Tag: Ransomware
Rever
Ransomware

Rever Ransomware

Ransomware attacks have been on the rise these past few years, and new ransomware often emerges. This July, it was the case with Rever ransomware that has some important characteristics. The main target of Rever ransomware is Synology NAS and Windows Server systems. After breaking in, most often done via unprotected RDP or malicious emails, the attackers encrypt the files

READ MORE →
CryptOn
Ransomware

CryptOn Ransomware

The CryptOn ransomware was discovered around 2017. Since then, it has had varying nomenclatures, such as Cry9, CRY36, Cry128, Nemesis or X3M. CryptOn is part of the CryptoLocker ransomware family. CryptOn steals and encrypts the victim’s data. This way the group applies double extortion, which consists of threatening the victim with the publication of the data if the ransom is

READ MORE →
OnePercent
Ransomware

OnePercent Ransomware

We know that the OnePercent ransomware has been active in the cyber world since late 2020. Based on Ransomware as a Service (RaaS) operations, the group behind OnePercent ransomware has been directing attacks on a number of companies around the world and largely in the United States. Like many other ransomware, OnePercent typically encrypts a company’s data, threatening to release

READ MORE →
Boss
Ransomware

Boss Ransomware

Boss is a new ransomware extension discovered recently, but the group tends to grow rapidly due to its RaaS (Ransomware as a Service) strategy. The RaaS tactic has become a widely used method by hackers because it allows them to market the ransomware to anyone. Resulting in the highest profit and propagation of criminal operations. Boss brings a peculiar feature

READ MORE →
SoliBit
Ransomware

SolidBit Ransomware

SolidBit ransomware has recently emerged, targeting extort large and small businesses, the group behind SolidBit ransomware has been triggering attacks via email campaigns with malicious links and attachments. From the moment the environment is accessed, the attackers begin to encrypt files considered important and make them inaccessible to the user. Malware can also be transferred from one computer to another

READ MORE →
Luna
Ransomware

Luna Ransomware

The Luna ransomware was discovered in June 2022, it is developed in the Rust programming language, preventing the group from being easily detected because the malware’s code does not remain static. This variation is capable of operating on multi-platforms, which allows the ransomware to attack on more than one operating system at the same time, including Windows, Linux and ESXi.

READ MORE →
MBC
Ransomware

MBC Ransomware

The MBC Ransomware although little known is a group that practices large organised operations. There are several malicious malware scattered across the internet, most of which infect random victims. However, MBC, like LockBit, does not carry out random attacks, but targets specific targets. In July 2021 MBC was able to hack and block Iran’s railway system, the hack paralysed transport

READ MORE →
CoomingProject
Ransomware

CoomingProject Ransomware

The CoomingProject ransomware is a little-known group of malware that performs double extortion attacks. In addition to encrypting victims’ data, hackers steal and threaten to expose the information publicly if negotiation requirements are not met. It is worth noting that trading with the group is not recommended as there is no guarantee of the release of the decryption key. Cooming

READ MORE →
Ransomware
Ransomware

KelvinSecurity Ransomware

KelvinSecurity ransomware belongs to a very specific and not always malicious family of ransomware. The term “Hacker” is probably familiar to you, but you may not have heard of the categories these cyber experts fall into. We call them Black Hat, White Hat and Grey Hat. This appellation is based on the old Western movies that were prominent in American

READ MORE →
Ransomware
Ransomware

SynAck Ransomware

The SynAck ransomware is not particularly new. It first appeared in the year 2017. At that time, the technology used in SynAck ransomware was very similar to other types of ransomware. The group behind the SynAck ransomware participated heavily in the evolution of ransomware attacks. In fact, you don’t have many reports of victims of SynAck ransomware attacks. So I

READ MORE →

Through unique technologies Digital Recovery can bring back encrypted data on any storage device, offering remote solutions anywhere in the world.

Discover the invisible vulnerabilities in your IT – with the 4D Pentest from Digital Recovery