Soft2Secure

Author Archive

Thor file: restore encrypted .thor extension files

Thor file: restore encrypted .thor extension files

Thor is the latest persona of the infamous Locky ransomware. This variant was released less than a day after the previous .shit extension edition was discovered, which might suggest that the latter was a misunderstanding in the cybercriminal ring responsible for this lineage. The updated pest doesn’t have many adjustments inside. It appends .thor to […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Decrypt .shit files virus – Shit ransomware removal

Decrypt .shit files virus – Shit ransomware removal

Locky ransomware devs appear to have been really busy rolling out updates to their nefarious extortion product lately. Less than a month after the emergence of the previous “Odin” variant, a brand-new iteration has been discovered that appends the .shit extension to one’s crippled files. Other than the somewhat different filename skewing effect, this version […]

Read more →

Posted in: News

Leave a Comment (0) →

CryPy ransomware decryptor and removal

CryPy ransomware decryptor and removal

Python-based ransomware is not a new phenomenon in the online extortion environment, but it hadn’t been nearly as well-orchestrated as it has become with the emergence of the CryPy baddie. This crypto threat is proficient at evading antiviruses and leverages an extraordinarily hard-to-tackle encryption principle. The main hurdle to handling these attacks is that the […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Hades Locker ransomware virus: decrypt .~HL extension files

Hades Locker ransomware virus: decrypt .~HL extension files

Ransomware takedowns are still the exceptions rather than the rule, but they do occur once in a while. The WildFire Locker campaign, for instance, discontinued about a month ago due to a well-orchestrated operation by law enforcement and private sector security organizations. While this initiative was undoubtedly a success, the same group of cybercrooks recently […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Readme.hta – Cerber Ransomware update

Readme.hta – Cerber Ransomware update

There are no extraordinary tweaks made to the prolific Cerber Ransomware in the course of the fresh update. It still leverages the same strong cryptosystem to lock a victim’s files. As before, it changes the desktop wallpaper to a grayish image with random pixels and some warning text in green font. The circulation peculiarities are […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Remove tech-connect.biz redirect virus in Chrome, Firefox and IE

Remove tech-connect.biz redirect virus in Chrome, Firefox and IE

There are several strong reasons why tech-connect.biz is a drag. Whereas it is okay as a website with some sort of a search functionality, the techniques bolstering its distribution and operation are clearly malicious. An associated rogue browser extension, once inside a Windows computer, muddles the user’s online preferences big time. It automatically makes tech-connect.biz […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Decrypt Mischa ransomware – recover files and remove virus

Decrypt Mischa ransomware – recover files and remove virus

Sometimes crypto threats fail to reach their extortion goal as early as at the stage of computer contamination, in which case the attack isn’t worth the criminals’ while. The Trojan dubbed Petya happens to be an example – its technical gist relies on gaining administrator privileges on a targeted machine. Since this kind of access […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →
Page 5 of 24 «...34567...»