Search results for: ransomware

Total: 99 results found. Page 2 of 4

Published: June 17, 2025  Category: News

31. Anubis Ransomware Becomes More Destructive With Wiper Addition

The Anubis ransomware operation, which emerged in December 2024, represents a chilling evolution in cyber extortion techniques. Unlike conventional ransomware, which encrypts files for ransom, Anubis enhances its menace with a destructive "wipe mode" feature. This dual functionality blurs the line between ...

Published: June 17, 2025  Category: Removal guides

32. Xso-adguard.co.in Ads

...  Rogue sites use their notifications to run intrusive advertisement campaigns. The delivered ads can promote scams (technical support, phishing, affiliate scams, etc.), unreliable/dangerous software (fake antivirus tools, PUAs, adware, browser hijackers, etc.), and malware (trojans, ransomware, etc.). ...

Published: June 16, 2025  Category: Removal guides

33. Vetraxluna.co.in Ads

... use their notifications to run intrusive advertisement campaigns. These ads can promote scams (technical support, phishing, etc.), unwanted/hazardous software (PUAs, adware, browser hijackers, fake antivirus tools, etc.), and malware (trojans, ransomware, cryptominers, etc.). To summarize, through ...

Published: June 16, 2025  Category: Removal guides

34. AMERILIFE Ransomware

What kind of malware is AMERILIFE? While investigating new submissions to VirusTotal, our research team found the AMERILIFE ransomware. This malware operates by encrypting files in order to demand payment for the decryption. On our testing system, AMERILIFE encrypted data and added a ".ameriwasted" ...

Published: June 15, 2025  Category: Removal guides

35. DataLeak Ransomware

What kind of malware is DataLeak? Our researchers discovered the DataLeak ransomware while investigating new file submissions to the VirusTotal website. This program is part of the MedusaLocker ransomware family. Malicious software within this classification encrypts data and demands payment for the ...

Published: June 15, 2025  Category: Removal guides

36. Supronatelmety.com Ads

... – they unintentionally permit this webpage to deliver browser notifications. These advertisements can promote online scams (phishing, tech support, etc.), untrustworthy/hazardous software (adware, PUAs, browser hijackers, etc.), and malware (trojans, ransomware, etc.). In summary, through pages like ...

Published: June 12, 2025  Category: Removal guides

37. HelperSection Adware (Mac)

... can endorse scams (phishing, tech support, etc.), unreliable/harmful software (adware, PUAs, browser hijackers, etc.), and malware (trojans, ransomware, etc.). Once clicked on, some of the adverts can execute scripts to perform stealthy downloads/installations. While legitimate products or services ...

Published: June 12, 2025  Category: Removal guides

38. DarkHack Ransomware

What kind of malware is DarkHack? DarkHack is ransomware our team discovered during an examination of samples submitted to VirusTotal. Upon analysis, we found that DarkHack encrypts files and appends the victim's ID and the ".darkhack" extension to files. Also, DarkHack provides a ransom note, the ...

Published: June 11, 2025  Category: Removal guides

39. Intuit QuickBooks Account Confirmation Email Scam

... also used to distribute all kinds of malware (e.g., trojans, ransomware, etc.). Due to how widespread spam mail is and how well-made it can be – we highly recommend approaching incoming emails, DMs/PMs, SMSes, and other messages with caution. How do spam campaigns infect computers? Malware is commonly ...

Published: June 10, 2025  Category: Removal guides

40. BrowserVenom Malware

... cause chain infections, stealers that extract/exfiltrate data, ransomware that encrypts files to demand ransoms for their decryption, and many, many others. Furthermore, malware is not limited to its classification, i.e., it may possess various differing capabilities. What is more, malware infections ...

Published: June 10, 2025  Category: Removal guides

41. Puld Ransomware

What kind of malware is Puld? While reviewing new malware submissions to VirusTotal, our researchers discovered the Puld ransomware. This malicious program belongs to the MedusaLocker ransomware family. Puld is designed to encrypt files and demand payment for the decryption. On our test machine, ...

Published: June 10, 2025  Category: Removal guides

42. Backups Ransomware

What kind of malware is Backups? Our discovery of the Backups malware occurred while examining samples uploaded to VirusTotal. Our analysis shows that Backups is ransomware designed to encrypt files and appends an email address and the ".backups" extension to files. For instance, it renames "1.jpg" ...

Published: June 09, 2025  Category: Removal guides

43. Stashalinamme.com Ads

... untrustworthy/hazardous software (e.g., PUAs, adware, browser hijackers, etc.), and malware (e.g., ransomware, trojans, etc.). To summarize, through pages like stashalinamme[.]com – users may experience system infections, severe privacy issues, financial losses, and even identity theft. Threat Summary: Name ...

Published: June 09, 2025  Category: Removal guides

44. ZV Ransomware

What kind of malware is ZV? ZV is ransomware belonging to the Dharma family. Our team has discovered it while inspecting samples submitted to VirusTotal. Once executed, ZV encrypts files and appends the victim's ID, an email address, and the ".ZV" extension to them. For example, it changes "1.jpg" ...

Published: June 08, 2025  Category: Removal guides

45. Nkw-protect.pro Ads

... software (adware, browser hijackers, potentially unwanted applications, etc.), and malware (trojans, ransomware, etc.). To summarize, through webpages like nkw-protect[.]pro – users can experience system infections, severe privacy issues, financial losses, and identity theft. Threat Summary: Name ...

Published: June 08, 2025  Category: Removal guides

46. Mastablegary.com Ads

... to deliver browser notifications. Rogue webpages use them to run intrusive advert campaigns. Ads of this kind can endorse online scams (phishing, tech support, etc.), unwanted/dangerous software (PUAs, adware, browser hijackers, etc.), and malware (trojans, ransomware, etc.). Therefore, through pages ...

Published: June 08, 2025  Category: Removal guides

47. SafeLocker Ransomware

What kind of malware is SafeLocker? SafeLocker is ransomware that we discovered during an inspection of malware samples uploaded to the VirusTotal site. Once active, SafeLocker encrypts the victim's files and appends its extension (".8xUsq62"). For example, it renames "1.jpg" to "1.jpg. 8xUsq62", "2.png" ...

Published: June 08, 2025  Category: Removal guides

48. Australia Lottery Email Scam

... refund, etc.). It is also used to distribute all kinds of malware (e.g., trojans, ransomware, cryptominers, etc.). Due to how prevalent this mail is and how well-made it can be – we highly recommend caution with incoming emails, PMs/DMs, SMSes, and other communications. How do spam campaigns infect ...

Published: June 08, 2025  Category: Removal guides

49. 9062 Ransomware

What kind of malware is 9062? During our inspection of malware samples uploaded to VirusTotal, we discovered the 9062 ransomware, which is based on Chaos ransomware. Upon execution, 9062 encrypts files and appends the ".9062" extension to files (e.g., it renames "1.jpg" to "1.jpg.9062" and "2.png" ...

Published: June 05, 2025  Category: Removal guides

50. Bgv-adguard.pro Ads

... endorse online scams (technical support, phishing, etc.), unwanted/harmful software (PUAs, adware, browser hijackers, etc.), and malware (trojans, ransomware, cryptominers, etc.). In summary, through webpages like bgv-adguard[.]pro – users can experience system infections, serious privacy issues, financial ...

Published: June 05, 2025  Category: Removal guides

51. Dersinstion.com Ads

... scams (phishing, technical support, affiliate scams, etc.), untrustworthy/hazardous software (adware, PUAs, browser hijackers, etc.), and malware (trojans, ransomware, etc.). In summary, through pages like dersinstion[.]com – users may experience system infections, serious privacy issues, financial ...

Published: June 05, 2025  Category: Removal guides

52. Traiolx Custom Utils Unwanted Application

... including ransomware, cryptocurrency miners, and information stealers. These payloads can encrypt files, steal sensitive data, use computer hardware to mine cryptocurrency, and more. Also, Traiolx Custom Utils comes with a fake "Save to Google Drive" extension. This extension can access browsing history, ...

Published: June 05, 2025  Category: Removal guides

53. Helper (Beast) Ransomware

What kind of malware is Helper? Our team has examined Helper (malware we discovered while inspecting samples uploaded to VirusTotal) and concluded that it is ransomware. Once infiltrated, Helper encrypts files and provides a ransom note ("README.TXT"). It also modifies filenames by appending the victim's ...

Published: June 04, 2025  Category: Removal guides

54. CyberVolk BlackEye Ransomware

What kind of malware is CyberVolk BlackEye? CyberVolk BlackEye is a ransomware-type program. Malware of this kind is designed to encrypt files and demand payment for the decryption. On our test machine, CyberVolk BlackEye encrypted files and added a ".CyberVolk_BlackEye" (or simply ".CyberVolk") ...

Published: June 04, 2025  Category: Removal guides

55. Chaos RAT

... or system disruption. Additionally, compromised computers may have other malware (e.g., ransomware or a cryptocurrency miner) planted on them. Threat Summary: Name Threat Type Remote Access Trojan Detection Names Avast (Win64:Malware-gen), CTX (Exe.trojan.chaos), ESET-NOD32 ...

Published: June 04, 2025  Category: Removal guides

56. Ololo Ransomware

What kind of malware is Ololo? Ololo is ransomware that we discovered while analyzing malware samples uploaded to VirusTotal. It is part of the MedusaLocker family and is designed to encrypt files. Also, Ololo appends the ".ololo" extension to files (e.g., renames "1.jpg" to "1.jpg.ololo" and "2.png" ...

Published: June 03, 2025  Category: Removal guides

57. Bicarnsh.co.in Ads

... These advertisements can endorse online scams (phishing, technical support, etc.), untrustworthy/hazardous software (PUAs, adware, browser hijackers, etc.), and malware (ransomware, trojans, etc.). In summary, through webpages like bicarnsh.co[.]in – users can experience system infections, serious ...

Published: June 03, 2025  Category: Removal guides

58. Klexposycliass.com Ads

... campaigns. These advertisements endorse online scams (phishing, technical support, etc.), unreliable/hazardous software (adware, browser hijackers, PUAs, etc.), and malware (trojans, ransomware, cryptominers, etc.). In summary, through webpages like klexposycliass[.]com – users can experience system ...

Published: June 02, 2025  Category: Removal guides

59. Vedit.sbs Ads

... affiliate scams, phishing, tech support scams, etc.), untrustworthy/hazardous software (e.g., potentially unwanted applications, adware, browser hijackers, etc.), and malware (e.g., trojans, ransomware, etc.). To summarize, through webpages like vedit[.]sbs – users may experience system infections, ...

Published: June 02, 2025  Category: Removal guides

60. Digilinksbluekittaner.com Ads

... into downloading a malware loader known as Legion Loader. Executing it on devices can lead to various issues. Legion Loader can be used to distribute ransomware, cryptocurrency miners, information stealers, and other types of malware. Victims can encounter issues like file encryption, financial loss, ...