Soft2Secure

Author Archive

Decrypt .arena files virus and remove Arena ransomware

Decrypt .arena files virus and remove Arena ransomware

When a blackmail Trojan hits a computer, things get out of hand. The depth of impact depends on how professionally designed a specific strain is, including cryptographic strength and the way the infection handles encryption keys. The new Arena version of the CrySiS/Dharma ransomware is one of the ransomware species you don’t want to encounter. […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Delta email scam – beware of fake emails from delta@performanceair.com

Delta email scam – beware of fake emails from delta@performanceair.com

There aren’t many domains as sensitive for the average person as the services of airlines. People naturally want to stay on top of flight schedules as well as the status of booking transactions and payments. Online fraudsters couldn’t have possibly walked by this segment of economy. A recent scam, for instance, distributes malware by duping […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Remove Lukitus ransomware and decrypt .lukitus extension files

Remove Lukitus ransomware and decrypt .lukitus extension files

Although the Locky ransomware family is no longer dominating the online extortion business, it is still in game. A recent proof of its longevity is the emergence of a new variant that adds the .lukitus extension to encrypted files and drops rescue notes named lukitus-[random].htm and lukitus-[random].bmp. This article sheds light on all hallmark signs […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

.CESAR ransomware: virus removal and files decryption

.CESAR ransomware: virus removal and files decryption

The word ‘CrySiS’ may seem like an awful misspelling, but it makes perfect sense in the context of cybersecurity. Said term designates one of the oldest and largest known families of file-encrypting malware. Also known as Dharma, this underground workshop of digital pests has given rise to dozens of variants during its existence. The newest […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Remove “Search My Window” ads virus in Chrome, Firefox and IE

Remove “Search My Window” ads virus in Chrome, Firefox and IE

The controversy about online ads is that they can either enhance one’s browsing experience or diminish it considerably. The latter effect is typically associated with PUPs, or potentially unwanted programs, like Search My Window. These types of applications literally flood search results and regular web pages with redundant advertising, thus preventing victims from seeing what’s […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

My Best Store Inc. fake emails: ups@mybestore.com scam details

My Best Store Inc. fake emails: ups@mybestore.com scam details

Malspam is, by far, the main vector of malware distribution nowadays. It has become cybercrooks’ favorite due to its universality – it allows them to spread virtually any malicious program by simply attaching booby-trapped files to such emails. Sometimes these campaigns harness well-known brand names or services to appear more persuasive, as is the case […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Gryphon Decrypter: ransomware removal and .gryphon files recovery

Gryphon Decrypter: ransomware removal and .gryphon files recovery

Cybercriminals are well motivated as long as their misdemeanor brings them a pretty penny. This seems to be the case with the new Gryphon ransomware. Having landed on a targeted host, it denies accessibility of the victim’s important files, appends them with the .gryphon extension and holds them for ransom. Learn what lineage this sample […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Cry36 decryptor: how to remove Nemezis ransomware

Cry36 decryptor: how to remove Nemezis ransomware

When a ransom Trojan gains a foothold on one’s computer, things get out of hand as the infection intelligently spots the most valuable files and scrambles them using cryptography. This classic assault workflow fully applies to the Cry36 virus representing one of the most widespread ransomware lineages circulating in 2017. Peruse this article to get […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

How to remove Trojan.Pidief.X malware

How to remove Trojan.Pidief.X malware

There are perpetrating programs that impair computers directly in various ways. The infection called Trojan.Pidief.X, though, happens to be different. Its objective is to promote other malicious code. Furthermore, its activity involves a great deal of manipulation reminiscent of classic social engineering techniques. The harmful component is camouflaged as a benign PDF file, so users […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Remove Reyptson ransomware and decrypt .reyptson virus files

Remove Reyptson ransomware and decrypt .reyptson virus files

Ransom Trojan rarely deviate from the well-trodden extortion route. The new sample called Reyptson is one of the very few that leverage offbeat tactics when deploying its infection chain. It performs some extra reconnaissance on a contaminated computer, harvesting the victim’s email credentials in order to self-spread via spam automatically generated from the host. What […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →
Page 13 of 40 «...101112131415...»