Beyond TeslaCrypt: Crysis, a new ransomware family lays claim to parts of its territory

It has been two weeks since ESET created a TeslaCrypt decryptor, which allows victims of the ransomware to get their files back. This came on the back of its developers ceasing operations. Since then, over 32,000 users around the globe have taken advantage of this opportunity and downloaded the tool. But even with TeslaCrypt abandoning its territory, … More Beyond TeslaCrypt: Crysis, a new ransomware family lays claim to parts of its territory

ESET releases new decryptor for TeslaCrypt ransomware

Have you been infected by one of the new variants (v3 or v4) of the notorious ransomware TeslaCrypt? If your encrypted files had the extensions .xxx, .ttt, .micro, .mp3 or were left unchanged, then ESET has good news for you: we have a decryptor for TeslaCrypt. We have been covering this malware for a few … More ESET releases new decryptor for TeslaCrypt ransomware

Another Eurovision contestant? Even malware can ‘perform music’

On the 14th of May, more than two dozen talented musicians from Europe will compete in Stockholm in one of the longest-running television shows in history – Eurovision. For the 61th time, contestants representing members of the European Broadcasting Union will perform an original piece to compete for the jury’s and public’s favor in the … More Another Eurovision contestant? Even malware can ‘perform music’

FBI: No, you shouldn’t pay ransomware extortionists

The roll call of organisations hit by ransomware attacks is depressingly long – hospitals, government departments, school districts, banks, businesses small and large… even law enforcement agencies haven’t been able to avoid attacks from what is becoming one of the biggest threats of 2016. The ransomware attacks are particularly damaging, of course, because of their … More FBI: No, you shouldn’t pay ransomware extortionists

Jigsaw and how ransomware is becoming more aggressive with new capabilities

There is no doubt that criminals have found a mechanism in ransomware enabling them to obtain significant benefits with relatively little effort. And the information stored by computers is much more important than we think, although many users only realize this when they lose access. “Jigsaw is an example of the tests that the creators … More Jigsaw and how ransomware is becoming more aggressive with new capabilities