DUSK 2 Ransomware

Posted: November 11, 2020 | Category: Ransomware
The DUSK 2 Ransomware is a file-locking Trojan that's an update of the previous Dusk Ransomware. Besides changes to some features' names, it remains mostly-similar to its predecessor, including blocking media files with RSA encryption. Users should let their anti-malware services remove the DUSK 2 Ransomware upon detection and store backups on other devices for recovering any locked files. Te Dusk Ransomware , first seen by malware experts in the fall of 2020, already shows a...

UpdateDecrypter Ransomware

Posted: November 10, 2020 | Category: Ransomware
The UpdateDecrypter Ransomware is a file-locking Trojan that's a possible variant of Hidden Tear. The UpdateDecrypter Ransomware uses screen-wide pop-ups for distracting users while it blocks their files with encryption. Users can recover with preexisting backups or a free solution from the Web while deploying trusted security services for removing the UpdateDecrypter Ransomware. Fake software updates, or legitimate ones compromised through obtuse means like a supply-chain breach, are...

Agho Ransomware

Posted: November 10, 2020 | Category: Ransomware
The Agho Ransomware is a file-locking Trojan that's from the STOP Ransomware family, an international Ransomware-as-a-Service. Windows users are at risk from its core attacks: blocking files with encryption and deleting their local backups. Non-locally-stored backups for recovery are recommended, in addition to trusted security solutions for removing the Agho Ransomware. Going against its name for the hundredth time, the STOP Ransomware shows off a variant out in the wild as of early...

Recoverydatas Ransomware

Posted: November 10, 2020 | Category: Ransomware
The Recoverydatas Ransomware is a file-locking Trojan that's part of the Scarab Ransomware family's Ransomware-as-a-Service. The Recoverydatas Ransomware can block media files with encryption, change their names to random characters, and extort money through text ransom notes. Users with adequate backup precautions can recover from any attacks affordably, and all Windows users should block and remove the Recoverydatas Ransomware with credible anti-malware utilities. The  Scarab...

Banjo Ransomware

Posted: November 9, 2020 | Category: Ransomware
The Banjo Ransomware is a file-locking Trojan that's a part of the well-known family of the Phobos Ransomware. The Banjo Ransomware uses a secure encryption feature for keeping users from opening documents, images and other media files. Users should have backups for saving their work from these attacks and may use Windows anti-malware programs for containing or removing the Banjo Ransomware. The Greek linguistic-inspired  Phobos Ransomware  family has a minor but ongoing presence in...

Termit Ransomware

Posted: November 9, 2020 | Category: Ransomware
The Termit Ransomware is a file-locking Trojan that's from the DCRTR Ransomware family. Effects of its attacks include non-opening media files, deleted backups, extra extensions on files' names, and text ransom notes. Users should have other backups for restoring their work and let trusted anti-malware products remove the Termit Ransomware from compromised PCs. Another Windows variant of the smaller family of DCRTR Ransomware might be making waves in Norway or merely benefiting from a...

Restoreserver Ransomware

Posted: November 9, 2020 | Category: Ransomware
The Restoreserver Ransomware is a file-locking Trojan that's part of the Scarab Ransomware family, which targets English and Russian-speaking victims. The Restoreserver Ransomware blocks most media files on the PC and overwrites their names and destroys local backups. Backups on secure systems or storage drives, and anti-malware tools for removing the Restoreserver Ransomware, are useful in most infection scenarios. File-locker Trojans from the dual-language family of Scarab Ransomware...

Pay2Key Ransomware

Posted: November 9, 2020 | Category: Ransomware
The Pay2Key Ransomware is a file-locking Trojan that blocks the data on companies' networks while generating unique ransom notes for them. Its attacks are using RDP for initial infections and network access, which admins can prevent partially by updating all relevant software and avoiding weak passwords. Businesses without appropriate backups may have no other recovery options, although Windows security solutions may remove the Pay2Key Ransomware in time. The appearance of file-locker...

ELDAOSLA Ransomware

Posted: November 7, 2020 | Category: Ransomware
The ELDAOSLA Ransomware is a file-locking Trojan that's from the Phobos Ransomware family. The ELDAOSLA Ransomware encrypts media files for holding them hostage until the victim pays a ransom, which it demands through pop-ups and text notes. Users with preserved backups can ignore these demands, and Windows anti-malware tools should detect and delete the ELDAOSLA Ransomware. The Phobos Ransomware (or, from Greek, 'fear') family remains adept at popping up at unexpected times and places....

V3JS Ransomware

Posted: November 6, 2020 | Category: Ransomware
The V3JS Ransomware is a file-locking Trojan that holds the user's digital media hostage by encrypting it. Its symptoms include a pop-up alert with English-Polish ransom demands, a timer and a decryption option. Users should reserve backups of their work on other devices for recovering anything that it locks and have a trusted anti-malware product immediately uninstall the V3JS Ransomware from an infected PC. A file-locking Trojan's visuals can be misleading, as in the case of the ...

CC1H Ransomware

Posted: November 6, 2020 | Category: Ransomware
The CC1H Ransomware is a file-locking Trojan from the Globe Imposter Ransomware family. This threat imitates Globe Ransomware's symptoms while conducting actual encryption attacks for blocking the user's files. Proper backup procedures can limit the data losses, and most cyber-security utilities should remove the CC1H Ransomware as a threat. The copycat Trojan family of the  Globe Imposter Ransomware  shows that a Trojan's aesthetic facade and its attack features aren't always...

Pethya Zaplat Zasifrovano Ransomware

Posted: November 6, 2020 | Category: Ransomware
The Pethya Zaplat Zasifrovano Ransomware is a file-locking Trojan that targets Czech speakers. This threat may block files, create pop-up alerts with ransom demands, change the user's wallpaper, and change extensions. Adequate backup precautions will stop any extortion leverage from occurring during infections, and professional PC security services should block and remove the Pethya Zaplat Zasifrovano Ransomware. A possible variant off of the  Xorist Ransomware  is attacking Czech...

Hard2decrypt Ransomware

Posted: November 5, 2020 | Category: Ransomware
The Hard2decrypt Ransomware is a file-encryption Trojan that you want to keep away from your computer at any cost. If this threat is allowed to carry out its attack, it may render most of your data useless because it will encrypt its contents. Of course, the authors of the Hard2decrypt Ransomware project have a plan – they want to extort their victims for money by offering to sell them a decryption service. This is a popular strategy among ransomware operators, and, unfortunately, many of...

King Engine Ransomware

Posted: November 5, 2020 | Category: Ransomware
Cybercriminals continue to be taking advantage of the COVID-19 scare to spread their threatening software online. The latest malware campaign to make use of the popularity of the COVID-19 subject is related to a file-locker called the King Engine Ransomware. This threat appears to be based on the fairly unpopular Hentai Onichan Ransomware, which was discovered in October. Unfortunately, the King Engine Ransomware is not compatible with free decryption tools, and users affected by its attack...

RegretLocker Ransomware

Posted: November 5, 2020 | Category: Ransomware
Cybersecurity experts have identified a new ransomware family that boasts a rather interesting feature enabling it to encrypt the files used by Windows Virtual Machines. While this feature will not do much to the computer of the average Internet user, it may prove to be devastating if the RegretLocker Ransomware manages to penetrate the cybersecurity measures of a larger company network. Apart from the peculiar interest in virtual machines, the RegretLocker Ransomware does not have any other...
1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 375