Nemty ransomware updated, ability to kill processes and services added
Nemty ransomware now has the ability to kill processes and services of target devices.
The developers of the ransomware are continuously updating it and making it more efficient. The authors of the ransomware have now added additional code which makes it more aggressive and dangerous. Researchers have found that Nemty now includes the code for killing processes and services in order to encrypt currently active files. The new release for Nemty ransomware has a different encryption process and a unique target selection process. The distribution process chosen for this update is through a fake PayPal page.
Processes that are a target of Nemty include Wordpad, Microsoft Word, Excel, Outlook Thunderbird email clients, SQL, and the VirtualBox software. Processes targeted by the ransomware are used for common purposes as well as corporate sector practices. By going through the list of target processes, it is easy to say that the target audience for the attack is huge. Nemty might burst-out and cause menace by killing essential processes and services required by the users.
Use NPAV Z-Security for complete protection against all ransomware attacks.
- Other (42)
- Ransomware (124)
- Events and News (26)
- Features (44)
- Security (423)
- Tips (79)
- Google (22)
- Achievements (8)
- Products (33)
- Activation (7)
- Dealers (1)
- Bank Phishing (42)
- Malware Alerts (187)
- Cyber Attack (219)
- Data Backup (11)
- Data Breach (75)
- Phishing (138)
- Securty Tips (1)
- Browser Hijack (16)
- Adware (15)
- Email And Password (67)
- Android Security (55)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (70)
- Hacking (57)
- Social Media (7)
- vulnerability (53)
- Hacker (31)
- Spyware (8)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (3)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (5)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (5)
- IoT Security (1)
- Deals and Offers (1)
- Cloud Security (8)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (1)
- DMart (1)
- Payment Risk (4)
- Occasion (2)
- firewall (1)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (4)
- Impersonation phishing (1)
- DDoS (4)
- Smishing (2)
- Whale (0)
- Whale phishing (3)
- WINRAR (2)
- ZIP (2)