Category: Não categorizado
Ransomware
Ransomware

Entropy Ransomware

Entropy ransomware comes from a long line of malware that has been hacking and stealing data from large corporations for years, it is a variation of the DoppelPaymer ransomware and part of the EvilCorp gang. The gang has other ransomware such as WastedLocker, Hades and Phoenix. The EvilCorp group has become so large that the U.S. Treasury Department has placed

READ MORE →
Ransomware
Ransomware

Ransomware CryLock

The CryLock ransomware is a variant of the Cryakl ransomware, a group that was first seen in 2020, like its predecessor CryLock attacks large enterprises, although regular users are also part of its targets. The group uses various tactics to access the victim’s system, such as spam email campaigns, unsecured RDP ports, malicious downloads, and others. These are just a

READ MORE →
Ransomware
Ransomware

Ransomware BabyDuck

The BabyDuck ransomware may seem harmless from its name, but believe me, it is not. The group is responsible for numerous attacks in recent months, it is just as destructive as any other ransomware group. BabyDuck uses the AES+RSA algorithm to encrypt the victim’s files, this algorithm is practically impossible to break, all files affected by it get the extension

READ MORE →
Ransomware
Ransomware

Admin Locker Ransomware

The Admin Locker ransomware was first seen in December 2021, the group uses a junction of the RSA and AES algorithms for encryption, this algorithm is extremely complex and produces a decryption key that only the group has access to. The Admin Locker targets all files stored on the device, as well as the backup system so that all possibilities

READ MORE →
Ransomware
Ransomware

Ransomware AKO

AKO ransomware emerged in 2020, and since then a few variations have emerged, today there is an active variation responsible for numerous attacks around the world. Despite the changes and time the AKO group remains with the same tactics,  double extortion remains in use. The group specializes not only in encrypting the victim’s data, but also in stealing it. After

READ MORE →
Democracy Whisperers,
Ransomware

Democracy Whiperers Ransomware

The Democracy Whisperers ransomware, also known as Democ ransomware, has made numerous attacks around the world. The group has the ability to attack Windows and Mac operating systems. Democ uses varied tactics to break into the victim’s system such as free software, spam emails, malicious links, and more. The group is extremely damaging to the affected system, soon after the

READ MORE →
Recover Ransomware Pipikaki
Ransomware

Ransomware Pipikaki

The Pipikaki ransomware has rocked forums across the internet with reports from numerous victims looking for solutions to the group’s encryption. Pipikaki has developed a powerful encryption algorithm, and not only that, the group uses tactics to break into the victim’s system ranging from brute force attacks to spam email campaigns. After invading the victim’s system, the ransomware disables the

READ MORE →
Blaze Ransomware Recovery
Ransomware

Ransomware Blaze

The Blaze ransomware is a relatively new group, a variation of the Babuk ransomware, a group that has made numerous attacks on businesses around the world. Blaze is following the path of its predecessor, the group aims to target large companies. The group uses phishing campaigns to break into the victim’s system, this tactic is targeted at specific companies, after

READ MORE →
Recover Axxes Ransomware
Ransomware

Ransomware Axxes

The Axxes ransomware has focused its attacks on businesses; the group uses the tactic of double extortion, which consists of stealing sensitive files and blocking them through encryption. After breaking into the victim’s system Axxes copies all stored files and sends them to a remote server controlled by the group, after which the original files are encrypted, thereby completely blocking

READ MORE →
Ransomware
Ransomware

Ransomware Onyx

Onyx ransomware is the newest group to emerge on the cyberattack scene, the group has generated a great deal of trouble for its victims, on its website the group already has six companies listed as victims. The group’s malware has not only encrypted files, but has corrupted them as well. The group’s malware is designed to encrypt files smaller than

READ MORE →

Through unique technologies Digital Recovery can bring back encrypted data on any storage device, offering remote solutions anywhere in the world.

Discover the invisible vulnerabilities in your IT – with the 4D Pentest from Digital Recovery