securable and users shouldn't assume that a free decryption service is possible. Anti-malware tools can protect your PC by blocking or removing the Cago Ransomware, and backups can streamline the recovery process. There's an ongoing investigation into a new file-locking Trojan, with a Russian AV vendor estimating it as being a variant of the DCRTR-WDM Ransomware family....

DCOM Ransomware

Posted: July 1, 2019 | Category: Ransomware
The DCOM Ransomware is a file-locker Trojan that takes your documents, pictures, and other media hostage with encryption. Users should rule out other restoration solutions for their work before considering the ransom option, which this Trojan demands through a text file. Many anti-malware products can delete the DCOM Ransomware automatically, and secure backups can give users a fallback solution for recovering. A file-locking Trojan whose ancestry is murky is trying its hand against the file-storing habits of random Windows users. This threat, the DCOM Ransomware, is being called out by...

Litar Ransomware

Posted: July 1, 2019 | Category: Ransomware
The Litar Ransomware is a file-locking Trojan from the STOP Ransomware's Ransomware-as-a-Service family. RaaS Trojans 'rent' themselves out to third-party criminals who update the distribution exploits and ransoming addresses while blocking the digital media of victims of their choice. Backups and anti-malware services are equally critical for damage mitigation and removing the Litar Ransomware securely. The STOP Ransomware 's procession of file-encrypting operations against Asian nations remains a constant factor, as even the newest releases from its group are expressing a similar...

Freezing Ransomware

Posted: June 28, 2019 | Category: Ransomware
The Freezing Ransomware is a variant of the Freeme Ransomware, a file-locking Trojan. This .NET-based threat uses encryption for blocking files, may generate pop-ups during its attacks, and leaves ransom messages asking for payment within one week. A backup that's well-maintained is an appropriate post-infection recovery option against this Trojan, and most anti-malware programs should block and delete the Freezing Ransomware instantly. A .NET Framework Trojan with PowerShell commands is out in the wild, wielding AES encryption with an icy theme. Freezing Ransomware's choice of brand...

Nusar Ransomware

Posted: June 28, 2019 | Category: Ransomware
The Nusar Ransomware is a file-locking Trojan that's from the STOP Ransomware family, whose campaigns are prolific throughout Asia. The Nusar Ransomware can block media automatically by encrypting it, demand ransoms through text files, download other threats, and remove backups. Retrieving your data from an external backup is an effective response to the Nusar Ransomware infections, and most anti-malware products will identify and delete the Nusar Ransomware appropriately. While the STOP Ransomware maintains a breakneck development pace after, finally, hitting 1.0 with the Muslat...

Pzdc Ransomware

Posted: June 27, 2019 | Category: Ransomware
Ransomware threats usually aim to cause as much damage as possible, and this is why their creators configure them to encrypt a huge variety of file formats. However, a new file-locker has emerged on the horizon, and it appears to be much more precise about the files it encrypts – the PZDC Ransomware only locks the contents of databases. This file-encryption Trojan appears to be propagated via phishing emails that are likely to target companies and organizations – it is unlikely that the authors want to target regular users, since the PZDC Ransomware does not bother causing damage to files...

Popotic Ransomware

Posted: June 27, 2019 | Category: Ransomware
The Popotic Ransomware is a file-locker Trojan that can block different media types on your computer through encryption. Data-encrypting attacks can be irreversible, and malware experts recommend having backups in secure locations for an all-inclusive and free recovery solution. Otherwise, use anti-malware services for deleting the Popotic Ransomware on sight and monitor infection vectors and server weaknesses, such as open RDP. A threat actor is going to the trouble of writing a unique ransom note, instead of bothering with an abject copy-paste or recycled resources, for his Trojan's...

'decryptxxx@protonmail.com' Ransomware

Posted: June 26, 2019 | Category: Ransomware
The 'decryptxxx@protonmail.com' Ransomware is a file-locking Trojan that can block media on your computer, such as pictures, with encryption. Further attacks can deliver ransom messages and generate pop-up warnings that demand ransoms for the criminal's decryption help. Secure backups will give victims a free recovery option, and most anti-malware services can delete the 'decryptxxx@protonmail.com' Ransomware and its other family members. While 'triple X' is synonymous with adult media, Trojans are happily taking up another variant of the letter for their brand: ransoming file-unlocking...

Craftul Ransomware

Posted: June 26, 2019 | Category: Ransomware
The Craftul Ransomware is a file-locking Trojan that can block your computer's media, such as pictures or text documents, through encryption. Users can identify infections by the 'craftul' extensions on their non-opening files and the presence of a Notepad ransom note specifically. Updating your secure backups will avoid any extortionist leverage through its attacks, and anti-malware products should shut down and delete the Craftul Ransomware at any point. The PC security industry is on the tail of a new, file-locker Trojan whose symptoms are generic sufficiently that its victims could...

TROLL Ransomware

Posted: June 25, 2019 | Category: Ransomware
The TROLL Ransomware is a file-locker Trojan that can block the files on your computer with encryption, an attack that may or may not be reversible. An appropriate and regularly-maintained backup strategy can reduce problems from infections, which target digital media that could be valuable to the victim. Anti-malware products are, similarly, essential for deleting the TROLL Ransomware safely or preventing an installation exploit. Although a ransoming message is a source of numerous hints about a criminal's motives and other characteristics, it isn't a substitute for hard information....

WALAN Ransomware

Posted: June 25, 2019 | Category: Ransomware
The WALAN Ransomware is a file-locker Trojan that blocks media, such as documents, on your computer and sells the unlocking solution to its victims. Any files that it affects will not open in their associated applications and will have extensions referencing the WALAN Ransomware. Keeping both anti-malware services for deleting the WALAN Ransomware and backups for file recovery are equally valuable defenses. File-locking Trojans aren't always identifiable so easily, even though distinctive characteristics like pop-ups, family-formatted ransoming messages, and even ransom-negotiating ID...

Truke Ransomware

Posted: June 24, 2019 | Category: Ransomware
The Truke Ransomware is a file-locking Trojan from the STOP Ransomware or Djvu Ransomware family. Along with other features, it can block the media on your computer by encrypting it, remove some backups, and leave behind ransom demands. Appropriate storage of backups can mitigate damages from its attacks, and many anti-malware solutions should delete the Truke Ransomware safely. The STOP Ransomware family delivers the tools for attacks through different threat actors around the world, and many of its new additions only emphasize the universal danger that it represents. Malware experts...

Adage Ransomware

Posted: June 24, 2019 | Category: Ransomware
The Adage Ransomware is a file-locking Trojan from the Phobos Ransomware's family. Like other members of this family, it can encrypt files as a way of blocking them from opening, make changes to their filenames, and leave ransoming messages in multiple formats. Users should back their work up onto another storage device or computer and keep anti-malware programs ready for removing the Adage Ransomware as soon as it becomes identifiable. Although the Phobos Ransomware family isn't the largest of its kind, as a risk to users without backups, it's remaining present in the threat landscape...

DMO Ransomware

Posted: June 21, 2019 | Category: Ransomware
The DMO Ransomware is a file-locking Trojan from the Ransomnix Ransomware family. This group's campaigns focus on compromising victims' websites and encrypting the contents, such as database files. Website administrators should restore from a backup instead of paying the ransom and use anti-malware products for deleting the DMO Ransomware safely. The Ransomnix Ransomware family is quieter than Ransomware-as-a-Service operations like Scarab Ransomware , but being low-key doesn't equate to silent. Activity in this family is renewing in June of 2019, thanks to the DMO Ransomware. While...
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 329