• This new ransomware variant is known for the unique graphic designs of its ransom notes. Similar to other ransomware variants, it encrypts files and arrives via email.
    Read more   

  • This new ransomware variant is known for the unique graphic designs of its ransom notes. Similar to other ransomware variants, it encrypts files and arrives via email.
    Read more   

  • This malware was involved in the March 2016 compromise of a popular bittorent client website, where it was passed off as a legitimate upgrade installer. The first ransomware to exclusively target OSX machines, users affected by this malware may find their important files and documents useless and unopenable.
    Read more   

  • This crypto-ransomware "speaks", apart from dropping ransom notes. It determines the location (country) of the computer it infects, and avoids infecting computers found in certain countries.
    Read more   

  • This malware is used in the attack believed to be targeting companies that are involved with Japan critical infrastructure. The attack is dubbed as Operation Dust Storm.
    Read more   

  • This malware is involved in the February 2016 compromise of an open-source Linux OS distribution website. It may find its way into users' systems by being embedded in a downloaded Linux Mint ISO file.
    Read more   

  • This latest ransomware variant is dubbed as DMA Locker. It encrypts files on fixed, removable and network drives.
    Read more   

  • This malware,discovered late December 2016, has been found to be connecting to a bitcoin transaction site as part of its malicious routines. Users affected by this malware may find their critical documents and files encrypted, which may cause data loss.
    Read more   

  • This malware is related to the recent BlackEnergy targeted attacks that affected industries in Ukraine. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more   

  • This malware is related to the recent BlackEnergy targeted attacks that affected industries in Ukraine.To get a one-glance comprehensive view of the behavior of this Rootkit, refer to the Threat Diagram shown below.
    Read more