Soft2Secure

Author Archive

Philadelphia Ransomware virus decryptor and removal

Philadelphia Ransomware virus decryptor and removal

The ins and outs of the Philadelphia ransomware reflect the heterogeneity of the extortion-centered cybercrime underground. This sample is backed by a Ransomware-as-a-Service platform advertised on darknet sites and forums as an extensively flexible service to get the bang for one’s buck. Everyone interested can purchase a copy of the perpetrating program for $400 and […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Decrypt and remove TrumpLocker ransomware

Decrypt and remove TrumpLocker ransomware

In a way, the ransom Trojan called TrumpLocker is off the beaten track. Also referred to as The Trump Locker, this strain has a bit of ridicule in it, mixed up with politics and some best-practice data encryption techniques. Expert believe it is a derivative of VenusLocker, an older online extortion family that’s been active […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Crypt0L0cker 2017 decryption tool and virus removal

Crypt0L0cker 2017 decryption tool and virus removal

This article is about one of the longest-lasting online extortion campaigns to date. Originally known as TorrentLocker, the currently active ransomware called Crypt0L0cker has been around since late April 2015. Its authors have been able to get away with their filthy business because they craftily conceal their trail through the use of hard-to-track Bitcoin cryptocurrency […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Spora ransomware decryption and removal techniques

Spora ransomware decryption and removal techniques

Whereas the indicators of compromise in the average ransomware attack predicament are usually uniform, different file-encrypting strains still have their unique properties. In the case of the relatively new Spora ransomware, offbeat characteristics are to the fore. It uses a nontrivial cryptographic technique to deny access to one’s data, implements a smart victim gradation tactic, […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Remove Query Router virus (search.queryrouter.com search) from Chrome, Firefox, IE

Remove Query Router virus (search.queryrouter.com search) from Chrome, Firefox, IE

The fact that adware and browser hijackers are not considered to be severe infections doesn’t mean that they are safe to keep on a computer. Moreover, the impact may get serious as far as one’s privacy is concerned. The potentially unwanted program called Query Router (QueryRouter), for instance, collects personally identifiable data of users aside […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Virus HELP_HELP_HELP: Cerber Ransomware 2017 edition decryptor

Virus HELP_HELP_HELP: Cerber Ransomware 2017 edition decryptor

As the Cerber ransomware is approaching a one-year milestone of its abominable extortion crusade, its authors have rolled out another update to give their brainchild a slightly different look and feel. The fresh 2017 iteration currently on the loose sticks with a red color scheme for highlighting the text of the desktop warning. The most […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

GoGameGo virus: remove search.mysearch.com New Tab popup

GoGameGo virus: remove search.mysearch.com New Tab popup

Browser hijackers often pose as something worthwhile that will enhance different facets of one’s Internet experience. It’s clear why – nobody would ever install these pseudo browser helper objects otherwise. This applies to the extension called GoGameGo, also referred to as Go Game Go. It pretends to provide easy, quick and unlimited access to free […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Remove fanli90.cn redirect virus in Chrome, Firefox and IE

Remove fanli90.cn redirect virus in Chrome, Firefox and IE

It’s not too uncommon to discover these days that a web browser’s homepage starts defaulting to a site that’s not the user’s choice. In pursuit of easy Internet traffic monetization and malvertising, some cybercrime groups leverage malicious code called browser hijackers. These intrusive applets infect computers and adjust the functioning of installed browsers to specific […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →
Page 3 of 26 12345...»