Ransomware Chronicle

This is a comprehensive report on ransomware-related events covering a time frame of May – December 2016. The incidents herein are visually broken down into categories, including new ransomware, updates of existing strains, decryptors released, and other noteworthy news. Security researchers and users interested in the ransomware subject can now use this all-in-one knowledgebase instead […] Continue reading Ransomware Chronicle

Remove OSIRIS ransomware and decrypt .osiris extension files

A brand-new iteration of the deleterious Locky ransomware is out. Expert reports about the update started to appear on December 5, which is almost a fortnight after the ZZZZZ precursor surfaced. The latest tweak means that the files affected by Locky will now have the .osiris extension appended to them, hence the generic name of […] Continue reading Remove OSIRIS ransomware and decrypt .osiris extension files

Posted in SBN

Remove OSIRIS ransomware and decrypt .osiris extension files

A brand-new iteration of the deleterious Locky ransomware is out. Expert reports about the update started to appear on December 5, which is almost a fortnight after the ZZZZZ precursor surfaced. The latest tweak means that the files affected by Locky will now have the .osiris extension appended to them, hence the generic name of […] Continue reading Remove OSIRIS ransomware and decrypt .osiris extension files

Posted in SBN

The First Ransomware to Exploit Telegram Cracked and Decryptor Published

By David Balaban

A security researcher whose name is Nathan Scott managed to break the encryption model employed by the Telecrypt ransomware. The unusual characteristic that made this virus to stand out was the server-client connection method. This time ransomware creators decided to make use of the Telegram protocol, as opposed to HTTPS or HTTP like the majority of ransomware does nowadays. Also Read: 7 Cases When Victims Paid Ransom to stop cyber attacks Since it is dependent upon Telegram, Telecrypt requires an […]

This is a post from HackRead.com Read the original post: The First Ransomware to Exploit Telegram Cracked and Decryptor Published

Continue reading The First Ransomware to Exploit Telegram Cracked and Decryptor Published

The First Ransomware to Exploit Telegram Cracked and Decryptor Published

By David Balaban

A security researcher whose name is Nathan Scott managed to break the encryption model employed by the Telecrypt ransomware. The unusual characteristic that made this virus to stand out was the server-client connection method. This time ransomware creators decided to make use of the Telegram protocol, as opposed to HTTPS or HTTP like the majority of ransomware does nowadays. Also Read: 7 Cases When Victims Paid Ransom to stop cyber attacks Since it is dependent upon Telegram, Telecrypt requires an […]

This is a post from HackRead.com Read the original post: The First Ransomware to Exploit Telegram Cracked and Decryptor Published

Continue reading The First Ransomware to Exploit Telegram Cracked and Decryptor Published

Cerber ransomware: virus removal and file recovery

Cybercriminals keep on devising intricate instruments in pursuit of a more efficient online extortion. Compared to the myriads of crypto ransomware floating around the worldwide web these days, the one named Cerber appears to be more advanced as it accommodates a few out-of-the-ordinary properties. Furthermore, it has been up and running for more than four […] Continue reading Cerber ransomware: virus removal and file recovery

Posted in SBN

Locky ransomware: virus removal and decryption advice

The victims of ransom Trojans incur a great deal of damage because the thing at stake is their personal data. The indicators of compromise when it comes to ransomware are rather straightforward. These malicious programs don’t conceal the impact that they impair to users, displaying step-by-step tutorials on file recovery through paying up. Some strains […] Continue reading Locky ransomware: virus removal and decryption advice

Posted in SBN