Expert Insights

Stepik Ransomware
Ransomware

Stepik Ransomware

Stepik ransomware is highly dangerous, its attacks have produced damage all over the world. Stepik uses strong AES and RSA encryption. The files encrypted by it can only be accessed with the matrix decryption key, which is kept by the group on a remote server, for each attack there is a specific key. The main means of attacks used by

READ MORE →
LolKek Ransomware
Ransomware

LolKek Ransomware

The LolKek ransomware is a variant of BitRansomware, a family that used the RaaS (Ransomware as a Service) tactic. The RaaS tactic consists of selling the malware to agents outside the group that developed the ransomware, the ransomware is offered on dark web forums and interested parties can make the purchase. The group has a stake in the ransom amount paid

READ MORE →
Banta Ransomware
Ransomware

Banta Ransomware

The Banta ransomware is part of the Phobos ransomware family, which has been responsible for numerous attacks over the years. Banta was developed in .NET language and uses AES encryption. Banta acts as a Trojan horse to break into the victim’s system, the file is downloaded via email, pirate download sites and others. The file apparently looks normal, but the ransomware

READ MORE →
Recover Maoloa Ransomware
Ransomware

Ransomware Maoloa

The Maoloa ransomware apparently appears to be a member of the GlobeImposter ransomware family. But it is not confirmed whether Maoloa is in fact part of the GlobeImposter family. But in a deeper look at the malware, it appears to be a variation of the Russian Scarab ransomware. The first appearance of the group was in 2019, the group was offering its

READ MORE →
MKP Ransomware
Ransomware

MKP Ransomware: Recover Encrypted Data

MKP ransomware is a variant of the Makop ransomware, which like other ransomware has strived to create a family/cartel. MKP has already emerged with all the structure that Makop built with its attacks, this completely changes the shape and potential of a newly created group. MKP ransomware uses two main ways to break into the victim’s system, which are spam email and

READ MORE →
STOP/DJVU Ransomware
Ransomware

STOP/DJVU Ransomware Recovery

The DJVU ransomware, also known as STOP, has elevated its attacks since early 2022. It first appeared in 2018 and since then there have been more than 370 variations of the malware. STOP/DJVU uses RSA encryption, which is one of the most commonly used by ransomware groups, the group’s main focus is Windows operating systems. Because there are so many variations

READ MORE →

Through unique technologies Digital Recovery can bring back encrypted data on any storage device, offering remote solutions anywhere in the world.

Discover the invisible vulnerabilities in your IT – with the 4D Pentest from Digital Recovery