Facts and Figures you should know about Ransomware

Even as cyber security specialists work tirelessly towards containing the Ransomware menace – which has sort of gained a pandemic proportions this year – there doesn’t seem to be any permanent respite from…Read More

  • Ankit
  • 13 Oct 2016
No comment

TorrentLocker: Ghost in Your Machine

There’s something about torrents that makes them controversial. Apart from the fact that you’re downloading stuff for free (even paid stuff for free), it is one of the most common carriers of malware, viruses and Trojans. While our next culprit has nothing to with torrents, its heinousness is enough to make a permanent impression on the victim. Appearing first in 2014, TorrentLocker is a close cousin to other infamous Ransomware such as CTB-Locker, CryptoWall, Locky and CryptoLocker etc. How It Infects Like most other Ransomware, it enters the victim’s computer… Read More

  • Ankit
  • 13 Sep 2016
No comment

PadCrypt: Hijacker with A Conscience

There are villains who commit crimes without remorse and there are some that take a totally different approach. Most crypto viruses or Ransomware aim at hijacking and infecting their victim’s computers and extorting money. They are not only a threat to computer security but is also a major hindrance to the internet of things. But regardless of how dangerous they are, we must not forget that they have been designed by humans who might also have a conscience. The best example of such a self-conscious and somewhat ethical crypto virus… Read More

  • Ankit
  • 13 Sep 2016
No comment

CTB Locker – The Professional Saboteur

Unlike regular viruses or malware that can be removed from your computer using an antivirus program, ransom ware or crypto-viruses spell disaster for your files. Once this malicious program makes its way to your computer, there is no asylum from the horrors of losing your valuable data. Another highly proficient Ransomware from the huge family of such crypto-malware is CTB Locker. Like other Ransomware of its kind, CTB Locker secretly encrypts your files, hijacks your computer and demands ransom from the owner in Bitcoin. Common Targets CTB Locker is notorious… Read More

  • Ankit
  • 13 Sep 2016
No comment

Locky: Extension Pioneer

Although, newer strains of Ransomware change file extension names, Locky was the first ever to start the trend. It’s not particularly old, but has become an infamous one in a short span of 5 months. Perhaps, Locky’s fame is credited to its wide spread transmission. A research over it says, out of 10 spam emails, 7 contained Locky executables in the first quarter of 2016. How it infects? Just like many other Ransomware variants, Locky too finds its way via spam emails. More often than not, these emails contain a… Read More

  • Ankit
  • 13 Sep 2016
No comment

Petya: Don’t Fall for a ‘Business Email’

Cyberware criminals couldn’t get any more crooked when they designed Petya Ransomware. While infinite strains have already been developed in the Ransomware family, Petya is probably the most wicked one. Unlike other locker Ransomware, Petya overwrites master boot record (MRB) and encrypts master file table (MFT) so that files become unreadable. Petya Ransomware emerged in the beginning of this year and is still a menace for Windows users. It uses binary encryption, which would take place one after another and makes recovery hardly possible. Petya’s Transmission Like every other Ransomware… Read More

  • Ankit
  • 13 Sep 2016
No comment

Fairware: The ‘Punny’ Ransomware

It is beyond our understanding how on Earth can one possibly utter the words ‘Fair’ and ‘Ransomware’ in the same breath. Experts at BleepingComputer.com apparently don’t. They have dubbed the most recent Ransomware as ‘Fairware’. Pun/Sarcasm, anyone? Beginnings The first instance of a ‘Fairware’ attack was posted on a BleepingComputer Forum. According to the victim, the hackers somehow intercepted the password on his Linux machine and logged on to Linux servers for the website. Fairware then deleted the relevant web folder and left a ransom note asking for 2 bitcoins… Read More

  • Ankit
  • 13 Sep 2016
No comment

TeslaCrypt: Evildoer for your computer games

Talk about anything- your doc files, images, audios, videos, portals, database, source codes, etc., Nothing is spared by Ransomware. Within this specific family of Ransomware – Cryptovirus – distinct malware programs have been developed to specifically target files. TeslaCrypt is no different. It was first seen in early 2015 and attacked computer games. However, a master decryption key for anyone who has been infected with TeslaCrypt is available now. This might be the end of the road for TeslaCrypt but definitely is no so for its creators. Gamers’ Nightmare Just… Read More

  • Ankit
  • 13 Sep 2016
No comment

Fantom: Weaponizing a Preventive Measure

If you grew up in the late 80s (and 90s), you are likely to remember the purple spandex clad “Phantom” from newspaper strips. And he loved wearing his drawers over his crime-fighting suit. Most Super Heroes do! The ‘Fantom’ we are talking about is more a Super Villain than a Super Hero. It’s one of the newer strains of Ransomware and has so far been able to fool a number of unsuspecting users. Fantom of The Opera Jakub Kroustek, a malware researcher at AVG was the first to discover Fantom…. Read More

  • Ankit
  • 13 Sep 2016
No comment

CryptoLocker: Evil Never Dies, It Just Evolves

One of the earliest Ransomware viruses to surface, CryptoLocker is pretty much the Big Boss of all such malware floating around the internet. It first appeared in 2013 and soon became the posterchild for all malicious programs that encrypt user data and demand ransom…Read More

  • Ankit
  • 12 Sep 2016
No comment
closeicon-new sign-up-free