• This ransomware uses a client console, giving the affected user a variety of options. including a free trial individual file restore.
    Read more   

  • This malware, name derived from the title of its ransom note, was discovered early January 2017. Victims of this ransomware will have their files encrypted, with a ransom note wishing them a Merry Christmas and demanding to pay the ransom in order to retrieve the encrypted files.
    Read more   

  • This malware, name derived from the title of its ransom note, was discovered early January 2017. Victims of this ransomware will have their files encrypted, with a ransom note wishing them a Merry Christmas and demanding to pay the ransom in order to retrieve the encrypted files.
    Read more   

  • This ransomware, discovered in December 2016, has been found to be connected to Mischa and Petya ransomware. Users affected by this malware will experience system reboot, which will then execute the ransomware's routine of encrypting files.
    Read more   

  • This malware is a new family of ransomware detected mid-November 2016. Users affected by this malware may find their files and documents rendered inaccessible.
    Read more   

  • This malware is a new family of ransomware discovered on early November 2016. Users affected by this particular ransomware may find their files and documents rendered inaccessible.
    Read more   

  • This malware is a variant of malware family CERBER discovered late November 2016, and has been found to be sporting routines that seek out database processes in the affected system. This is believed to enhance its ability to target and infect machines used by businesses.
    Read more   

  • This ransomware purportedly targets web servers. Once it finds its target, it encrypts files in the web server.
    Read more   

  • This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes then deletes itself afterward.
    Read more   

  • This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It modifies the Internet Explorer Zone Settings.
    Read more