Category: Não categorizado
Ransomware Quantum
Ransomware

Ransomware Quantum

Quantum Ransomware is one of the newer malware in activity, there are already some reports of attacks done by it. A bit different from other types of ransomware, it does not only encrypt data, it also installs an AZORult which is a Trojan horse that aims to steal passwords and credentials from the user, this is an extra headache for

READ MORE →
Yqal Ransomware
Ransomware

Yqal Ransomware

The Yqal ransomware is one of the variations of the Stop/Djvu ransomware, as well as the Robm ransomware. Stop/Djvu has created a huge cartel with over 370 ransomware variations. The STOP/Djvu cartel has authored countless attacks, easily the damage caused by their attacks runs into the thousands of dollars. Yqal uses the RSA 2048 + Salsa20 encryption algorithm, files that are hit by

READ MORE →
Xot5ik Ransomware
Ransomware

Xot5ik Ransomware

The Xot5ik ransomware is a variant of the Thanos ransomware, which has been responsible for numerous attacks, Europe has been the target of most attacks. As usual for large ransomware groups, after numerous successful attacks they cease their activities because their attacks attract the attention of the authorities. But after some time, the group reappears under a new name and

READ MORE →
Robm Ransomware
Ransomware

Robm Ransomware

The Robm ransomware is part of the Djvu/STOP ransomware barracks, which is one of the ransomware with the most variants. The cartel is responsible for hundreds of attacks around the world. Like members of the Djvu family, Robm uses AES-256 encryption. This algorithm generates only one decryption key, it is unique and if it is deleted the files cannot be recovered by hackers.

READ MORE →
NEEH Ransomware
Ransomware

NEEH Ransomware

NEEH ransomware is one of the newest and most lethal data encryption agents in circulation, the group has been responsible for numerous attacks around the world, causing hundreds of dollars in damage. NEEH encrypts the victim’s data using the RSA and AES algorithms, these are the most commonly used algorithms by ransomware groups. This encryption can only be broken with the

READ MORE →
Ransomware XIII
Ransomware

Ransomware XIII

We can recover encrypted files on any data storage device. Start the recovery now. Like the vast majority of ransomware groups, Phobos ceased its activities after a large spike in successful attacks. But what is becoming very common is the creation of families by these groups. XIII ransomware invades victims’ devices through malicious e-mails, illicit programs, phishing campaigns and other ways.

READ MORE →
Stormous Ransomware
Ransomware

Ransomware Stormous

Stormous ransomware emerged in the midst of tensions between Russia and Ukraine. As the invasion of Ukraine began, Stormous positioned itself in favor of Russia. Along with the Conti ransomware, which have been at the forefront of cyber attacks against countries that are opposed to Russia. This conflict has shown the advancement of modern warfare that goes far beyond war power. In the

READ MORE →
Chaos Ransomware
Ransomware

Ransomware Chaos

Chaos Ransomware has been active since June 2021, it is a .NET variant of the RYUK Ransomware. It is being offered for testing on underground forums. Chaos has come a long way since its first appearance, at first it was much more of a destructive Trojan than a ransomware. But now in its current version it acts like ransomware, which aims

READ MORE →
Sugar Ransomware
Ransomware

Ransomware Sugar

The Sugar ransomware differs from the larger ransomware gangs and focuses its attacks on individual computers of ordinary users and small businesses. The group emerged in November 2021, it is not very clear why the group chose to do small attacks, but the fact that these computers are easier to break into and do not draw as much attention from authorities,

READ MORE →
Stepik Ransomware
Ransomware

Stepik Ransomware

Stepik ransomware is highly dangerous, its attacks have produced damage all over the world. Stepik uses strong AES and RSA encryption. The files encrypted by it can only be accessed with the matrix decryption key, which is kept by the group on a remote server, for each attack there is a specific key. The main means of attacks used by

READ MORE →

Through unique technologies Digital Recovery can bring back encrypted data on any storage device, offering remote solutions anywhere in the world.

Discover the invisible vulnerabilities in your IT – with the 4D Pentest from Digital Recovery