Tag: Ransomware
Ransomware
Ransomware

Prestige Ransomware

Prestige Ransomware is malware that encrypts files from an environment and makes them inaccessible to the user.

It has been active for the past few months and has harmed many businesses with its ransomware attacks

READ MORE →
Azov
Ransomware

Azov Ransomware

Azov Ransomware is a new destructive wiper extension that appeared in the month of October 2022. A peculiarity of this ransomware is that it is not an extortion operation as it does not charge ransoms, in fact, it only encrypts the victims’ data.

READ MORE →
Ransomware
Ransomware

Ransomware Monster

The Monster ransomware was discovered in early 2022 as they led a string of attacks targeting several companies around the world. This ransomware brought some news to the cyber world. New developments that have influenced several other ransomware after it. One of them is for sure the use of a GUI (Graphical User Interface) in its ransomware, making it more

READ MORE →
Ransomware
Ransomware

Ransomware Venus

The Venus ransomware made its appearance around August 2022, and since then the group behind the ransomware has been adding names to its list of victims. Another ransomware using the same name had already appeared in 2021, but nothing other than the name shows any connection between them. The operators use Windows vulnerabilities related to the remote desktop system (RDP).

READ MORE →
Royal
Ransomware

Ransomware Royal

Royal is a rapidly growing ransomware operation that is targeting large companies where its ransom demands range from $250,000 to over $2 million. According to active research into the Royal group, its participants are composed of experienced operatives from other ransomware groups. For this reason, with the know-how the group has accumulated from former groups, Royal Ransomware does not operate

READ MORE →
Ransomware
Ransomware

Ransomware VSOP

The VSOP ransomware appears to be directly linked to another malware that also demands ransom after stealing data from its victims. Based on the similarities in their attack processes, researchers believe VSOP may be a variant of the Onyx ransomware that was seen in May of this year. VSOP ransomware has been multiplying victims, whether they are businesses or individuals.

READ MORE →
Ransomware
Ransomware

Ransomware Cyber Police

The Cyber Police ransomware has been making headway on ransomware information channels. It was discovered by Lawrence Abrams and is based on an older ransomware project called HiddenTears. Cyber Police Ransomware usually targets personal computers and servers rather than organizations. The attackers’ idea is to pose as a type of cybercrime fighting unit called “Cyber Police.” To break into the

READ MORE →
Ransomware
Ransomware

Ransomware AgainstTheWest

The AgainstTheWest ransomware belongs to the hacktivist group of the same name. There is not much information yet about who the members of the group are. However, they have been carrying out attacks around the world. Among their victims today are the Chinese Ministry of Public Security and the company ByteDance, creator of the social network TikTok. With these two

READ MORE →
Ransomware
Ransomware

Ransomware BlooDy

The BlooDy ransomware has been known since May 2022, with an attack targeting a group of medical and dental offices in New York City. Recently, there was an event that pleased many cybercrime wannabes. After a fight between the LockBit operator and its developer, the LockBit 3.0 ransomware builder leaked on Twitter. This builder makes it accessible to anyone,

READ MORE →
Ransomware
Ransomware

Ransomware Play

The Play ransomware began its activities in June 2022. Since then, many businesses and government institutions have fallen victim to the Play ransomware. Among them is the Judiciary of Cordoba in Argentina. A large case that involved companies such as Microsoft, Cisco and Trend Micro for the investigation into the attack. Because of the event, the IT system of the

READ MORE →

Through unique technologies Digital Recovery can bring back encrypted data on any storage device, offering remote solutions anywhere in the world.

Discover the invisible vulnerabilities in your IT – with the 4D Pentest from Digital Recovery