• This ransomware purportedly targets web servers. Once it finds its target, it encrypts files in the web server.
    Read more   

  • This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes then deletes itself afterward.
    Read more   

  • This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It modifies the Internet Explorer Zone Settings.
    Read more   

  • This ransomware, also known as Crypt0Shad0w, is based on the Hidden Tear open source ransomware.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more   

  • This ransomware, also known as Alcatraz Locker, charges its victims between 0.3 - 0.
    Read more   

  • This ransomware is a variant of Encryptor RaaS, a popular Ransomware as a Service (RaaS) that came out in July 2015. RANSOM_CRYPRAAS.
    Read more   

  • RANSOM_MIRCOP.F116IL is a variant of RANSOM_MIRCOP.
    Read more   

  • This ransomware does not only target resources in network shares such as drives, folders, and files but locks the drive as well. It does this by combining both legitimate and malicious tools.
    Read more   

  • This ransomware does not only target resources in network shares such as drives, folders, and files but locks the drive as well. It does this by combining both legitimate and malicious tools.
    Read more   

  • This backdoor enables the attacker to steal a range of information, including screenshots, audio, and keylogs. It can also execute commands and communicate using encrypted data.
    Read more