Start Ransomware

A brand-new Dharma Ransomware variant was spotted at the end of October 2019. Malware researchers dubbed it Start Ransomware. Most cyber crooks have neither the skill or the desire to build ransomware threats from scratch when they can just borrow the code of an already developed and established file-encrypting Trojan. As we already mentioned, the Start Ransomware belongs to the Dharma Ransomware family and exhibits most of the trademarks of the notorious data-locking Trojan. Propagation and Encryption The exact propagation method used in the distribution of the Start Ransomware is not yet known with any particular certainty. Usually, ransomware threats are spread with the help of fake emails. These emails often contain an infected attachment, which, when launched, would compromise the target's system. Authors of ransomware threats...

Posted on October 31, 2019 in Ransomware

Asus Ransomware

At the end of October 2019, malware researchers noticed a new ransomware threat lurking in the shadows of the Web. This new file-locking Trojan is called Asus Ransomware. When experts dissected this threat, they found that it is a variant of the widely popular Dharma Ransomware. The Dharma Ransomware variants have been pestering users online for a while, and cybercriminals continue to pump out more and more copies of this threat. Ransomware threats are seen as a quick and easy way to get some cash with very little effort, so it is not likely that we will see this trend die out any time soon. By Using Encryption, the ASUS Ransomware Blocks Your Files The exact infection vectors involved in the distribution of the Asus Ransomware are not known yet. Some experts speculate that the creators of the Asus Ransomware may be using one of the...

Posted on October 31, 2019 in Ransomware

SorryForThis Ransomware

Cybercriminals from all over the world keep developing and distributing ransomware threats. This is due to the fact that even individuals with little skill and almost no experience in the field of cybercrime can try their luck with a ransomware threat. This is because it is very easy for one to get their hands on the code of already existing data-encrypting Trojans and alter it to their liking. One of the newest file-locking Trojans spotted in the wild is called the SorryForThis Ransomware. The Authors Have Likely Used a Free Ransomware Builder Upon dissecting the SorryForThis Ransomware, malware researchers concluded that it is highly likely that the authors of this threat may have used a free ransomware builder. These builders are available online and make it much easier for shady individuals to create data-encrypting Trojans without...

Posted on October 31, 2019 in Ransomware

Nakw Ransomware

Ransomware is among the nastiest types of malware. These threats are often distributed via spam e-mails, then use an encryption algorithm to lock all the data on the infected host while also extorting them for money. Most cyber crooks that distribute ransomware threats do not build them from scratch but rather take most of the code from existing data-locking Trojans. Such is the case of the Nakw Ransomware. The file-encrypting Trojan, the Nawk Ransomware, is a variant of the STOP Ransomware. The STOP Ransomware family has been the most popular ransomware family in 2019, arguably. Propagation and Encryption There are numerous ways to propagate ransomware threats. One of the most universally preferred methods is spam e-mails, as we already mentioned. The bogus e-mails often contain a specifically crafted message, which is meant to trick...

Posted on October 30, 2019 in Ransomware

Encryptd Ransomware

There is an increasing amount of ransomware threats that rear their ugly heads daily as more and more cybercriminals try their luck in distributing them. One of these newly uncovered file-encrypting Trojans is the Encryptd Ransomware. This threat has not yet been indicated to belong to any ransomware family. Propagation and Encryption The infection triggers involved in the spreading of the Encryptd Ransomware have not yet been confirmed with any certainty. Some believe that propagation via mass spam email campaigns is the most likely method used in the case of the Encryptd Ransomware. What this would entail is an email with a message, which was crafted using a variety of social engineering tricks carefully. The goal of this message is to convince the user that the unsafe attachment, which is accompanying the email, is safe, and the...

Posted on October 30, 2019 in Ransomware

JayTHL Ransomware

The most popular ransomware family of 2019 is likely the STOP Ransomware family, however, this does not mean that variants of other data-locking Trojans are not being created too. One of the latest file-encrypting Trojans spotted is called the JayTHL Ransomware and it belongs to the SamSam Ransomware family. Ransomware threats tend to operate in a similar manner – they compromise a host, encrypt all the files present on the system, and then demand money in return for unlocking the affected data. However, many of the users who decide to pay the fee are left disappointed after the cyber crooks never end up delivering on their promises. Propagation and Encryption A large number of ransomware threats are being propagated via spam emails. Usually, these are large-scale campaigns that distribute fraudulent emails to thousands of users...

Posted on October 30, 2019 in Ransomware

Mespinoza Ransomware

One of the most newly uncovered ransomware threats is called the Mespinoza Ransomware. After dissecting this threat, malware researchers have no been able to link it to any of the existing ransomware families yet. Data-locking Trojans, like the Mespinoza Ransomware, are a particularly severe cyber threat. They will sneak into one's system, encrypt all their files, and then blackmail the user into paying money in exchange for a supposed decryption key. The kicker is that authors of ransomware threats, more often than not, do not intend to provide the victim with the decryption key they need so badly. Propagation and Encryption The infection vectors, which are to blame for the propagation of the Mespinoza Ransomware, are not yet known. Some cybersecurity experts speculate that the creators of the Mespinoza Ransomware may be using fake...

Posted on October 30, 2019 in Ransomware

Thanatos Ransomware Helps Turn the Cryptocurrency World into a Feeding Frenzy for Cybercrooks

Thanatos Ransomware Helps Turn the Cryptocurrency World into a Feeding Frenzy for Cybercrooks screenshot

A well-known scam is continually running rampant throughout the ransomware world being hailed as the first infection to accept cryptocurrencies like Bitcoin and Ethereum for payment for a ransom in the new feeding frenzy of ransomware threats. Thanatos ransomware, known to be a real menace from last year leaving users with no practical way to restore a computer that has been infected. Thanatos is like a Homing Pigeon, it actually heads back to a URL to keep track of its victims. This enables the authors of the malware to monitor a long list of infected victims. Greek Mythology describes Thanatos as the son of Nyx (Night) and Erebos (Darkness) and twinned with Hypnos (Sleep). Thanatos, in...

Posted on October 29, 2019 in Computer Security

FuxSocy Ransomware

Ransomware threats are one of the most vicious malware types out there. Data-locking Trojans target regular users, as well as large corporations and even government bodies. Nobody is rulled out when it comes to ransomware threats. Recently, a new file-encrypting Trojan has been circulating the Web. It has been dubbed the FuxSocy Ransomware. It is not clear whether the FuxSocy Ransomware belongs to any of the already known ransomware families. However, its creators have made sure to make it seem like the FuxSocy Ransomware is a variant of the very infamous Cerber Ransomware. Propagation and Encryption Researchers have not yet estimated the exact propagation method, which was used in the spreading of this new ransomware threat. Criminals have several preferred methods to propagate threats of this type. Perhaps the most popular one is...

Posted on October 29, 2019 in Ransomware

Bot Ransomware

Ransomware threats seem to be the go-to tool when it comes to making a quick buck on the backs of innocent users. However, many cybercriminals are not nearly as high-skilled as they are often portrayed. This is one of the reasons why so many ransomware threats are just slightly altered variants of an already existing threat. This is the case with the Bot Ransomware. This file-encrypting Trojan is a copy of the infamous Dharma Ransomware, which has been pestering users online for quite a while. Propagation and Encryption Malware researchers have not come to a definitive conclusion as to how the Bot Ransomware is being propagated. Among the most common ways to spread ransomware threats are spam emails. These emails would often contain a carefully tailored message riddled with social engineering tricks aiming to convince the user to open...

Posted on October 29, 2019 in Ransomware

Xda Ransomware

Nowadays, even a person with very little technical skill and experience can create and distribute a file-locking Trojan. This is done by borrowing the code of already established ransomware threats, tweaking it to fit one's needs slightly, and then propagating it. By using Tor services, encrypted email clients, and cryptocurrencies, the cyber crooks manage to keep their anonymity and avoid punishment for their crimes. Recently, malware researchers spotted a brand-new ransomware threat that is being propagated. Its name is the Xda Ransomware, and it appears to belong to the notorious Dharma Ransomware family. Propagation and Encryption The exact infection vectors involved in the spreading of the Xda Ransomware are yet to be established. Cybersecurity experts speculate that some of the most commonly used methods may be among the...

Posted on October 29, 2019 in Ransomware

CCryptor Ransomware

Malware researchers struggle to keep up with all the data-locking Trojans, which are being pumped out into the wild by greedy cyber crooks with a lack of morals. Cybersecurity experts put a lot of effort into developing decryption tools that they release publicly to help infected users. However, with the sheer amount of ransomware threats out there, this is truly a Sisyphean task. At the end of October 2019, yet another ransomware was spotted lurking on the Web. It goes by the name CCryptor Ransomware and, so far, does not appear to be associated with any of the known ransomware families. Propagation and Encryption It has not been determined what infection vectors are being used in the spreading of this new file-encrypting Trojan. Some believe that the main culprit here is spam email campaigns, as this is one of the most popular...

Posted on October 29, 2019 in Ransomware

Coot Ransomware

Ransomware threats are incredibly popular in the world of cybercrime, as one can make some cash quickly with very little risk of repercussions. Most creators of ransomware threats do not build them from scratch, as this would require a lot of skill and time. Instead, they would take the code from an already existing file-locking Trojan and alter it to fit their needs before propagating it and causing headaches to innocent users. This is the case with today's ransomware threat called the COOT Ransomware. Once malware experts spotted the COOT Ransomware and studied it, they discovered that it belongs to the infamous STOP Ransomware family. Its Distribution Method is Not Clear It is not clear what propagation methods have the creators of the COOT Ransomware used in this campaign. It is being speculated that they are using mass spam emails...

Posted on October 29, 2019 in Ransomware

Future Cybersecurity Warning: Mobile Malware Attacks and Ransomware Expected to Surge in 2020

Future Cybersecurity Warning: Mobile Malware Attacks and Ransomware Expected to Surge in 2020 screenshot

Every year we get a glimpse into the future from recent trends that we take notice from our internal data. With such, we see are able to decipher what cybersecurity trends are expected to be more prevalent in the next year with mobile malware attacks and ransomware being at the top of the list for our predictions into the year 2020. With 2019 soon to come to a close, the year has been eventful, to say the least. Cyberattacks on computers as well as mobile devices have become a regular occurrence. Mobile malware threats and ransomware, such as Ryuk, CMD, Adame, and Phobos ransomware, have all flooded the market leaving many computer security experts and technology companies on edge for...

Posted on October 28, 2019 in Computer Security

NukeSped RAT

The North Korean hacking group called Lazarus is back in the news. This is one of the most prominent APTs (Advanced Persistent Threat) in the world and has carried out numerous successful attacks globally. They also are known under the alias Hidden Cobra. It has long been speculated that the Lazarus hacking group is being funded by the North Korean government and used for doing the bidding of Kim Jong-Un. Malware researchers have reported that North Korean hacking groups are cooperating closely and are likely sharing members and infrastructure, making them even more threatening to anyone who stands against the interests of the government of North Korea. How the NukeSped RAT Functions One of their latest threats is the NukeSped RAT (Remote Access Trojan). This RAT was designed to target 32-bit systems. The authors of the NukeSped RAT...

Posted on October 28, 2019 in Remote Administration Tools
1 2 3 4 5 6 7 8 9 10 11 12 1,370