- Threat Encyclopedia
- Malware
This new ransomware variant is known for the unique graphic designs of its ransom notes. Similar to other ransomware variants, it encrypts files and arrives via email.
Read more
This new ransomware variant is known for the unique graphic designs of its ransom notes. Similar to other ransomware variants, it encrypts files and arrives via email.
Read more
This malware was involved in the March 2016 compromise of a popular bittorent client website, where it was passed off as a legitimate upgrade installer. The first ransomware to exclusively target OSX machines, users affected by this malware may find their important files and documents useless and unopenable.
Read more
This crypto-ransomware "speaks", apart from dropping ransom notes. It determines the location (country) of the computer it infects, and avoids infecting computers found in certain countries.
Read more
This malware is used in the attack believed to be targeting companies that are involved with Japan critical infrastructure. The attack is dubbed as Operation Dust Storm.
Read more
This malware is involved in the February 2016 compromise of an open-source Linux OS distribution website. It may find its way into users' systems by being embedded in a downloaded Linux Mint ISO file.
Read more
This latest ransomware variant is dubbed as DMA Locker. It encrypts files on fixed, removable and network drives.
Read more
This malware,discovered late December 2016, has been found to be connecting to a bitcoin transaction site as part of its malicious routines. Users affected by this malware may find their critical documents and files encrypted, which may cause data loss.
Read more
This malware is related to the recent BlackEnergy targeted attacks that affected industries in Ukraine. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
Read more
This malware is related to the recent BlackEnergy targeted attacks that affected industries in Ukraine.To get a one-glance comprehensive view of the behavior of this Rootkit, refer to the Threat Diagram shown below.
Read more