GORO ransomware is yet another version of GlobeImposter ransomware. This one is extremely invasive and becomes a major troublemaker of this midsummer. Security software detects the virus under a range of names. In a number of cases, the detecting tools label it with a name that mentions […]
Read more →MORT ransom Trojan leverages the power of modern cyber-encryption. It keeps data hostage until after the victims purchase the decryption remedy. The encryption it applies is really strong; it is strong enough to withstand any brute-forcing available with the most powerful computing power. MORT ransomware is often […]
Read more →Reyptson ransomware is able to cycle data in such a way that it becomes gibberish. The infection wants the users concerned to pay for processing the data back. This specimen rather targets Spanish-speaking audience. Most of the samples taken in the wild drop their ransom note composed […]
Read more →CryptoMix encryption now adds the following to the names of affected items: .EXTE. This extra extension marks another spinoff in the ransomware family. The encryption by this variant of CryptoMix also modifies main part of a file name. To be precise, the filename undergoes severe encryption to […]
Read more →[email protected] \ Aleta ransomware is a variety of BTCWare. This infection is notorious for blending AES and RSA military-grade ciphers. The combination ensures extra strong scrambling for the files hit by the invasion. Brute-force counter-action proves to be to no avail. Currently, the users are looking for […]
Read more →Bigpicturepop is true to its name as it actually generates tons of popups. This name corresponds to the same-name website, Bigpicturepop.com. Remarkably, the page is not available, unless and until you have your browser hacked by the adware called Bigpicturepop. Such a selectiveness clearly indicates that this […]
Read more →Mole extortion virus hacks computer systems to keep their data locked for ransom. The infection has been around long since. However, it updates both in its own scripts and in the infection vectors. That enables the ransomware to remain a top threat for computer users worldwide. Currently, […]
Read more →Cerber Ransomware has unexpectedly changed its name to CRBR Encryptor. We see it from the ransom note title. Actually, regardless of how it is called, it is still Cerber Ransomware but not a brand new virus. CRBR Encryptor is presently being spread in two most common ways. […]
Read more →Launchpage.org looks like a useless-but-harmless web-hub. Some may even find it a handy option. The web-platform actually brings together most popular resources such YouTube, Facebook, LinkedIn etc. To avoid misunderstanding, please note launchpage.org refers both to the software and the website itself. It may also designate the […]
Read more →[email protected] is one of the longest ransomware names. As usual, this name reflects the extension added to the items ruined by the Trojan. The infection urges users to restore the damage it has caused. It issues a ransom note for this purpose. The message basically says that […]
Read more →