Avaddon Ransomware

Posted: June 8, 2020 | Category: Ransomware
The Avaddon Ransomware is a threat that may be spread online with the help of various tricks – phishing emails that contain a bogus attachment, torrent trackers, game cracks, software activators, etc. Malware operators often rely on shady online content to distribute their threatening applications, and the Avaddon Ransomware is not an exception. Dealing with the consequences of an Avaddon Ransomware attack may be a very challenging task that is often impossible to accomplish – this is because...

Zwer Ransomware

Posted: June 8, 2020 | Category: Ransomware
The STOP Ransomware is still one of the most threatening file-lockers circulating in the wild, and it is recommended that you take the required measures to protect your system and files from its attacks. The best way to reach this result is to invest in a regularly updated anti-malware service, as well as to keep backup copies of your most important files. Do not forget that there dozens of variants of the STOP Ransomware circulating in the wild, and you are at risk of coming across them if...

Zorab Ransomware

Posted: June 8, 2020 | Category: Ransomware
Ransomware victims often are desperate to recover their files, and they may not think twice about trying out 'decryption software' offered by shady websites. This is exactly the behavior that the authors of the Zorab Ransomware are preying on – they promote their threatening application by masking it as a decryptor for the STOP Ransomware and its variants. The STOP Ransomware is one of the most widely spread file-lockers, and it has been used to create over a hundred different variants of...

Frogo Ransomware

Posted: June 8, 2020 | Category: Ransomware
The Frogo Ransomware is a relatively new member of the broader family of the Amnesia Ransomware clones. It behaves a lot like other Amnesia variants, encrypting the victim's files, making them inaccessible and then asking for a ransom. The files scrambled by the Frogo Ransomware receive the '.frogo' extension. However, the Frogo Ransomware goes the extra mile and also changed the original names of all encrypted files. In this way, a file that was called 'jalopy.jpg' previously, may become...

BBC Ransomware

Posted: June 8, 2020 | Category: Ransomware
The BBC Ransomware is one of the most recent additions to the seemingly endless family of the Phobos Ransomware clones. There is nothing particularly remarkable about BBC to set it apart from other Phobos clones, and it’s probably just the latest customized version used by a new party of bad actors for their own threatening campaign. The BBC Ransomware encrypts its victim’s files and renders them unusable. Once a file is encrypted by the BBC Ransomware, both its name and extension change....

FRM Ransomware

Posted: June 5, 2020 | Category: Ransomware
The FRM Ransomware is a harmful software that encrypts important files on infected computers, appending them with the ".[hitsbtc@tuta.io].FRM" extension. It is one more member of the Dharma Ransomware family. Once the victims are infected, and their files are encrypted, the threat actors demand a ransom paid in Bitcoin for the decryption key. When a computer is compromised by the FRM Ransomware, the harmful program will scan for documents, images, videos, and other important files in...

PGP Ransomware

Posted: June 5, 2020 | Category: Ransomware
The PGP ransomware is a piece of threatening software, belonging to the Dharma Ransomware family. Its purpose is to encrypt valuable data on infected machines and demand a ransom for the decryption tools. The PGP ransomware variant encrypts files and appends them with a unique victim ID, the email address of the threat actors and the .pgp extension. An example would be a file named ''redcar.jpg'' becoming ''redcar.jpg.id-********[openpgp@foxmail.com].pgp after encryption. After the PGP...

DualShot Ransomware

Posted: June 5, 2020 | Category: Ransomware
The DualShot Ransomware is a file-encryption Trojan capable of damaging a wide range of files. While the damage it does to them is not permanent, it may be difficult to reverse the encryption that the DualShot Ransomware uses – the encryption key used to lock the files is generated for every victim randomly, and it is stored on the server controlled by the ransomware's creators. It cannot be recovered in any other way, and the only people capable of decrypting the files are the authors of the...

Sdkkxbh Ransomware

Posted: June 5, 2020 | Category: Ransomware
The Sdkkxbh Ransomware is a computer threat that has the ability to encrypt your files, therefore making it impossible to view or use their contents. The encrypted files may only be restored by running a specialized decryption tool paired with a unique decryption key that the Sdkkxbh Ransomware generates when it infects your computer. Unfortunately, the key is stored on servers controlled by the Sdkkxbh Ransomware's authors, and they are not giving it away for free – instead, they ask to be...

jHEAc Ransomware

Posted: June 5, 2020 | Category: Ransomware
The jHEAc Ransomware is a new file-locker that does not share code with previously known ransomware families, so it appears to be the product of an independent malware developer. Unfortunately, the crooks behind the jHEAc Ransomware is likely to have some experience in the hacking field since they have managed to create a file-locker whose encryption routine cannot be cracked or reversed – this makes the recovery of files locked by the jHEAc Ransomware a very difficult task. When the jHEAc...

WCH Ransomware

Posted: June 5, 2020 | Category: Ransomware
The WCH Ransomware is a computer virus whose attack may cause potentially permanent damage to many of your files. The purpose of the WCH Ransomware is to encrypt the contents of files that may contain important information – images, spreadsheets, documents, presentations, archives, databases and more. Whenever it locks a file, the WCH Ransomware will add the '.[wecanhelpu@tuta.io].wch' extension, which will make the encrypted files easy to recognize. Even if you remove the newly added...

Kkll Ransomware

Posted: June 5, 2020 | Category: Ransomware
If you find out that some of your files are impossible to access, and their names have been suddenly changed and now include the '.kkll' extension, then your system has fallen victim to an attack of the Kkll Ransomware. This is a Trojan that specializes in encrypting a wide variety of files and, sadly, recovering from its attack can be a very challenging and nearly impossible task. This is owed to the fact that the Kkll Ransomware project is based on the infamous STOP Ransomware , a...

SIGARETA Ransomware

Posted: June 5, 2020 | Category: Ransomware
File-lockers continue to be the biggest threat to your online safety due to how widespread they are, and the fact that they are one of the few cyber-threats that are able to cause long-lasting damage to your computer. Thankfully, most ransomware is not capable of damaging your PC, but it may prevent you from using many of your important files by locking their contents and demanding a ransom fee in exchange for a decryption tool. One threat that operates in such a manner is the SIGARETA...

Tycoon Ransomware

Posted: June 5, 2020 | Category: Ransomware
The Tycoon Ransomware is a new strain of ransomware that cybersecurity experts identified as the culprit that managed to encrypt the files stored on the systems of small and medium-sized companies in different parts of the world. It is believed that the Tycoon Ransomware has been employed in attacks since December 2019, but it ramped up its activity in the past few weeks drastically and attracted the attention of security researchers quickly. This new file-locker is based on the JAVA...

Scarab-Coronavirus Ransomware

Posted: June 5, 2020 | Category: Ransomware
The Scarab-Coronavirus Ransomware is the latest offshoot of the large Scarab Ransomware family. The Scarab-Coronavirus Ransomware is run by the same hackers who operate the BOMBO Ransomware , another strain based on the Scarab Ransomware . Once the Scarab-Coronavirus Ransomware is installed, it encrypts the user's files and instructs the victim to contact the ransomware operators. The hackers' goal is to extort money from the victim in exchange for a decryptor. Distribution and...
1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 ... 375