Audit and Security for all Remote Desktop (RDP mstsc) access to your Servers.
The Hermes ransomware, like all other ransomware encrypting the files on your infected computer and appending .HRM extension. The malware also uses advanced encryption in order to render a unique decryption key for each file or set of files.
Bad Rabbit, a Petya type ransomware compromising devices at large scale.
Bad Rabbit is distributed through drive-by download attacks and utilizes fake Adobe Flash players installers to trap victims into installing malware. BadRabbit ransomware uses a website to drop a fake Flash update and then drops its payload.
The latest variant of Locky Ransomware is released. Distributed via spam email containing infected attachments or links to malicious websites.
Once infected, it will scan your PC for .doc, .docx, .xls, .pdf etc files and encrypt them adding an .asasin extension.
.LUKITUS ransomware is very similar to the original Locky ransomware. It can enter your computer secretly via attachments of spam emails. 90% the victims were attacked by ransomware after opening malicious attachments of spam mails having a subject line related to online shopping or payment receipt.
If your web browser is commonly redirected to tech support scams, advertisements for Chrome extension, unwanted programs, dating sites, or porn sites then you are most likely infected with some sort of malware.
Aleta – a latest variant of BTCWare, encrypt user files with extension [firstname.lastname@example.org].aleta
Upon encryption a ransom note !#_READ_ME_#!.inf will be left at user desktop regarding payment information and [email@example.com].aleta will be appended.