• This ransomware, seemingly similar to JIGSAW ransomware, threatens to delete one file six hours after non-payment. It threatens to delete all encrypted files after 96 hours of non-payment.
    Read more   

  • This ransomware is delivered as an attached document, via spam email. It disguises itself as a fake Thai customs form.
    Read more   

  • This ransomware has the ability to encrypt files found on an affected system. This routine makes these files inaccessible until a ransom is paid.
    Read more   

  • This ransomware is written in Jscript, a scripting language designed for Windows. Particularly, it is for Internet Explorer.
    Read more   

  • This JIGSAW ransomware uses chat support to aid customers in paying the demanded ransom. Previous variants of JIGSAW are known to use scary or porn-related ransom messages.
    Read more   

  • This JIGSAW ransomware uses chat support to aid customers in paying the demanded ransom. Previous variants of JIGSAW are known to use scary or porn-related ransom messages.
    Read more   

  • This ransomware is one of the few ransomware families that is capable of spreading on its own. It drops a copy of itself in removable drives, making use of USBs a risky practice.
    Read more   

  • To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
    Read more   

  • This ransomware, known as CryptXXX, is a .DLL file that is capable of locking screens.
    Read more   

  • This malware is involved in the global financial network transfer system Swift hacking incident of April-May 2016. It has certain routines that are tailored to take advantage of the SWIFT messaging network in order to steal funds.
    Read more