Soft2Secure

“Your files are encrypted”: Microsoft Decryptor ransomware virus

“Your files are encrypted”: Microsoft Decryptor ransomware virus

The updated edition of CryptXXX ransomware, also referred to as Microsoft Decryptor, has introduced a couple of new features. While the predecessor appended a random string at the end of filenames, such as .AF4D3, this one does not affect the look and feel of encrypted data at all. Furthermore, the Trojan now creates ransom notes […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Docm file virus phishing emails spread Zepto ransomware

Docm file virus phishing emails spread Zepto ransomware

Cybercrooks use several different vectors to spread ransomware, a type of malicious code that takes one’s files hostage by encrypting them. Some samples arrive through the use of exploit kits whose efficiency depends on the presence of vulnerabilities on a targeted computer. Most incidents, though, involve spam emails that contain attachments in different formats. Docm […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Decrypt and remove Bart ransomware (.bart.zip extension virus)

Decrypt and remove Bart ransomware (.bart.zip extension virus)

A new breed of Internet scum named the Bart ransomware entered a rapid circulation phase last weekend, with hundreds of Windows computers reportedly affected at the time of writing. Despite the apparent fact that the ransom instructions and the payment page design are nearly identical to those used by another plague called Locky, the principle […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Remove Safebrowsing.biz virus in Chrome, Firefox and IE

Remove Safebrowsing.biz virus in Chrome, Firefox and IE

Monetization of web traffic is a type of activity that cyber threat actors heavily engage in their malicious schemes. This tactic features a twofold benefit for the hackers. It is profitable due to third parties’ interest in the associated advertising opportunities. Furthermore, no one can really sue and prosecute them for hijacking web browsers, because […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Decrypt .zepto file virus: Zepto ransomware removal and decryption guide

Decrypt .zepto file virus: Zepto ransomware removal and decryption guide

The cybercrooks liable for distributing Locky, one of the dominating ransomware scourges of the current year, appear to have started a new campaign with a couple of tangible differences made to their extortion tactic. The new successor dubbed the Bart ransomware is on the loose, operating concurrently with the new iteration of Locky proper. Bart […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Crypz virus removal : how to decrypt .crypz file extension ransomware

Crypz virus removal : how to decrypt .crypz file extension ransomware

Computer threats leveraging known cryptosystems to blocks users’ data are in vogue in the present-day cybercrime environment, but the CryptXXX sample, also known as UltraCrypter, deflects from the typical ransomware routine. The main deviation consists in a peculiar propagation technique and credentials theft capabilities. The infection also copies itself to network shares that the computer […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

AGL electricity bill email scam infecting with Cryptolocker virus

AGL electricity bill email scam infecting with Cryptolocker virus

Crypto infections are no longer indiscriminate in terms of whom they compromise and where. The latest newsmaking story involves a widespread strain of file-encrypting malware, which is deposited onto the computers of commercial and retail customers of AGL Energy, one of the biggest electricity facilities in Australia. The criminals have been deploying an intricate phishing […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

CryptoLocker virus removal and ransomware files decryption

CryptoLocker virus removal and ransomware files decryption

There are computer threats that no longer pose risk once removed. In contrast to this overwhelming majority, even after a ransom Trojan is eliminated, its effects persevere. Files affected by the CryptoLocker ransomware are not recoverable unless the victim agrees to the terms of the imposed buyout and submits money to the extortionists. In some […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Endesa fake virus emails spread Cryptolocker/Locky ransomware

Endesa fake virus emails spread Cryptolocker/Locky ransomware

The customers of Endesa, the leading electric utility company in Spain, have been exposed to a large-scale social engineering campaign that installs a sample of crypto ransomware. This ongoing hoax relies on fake invoices sent to thousands of Endesa clients. Once opened, these bills automatically load a variant of CryptoLocker or Locky, which straightforwardly encrypts […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →
Page 7 of 23 «...56789...»