Search
Keyword: bkdr_back.b
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware from
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. It encrypts files
This malware is a variant of the ransomware family EREBUS and was discovered to be involved in an attack against South Korean webhosting company NAYANA. Users affected by this malware may find their
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. It uses the Windows
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. It encrypts files
ait al aoi apj arc arw asc asf asm asp aspx asx avi awg back backup backupdb bak bank bat bay bdb bgt bik bin bkp blend bmp bpw brd c cdf cdr cdr3 cdr4 cdr5 cdr6 cdrw cdx ce1 ce2 cer cfg cgm cib class
leaves text files that serve as ransom notes containing the following text: {Encrypted Directory}\HOW BACK YOUR FILES.txt Trojan-Ransom.FileCrypter (IKARUS); Trojan.Win32.Zudochka.be (KASPERSKY) Downloaded
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
+MuhD ab4 accdb accde accdp accdr accdt accdu ach acr act adb ads agdl ait ai al apj arw asf asm asp asx avi awg back backup backupdb bak bank bay bdb bgt bik bkf bkp blend bpw cdb cdf cdr cdr6 cdrw cdr5
This malware was involved in the March 2016 compromise of a popular bittorent client website, where it was passed off as a legitimate upgrade installer. The first ransomware to exclusively target OSX
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This ransomware, also known as Bad Rabbit, reportedly spread to networks of some high profile companies located in Ukraine and Russia. It spreads via network shares. It also modifies the Master Boot
This ransomware known as Bad Rabbit infected systems belonging to several high profile companies in Ukraine and Russia. It arrives via watering hole attack on compromised websites. This Ransomware
This Trojan may be downloaded by other malware/grayware from remote sites. It connects to certain websites to send and receive information. It deletes the initially executed copy of itself. Arrival
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive