Soft2Secure

Fast_decrypt_and_protect@tutanota.com ransomware file decryption

Fast_decrypt_and_protect@tutanota.com ransomware file decryption

The ransomware lineage referred to as Xorist has got a new variant. Circulating in the wild since early June 2017, the spinoff in question appends the .fast_decrypt_and_protect@tutanota.com extension to encrypted files and drops a decryption walkthrough named HOW TO DECRYPT FILES.txt. The extortionists behind these attacks demand 3 Bitcoin for the private key, which way […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Remove MyStarting123 virus in Chrome, Firefox and IE

Remove MyStarting123 virus in Chrome, Firefox and IE

There’s a slew of browser hijackers roving around the Internet, but very few of them ever reach significant traffic benchmarks. The one called MyStarting123 falls under the category of particularly toxic redirect infections. It forces a victim’s browser to default to MyStarting123.com at routine events, thus wreaking havoc with online preferences and drastically impacting user […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Remove WannaSister ransomware and decrypt .UIWIX virus

Remove WannaSister ransomware and decrypt .UIWIX virus

The recent disconcerting WannaCry ransomware incident has obviously inspired other cybercrooks to follow suit. A slew of replicas started popping up thick and fast, some of them crude but some tailored professionally enough to become a major problem. The latest one of these derivatives dubbed UIWIX resembles its more successful prototype by the same exploit-based […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Jaff Decryptor System virus: Jaff ransomware removal

Jaff Decryptor System virus: Jaff ransomware removal

A cybercrime group that might be affiliated with the Locky ransom Trojan have unleashed another crypto disaster called the Jaff ransomware. This release deviates from the well-trodden path that the suspected threat actors have gone since February 2016. As opposed to a rock-hard mix of RSA and AES algorithms, the new Locky lookalike uses AES-128 […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

How to uninstall YeaDesktop virus

How to uninstall YeaDesktop virus

No matter how hard the creators of YeaDesktop app may try to persuade users that their service is a perfect match for those seeking a better web search experience, it’s all deceptive to the bone. This rogue browser plugin is both a nuisance and a threat to one’s privacy. It forces hits to YeaDesktop.com when […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

How to remove OurLuckySites virus

How to remove OurLuckySites virus

When a web browser is hijacked by malware like OurLuckySites, things related to Internet browsing on a plagued computer start getting out of hand. This offending digital entity reconfigures the online navigation preset defined by the victim so that a specific URL is resolved upon mundane actions such as opening the browser or doing a […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

How to remove Onion ransomware virus and decrypt .onion files

How to remove Onion ransomware virus and decrypt .onion files

The worst part about the average ransomware attack is that the victim gets locked out of their personal data. While it’s usually not problematic to get rid of the malicious code itself, important information stays inaccessible until the infected user redeems it by paying up. The newest variant of the Dharma ransomware species follows this […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →
Page 3 of 28 12345...»