If you work for a government institution, you need to look out for Skipper. This malware was actively attacking operating systems in 2016, but the cybercriminals behind it could always resume attacks without any warning. These cybercriminals belong to the Turla APT group, and so they are completely unpredictable. This group employs various hacking tools – sometimes, several at the same time – to invade the targeted operating system and perform various malicious actions. It is hard to say what exactly the attackers would do using the backdoor Trojan for, but they definitely could personalize their attacks and do as little as record information about the infected system or as much as leak confidential information to the enemies of a targeted government. ...
Trust us when we say, you would never want to encounter Sherminator Ransomware on your computer. However, if you are reading this description, you probably already have this dangerous infection on-board. Tough luck, the program has encrypted your files, and now you are looking for a way to get rid of Sherminator Ransomware. It is possible to remove this infection from your system, but it could prove to be challenging to get your files back. Please do not feel discouraged if you do not have a file backup. You should explore other file recovery options, and the best way to do that is address a local technician. ...
Domn Ransomware seems to be a newly created threat as it still does not work as it is supposed to. The sample tested by our specialists only encrypted files but did not display a note demanding to pay for decryption. Such behavior is unusual for a ransomware application since most of them are created for money extortion. In any case, a missing ransom note means it might be impossible to contact hackers behind the malware and pay a ransom in the hope of receiving decryption tools. To tell you the truth, it is not something we would advise you to do even if you could, because there is always a risk you could get scammed. ...
Vulnerabilities within your operating system can help WatchBog and thousands of other malicious infections to slither in. According to recent statistics, new malware is released every 7 seconds, and more and more infections emerge every single year. At the same time, more and more security tools and measures become available to users, and that means that cybercriminals have to be smart and come up with new ways to attack operating systems. Now, we start seeing malware that might cross over from one operating system to the next. ...
FTCODE Ransomware encrypts pictures and various types of documents. During this process, the malware should mark each affected file with the .FTCODE extension, for example, ticket.pdf.FTCODE. Usually, most ransomware applications display a ransom note after the encryption process is complete, but not in this case. According to our specialists, the sample they were able to test did not create any message that would contain instructions on how to receive a decryptor or contact the threat’s developers. If you want to learn more about this malicious application, we invite you to read our full report. ...
Varenyky is a Trojan, and it uses misleading spam emails to slither in. How does that work? First, the attackers have to come up with a convincing message and a subject line to match it. For example, the subject line can tell you that your order is on its way. Once you open the email, the message inside might inform you that you need to confirm a delivery date or time. This is meant to lead you to an attached document file. If you are pushed into opening it, you are asked to enable macros, and once you do that, the Trojan is let into the operating system silently. ...
There are infections that do malicious things, and then there are infections that drop other threats. Retadup belongs to the latter group, and while it can be used to intrude on the lives of Windows users, its main task is to execute other infections. To be more specific, the infection was found executing, a Monero miner, STOP Ransomware, and the Arkei password stealer. A miner is the kind of software that computes complex problems that are required for managing crypto-currency. In return, the owner of the miner is awarded money. Miners can exploit CPU resources and cause crashes or larger electricity bills. ...
TFlower Ransomware encrypts files and leaves a message described as an “IMPORTANT NOTICE THAT IS URGENT AND TRUE.” While we can agree that the note's statements that say a user cannot decrypt his files on his own are true, we do not believe there are any guarantees you will receive the offered decryptor. We always advise against trusting malware’s creators because they may promise to help but may not bother to do so once they get paid. In other words, putting up with their demands could end up hazardously, and you might lose not just your files, but also the money paid for the decryptor. ...
Windows users living in China need to be very cautious about CXK-NMSL Ransomware, a malicious file-encrypting threat that can encrypt most, if not all, personal files on the infected computer. These could range from barely important documents to highly precious photos. Amongst the files that this malware encrypts, we have .RAR, .AVI, .DOC, .JPG, and various other types of files. Once they are fully encrypted, you will not be able to open them, and that is what might make the ransom note much more effective. This note is represented using a file named “CXK-NMSL-README.txt,” and we talk about it more in this report. ...
'My Trojan Captured All Your Private Information Email' Scam is an old spam email campaign that is designed to trick gullible users into doing whatever the schemers want them to do. The good news is that your computer is not infected if you receive this spam email. The bad news is that such spam campaigns are very good at steering unsuspecting users into the direction they want. Although there usually isn’t anything to remove when you want to get rid of 'My Trojan Captured All Your Private Information Email' Scam, you should still employ the basic cybersecurity measures. ...