Guster ransomware

An American alternative rock band has been “honored” to share a name with a crypto-ransomware infection. Guster is the title that rock music fans have come to recognize as their lovable group, but now, the name Guster is exploited to refer to a rather aggravating crypto-ransomware virus. Despite having the same goal as any other … Continued

Guvara Ransomware

is a computer virus that, once it infects a system, finds and encrypts the majority of files. Then you’re asked to pay money in exchange for restoring the files, or else, they threaten, the files will be lost forever. Extortion like that is definitely illegal, and ransomware is one of the worst types of viruses. … Continued

GVU Scam

GVU (Gesellschaft zur Verfolgung von Urheberrechtsverletzungen) Scam is a virus that attacks computers located in Germany. It pretends to work under the name of German Cyber Crime Police. Once installed to a machine, a virus blocks it completely. This scam was made to swindle peoples’ money away by scaring them with many crimes committed. These … Continued

GX40 ransomware

GX40 crypto-virus belongs to the type of malware that is the most difficult to treat and to erase from infected machines. Cleaning systems from infections is difficult as it is, but ransomware threats put up a more persistent fight than other samples. First of all, they conceal their presence until the encryption process is fully … Continued

Hades666 Cryptovirus

Hades666 is a new cryptovirus, a member of the Maoloa family ransomware. Hades666 was named after the extension that it gives the encrypted files. So, if you notice that you can’t open your images, documents, songs, or other files anymore and that they’ve got the string “.Hades666” attached to their names, unfortunately, you’re a victim … Continued

HadesLocker virus

HadesLocker virus was first detected on the 5 of October as a crypto-ransomware. Its main purpose is to startle users and make them pay the ransom out of the devastation that arrives together with the ransom note. The initial price for the decryption key reaches 1 Bitcoin which seems like a medium-sized fee. However, once … Continued

HADOPI virus

HADOPI virus is a ransomware program that was designed by cyber crooks in order to steal money from random users. The program imitates a message from official French institution that is responsible for protection of copyrighted content. The program attacks computers located in French speaking countries. The message is not related to official HADOPI institution … Continued

Hakbit (.crypted) Ransomware

Hakbit is a ransomware infection that asks for money from each victim who wants to get their files back. That it’s ransomware means that Hakbit encrypts files to make them impossible to access. To break the encryption, you could get the needed tools and information from the crypto-extortionists. However, they’re asking for money – $300. … Continued

Hand of God Virus

Hand of God is officially listed as a ransomware. That’s because of obvious reasons – it is aiming to infect computers, encrypt files and demand a ransom. This type of virus is one of the most dangerous and can cause you all sorts of problems. It look like this virus is using the same tactics … Continued

HappyDayzz ransomware

At first, when HappyDayzz crypto-virus took its first steps, security researchers were eager to associate with Globe ransomware as they both featured similar ransom notes. It certainly was an honest mistake as the instructions do look almost identical. However, it was soon determined that HappyDayzz ransomware was a separate virus. It features a technical support … Continued

Harma ransomware

Harma is a computer virus that encrypts files and holds them hostage while demanding a ransom payment. If money isn’t paid, the extortionists threaten, the files will never be recovered. And though that’s not certain, Harma really is a dangerous and devastating virus. After it has infected a computer, Harm goes through the files and encrypts … Continued

Havoc ransomware

Havoc crypto-ransomware (full name Havoc Ransomware MK II) is a cyber nightmare that you cannot wake up from. It will selfishly encrypt your files with complicated algorithms that perform encoding without feelings of remorse. As you might have become aware from the previous sentence, this infection belongs to ransomware category which is probably the worst … Continued

hc6 ransomware

hc6 ransomware virus is a PyInstaller-based infection that started threatening Internet surfers at the end of November. Python-based malware variants are not that rare: Striked and Fatboy infections were also written in this language. At first, security researchers had some problems while trying to decompile the main module of this crypto-malware. However, the analysis was … Continued

Hceem Ransomware

Extortion is a horrible way for criminals to profit from people who are only trying to live their life. Unfortunately, extortion is a problem not just in the real world, but online, too. A virus infects your computer, your files are locked up and money is demanded for fixing of the files. Hceem is an example of … Continued

Healforyou Virus

You have probably heard of notorious Globeimposter ransomware virus. There were two versions of this infection – Globe Imposter and Globeimposter 2.0. Well, it seems like we are facing a third, updated version of the original Globeimposter. Most of the features are really similar and it might look like Healforyou hasn’t delivered any new features, but … Continued

Heimdall Ransomware

Heimdall ransomware is an open-source program for encrypting data created by a Brazilian coder Lenon Leite. Released on the 26th of October, 2016, this ransomware is written in PHP (Hypertext Preprocessor) server-side programming language, thus, the crypto-malware is aimed at encrypting the data of web servers. Since Heimdall ransomware virus is an open-source project, it … Continued

HELP_YOUR_FILES virus

[ virus is a new version of Cryptowall ransomware that encrypts personal files and asks for $700 or 1.79 Bitcoints to be paid within 96 hours to decrypt them. If the users doesn’t do that, the ransom grows two times and becomes %1400 or 3.85 Bitcoins. It’s a 4th version of Cryptowall virus which first appeared … Continued

Herad File-Locking Virus

Herad — the name of a new virus that targets Windows computers and attaches a file type extension “.herad” to image, audio, video files, documents, text files, and other data. Renaming the files to remove the extension doesn’t work, and the only clue about what happened is a _readme.txt file placed in the affected folders. … Continued

Hermes 2.1 HRM

Hermes 2.1 ransomware corrupts your files and marks them with the HRM extension. Hermes 2.1 spreads with malicious ads and infected documents. The victims are asked by the crypto extortionists to pay money to get their files back. There’s no free decryption tool available for Hermes 2.1. In short about Hermes 2.1: Type of threat … Continued

Hermes ransomware

Crypto-ransomware viruses refuse to be overshadowed by other malware threats and sustain a position of being one of the most fearsome infections around. Next to the fact that it invades your privacy, it also uses elaborate cryptography to turn your files to dust. Hermes ransomware is another disruptive sample from this bloodthirsty clan, originating from … Continued

Hermes666 Ransomware

Has Hermes666 encrypted your files? Do the files refuse to open anymore? Do they have the “.Hermes666” extension as a part of their names now? If yeas, you must have become a victim of a cryptovirus. This malware is serious because it can cause irreparable harm by locking up the victim’s files. You can still … Continued

Hermes837 Extension Virus

The Hermes837 extension virus is an example of really destructive and harmful malware — at least, if you don’t have data backups. It makes most user files on the infected computer unusable and leaves no easy or direct way to get them back. Some data recovery software might be able to restore the lost files. … Continued

Heropoint ransomware

Heropoint ransomware virus is an example of a crypto-malware threat. It is currently in-development stage and does not fully function. While it is supposed to encrypt files, it does not implement this feature because of a flaw. There had been many infections that were first detected as in-dev viruses. For instance, Red Boot infection was … Continued

Heroset Ransomware

Heroset is a virus that locks files (pictures, documents, movies, etc.) and appends the .heroset extension to them. It also leaves a text file with a message. The result of a Heroset infection is that normal files become impossible to open. Your antivirus program might not function correctly, and you might be unable to visit … Continued

Hese Cryptovirus

Hese is malware that takes away your access to your own files. The files are still on your computer, but Hese locks them and tries to sell you the key for around a thousand dollars. This virus belongs to the STOP/Djvu family which claims new victims every day: people lose precious photographs, ongoing projects, work files, important … Continued

Hets Ransomware

Hets ransomware is a new file-locker. It is distributed on torrent sites and is used by cyber-extortionists to collect ransom money from Hets’ victims. To make matters worse, it also installs a password-stealer. Remove the malware and change your passwords to limit the damage. As for fixing the files locked by Hets, there are some … Continued

Hi Buddy Ransomware

Hi Buddy Ransomware is a computer infection that may enter your computer without you noticing and encrypt your important files. Once inside, the program places a message on your computer saying that your important files have been encrypted, and in order to unlock them you must pay a ransom in BitCoins. Usually it asks for … Continued

HiddenBeer ransomware

HiddenBeer ransomware is just another HiddenTear project variant which was detected and reported by the malware expert GrujaRS October 23rd, 2018. This cryptovirus has brought some attention because of its flamboyant features, despite being made from one of the most widespread open-source ransom demanding virus examples. Although working principles and encryption stayed the same, crooks added … Continued

HildaCrypt Ransomware

The Hilda (HildaCrypt, HILDA!) is another virus that locks personal files and hopes that you pay to get them unlocked. This behavior is criminal and in no way are you obliged to pay them. The ones who do are people desperate to get their files back — their photos, projects, months or even years of … Continued

Hitler Ransomware

While it is quite clear that Hitler is a persona the majority of us would not have liked to meet in the real world and, luckily, none of us will be able to, now there is a highly malicious program, namely, the ransomware under the name of Hitler released, which, unfortunately, can be encountered in … Continued

HolyCrypt ransomware

HolyCrypt is a recently discovered threat, more precisely identified as a crypto-ransomware, written using the Python programming language. It drops its payload that looks like a completely harmless, incapable of hurting a fly, executable and begins to initiate a series of unfortunate events. From this virus, you can even smell the fresh scent of paint … Continued

Homeland Security virus

Homeland Security virus is a ransomware program that was designed by cyber criminals in order to steal money from random users. The malware is distributed to random systems using Trojan viruses. It can also get into computers through spam emails or if you click on some malicious link. The program belongs to Reveton group of … Continued

Hoop Ransomware

Hoop is a malicious program that infects computers and breaks files by encrypting them. Encrypted files have their data scrambled, which makes them unreadable. Cybercriminals use Hoop ransomware to make money – they ask each victim to pay a few hundred dollars if they want to repair their files. There are some options to get … Continued

Horon Ransomware

Horon, the ransomware virus that renames files by adding “.horon” to the end, is a new version of the STOP/DJVU family of file-locking malware. Horon is primarily created to force people to pay money to the criminals behind this crypto-extortion. Luckily, there are other ways to possibly recover the corrupted files. While Horon is new, … Continued

Horros ransomware

Horros ransomware virus is a new crypto-malware, using AES-256 algorithm for file-encryption. Even though it is standard that victims of ransomware infections like Magniber are introduced to demands for ransom, Horros virus is one of the exceptions: security researchers did not find a ransom note. Just like the Sorry crypto-virus, the newly-detected malware is also … Continued

Horsia virus

Scarab ransomware has got another malicious member in its family called Horsia. This crypto-extortionist works as a typical ransomware virus encrypting personal data with AES algorithm and adding a specific extension, in this case [email protected], to the file’s name so the user would not be able to access it and asks for a ransom in … Continued

HPE iLO Ransomware

HPE iLO ransomware virus is a new cyber threat, targeting Internet accessible HPE servers with management interfaces. HPE iLo, aka HPE Integrated Lights-Out, is a special processor, integrated into HP servers. It gives specialists the opportunity to remotely manage the device. The virus is said to encrypt hard drives. Iranian UBCERT researcher named M. Shahpasandi … Continued

Hrosas Ransomware

Hrosas is a virus — ransomware, a virus that affects Windows users. It tries to get money from people by breaking their files and threatening that the only way to get them back is to pay money to the extortionists who created the virus. If you’re a victim of Hrosas, your files have been locked and had … Continued

HugeMe ransomware

A common enemy to us all has flared up and demonstrated its true colors. Probably the most fundamental and most important aspect to discuss is the characterization of HugeMe crypto-virus as a ransomware. These accusations are not weakling as this infection has showed essential symptoms of an ransomware threat. This seems to be a currently … Continued

Hydracrypt

Hydracrypt is a new computer virus that is listed as ransomware. The virus is targeting your personal files, like photos, documents, audio files and other private data. If your computer is infected with Hydracrypt, most of the files stored on your hard drive will be locked and you won’t be able to use them anymore, till you … Continued

ICE Cyber Crimes Center Virus

ICE Cyber Crimes Center virus is a ransomware program that locks your computer asking you to pay a fine of $400. Basically, the program accuses you for violating the law of the United States of America which can involve distributions of pornographic files, copyright issues or the use of unlicensed software. ICE Cyber Crimes Center … Continued

ICSPA Virus

ICSPA Virus is a ransomware program that attacks computer users of several countries using different versions of notifications in different languages. The letters ICSPA stand for International Cyber Security Protection Alliance and it mainly targets computers located in the UK, Ireland, Canada, the United States and Australia. The warning always contains its logo and a … Continued

.IGAMI Ransomware

If you found your files locked with the strange .iGAMI suffix appended to their names, you are a victim of ransomware. .iGAMI is a new incarnation of GlobeImposter 2.0, a file-encrypting virus that itself was upgraded from GlobeImposter after a free universal decryptor was developed for it. So far, GlobeImposter 2.0 does not have a … Continued

Igdm Ransomware

Igdm is ransomware that gets installed with info-stealing viruses and then encrypts user files. It then asks for money to be sent to cyber criminals so that the files can be fixed. It can be devastating if you don’t have backups, however, there are a couple of ways that some files can possibly be recovered. … Continued

Igvm Ransomware

Igvm ransomware infects Windows computers, encrypts (corrupts) files, and then demands a payment of hundreds of dollars for fixing the files. It is very dangerous. The best way to stay safe from Igvm is to have a backup of your data. That way, even if your computer is attacked by ransomware, you won’t lose your … Continued

Iiss Ransomware

Iiss is a malicious program that breaks user files by encrypting them. It then demands money in exchange for fixing the files. You could say that it holds files for ransom. Iiss is no joke – it uses unique encryption keys, so you can’t just get a code from someone else and unlock your files. … Continued

Il computer è bloccato ISP virus

Il computer è bloccato ISP virus is a ransomware that attacks computers located in Italy. It is one of those applications that block a computer completely, accusing user of violating the law and asking to pay a fine in order to remove the charges. Il computer è bloccato ISP virus charges you with breaching the … Continued

The “Il vostro computer è stato bloccato” Virus

The “Il vostro computer è stato bloccato” virus is adapted for Italian computers mainly. It has all the information written in Italian language and is supposed to act in the name of a local police – Polizia di Stato – Unità di analisi sul crimine informatico. As many other ransomware, the “Il vostro computer è … Continued

In-Development Ransomware

In-Development ransomware is a new ransomware virus detected, which pretends to be a Click Me Game. It was discovered just two days ago, on the 18th of October, 2016, by a cyber security researcher at GData Karsten Hahn. As its name speaks for itself, this crypo-locker is still in development. Thus, it lacks some of … Continued

InfiniteTear ransomware virus

InfiniteTear (also referred to as The_Last and InfinityShadow) ransomware virus has been detected to follow a strict plan of encoding files with AES crypto key, and then exploiting RSA cipher to encrypt the decryption key. Random6 and Diablo6 have chosen similar tactics of exploiting two techniques of cryptography to make their product more invincible. The … Continued

Recent Posts

Security Guides

Recent Comments