Malware
This ransomware, seemingly similar to JIGSAW ransomware, threatens to delete one file six hours after non-payment. It threatens to delete all encrypted files after 96 hours of non-payment.
Read moreThis ransomware is delivered as an attached document, via spam email. It disguises itself as a fake Thai customs form.
Read moreThis ransomware has the ability to encrypt files found on an affected system. This routine makes these files inaccessible until a ransom is paid.
Read moreThis ransomware is written in Jscript, a scripting language designed for Windows. Particularly, it is for Internet Explorer.
Read moreThis JIGSAW ransomware uses chat support to aid customers in paying the demanded ransom. Previous variants of JIGSAW are known to use scary or porn-related ransom messages.
Read moreThis JIGSAW ransomware uses chat support to aid customers in paying the demanded ransom. Previous variants of JIGSAW are known to use scary or porn-related ransom messages.
Read moreThis ransomware is one of the few ransomware families that is capable of spreading on its own. It drops a copy of itself in removable drives, making use of USBs a risky practice.
Read moreTo get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Read moreThis ransomware, known as CryptXXX, is a .DLL file that is capable of locking screens.
Read moreThis malware is involved in the global financial network transfer system Swift hacking incident of April-May 2016. It has certain routines that are tailored to take advantage of the SWIFT messaging network in order to steal funds.
Read more