• This ransomware is written in Jscript, a scripting language designed for Windows. This variant comes from an .
    Read more   

  • This ransomware is believed to be patterned after WALTRIX/CRYPTXXX. It almost has the same routines as the aforementioned ransomware family, save for a few minor differences.
    Read more   

  • This ransomware, seemingly similar to JIGSAW ransomware, threatens to delete one file six hours after non-payment. It threatens to delete all encrypted files after 96 hours of non-payment.
    Read more   

  • This ransomware is delivered as an attached document, via spam email. It disguises itself as a fake Thai customs form.
    Read more   

  • This ransomware has the ability to encrypt files found on an affected system. This routine makes these files inaccessible until a ransom is paid.
    Read more   

  • This ransomware is written in Jscript, a scripting language designed for Windows. Particularly, it is for Internet Explorer.
    Read more   

  • This JIGSAW ransomware uses chat support to aid customers in paying the demanded ransom. Previous variants of JIGSAW are known to use scary or porn-related ransom messages.
    Read more   

  • This JIGSAW ransomware uses chat support to aid customers in paying the demanded ransom. Previous variants of JIGSAW are known to use scary or porn-related ransom messages.
    Read more   

  • This ransomware is one of the few ransomware families that is capable of spreading on its own. It drops a copy of itself in removable drives, making use of USBs a risky practice.
    Read more   

  • To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
    Read more