Soft2Secure

Author Archive

.DOT file virus: spam delivering malicious .dot extension attachments

.DOT file virus: spam delivering malicious .dot extension attachments

An ongoing malspam campaign spreads malicious .dot files claiming to contain sensitive information about recipients. The emails look targeted as they address users by name and even provide their home address. However, the password-protected .dot entities attached to these messages are actually linked to a malware botnet distributing the Crypt0L0cker ransomware. What is the .dot […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Dharma ransomware: decrypt .dharma and [crannbest@foxmail.com].wallet files

Dharma ransomware: decrypt .dharma and [crannbest@foxmail.com].wallet files

The ransomware plague is on the rise these days. File-encrypting viruses come and go, but new ones take over to prop the inheritance. One such family is probably the most dynamic one to date. Originally referred to as the CrySiS strain, it morphed into Dharma in late fall 2016. Encrypting victims’ data and appending the […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Sage 2.2 ransomware removal: decrypt .sage virus files

Sage 2.2 ransomware removal: decrypt .sage virus files

When confronted with a crypto hazard emanating from the Sage 2.2 ransomware, PC users and organizations run the risk of losing their important data if they have no backups. This infection is a prime example of benign technology being abused by unscrupulous individuals. Before the phenomenon of e-extortion emerged, cryptography had been a godsend for […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Philadelphia Ransomware virus decryptor and removal

Philadelphia Ransomware virus decryptor and removal

The ins and outs of the Philadelphia ransomware reflect the heterogeneity of the extortion-centered cybercrime underground. This sample is backed by a Ransomware-as-a-Service platform advertised on darknet sites and forums as an extensively flexible service to get the bang for one’s buck. Everyone interested can purchase a copy of the perpetrating program for $400 and […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Decrypt and remove TrumpLocker ransomware

Decrypt and remove TrumpLocker ransomware

In a way, the ransom Trojan called TrumpLocker is off the beaten track. Also referred to as The Trump Locker, this strain has a bit of ridicule in it, mixed up with politics and some best-practice data encryption techniques. Expert believe it is a derivative of VenusLocker, an older online extortion family that’s been active […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Crypt0L0cker 2017 decryption tool and virus removal

Crypt0L0cker 2017 decryption tool and virus removal

This article is about one of the longest-lasting online extortion campaigns to date. Originally known as TorrentLocker, the currently active ransomware called Crypt0L0cker has been around since late April 2015. Its authors have been able to get away with their filthy business because they craftily conceal their trail through the use of hard-to-track Bitcoin cryptocurrency […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Spora ransomware decryption and removal techniques

Spora ransomware decryption and removal techniques

Whereas the indicators of compromise in the average ransomware attack predicament are usually uniform, different file-encrypting strains still have their unique properties. In the case of the relatively new Spora ransomware, offbeat characteristics are to the fore. It uses a nontrivial cryptographic technique to deny access to one’s data, implements a smart victim gradation tactic, […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Remove Query Router virus (search.queryrouter.com search) from Chrome, Firefox, IE

Remove Query Router virus (search.queryrouter.com search) from Chrome, Firefox, IE

The fact that adware and browser hijackers are not considered to be severe infections doesn’t mean that they are safe to keep on a computer. Moreover, the impact may get serious as far as one’s privacy is concerned. The potentially unwanted program called Query Router (QueryRouter), for instance, collects personally identifiable data of users aside […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →
Page 3 of 27 12345...»