Matrix Ransomware: Spreading to PCs through Malicious Shortcuts

Matrix Ransomware

The latest addition to the growing threat of ransomware is the Matrix Ransomware. Though the ransomware has been active for quite some time now but it has recently seen a surge in attacks. Like all other ransomware, Matrix Ransomware holds computer data encrypted for ransom. The encryption is usually strong and no formal way is […]

Continue reading


How are Locky and Cerber Ransomware Skilled at hiding themselves?

locky and cerber ransomware

2 of the 3 major ransomware families responsible for 90% of ransomware attacks are Locky and Cerber Ransomware families. They are acutely notorious in hiding in plain sight. The camouflage helps the ransomware to hide inside the system and attack when unexpected. Once they encrypt the files there is no other way except to pay […]

Continue reading


PetrWrap: Cybercriminals stealing code from one another

petrwrap

The latest version of Petya based ransomware is PetrWrap. Petya ransomware has been distributed as ransomware-as-a-service wherein the creator of the ransomware shares the malware code as a product and shares the profits (ransom) after any attacker uses the Petya malware and succeeds.  Cyber criminals have found a way to use the code without sharing […]

Continue reading


Kirk Ransomware: Star trek themed malware!

Kirk Ransomware

A new piece of ransomware has surfaced featuring star trek theme, named Kirk Ransomware, the first of its kind ransomware demanding Monero cryptocurrency instead of Bitcoin. It was discovered by Avast malware researcher Jakub Kroustek. Cyber criminals are turning highly sophisticated with better, more secure ways to ask for ransom and hence a first for […]

Continue reading


Ransomware Spora: Everything you should know about it

ransomware spora

Spora is the latest ransomware trojan which is highly sophisticated in its attacks and well crafted. Security experts already believe that it will lead to next evolution of ransomware with freemium model of extortion and a sophisticated payment website in place. Why is Spora dangerous in its attack? 1.Unlike many ransomware present, Spora works offline. […]

Continue reading


India Pakistan Cyber War in full throttle with new Ransomware attacks this new year 2017

India Pakistan Cyber War in full throttle with new Ransomware attacks this new year

When the whole world is busy with New year Celebration National Security Guard website got hacked, defaced with an abusive message against Narendra Modi on Jan 2, 2017. Suspected Pakistan-affiliated operatives hacked the official website of the elite National Security Guard (NSG). To take avenge hacking of the official website of the elite National Security […]

Continue reading


[Infographic] Ransomware Attacks 2016 : Warning Act before you are the next Victim

ransomware-attacks-2016-4

Ransomware attacks continued to increase rapidly across 2016.According to Beazley Report, trend was particularly pronounced in the financial services, retail and hospitality sectors. Ransom demands remain small, averaging just $1,000. New ransomware variants like Zepto, the increased availability of ransomware-as-a-service, and readily available toolkits make it easy for less sophisticated attackers to launch these types […]

Continue reading


Top 5 communications IT trends in 2016

Top 5 communications IT trends in 2016

Came across an article today morning – Top 5 communications IT trends in 2016 published on January 21st 2016 by author Ben Rossi. We are now almost end of 2016 – only 2 months to go. So thought to review it. Ben Rossi mentioned Top 5 communications IT trends in 2016 as Security as top most […]

Continue reading