Tag: Ransomware
Ransomware
Ransomware

AKO Ransomware

AKO ransomware emerged in 2020, and since then a few variations have emerged, today there is an active variation responsible for numerous attacks around the world. Despite the changes and time the AKO group remains with the same tactics, double extortion remains in use. The group specialises not only in encrypting the victim’s data, but also in stealing it. After

READ MORE →
recover Ransomware
Ransomware

Democracy Whisperers Ransomware

The Democracy Whisperers ransomware, also known as Democ ransomware, has carried out numerous attacks around the world. The group has the ability to attack Windows and Mac operating systems. Democ uses varied tactics to break into the victim’s system like free software, spam emails, malicious links among others. The group is extremely damaging to the affected system, soon after the

READ MORE →
Recover Pipikaki Ransomware
Ransomware

Pipikaki Ransomware​

The Pipikaki ransomware has rocked forums across the internet with reports from numerous victims looking for solutions to the group’s encryption. Pipikaki has developed a powerful encryption algorithm, and not only that, the group uses tactics to break into a victim’s system ranging from brute force attacks to spam email campaigns. After invading the victim’s system, the ransomware disables the

READ MORE →
Recover Ransomware Blaze
Ransomware

Blaze Ransomware

The Blaze ransomware is a relatively new group; it is a variation of the Babuk ransomware, a group that has made numerous attacks on businesses around the world. Blaze is following the path of its predecessor, the group targets large companies. The group uses phishing campaigns to break into the victim’s system, this tactic is targeted at specific companies, after

READ MORE →
Recover Ransomware Axxes
Ransomware

Axxes Ransomware

The Axxes ransomware has focused its attacks on businesses; the group uses the tactic of double extortion, which consists of stealing sensitive files and blocking them through encryption. After breaking into the victim’s system Axxes copies all stored files and sends them to a remote server controlled by the group, after which the original files are encrypted, thus completely blocking

READ MORE →
Ransomware
Ransomware

Onyx Ransomware

Onyx ransomware is the newest group to emerge on the cyberattack scene, the group has generated a great deal of trouble for its victims, on its website the group already has six companies listed as victims. The group’s malware has not only encrypted files but has corrupted them as well. The group’s malware is designed to encrypt files smaller than

READ MORE →
storage-iomega
Ransomware

Iomega NAS Data Recovery

We rescue your important data from Iomega NAS systems. Iomega NAS Data Recovery: We have a solution for your data loss. Through years of experience, deep know-how on RAID systems and Iomega NAS functions, your data loss becomes a successful data recovery. Iomega NAS Data Recovery – Network Storage A NAS is a storage device with its own operating system

READ MORE →
Ransomware

KalajaTomorr Ransomware

The KalajaTomorr ransomware is one of the newest of the moment, the group emerged timidly in March 2022 but leveraged its attacks in a few weeks. The group’s target has been the English-speaking system, the group appears to have been developed in Albania as its name originates from the country. KalajaTomorr was developed with the AES+RSA encryption algorithm, this is an

READ MORE →
Ransomware

Ransomware Black Basta

Black Basta ransomware is the newest ransomware group targeting large corporations, the group emerged in April, and has already left at least 12 known victims. Black Basta acts with the tactic of double extortion. Before encrypting files, the group copies them and sends them to a remote server. This tactic is extremely damaging to the victims as, in addition to being

READ MORE →
Ransomware

IceFire Ransomware

The IceFire ransomware emerged in the first half of March 2022, the group has applied the tactic of double extortion, which consists of locking the system by encryption and stealing sensitive files with the intention of disclosing them if the company does not pay the ransom. IceFire uses the AES+RSA encryption algorithm, this is an extremely powerful encryption, it generates a

READ MORE →

Through unique technologies Digital Recovery can bring back encrypted data on any storage device, offering remote solutions anywhere in the world.

Discover the invisible vulnerabilities in your IT – with the 4D Pentest from Digital Recovery