Expert Insights

Robm Ransomware
Ransomware

Robm Ransomware

The Robm ransomware is part of the Djvu/STOP ransomware barracks, which is one of the ransomware with the most variants. The cartel is responsible for hundreds of attacks around the world. Like members of the Djvu family, Robm uses AES-256 encryption. This algorithm generates only one decryption key, it is unique and if it is deleted the files cannot be recovered by hackers.

READ MORE →
NEEH Ransomware
Ransomware

NEEH Ransomware

NEEH ransomware is one of the newest and most lethal data encryption agents in circulation, the group has been responsible for numerous attacks around the world, causing hundreds of dollars in damage. NEEH encrypts the victim’s data using the RSA and AES algorithms, these are the most commonly used algorithms by ransomware groups. This encryption can only be broken with the

READ MORE →
Ransomware XIII
Ransomware

Ransomware XIII

We can recover encrypted files on any data storage device. Start the recovery now. Like the vast majority of ransomware groups, Phobos ceased its activities after a large spike in successful attacks. But what is becoming very common is the creation of families by these groups. XIII ransomware invades victims’ devices through malicious e-mails, illicit programs, phishing campaigns and other ways.

READ MORE →
Stormous Ransomware
Ransomware

Ransomware Stormous

Stormous ransomware emerged in the midst of tensions between Russia and Ukraine. As the invasion of Ukraine began, Stormous positioned itself in favor of Russia. Along with the Conti ransomware, which have been at the forefront of cyber attacks against countries that are opposed to Russia. This conflict has shown the advancement of modern warfare that goes far beyond war power. In the

READ MORE →
Chaos Ransomware
Ransomware

Ransomware Chaos

Chaos Ransomware has been active since June 2021, it is a .NET variant of the RYUK Ransomware. It is being offered for testing on underground forums. Chaos has come a long way since its first appearance, at first it was much more of a destructive Trojan than a ransomware. But now in its current version it acts like ransomware, which aims

READ MORE →
Sugar Ransomware
Ransomware

Ransomware Sugar

The Sugar ransomware differs from the larger ransomware gangs and focuses its attacks on individual computers of ordinary users and small businesses. The group emerged in November 2021, it is not very clear why the group chose to do small attacks, but the fact that these computers are easier to break into and do not draw as much attention from authorities,

READ MORE →

Through unique technologies Digital Recovery can bring back encrypted data on any storage device, offering remote solutions anywhere in the world.

Discover the invisible vulnerabilities in your IT – with the 4D Pentest from Digital Recovery