Ransomware

What is Tisak Ransomware? screenshot

What is Tisak Ransomware?

Tisak, a menacing ransomware variant, operates by encrypting and renaming victim files. Upon infiltration, it appends the ".Tisak" extension to encrypted filenames. For instance, "1.jpg" transforms into "1.jpg.Tisak,"... Read more

December 29, 2023
What is Lock (MedusaLocker) Ransomware? screenshot

What is Lock (MedusaLocker) Ransomware?

Lock, a notorious ransomware strain, has been identified as a member of the MedusaLocker family. This malicious software is specifically designed to encrypt files, leaving victims with restricted access to their own... Read more

December 27, 2023
What is Cdmx Ransomware? screenshot

What is Cdmx Ransomware?

Cdmx, a member of the Djvu ransomware family, has emerged as a potent threat with its primary objective being file encryption. Not only does it encrypt files, but it also appends the ".cdmx" extension to altered file... Read more

December 27, 2023

What is Ljaz Ransomware?

Ljaz Ransomware is a malicious software program categorized within the Djvu ransomware family. Its primary function is to encrypt files on a victim's computer, appending a distinctive extension (".ljaz") to the... Read more

December 18, 2023
What is Lambda Ransomware and How to Remove Lambda Ransomware screenshot

What is Lambda Ransomware and How to Remove Lambda Ransomware

Lambda ransomware has recently emerged as a fraudulent scheme aiming to exploit users' fears and coerce them into making unwarranted payments under false pretenses. This malicious campaign involves sending deceptive... Read more

December 15, 2023
Hhaz Ransomware Locks Victim Systems screenshot

Hhaz Ransomware Locks Victim Systems

In our examination of new malware samples, we identified Hhaz as a ransomware variant linked to the Djvu family. Our investigation revealed that Hhaz encrypts data, modifies filenames by appending the ".hhaz"... Read more

December 11, 2023
What is BO Team Ransomware? screenshot

What is BO Team Ransomware?

BO Team ransomware has emerged as a malicious threat, demonstrating a sophisticated approach to encrypting files and extorting victims for financial gain. Identified by its distinctive ".bot" file extension, this... Read more

December 28, 2023
What is Tprc Ransomware? screenshot

What is Tprc Ransomware?

Tprc ransomware operates with a sinister mission: to deny victims access to their files by encrypting them. This malicious software appends the ".tprc" extension to filenames, transforming "1.jpg" into "1.jpg.tprc"... Read more

December 27, 2023
What is Ljui Ransomware? screenshot

What is Ljui Ransomware?

LJUI Ransomware, a malicious software designed specifically for Windows systems, belongs to the family of STOP/DJVU malware. Operating as a variant within this lineage, LJUI executes a coercive strategy by encrypting... Read more

December 19, 2023
Turtle Ransomware Threatens Computer Users Without a Traditional Ransom Note screenshot

Turtle Ransomware Threatens Computer Users Without a Traditional Ransom Note

Turtle Ransomware has emerged as a potent threat, targeting a wide range of computer users across Windows, Linux, and macOS operating systems. Unlike typical ransomware variants, Turtle encrypts files and appends the... Read more

December 18, 2023
What is BuLock Ransomware? screenshot

What is BuLock Ransomware?

BuLock Ransomware is a malicious program identified by computer security researchers. This malware is categorized as part of the MedusaLocker ransomware family, and its primary function is to encrypt files on the... Read more

December 13, 2023
Hhuy Ransomware is Based on Djvu Code screenshot

Hhuy Ransomware is Based on Djvu Code

Following an examination, it has been determined that Hhuy is a type of ransomware associated with the Djvu family. Hhuy's primary objective is file encryption. Additionally, it alters filenames by adding the ".hhuy"... Read more

December 11, 2023
What is HuiVJope Ransomware? screenshot

What is HuiVJope Ransomware?

HuiVJope is a notorious ransomware variant associated with the Phobos family. This malicious software encrypts files, appends specific information to filenames, and issues ransom demands through accompanying notes.... Read more

December 27, 2023
What is Cdqw Ransomware? screenshot

What is Cdqw Ransomware?

Cdqw is a variant of Djvu ransomware that specifically targets users by encrypting their files. Upon infection, Cdqw appends the extension ".cdqw" to filenames, transforming, for example, "1.jpg" into "1.jpg.cdqw" and... Read more

December 27, 2023
How to Safely Detect & Remove Ljuy Ransomware screenshot

How to Safely Detect & Remove Ljuy Ransomware

Ljuy Ransomware is a malicious software belonging to the Djvu family, known for encrypting files and appending the ".ljuy" extension to their filenames. This encryption process transforms files such as "1.jpg" into... Read more

December 19, 2023
What is GREEDYFATHER Ransomware? screenshot

What is GREEDYFATHER Ransomware?

In the realm of cyber threats, GREEDYFATHER emerges as a formidable ransomware-type program. Operating with the insidious intent of encrypting user data, it demands ransoms for the release of the compromised... Read more

December 18, 2023

Fun (.funny) Ransomware Turns out to be Serious and Dangerous for Infected Computers

The emergence of Fun Ransomware has added a new layer of severity to the threat landscape, proving that what may initially seem like a lighthearted or amusing intrusion can quickly turn into a serious and dangerous... Read more

December 12, 2023
WANA CRY Ransomware Attempts to Steal Wannacry's Thunder screenshot

WANA CRY Ransomware Attempts to Steal Wannacry's Thunder

In our examination of new malware samples, it was revealed that WANA CRY is a form of ransomware that mimics another well-known ransomware called WannaCry. WANA CRY is derived from the Chaos ransomware and is designed... Read more

December 8, 2023
Loading...