<tutorialjinni.com/>

Kekpop Ransomware

Posted Under: Malware on May 14, 2022
Kekpop Ransomware
Kekpop Ransomware encrypts user data using a combination of AES+RSA algorithms and then demands a ransom of $500 in BTC to get the files back.

BPFDoor Linux Backdoor

Posted Under: Malware on May 11, 2022
BPFDoor Linux Backdoor
BPFDoor is a highly evasive surveillance tool using the Berkeley Packet Filter (BPF). It is allegedly attributed to Chinese threat actors. It is assumed to be deployed on thousands of Linux systems, its controller has gone almost completely unnoticed by endpoint protection vendors despite it being in use for at least five years.

Quantum Ransomware

Posted Under: Malware on May 10, 2022
Quantum Ransomware
Quantum ransomware is the re-branded version of the MountLocker Ransomware. Threat actors uses IcedID malware as one of the initial access vectors that deploys Cobalt Strike. It then remotely access victim computers for data theft and to deploy Quantum Locker ransomware for encryption.

Stormous Ransomware

Posted Under: Malware on May 7, 2022
Stormous Ransomware
Stormous Ransomware gang is well know for website defacement and data theft. They recently targeted Coca Cola and stole 161 GB of data from there servers. They are currently asking a ransom of 1.65 Bitcoin for not publicly releasing stolen files.

Onyx Ransomware

Posted Under: Malware on May 4, 2022
Onyx Ransomware
Onyx Ransomware is the based on the Chaos Ransomware. It encrypts used data ask a ransom of $100,000 in BTC to get the files back. It starts is operations in mid April of 2022.