A variant of the Radamant ransomware uses the domain name “emisoftsucked” and strings such as emisoft f**kedbastardsihateyou in the code. You have to see this!
Category Archives: Emsisoft Lab
Crypto ransomware turns out to be threat number 1 in 2015 again. It encrypts all your document files and forces you to pay a ransom to get them back.
Only a few people are aware that one of the biggest threats to their privacy is actually their antivirus software. Here the Emsisoft team explore privacy conscious alternatives.
Emsisoft’s public anti-malware database isthisfilesafe.com truly is one of a kind. As of today, it knows over 163 million malware threats so you don’t have to worry about getting infected with any of those bastards.
The ransomware PCLock started out as a rather simplistic Cryptolocker copycat, but has since evolved significantly with many variants and more advanced encryption methods.
Numbers don’t lie: it seems we have literally become an “Anti-PUP” company! Almost 80% of all malware we detect is made up of potentially unwanted programs (PUPs).
Emsisoft Labs successfully decrypted the CryptoDefense ransomware before the story was leaked to the press, helping at least 350 users recover their files.
Emsisoft’s Malware Analysis team has been closely following a new ransomware Trojan variant identified as Trojan-Ransom.Win32.Linkup.
This week, Emsisoft releases an update that optimizes our extensive signature database and identifies over 6000 new PUPs!
Over the past few days Emsisoft’s malware research team has received numerous reports of a new file encrypting ransomware strain. This new family of ransomware is commonly referred to as CryptoLocker or Trojan:Win32/Crilock.A. Like all file encrypting ransomware (also known as crypto malware) the goal of the attacker is to encrypt important files on the […]
Navigating the Internet without web browsers would be like trying to drink your coffee without a mug. It simply doesn’t work. But the browser is also what stands between you and the millions of malware circulating websites out there. Accordingly, all major browsers have their own various forms of protection to protect users from malicious […]
Java is installed on almost all computers. This is an obvious security risk, considering that there are regular announcements on new Java vulnerabilities that enable hackers to infect your PC with malware. However, most users don’t even need Java and can safely uninstall it without losing needed functionality. Keep reading to learn all you need […]
Last week, a new zero-day Java vulnerability created quite a buzz on the Internet. To illustrate just how effectively this vulnerability is exploited, lets have a look at an email our research lab received, supposedly from LinkedIn. Below you can see the email as we received it. It looks harmless enough and appears to be […]
Spam emails are nothing new and unfortunately most internet users are confronted with them daily. Their purposes vary from simply promoting a site or product, to phishing and downright infecting a computer. Today we received a particularly nasty, but at the same time convincing-looking email, claiming to be from eFax: Convincing at first sight, but […]
Detect and get rid of malware without entering Windows, use a bootable Linux Rescue CD; it sounds like something that can make the life of anyone who needs to remove malware a lot easier. The idea behind it? Scan your computer without booting in Windows, which can come in handy when malware is actively preventing […]
One of our colleagues received spam emails today claiming to be from Amazon . These emails were sent from spoofed addresses and used high priority flags along with a variety of subjects including the following: Re: Order Shipped Today Your Order Processed Today Re: Item Waiting on delivery Now Re: Order Shipped Few hours ago […]
Systems in the Netherlands are currently being hit hard by a new wave of crypto malware named “Trojan-Ransom.Win32.Dorifel”. Based on press reports as well as our own telemetry gathered through our Emsisoft Anti-Malware Network thousands of Dutch systems are already infected. The majority of them located in government, public sector or company networks. Based on […]