CryptoWall 4.0 has been discovered being installed via the Nuclear Exploit kit. As an added twist, the malware payload is also being delivered as a NSIS installer that when executed installs the CryptoWall 4.0 ransomware.
A new file-encrypting ransomware has been floating around this past week called CryptInfinite or DecryptorMax. At first this ransomware looked secure, but with further analysis by Fabian Wosar, it was discovered that a decrypter could be made that would recover your files for free.
The Chimera Ransomware uses a new technique for distributing decryption keys through a peer-to-peer messaging application called Bitmessage. This method provides a very easy method of pushing decryption keys out to the victim while staying anonymous behind the peer-to-peer network.
A new variant of TeslaCrypt has been released that utilizes the same .CCC extension for encrypted files, but now uses the _how_recover_
A new Ransomware as a Service has been discovered called the Cryptolocker Service. This service states it will go live in the next few days and allow affiliates to distribute their ransomware for a 10% commission.
Kaspersky has released 14,000 additional decryption keys for users infected with the CoinVault or BitCryptor ransomware infections. Using their decryption tool you may be able to recover your encrypted files for free.
Vssadmin.exe is a utility bundled with Windows that allows you to administer Shadow Volume Copies. Unfortunately, this tool is also being used by Ransomware developers to make it harder for you to recover your files. This article explains how Shadow Volume Copies work and why it is important for every user to disable vssadmin.exe.
A new version of CryptoWall has been released that displays a redesigned ransom note, new file names, and now encrypts a file's name along with the data as well. A new version of CryptoWall has been released that displays a redesigned ransom note, new file names, and now encrypts a file's name along with the data as well.
A new ransomware has started to become seen on various computer support forums that encrypts your data and then appends the helpme@freespeechmail.org string to the filename. Thankfully Kaspersky's RakhniDecryptor tool is able to decrypt this infection.
It is bad enough when a ransomware infection encrypts your data and demands a ransom, but it's even worse when shoddy programming destroys it instead. This is what happened in a new variant of the Power Worm ransomware where bad programming encrypts your data using AES encryption and then throws away the key
A new version of TeslaCrypt has been released that is now using the ccc extension when encrypting files. This version utilizes the same payment site as previous variants and requires a 2 bitcoin, or approximately $500 USD, ransom in order to decrypt your files.
A new file-encrypting ransomware has been discovered that appears to be installed via targeted Remote Desktop or Terminal Service attacks. This ransomware, which we call LowLevel4, encrypts your data with AES encryption and then demands 4 Bitcoins to get your files back.
Microsoft recently announced that they have updated their malicious removal tool to detect and remediate the TeslaCrypt ransomware infection due to the increased distribution and activity detected in August. This announcement just means that Microsoft has added further detection for this ransomware and will remove it via MSRT.