Posts

Petya ransomware removal and system recovery (upd. June 27)

Petya ransomware removal and system recovery (upd. June 27)

Learn how the Petya ransomware is different from other crypto threats, why it is considered a high-profile infection, and how to go about the attack. The ransomware called Petya illustrates the fact that crypto viruses are evolving over time. The perpetrators are no longer content with the tactic where victims’ personal data is held for […]

Sorebrect ransomware – fileless malware exploits PsExec utility

Sorebrect ransomware – fileless malware exploits PsExec utility

The Sorebrect ransomware is more sophisticated than the average crypto strain because it boasts stealthy fileless execution and easily evades AV suites. Considering all ransom Trojans the same except their names is a wrong perception. Whereas the extortion scheme proper tends to be common ground, the modus operandi is a variable. The ransomware dubbed Sorebrect […]

Remove MOLE02 ransomware virus and decrypt .mole02 files (upd. June 15)

Remove MOLE02 ransomware virus and decrypt .mole02 files (upd. June 15)

It appears that CryptoMix virus is back again. Its fresh variant is labeled as MOLE02 ransomware. This update changes files extensions to .MOLE02 for all encrypted files. The new version of MOLE virus also uses new ransom note and Tor website. Ransom note text: !!!IMPORTANT INFORMATION!!! All of your files are encrypted with RSA 2048 […]

Erebus ransomware infects Linux web servers in South Korea

Erebus ransomware infects Linux web servers in South Korea

Since the crypto ransomware called Erebus is professionally designed and currently cannot be cracked, it is shaping up to be another serious security problem. There is no computer completely immune to ransomware. What is more, these threats are getting increasingly sophisticated over time. Even if one exercises due caution with files that go with malicious […]

Decrypt .master ransomware files – BTCWare virus variant

Decrypt .master ransomware files – BTCWare virus variant

A new version of the BTCWare ransom Trojan is out that appends the .master extension to encrypted files and drops a ransom note named !#_RESTORE_FILES_#!.inf. The evolution of the BTCWare crypto hoax is underway. Its latest edition has introduced a few external tweaks, while on the inside it is still the same, quite professionally tailored […]

Remove unTabs virus in Chrome, Firefox, IE and Safari

Remove unTabs virus in Chrome, Firefox, IE and Safari

Learn how to get rid of unTabs, a potentially unwanted program that gets installed on its own, changes the default search engine and displays nagging ads. It’s amazing how a commendable idea can be implemented in a way that makes people want to opt out. The application called unTabs is a shining example of such […]

Taskeng.exe virus popups removal in Windows

Taskeng.exe virus popups removal in Windows

The issue with Taskeng.exe popup windows fully demonstrates the blurred gist of present-day malware, where the line between legit and malicious is very thin. There are two different facets of the Taskeng.exe. On the one hand, it is a genuine Windows process referred to as the Task Scheduler Engine. Residing in C:\Windows\System32 directory, this entity […]

How to decrypt .wlu files – new Jaff ransomware extension

How to decrypt .wlu files – new Jaff ransomware extension

A new variant of the Jaff ransomware is out that appends the .wlu extension to enciphered files, presents itself as Jaff Decryptor and uses new ransom notes. It took the makers of the Jaff file-encrypting virus less than two weeks to contrive and launch a fresh edition of their nasty program. The bad news is […]

XData ransomware

XData ransomware

New ransomware called XData is rapidly making the rounds, so take precautions to avoid it and learn how to decrypt .~xdata~ files if the attack has occurred. Security analysts are accustomed to recurrent ransomware outbreaks, but few crypto infections spread like wildfire. The aggressive strain dubbed XData, which surfaced on May 18, 2017, has managed […]

Wanna Cry ransomware attack: dissecting the campaign

Wanna Cry ransomware attack: dissecting the campaign

Get the lowdown on the recent Wanna Cry, or Wana Decrypt0r, ransomware wave that took data on tens of thousands of computers hostage in less than a week. One of the heftiest ransomware outbreaks to date took root on May 12, 2017. A strain called Wanna Cry started making the rounds in a stealthy fashion, […]

Page 1 of 1412345»10...Last »