- Threat Encyclopedia
- Malware
This ransomware is delivered as an attached document, via spam email. It disguises itself as a fake Thai customs form.
Read more
This ransomware has the ability to encrypt files found on an affected system. This routine makes these files inaccessible until a ransom is paid.
Read more
This ransomware is written in Jscript, a scripting language designed for Windows. Particularly, it is for Internet Explorer.
Read more
This JIGSAW ransomware uses chat support to aid customers in paying the demanded ransom. Previous variants of JIGSAW are known to use scary or porn-related ransom messages.
Read more
This JIGSAW ransomware uses chat support to aid customers in paying the demanded ransom. Previous variants of JIGSAW are known to use scary or porn-related ransom messages.
Read more
This ransomware is one of the few ransomware families that is capable of spreading on its own. It drops a copy of itself in removable drives, making use of USBs a risky practice.
Read more
To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Read more
This ransomware, known as CryptXXX, is a .DLL file that is capable of locking screens.
Read more
This malware is involved in the global financial network transfer system Swift hacking incident of April-May 2016. It has certain routines that are tailored to take advantage of the SWIFT messaging network in order to steal funds.
Read more
This malware is involved in the global financial network transfer system Swift hacking incident of April-May 2016. It is a crucial component of the malware that performs the SWIFT message tampering that then causes financial theft.
Read more