BleepingComputer has long been working on helping users effected by CryptXXX Ransomware. This week, they published an article uncovering a bug on the CryptXXX ransomware’s payment server where victims are logging in and receiving their decryption key for free.
Category Archives: Emsisoft Lab
A scam-chatbot approached our CEO via Skype and revealed some interesting facts how their business works.
A variant of the Radamant ransomware uses the domain name “emisoftsucked” and strings such as emisoft f**kedbastardsihateyou in the code. You have to see this!
Crypto ransomware turns out to be threat number 1 in 2015 again. It encrypts all your document files and forces you to pay a ransom to get them back.
Emsisoft’s public anti-malware database isthisfilesafe.com truly is one of a kind. As of today, it knows over 163 million malware threats so you don’t have to worry about getting infected with any of those bastards.
The ransomware PCLock started out as a rather simplistic Cryptolocker copycat, but has since evolved significantly with many variants and more advanced encryption methods.
Numbers don’t lie: it seems we have literally become an “Anti-PUP” company! Almost 80% of all malware we detect is made up of potentially unwanted programs (PUPs).
Emsisoft Labs successfully decrypted the CryptoDefense ransomware before the story was leaked to the press, helping at least 350 users recover their files.
Emsisoft’s Malware Analysis team has been closely following a new ransomware Trojan variant identified as Trojan-Ransom.Win32.Linkup.
This week, Emsisoft releases an update that optimizes our extensive signature database and identifies over 6000 new PUPs!
Over the past few days Emsisoft’s malware research team has received numerous reports of a new file encrypting ransomware strain. This new family of ransomware is commonly referred to as CryptoLocker or Trojan:Win32/Crilock.A. Like all file encrypting ransomware (also known as crypto malware) the goal of the attacker is to encrypt important files on the […]
Navigating the Internet without web browsers would be like trying to drink your coffee without a mug. It simply doesn’t work. But the browser is also what stands between you and the millions of malware circulating websites out there. Accordingly, all major browsers have their own various forms of protection to protect users from malicious […]
Have you ever received a contact request on Skype from someone you don’t know? This may happen from time to time, particularly if your Skype name is publically searchable. But what is really behind these contact requests and why do people bother? To find that out we played along and the following conversation ensued: At […]
Java is installed on almost all computers. This is an obvious security risk, considering that there are regular announcements on new Java vulnerabilities that enable hackers to infect your PC with malware. However, most users don’t even need Java and can safely uninstall it without losing needed functionality. Keep reading to learn all you need […]