Redline and Vidar Stealers Switch to Ransomware Delivery

In addition to spreading stealer malware, hackers started to deploy ransomware through the same channels

Cybercriminals who stand behind RedLine and Vidar stealers decided to diversify their activity. Now, crooks deploy ransomware, using the same spreading techniques as they used to deliver their spyware. Meanwhile, the process of ransomware enrollment is rather unusual and is full of advanced evasion techniques. What are Redline and Vidar Stealers? RedLine is an infostealer… Continue reading Redline and Vidar Stealers Switch to Ransomware Delivery

Ransomware Attacks Decline in 2023 – Is It True?

The unusual downward trend in the number of ransomware attacks begs the question.

According to ransomware attacks status statistics, the trend of incidents related to this type of malware will decline in 2023. But is this really the proper conclusion, or is it not all clear-cut? Today we will look at analysts’ opinions and determine why ransomware activity is decreasing. Some statistics According to the X-Force Threat Intelligence… Continue reading Ransomware Attacks Decline in 2023 – Is It True?

Huge Ransomware List by Gridinsoft Research – Part #2

Even more ransomware attacks you should know about

We talked a lot about notorious ransomware examples in Part #1 of this series. Still, it was not enough to reveal all noteworthy ransomware attacks. In Part #2, we will have a look at notorious attacks and ransomware families – several groups that use a single ransomware sample or its subspecies. More Interesting Ransomware Attacks… Continue reading Huge Ransomware List by Gridinsoft Research – Part #2

Huge Ransomware List by Gridinsoft Research – Part #1

History knows a lot of really noteworthy ransomware attacks

Ransomware is rightfully considered one of the most dangerous types of malware. It attacks individuals and companies, creating a mess in their files and paralysing their work. And even being such a devastating malware, it manages to have its own favourites. Let’s have a look at the most notorious ransomware attacks that ever happened. What… Continue reading Huge Ransomware List by Gridinsoft Research – Part #1

U2K Ransomware Strikes, Thousands Of Victims

U2K ransomware, probably the rising star on the ransomware arena, appeared on July 10, 2022. It instantly infected a huge number of users and keeps spreading, despite the massive alarms in cyberspace. U2K ransomware (U2K files encrypted) – what happened? Numerous analysts report the analysts about the new ransomware variant stomping the users’ devices. It… Continue reading U2K Ransomware Strikes, Thousands Of Victims

War in Ukraine triggered a Stream of amateurish ransomware

Ransomware, Ransomware attacks, Conti, LockBit

Russia has provoked hackers around the world to focus their attacks on the servers of the largest companies, TV channels, banks, and government agencies. According to the statistics given by ESET, Russia has entered the list of the most attacked countries, which was not relevant earlier. More and more amateur hackers appeared after February, 24… Continue reading War in Ukraine triggered a Stream of amateurish ransomware

20 Dangerous Types of Cybersecurity Threats

The cybersecurity threats in this year are more considerable than ever. Due to the emergence of efficient ransomware, coin miners, spyware, and so on, hacking has become a consistently profitable business. Knowing about cybersecurity threats is crucial because it livens up the safety measures. In addition, when you’re aware of what is up against you… Continue reading 20 Dangerous Types of Cybersecurity Threats

TOP 9 Malware Attacks: Compilation 2022

The World Wide Web is not a hostile realm by itself, but any Internet user should be aware of the dangers lurking on the Net. If earlier harmful software was just fun for the hackers or vandalism in the worst case, today, malware attacks are a viable business model. The commercial element makes the danger… Continue reading TOP 9 Malware Attacks: Compilation 2022

The Best Ransomware Protection – Steps to Help

Ransomware is considered one of the most dangerous types of malware. You may disagree, but the occasion when your data becomes inaccessible bleaches all other threats. While spyware attacks, backdoors, or adware try to make it silent or, at least, not very harsh, ransomware is a nuke. Knowing how to protect your system from a… Continue reading The Best Ransomware Protection – Steps to Help

Microsoft estimated that ransomware attacks take less than 45 minutes

Microsoft analysts have prepared a traditional Digital Defense report, in which they talked about the main events and trends in the field of cybersecurity and threat analysis over the past year (from July 2019 to June 2020). The company, for example, estimated that some ransomware attacks could be carried out in less than 45 minutes.… Continue reading Microsoft estimated that ransomware attacks take less than 45 minutes