<tutorialjinni.com/>

GoodWill Ransomware

Posted Under: Malware on May 25, 2022
GoodWill Ransomware
Goodwill ransomware encrypts it victim data and then requires them to show kindness to strangers and confirm this with a message on social networks, as well as record a video in order to be able to return their files.

Yashma Ransomware

Posted Under: Malware on May 21, 2022
Yashma Ransomware
Yashma Ransomware is the paid version of Chaos Ransomware. It demands a ransom of 300 euros worth of BTC.

Kekpop Ransomware

Posted Under: Malware on May 14, 2022
Kekpop Ransomware
Kekpop Ransomware encrypts user data using a combination of AES+RSA algorithms and then demands a ransom of $500 in BTC to get the files back.

BPFDoor Linux Backdoor

Posted Under: Malware on May 11, 2022
BPFDoor Linux Backdoor
BPFDoor is a highly evasive surveillance tool using the Berkeley Packet Filter (BPF). It is allegedly attributed to Chinese threat actors. It is assumed to be deployed on thousands of Linux systems, its controller has gone almost completely unnoticed by endpoint protection vendors despite it being in use for at least five years.

Quantum Ransomware

Posted Under: Malware on May 10, 2022
Quantum Ransomware
Quantum ransomware is the re-branded version of the MountLocker Ransomware. Threat actors uses IcedID malware as one of the initial access vectors that deploys Cobalt Strike. It then remotely access victim computers for data theft and to deploy Quantum Locker ransomware for encryption.