• This ransomware has the ability to encrypt files found on an affected system. This routine makes these files inaccessible until a ransom is paid.
    Read more   

  • This ransomware is written in Jscript, a scripting language designed for Windows. Particularly, it is for Internet Explorer.
    Read more   

  • This JIGSAW ransomware uses chat support to aid customers in paying the demanded ransom. Previous variants of JIGSAW are known to use scary or porn-related ransom messages.
    Read more   

  • This JIGSAW ransomware uses chat support to aid customers in paying the demanded ransom. Previous variants of JIGSAW are known to use scary or porn-related ransom messages.
    Read more   

  • This ransomware is one of the few ransomware families that is capable of spreading on its own. It drops a copy of itself in removable drives, making use of USBs a risky practice.
    Read more   

  • To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
    Read more   

  • This ransomware, known as CryptXXX, is a .DLL file that is capable of locking screens.
    Read more   

  • This malware is involved in the global financial network transfer system Swift hacking incident of April-May 2016. It has certain routines that are tailored to take advantage of the SWIFT messaging network in order to steal funds.
    Read more   

  • This malware is involved in the global financial network transfer system Swift hacking incident of April-May 2016. It is a crucial component of the malware that performs the SWIFT message tampering that then causes financial theft.
    Read more   

  • This ransomware attempts to bait Chinese users by using Chinese language in its ransom notes and interface.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more