Guides

Restore .java Files and Remove Dharma Ransomware (Updated April 2018)

.java File Virus – Dharma Ransomware imposes encryption on certain files it can reach upon installing its components into a target device. Dharma ransomware, once designating a specific threat, now rather indicates a somewhat generic name for the viruses developed from the same prototype. Java virus, accordingly, […]

Read more

Get rid of GANDCRAB V2.0 virus and decrypt .CRAB files

GranCrab extortion virus spotted in February 2018 hit a number of users. This attracted authorities and security firms. In order to help the victims who suffered the ransomware invasion, Romanian national cybersecurity and Europol hacked the remote command-and-control center behind the malware. The server contained some of […]

Read more

How to Remove GandCrab Virus and Decrypt .Gdcb Files

Another wave of ransomware propagation circulates GandCrab virus; this release features a range of peculiarities making it a stand-alone specimen. First off, the malware is one of a kind as it accepts payments in DASH. Most of the counterparts stick to bitcoins, with few minor exceptions, neither […]

Read more

Get Rid of Rapid Ransomware and Decrypt .rapid Files

Rapid ransomware has been around since the first days of 2018. The first case approved by trusted security labs dates back to January 3. Since that, some 300 cases were reported to ID-ransomware database only. The actual number of victims is likely to be much greater, and […]

Read more

Get Rid of [email protected] Virus and Decrypt .Java Files

[email protected] ransom Trojan is one of the strains for .java ransomware. Digging a bit further reveals the .java ransomware itself is but a spin-off, a new member of Drahma/Crysis encryption-for-ransom family. Apart from [email protected], there are, at least, such instances of .java Trojan as 1777783646@@qq.com, [email protected]. One […]

Read more

How to Decrypt .WORK Files (Cryptomix Ransomware)

A new variant of Cryptomix ransomware that is called .WORK file virus targets a wide range of users. The attack aims at forcing the user to pay the ransom. In exchange, the crooks state they are to release the decryption key that is able to decrypt the […]

Read more

Remove and Decrypt StorageCrypt Ransomware

StorageCrypt ransomware targets cloud and other network attached storage (NAS) devices as its distributors make use of SambaCry vulnerability to drop the infection. The vulnerability is also known to be exploited for unauthorized installation of cryptocurrency miners. Basically, SambaCry is a flaw that occurs as you create […]

Read more

Decrypt .FUCK Files and Remove GlobeImposter 2.0 Ransomware

If your files have a new extension .FUCK it means you are infected with one of the most common variants of GlobeImposter 2.0 ransomware. Why Imposter? This part of the malware name suggests the infection is not true to the name it bears. That is to say, […]

Read more

How to Decrypt .scarab Files and Remove the Corresponding Ransomware

Breaking into malware news this week is the re-emergence of Scarab ransomware. The blackmail malware under review is built on the basis of Hidden-Tear ransomware project code but has many new features and improvements. The noteworthy element of the Scarab ransomware outbreak is its use of the […]

Read more

How to Decrypt .cobra File Virus (Dharma/Crysis Ransomware)

Security researchers from the ID-Ransomware project have found a new version of the Dharma – Crysis Ransomware this week. This new variant creates the .cobra extension to all locked files. For now, it is not clear how this version is being spread. In the past Dharma – […]

Read more

Follow Us:

Surf Spy

Surf Spy is an invisible tool that monitors the Internet activity on your computer. It captures the link of every visited web site. Read more >>

Bluescreen Screensaver

Bluescreen Screensaver will simulate the Windows Blue Screen of Death for your operating system. Read more >>

Farsighter

Farsighter monitors a remote computer invisibly by streaming real-time video to a viewer on your computer. Read more >>