Malware
This ransomware has the ability to encrypt files found on an affected system. This routine makes these files inaccessible until a ransom is paid.
Read moreThis ransomware is written in Jscript, a scripting language designed for Windows. Particularly, it is for Internet Explorer.
Read moreThis JIGSAW ransomware uses chat support to aid customers in paying the demanded ransom. Previous variants of JIGSAW are known to use scary or porn-related ransom messages.
Read moreThis JIGSAW ransomware uses chat support to aid customers in paying the demanded ransom. Previous variants of JIGSAW are known to use scary or porn-related ransom messages.
Read moreThis ransomware is one of the few ransomware families that is capable of spreading on its own. It drops a copy of itself in removable drives, making use of USBs a risky practice.
Read moreTo get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Read moreThis ransomware, known as CryptXXX, is a .DLL file that is capable of locking screens.
Read moreThis malware is involved in the global financial network transfer system Swift hacking incident of April-May 2016. It has certain routines that are tailored to take advantage of the SWIFT messaging network in order to steal funds.
Read moreThis malware is involved in the global financial network transfer system Swift hacking incident of April-May 2016. It is a crucial component of the malware that performs the SWIFT message tampering that then causes financial theft.
Read moreThis ransomware attempts to bait Chinese users by using Chinese language in its ransom notes and interface.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
Read more