Phantom Ransomware

Posted: August 7, 2020 | Category: Ransomware
The Phantom Ransomware is a file-locking Trojan that has no known connections to Ransomware-as-a-Services or other families. Infected users may find that their media files can't open, see HTA or pop-up ransom notes, or find Trojan-themed extensions on their files' names. Most anti-malware products should delete the Phantom Ransomware appropriately, but they don't negate secure backups for recovering any data. A file-locking Trojan that's borrowing some pseudo-public components for its...

ZES Ransomware

Posted: August 7, 2020 | Category: Ransomware
The ZES Ransomware is a file-locking Trojan from the Makop Ransomware family. It targets Windows systems with a data-encrypting attack that blocks media content like documents, images, or databases. Users with strongly-secured backups have sufficient protection from this feature, and most anti-malware services will remove the ZES Ransomware and other members of its family immediately. Although the Makop Ransomware family has a long way to go for catching up with the sheer sprawl of a...

Trump Ransomware

Posted: August 7, 2020 | Category: Ransomware
The Trump Ransomware is a file-locking Trojan that's part of the Scarab Ransomware family, a Russian Ransomware-as-a-Service. The threat keeps files from opening by encrypting them and holds them hostage until the victim pays its ransom. Users can update and secure their backups for optimal recovery options, and most anti-malware programs should delete the Trump Ransomware if they're active. Colorful themes are one way how threat actors can make their Trojans' campaigns more meaningful or...

Deadfiles Ransomware

Posted: August 6, 2020 | Category: Ransomware
The Deadfiles Ransomware is a file-locking Trojan that's from the family of the MedusaLocker Ransomware. The Deadfiles Ransomware can lock media files on the user's computer and later sell an unlocking or decryption service. Users should preserve their backups carefully for recovering and have anti-malware products accessible for removing the Deadfiles Ransomware. T he MedusaLocker Ransomware , a minor family of Trojans that's been ransacking files for a year, is up to a new campaign...

OutCrypt Ransomware

Posted: August 6, 2020 | Category: Ransomware
The OutCrypt Ransomware is a file-locking Trojan without known relatives or a family. It attacks Windows systems by blocking their non-essential media files and may extort money from its victims for an unlocking service. Windows users should let anti-malware tools delete the OutCrypt Ransomware and maintain their backups for painless data recoveries. Standard operating procedures for file-locker Trojans, like spyware or backdoor Trojans, emphasize stealth and running 'below the radar.' A...

ChinaJm Ransomware

Posted: August 6, 2020 | Category: Ransomware
The ChinaJm Ransomware is a file-locking Trojan that's not a part of a Ransomware-as-a-Service, although it borrows some code from older Trojans. The ChinaJm Ransomware attacks Windows environments with a data-encrypting feature that holds files for ransom. Affected users should have backups properly stored for recovering and let their anti-malware products disinfect their systems and remove the ChinaJm Ransomware. Software recycling with the Trojan industry takes place on a small scale...

1dec Ransomware

Posted: August 5, 2020 | Category: Ransomware
The 1dec Ransomware is a file-locking Trojan that's part of a Dharma Ransomware Ransomware-as-a-Service. Family members will block your files, digital media like documents, and extort money for their unlocking service, preferably. Users with secure backups have protection from most of the effects of infections, and good anti-malware programs will proactively remove the 1dec Ransomware. The often-randomly-named Dharma Ransomware family boasts such members as the Devil Ransomware , the...

Silvertor Ransomware

Posted: August 5, 2020 | Category: Ransomware
The Silvertor Ransomware is a file-locking Trojan that's independent of traditional Ransomware-as-a-Services and other families of threats. However, like most of them, it blocks the user's media by encrypting it to extort Bitcoins for an unlocking solution. Unaffected backups are currently the best solution to this threat's attacks besides safely removing the Silvertor Ransomware with compatible anti-malware products. It's not for nothing that Ransomware-as-a-Services, with their...

CCHH Ransomware

Posted: August 5, 2020 | Category: Ransomware
The CCHH Ransomware is a file-locking Trojan from the Globe Imposter Ransomware family, which imitates the Globe Ransomware . Although the CCHH Ransomware has a somewhat-updated ransom note, it retains other features, such as encrypting files and holding them hostage, from old versions. Windows users with backups for data recovery and anti-malware products for removing the CCHH Ransomware should have adequate protection from this threat. The Trojan, whose fakery is in its cosmetic...

Billy's Apocalypse Ransomware

Posted: August 4, 2020 | Category: Ransomware
The Billy's Apocalypse Ransomware is a file-locking Trojan that's a variant of the previous Black Claw Ransomware. The Billy's Apocalypse Ransomware locks the user's media files with encryption attacks that hold the content hostage while it demands a ransom. Affected Windows users should recover from backups and have their anti-malware services securely delete the Billy's Apocalypse Ransomware. A small-time Trojan with file-locking properties is getting updates from a probably-unrelated...

Nile Ransomware

Posted: August 3, 2020 | Category: Ransomware
The Nile Ransomware is a file-locking Trojan that's part of the STOP Ransomware family's Ransomware-as-a-Service. The Nile Ransomware disguises itself as a randomly-named temporary file while blocking the user's media files with encryption. A secure backup will assist the recovery of any data significantly, and professional anti-malware tools will block this threat or remove the Nile Ransomware installations. Proving its long-term success in the Black Market by renting itself out to other...

CryptoDarkRubix Ransomware

Posted: August 3, 2020 | Category: Ransomware
The CryptoDarkRubix Ransomware is a file-locking Trojan from a possible new family, the Ranet Ransomware. It can block files, such as databases and documents, and further damage them by erasing their internal data. Users should ignore the Trojan's ransom messages, let their anti-malware services uninstall the CryptoDarkRubix Ransomware, and recover from their last backup. The presence of a new campaign from a file-locking Trojan tends to be symptomatic of activity from an overarching...

'Browser started out operating as a RDP having a keylogger' Email Scam

Posted: July 31, 2020 | Category: Ransomware
Online con artists love to use fearmongering strategies to trick potential victims into performing actions that they would not otherwise perform. Such tactics have been around since the Internet became popular, and, unfortunately, it is unlikely that they will go away anytime soon. The 'Browser started out operating as an RDP having a keylogger' email scam is one of the latest tactics to circulate online, and it is being spread via fake email messages. If one of these emailsend up in your...

TCPRX Ransomware

Posted: July 31, 2020 | Category: Ransomware
Ransomware threats keep up being one of the biggest dangers you can find online – while many other cyber-threats aim to collect data from you, file-lockers like the newly spotted TCPRX Ransomware have a more sinister purpose. Instead of collecting files, the TCPRX Ransomware will encrypt their contents, therefore preventing you or other victims from accessing important documents, projects, videos, pictures and other files. Of course, this is not how the TCPRX Ransomware's attack ends –...

Mnbzr Ransomware

Posted: July 30, 2020 | Category: Ransomware
If your files have become inaccessible recently and their names use the 'mnbzr' extension, you should have fallen victim to a new and threatening file-encryption Trojan. The threat, dubbed Mnbzr Ransomware, is meant to encrypt the files on the compromised system, and then create a ransom message, which extorts the victim for money. Unfortunately, the Mnbzr Ransomware can be very devastating since this threat is able to encrypt a wide variety of file types, therefore maximizing the damage it...
1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 375