Tag: Ransomware
Ransomware
Ransomware

Play ransomware

The Play ransomware began its activities in June 2022. Since then, many businesses and government institutions have fallen victim to the Play ransomware. Among them is the Judiciary of Córdoba, Argentina. A large case that involved companies such as Microsoft, Cisco and Trend Micro for the investigation into the attack. Because of the event, the IT system of the Córdoba

READ MORE →
Ransomware
Ransomware

Dark Angels Ransomware

The Dark Angels ransomware has been active since May 2022, all indications are that it belongs to the Babuk ransomware family. As usual ransomware groups improve their malware and release new variants frequently. The Dark Angel ransomware is not left out of this move either. We have seen that the ransomware called ELF has appropriated a good technical part of

READ MORE →
Ransomware
Ransomware

ELF Ransomware

Uptycs researchers have recently discovered a new ransomware attacking Linux systems. Its name, ELF ransomware. Ransomware creators usually target Windows operating systems. But this time, technology lovers’ favourite OpenSource system has been exposed to its vulnerability. ELF ransomware, in reference to “Executable and Linkable Format” files, can encrypt files within the Linux system based on the folder path provided. Having

READ MORE →
Ransomware
Ransomware

HavanaCrypt Ransomware

Around July this year, the HavanaCrypt ransomware emerged in the cyber world. It has been carrying out attacks with an interesting twist. HavanaCrypt masquerades as a Google software update to encrypt virtual machines. The ransomware is written in the .NET language and uses an OpenSource obfuscator called Obfuscate to hide feature names used in the ransomware. The group behind the

READ MORE →
Ransomware
Ransomware

Monti Ransomware

In early July, researchers identified suspicious activity from a previously unknown, or not so unknown, ransomware, the Monti ransomware. You could say it is almost new, as it is quite similar to the famous Conti ransomware. Some say they are “Doppelganger”, which means look-alike. Some time ago the Conti group suffered a break-in and a big data leak, including source

READ MORE →
Ransomware
Ransomware

Daixin Ransomware

A new ransomware called Daixin has been spotted active. There is not much information yet on its technical characteristics, but we already understand the impact Daixin ransomware can have on a company’s operations. Daixin’s first victim was a community hospital in Missouri. Even before the hospital spoke out, the Daixin group had already taken credit for the attack. Members of

READ MORE →
Ransomware
Ransomware

NYX Ransomware

Nyx ransomware is the newest variant recently discovered by cyber researchers. This new ransomware practices one of the most feared strategies for ransomware attack victims: double extortion. This refers to the fact that they not only encrypt the data, but also steal it. In this way, they can exert greater pressure, threatening to release the stolen data if there is

READ MORE →
Ransomware
Ransomware

Arvin Club Ransomware

Ransomware that falls under the Ransomware as a Service (RaaS) system is extremely dangerous. Arvin Club ransomware is part of that category. RaaS is the malware’s sales strategy, the creators sell their services on DarkWeb for a relatively affordable price. The big danger is that any malicious person, is able to operate a ransomware attack on any company or organisation.

READ MORE →
Agenda
Ransomware

Agenda Ransomware

A new ransomware makes its appearance in the cyber world, the Agenda ransomware. Researchers have detected worrying moves on the part of this new group. In a short period of time, they have already orchestrated several attacks targeting organizations in Asia and Africa. The Agenda ransomware was developed in the Go programming language. A language widely used by hackers to

READ MORE →
ProLock
Ransomware

ProLock Ransomware

The ProLock ransomware follows a specific strategy when choosing its victims. This strategy is called “Big Game Hunting,” which refers to the fact that the group only attacks large companies. This way, by having large companies or government networks as targets, the attackers are able to extract large payouts from the victims. By the end of 2019 ProLock was already

READ MORE →

Through unique technologies Digital Recovery can bring back encrypted data on any storage device, offering remote solutions anywhere in the world.

Discover the invisible vulnerabilities in your IT – with the 4D Pentest from Digital Recovery