Search
Search Only:

Search Keyword ransomware

Total: 150 results found.

Page 1 of 5
... proliferate trojans, ransomware, cryptominers, and other types of malware. Spam letters are also used to promote various scams, including phishing, sextortion, lottery, inheritance, tech support, refund, ...
2. Rafel RAT (Android)
(PCrisk/Removal guides)
... steal theft, and operate as ransomware. This RAT is compatible with Android versions 5 through 12 and has been used to infect various brands and models of smartphones. Rafel has been utilized in over ...
A banking trojan first discovered in 2020 has made a comeback, according to threat intelligence firm Cleafy. Called Medusa, not to be confused by the ransomware gang or the botnet going by the same name, ...
... service subscription renewal/cancellation, sextortion, lottery, inheritance, and so on. This mail is also used to proliferate malware, such as trojans, ransomware, cryptominers, etc. While the commonly ...
5. Anonymous Arabs Ransomware
(PCrisk/Removal guides)
What kind of malware is Anonymous Arabs? While inspecting new VirusTotal submissions, our research team discovered the Anonymous Arabs ransomware. This malicious program is based on the Chaos ransomware. ...
6. XFUN Ransomware
(PCrisk/Removal guides)
What kind of malware is XFUN? Our researchers found the XFUN ransomware while investigating new submissions to the VirusTotal site. This malware is designed to encrypt data and demand payment for the ...
...  Spam emails distribute a wide variety of malware, including (but not limited to) trojans, ransomware, and cryptocurrency miners. These letters are also used to facilitate various scams. Recipients' ...
... of a malicious PowerShell script through the automation and configuration management tool. This ultimately leads to the installation of malware. Malware distributed through such methods may include ransomware, ...
... the button in the pop-up, victims could have a trojan, ransomware, cryptominer, or other malware infiltrate their devices. Alternatively, the button could redirect to a deceptive or malicious webpage. ...
10. COBRA Ransomware
(PCrisk/Removal guides)
What kind of malware is COBRA? COBRA is a ransomware-type program discovered by our research team during a routine investigation of new submissions to the VirusTotal website. This malicious program is ...
11. Geometrical Ransomware
(PCrisk/Removal guides)
What kind of malware is Geometrical? Geometrical is the name of a ransomware-type program based on Chaos. Our researchers discovered this malware during a routine inspection of new file submissions to ...
12. Jinwooks Ransomware
(PCrisk/Removal guides)
What kind of malware is Jinwooks? Our researchers found Jinwooks ransomware while browsing new malware submissions to VirusTotal. This program is based on the Chaos ransomware. On our test machine, ...
13. GhostHacker Ransomware
(PCrisk/Removal guides)
What kind of malware is GhostHacker? Our researchers found the GhostHacker ransomware during a routine inspection of new file submissions to the VirusTotal site. Malware of this type is designed to encrypt ...
14. AzzaSec Ransomware
(PCrisk/Removal guides)
What kind of malware is AzzaSec? AzzaSec is ransomware that we discovered during our analysis of samples uploaded to the VirusTotal platform. Once a computer is infected, AzzaSec encrypts files and appends ...
15. Cebrc Ransomware
(PCrisk/Removal guides)
What kind of malware is Cebrc? While inspecting malware samples submitted to VirusTotal, we discovered Cebrc ransomware, which is based on Chaos. Cebrc encrypts files, appends the ".cebrc", extension ...
16. Rapax Ransomware
(PCrisk/Removal guides)
What kind of malware is Rapax? While inspecting new malware submissions to the VirusTotal platform, our research team discovered the Rapax ransomware. This malware encrypts data and demands payment for ...
17. Networkchains.co.in Ads
(PCrisk/Removal guides)
... endorse fraudulent, untrustworthy, and possibly malicious applications (e.g., fake anti-viruses, adware, browser hijackers, PUAs, trojans, ransomware, etc.). Additionally, networkchains-co[.]in requested ...
18. Lord Bomani Ransomware
(PCrisk/Removal guides)
What kind of malware is Lord Bomani? Lord Bomani is ransomware belonging to the GlobeImposter family. Our team discovered this ransomware while analyzing samples submitted to VirusTotal. In our examination, ...
19. SSLoad Malware
(PCrisk/Removal guides)
... expand upon the most prevalent malware types, ransomware is designed to encrypt files and/or lock victims' device screens in order to demand ransoms for the decryption/ access recovery. It is noteworthy ...
20. KoiStealer Malware
(PCrisk/Removal guides)
... privacy breaches, identity theft, monetary loss, ransomware attacks, system disruption, data theft, and other issues. What is the purpose of KoiStealer? The purpose of KoiStealer is to steal sensitive ...
21. Dkq Ransomware
(PCrisk/Removal guides)
What kind of malware is Dkq? While investigating new file submissions to the VirusTotal platform, our researchers discovered a malicious program named Dkq. It is a ransomware from the Dharma family. ...
22. L3MON Ransomware
(PCrisk/Removal guides)
What kind of malware is L3MON? L3MON is ransomware based on Chaos (another ransomware) that we discovered during inspection of malware samples submitted to VirusTotal. L3MON encrypts victim's files and ...
23. Warmcookie Backdoor Malware
(PCrisk/Removal guides)
... from devices, keyloggers that record keystrokes, clippers that replace clipboard content, and so forth. Ransomware is another widespread malware. This malicious software encrypts files and/or locks device ...
24. El Dorado Ransomware
(PCrisk/Removal guides)
What kind of malware is El Dorado? El Dorado is ransomware derived from another ransomware known as LostTrust. It encrypts files, appends the ".00000001" extension to filenames, and creates a ransom ...
... cancel operations and blood transfusions after a cyberattack on June 4, 2024. Hospitals were directly impacted when their pathology and diagnostic services provider, Synnovis, was hit by a ransomware attack. ...
26. Trinity Ransomware
(PCrisk/Removal guides)
What kind of malware is Trinity? Trinity is the name of a ransomware-type program. It operates by encrypting files and demanding payment for the decryption. After we executed a sample of Trinity on our ...
27. AT&T Email Scam
(PCrisk/Removal guides)
... to systems, cyber criminals can also remove genuine security tools, install fake anti-viruses, or infect the device with malware (e.g., trojans, ransomware, cryptominers, etc.). To summarize, victims ...
28. Run Ransomware
(PCrisk/Removal guides)
What kind of malware is Run? Run is ransomware belonging to the MedusaLocker family. We discovered it during our analysis of samples uploaded to the VirusTotal page. Run encrypts files and appends its ...
29. Malware Mage Ransomware
(PCrisk/Removal guides)
What is Malware Mage? Our research team found Malware Mage ransomware during a routine investigation of new submissions to the VirusTotal platform. Malicious software within this classification encrypts ...
The relatively new ransomware gang RansomHub has been quick to cause waves amongst ransomware researchers. With increased attention comes increased analysis by researchers, who have now discovered possible ...
<< Start < Prev 1 2 3 4 5 Next > End >>
About PCrisk

PCrisk is a cyber security portal, informing Internet users about the latest digital threats. Our content is provided by security experts and professional malware researchers. Read more about us.

Malware activity

Global malware activity level today:

Medium threat activity

Increased attack rate of infections detected within the last 24 hours.

Virus and malware removal

This page provides information on how to avoid infections by malware or viruses and is useful if your system suffers from common spyware and malware attacks.

Learn about malware removal