Ransomware
Deep dive into ransomware attacks: how they work, common tactics used by cybercriminals, and practical prevention strategies. Learn actionable steps to protect your organization from falling victim to ransomware.
B0 Software Group is a potentially new ransomware-as-a-service threat using RDP brute force for access and deploying Golang-based ransomware with anti-forensic features. It skips data exfiltration, targets key services, and has weak encryption. A decryptor exists due to flaws in its key reuse and insecure key handling.
Dharma ransomware, also known as CrySiS, is a dangerous malware family that encrypts files on compromised systems and demands a ransom for decryption. Active since 2016, Dharma has evolved into one of the most persistent ransomware strains, leveraging Remote Desktop Protocol (RDP) vulnerabilities and phishing attacks to infiltrate networks. This article explores its history, indicators […]
Cerber is a ransomware-as-a-service (RaaS) threat that encrypts files on infected systems, demanding a ransom for their recovery. First discovered in 2016, it has evolved into one of the most persistent and dangerous ransomware families. This article explores Cerber’s history, indicators of compromise (IOCs), and removal strategies. Cerber ransomware history As a RaaS, Cerber enables […]
Anubis ransomware is a malicious software that encrypts files on infected systems, demanding a ransom for their recovery. Known for its advanced encryption techniques and destructive capabilities, Anubis has evolved into a significant threat targeting both individual users and organizations. This article explores its history, indicators of compromise (IOCs), and removal strategies. Anubis ransomware history […]
CryptoWall ransomware is one of the most damaging and persistent ransomware families, known for its ability to encrypt files, integrate deeply into operating systems, and demand cryptocurrency payments for file recovery. Having made victims since 2014, CryptoWall has evolved significantly over the years, causing over $18 million in damages. This article explores CryptoWall’s history, indicators […]
Ransomware is an ever-evolving threat in the cybersecurity landscape, targeting individuals and organizations with increasing sophistication. To combat this threat, ransomware scanners provide automated monitoring and detection of malicious activity. While manual detection methods exist, they’re typically slower and less reliable, potentially leaving your network vulnerable for longer periods. This guide will help you understand […]