Soft2Secure

Archive for 2017

No_more_ransom: ransomware decrypter and removal [gayferber@gmail.com upd. 2017]

No_more_ransom: ransomware decrypter and removal [gayferber@gmail.com upd. 2017]

The data-encrypting malware called Shade, which scrambles and blemishes victims’ files with the .no_more_ransom extension, definitely doesn’t lack sophistication. Also known as Troldesh, this digital contagion employs the AES cryptographic algorithm robustly enough to thwart brute-forcing, so anyone infected is confronted with a dilemma of paying the ransom or losing their important files. What is […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Remove Launchpage.org virus from Chrome, Firefox and IE

Remove Launchpage.org virus from Chrome, Firefox and IE

Almost like regular goods, Internet traffic is a commodity that’s subject to buying and selling these days. Online marketing is a great thing contributing to the success of various merchants and other interesting parties, but unfortunately it’s got a shady side. Some cybercrooks, such as those behind the Launchpage.org malvertising wave, engage in intercepting traffic […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Ads by Leadbolt removal from Android device

Ads by Leadbolt removal from Android device

Mobile gadgets are less susceptible to malware attacks than desktop computers, but they are shaping up to make an environment increasingly targeted by threat actors. No wonder – the user base and attack surface are potentially huge, which is a lure that crooks couldn’t possibly ignore. The app called Leadbolt is an Android adware sample […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

.DOT file virus: spam delivering malicious .dot extension attachments

.DOT file virus: spam delivering malicious .dot extension attachments

An ongoing malspam campaign spreads malicious .dot files claiming to contain sensitive information about recipients. The emails look targeted as they address users by name and even provide their home address. However, the password-protected .dot entities attached to these messages are actually linked to a malware botnet distributing the Crypt0L0cker ransomware. What is the .dot […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Dharma ransomware: decrypt .dharma and [crannbest@foxmail.com].wallet files

Dharma ransomware: decrypt .dharma and [crannbest@foxmail.com].wallet files

The ransomware plague is on the rise these days. File-encrypting viruses come and go, but new ones take over to prop the inheritance. One such family is probably the most dynamic one to date. Originally referred to as the CrySiS strain, it morphed into Dharma in late fall 2016. Encrypting victims’ data and appending the […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Sage 2.2 ransomware removal: decrypt .sage virus files

Sage 2.2 ransomware removal: decrypt .sage virus files

When confronted with a crypto hazard emanating from the Sage 2.2 ransomware, PC users and organizations run the risk of losing their important data if they have no backups. This infection is a prime example of benign technology being abused by unscrupulous individuals. Before the phenomenon of e-extortion emerged, cryptography had been a godsend for […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Philadelphia Ransomware virus decryptor and removal

Philadelphia Ransomware virus decryptor and removal

The ins and outs of the Philadelphia ransomware reflect the heterogeneity of the extortion-centered cybercrime underground. This sample is backed by a Ransomware-as-a-Service platform advertised on darknet sites and forums as an extensively flexible service to get the bang for one’s buck. Everyone interested can purchase a copy of the perpetrating program for $400 and […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Decrypt and remove TrumpLocker ransomware

Decrypt and remove TrumpLocker ransomware

In a way, the ransom Trojan called TrumpLocker is off the beaten track. Also referred to as The Trump Locker, this strain has a bit of ridicule in it, mixed up with politics and some best-practice data encryption techniques. Expert believe it is a derivative of VenusLocker, an older online extortion family that’s been active […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →
Page 6 of 8 «...45678