Hipandahi Ransomware

Posted: February 12, 2021 | Category: Ransomware
The Hipandahi file-locker is a threatening piece of malware whose attack can cause devastating, long-term damage to your important files. The authors of the Hipandahi Ransomware may be spreading it with the use of fraudulent email attachments, pirated downloads, torrents and other shady content. Users who launch the Hipandahi Ransomware on their computers may lose access to many of their important files immediately because the ransomware will encrypt their contents. The full list of file...

Danielthai Ransomware

Posted: February 11, 2021 | Category: Ransomware
The Danielthai Ransomware is a file-locker that is spread online through corrupted advertisements, fake downloads, torrent trackers, pirated content and other suspicious files. The best way to stay safe from such malware attacks is to use a trustworthy anti-virus software suite, as well as to be careful about the files you download from the Internet. If the Danielthai Ransomware penetrates your computer security, it may cause significant damage to your files by encrypting their contents....

HelloKitty Ransomware

Posted: February 11, 2021 | Category: Ransomware
The HelloKitty Ransomware is a file-encryption Troja that made the news because it was used in an attack against CD Project Red, a game development company behind popular game titles like Cyberpunk 2077 and Witcher 3. The ransom note that the HelloKitty Ransomware left behind for CD Project Red states that the criminals have encrypted their servers and that they have also collected information regarding their administration, legal, accounting departments, as well as additional game-related...

HDLocker Ransomware

Posted: February 11, 2021 | Category: Ransomware
The HDLocker Ransomware is a new file-encryption whose author may originate from China since this is the language used in the ransom note. Unfortunately, the HDLocker Ransomware already has a working file-locking algorithm, and it has the ability to cause a lot of damage if it manages to infect your system successfully. Other parts of the malware appear to be far from finished – the short ransom message lacks critical information such as the contact details of the attacker. In addition to...

Vassago Ransomware

Posted: February 10, 2021 | Category: Ransomware
The Vassago Ransomware is a file-encryption Trojan based on the source code of another very active ransomware family, the  Makop Ransomware . Sadly, this means it uses a flawless file-locking mechanism, which cannot be reversed with the use of free decryption software. The only working decryptor is likely to be in the hands of Vassago Ransomware's creators. But they will not give it to you for free – instead, they ask to be paid a ransom sum via Bitcoin in exchange for their help. The...

Hackerz Ransomware

Posted: February 10, 2021 | Category: Ransomware
The Hackerz Ransomware is a threatening piece of malware that has been around for over two years. The Hackerz Ransomware is still able to execute a devastating attack against poorly secured Android device, although it is not a very sophisticated project. The ransomware only works on the Android operating system and, surprisingly, its creators do not ask their victim to pay a ransom sum. Instead, they warn them that their files will be deleted after 24 hours, and prompt them to enter a...

AlbDecryptor Ransomware

Posted: February 10, 2021 | Category: Ransomware
The AlbDecryptor Ransomware is a threat that appears to target users in China, but it would not be a surprise if it reaches other parts of the world as well. The malware may be promoted through bogus email attachments, fake downloads, and other suspicious content hosted on torrent sites. The best way to stay safe from an AlbDecryptor Ransomware attack is to use a reliable anti-malware application. Users who fall victim to the AlbDecryptor Ransomware will lose access to the majority of...

Daddycrypt Ransomware

Posted: February 9, 2021 | Category: Ransomware
The Daddycrypt Ransomware is a threat whose authors are unlikely to help you regardless of what promises they make. This malware may be spread online via fake downloads, pirated content, software cracks, etc. The best way to keep threatening files away from your computer is to use a reputable anti-virus software suite at all times. If the Daddycrypt Ransomware is not stopped on time, it may damage a large portion of your files by encrypting them. Once the encryption is successful, the locked...

TRU8 Ransomware

Posted: February 9, 2021 | Category: Ransomware
The TRU8 Ransomware is a piece of malware able to lock the files found on infected computers. Its creators plan to use the locked files as a bargaining chip – they promise to provide the victim with a decryptor, but only if they pay some Bitcoin first. Just like other ransomware creators, the ones behind this file-locker also list their demands in a ransom note, which can be found on all computers infected by the TRU8 Ransomware. The TRU8 Ransomware also will mark locked files with the...

Niros Ransomware

Posted: February 8, 2021 | Category: Ransomware
Ransomware attacks continue to be a very profitable campaign for both experienced and inexperienced cybercriminals. Every week cybersecurity experts identify dozens of new file-locker variants, and, unfortunately, many of them use secure file-locking mechanisms that cannot be reversed for free. This is the case of the newly identified Niros Ransomware – this threat encrypts a wide variety of files and adds the '.niros' extension to their names. The Niros Ransomware will work in the background...

TerrorWare Ransomware

Posted: February 8, 2021 | Category: Ransomware
TheTerrorWare Ransomware is a low-quality file-locker that was created with the use of the open-source HiddenTear ransomware project. Typically, threats of this type extort the victim for money by encrypting their files and then offering to sell a decryption service. While the TerrorWare Ransomware does have the ability to encrypt files, its ransom note reveals that the criminals might have different plans – they do not ask the victim for a ransom payment and, instead, they ask them to join a...

TomLe Ransomware

Posted: February 5, 2021 | Category: Ransomware
The TomLe Ransomware was discovered only recently, but, unfortunately, this file-locker has already caused problems for dozens of users worldwide. The TomLe Ransomware uses the same encryption method as the infamous  Dharma Ransomware , and, unfortunately, this means that its victims will be unable to use a free data decryption tool. The TomLe Ransomware's encryption is only reversible by using the unique decryption key that was generated during the attack and transferred to the servers of...

Lucifer Ransomware

Posted: February 5, 2021 | Category: Ransomware
The Lucifer Ransomware is malware that has the ability to cause devastating damage to your file system by encrypting the data you use on a daily basis. The authors of the Lucifer Ransomware have programmed the malware to target popular file types such as documents, media, archives and others. By targeting these files, the Lucifer Ransomware makes sure that its victims will want to restore access to their files at any cost. Of course, the criminals plan to extort the victim for money. After...

Avaad Ransomware

Posted: February 4, 2021 | Category: Ransomware
File-encryption Trojans are exceptionally threatening because of their ability to cause long-term trouble. Even if you end up removing the ransomware from your computer, you will still have to find a way to recover the data that was damaged during the attack. One of the more prominent ransomware families in the past few years has been the Dharma Ransomware. At one point, the authors of the project announced that it was discontinued and then released all available decryption keys. However,...

Namaste Ransomware

Posted: February 4, 2021 | Category: Ransomware
The Namaste Ransomware is a threat designed to encrypt popular files like documents, images, videos, archives and others. The malware may be spread via fake downloads, pirated software and other shady file types. The best way to stay safe from the Namaste Ransomware and similar file-lockers is to use a reputable anti-malware application, as well as to maintain up-to-date backups of your important files. When the Namaste Ransomware damages a file, it will add the extension '._enc' to its name....
1 2 3 4 5 6 7 8 9 10 11 12 ... 375