You searched for MalwareHunterTeam | SC Media

Your search for MalwareHunterTeam returned 62 results

Your search for MalwareHunterTeam returned 62 results

Sort Results:

Relevant Recent
Ransomware, Security News

Ryuk-like malware targeting law, military and finance groups

A new malware containing some similarities to Ryuk ransomware, but which acts as an information stealer targeting military, law and financial institutions has been uncovered by MalwareHunterTeam. Once onboard a device the as-yet-unnamed malware begins its attack begins searching for .docx and .xlsx files, according to Bleeping Computer. In a fashion similar to how ransomware…
Ransomware, Security News

Ransomware attack comes with malicious ransom note

Some cybercriminals are taking an “in for a penny in for a pound” approach with a new ransomware campaign that is now under development. MalwareHunterTeam discovered the ransomware and the fact the malicious actors kindly offer several forms of payment to obtain the decrytption key, including PayPal. However, if the victim chooses PayPal and follows…
malvertising targets users for drive-by-downloads
Ransomware

New ransomware Zenis will delete backup files even if victim pays

A self-proclaimed “mischievous boy” who calls himself “ZENIS” unleashed ransomware attacks that encrypt the files and then purposely deleted the backups. Discovered last week by MalwareHunterTeam, Zenis uses a customized encryption method that warns recipients to pay up or risk losing forever their infected files. A BleepingComputer.com blog post by Lawrence Abrams details how the…
Ransomware

PUBG ransomware supplies its own decrypt key

If a victim is not in the mood to play the game PlayerUnknown's Battlegrounds in order to restore encrypted files, the ransomware creators also supply a decryptor code in the ransom note, the MalwareHunterTeam said.
Ransomware

Playing with FireCrypt: Ransomware encrypts files and conducts minor DDoS attack

While it holds your files hostage, the newly discovered ransomware FireCrypt also directs your computer to perform a poor man’s distributed denial of service (DDoS) attack by continuously connecting to a specifically targeted URL and repeatedly downloading junk content into a temporary folder. The presently targeted URL, which is hardcoded into FireCrypt’s source code, belongs to the…
Next post in Ransomware