
Khonsari Ransomware
The Khonsari ransomware was the first group to exploit known Apache Log4j vulnerabilities (CVE-2021-44228 and CVE-2021-45046), the group has focused its attacks on Windows servers that have not had Log4j updated. The group’s first registration occurred in December 2021, which all indicates that the group was created to directly exploit Apache Log4j vulnerabilities, but this may be just the beginning, the

Ransomware Quantum
Quantum Ransomware is one of the newer malware in activity, there are already some reports of attacks done by it. A bit different from other types of ransomware, it does not only encrypt data, it also installs an AZORult which is a Trojan horse that aims to steal passwords and credentials from the user, this is an extra headache for

Makop Ransomware
Makop ransomware has been expanding through its affiliate program, RaaS (Ransomware as a Service), a tactic that aims to seek partners to carry out attacks by only charging a commission on top of the ransom value. This tactic is intended to expand the attacks by bringing renown to the group. The main target of this group has been companies in

How we saved a power company from extortion by the ransomware REvil Sodinokibi
We received a case of REvil Sodinokibi ransomware attack, at the time the group was among the largest and most effective ransomware in the world, the group’s attacks were always targeted at large corporations, and in this case it was no different. The attack occurred over a weekend, in fact, the ransomware had been on the company’s system for some

Decrypting HiveLeaks Ransomware is possible, here’s how!
We saved a US company from an attack by the HiveLeaks ransomware, one of the most active groups on the market. We tell you all about it now. It is becoming common to hear testimonials from companies that have had to close their doors because of ransomware attacks. Certainly, such an event can create traumas and complications for the smooth

See how we recover files affected by .google ransomware
Digital Recovery develops unique solutions for decrypting ransomware files that can be applied to companies of all sizes. We can perform recovery from anywhere in the world via remote recovery. See how we helped an Italian company recover files encrypted by a ransomware attack. Cybercriminals often carry out mass attacks on many companies simultaneously. This gives them a higher probability