Ransoc – An unusual ransomware that threatens to expose your personal information

  • 194
 November 28, 2016

Estimated reading time: 2 minutes

Mostly a ransomware encrypts your files and demands money in exchange for a key that can decrypt the data. And the payment is demanded in Bitcoins. Ransoc is different in the way it works and the medium it uses for the payment. How does Ransoc work? Once your computer is...

Alert! A Fake Flash Player Website is Spreading Locky Ransomware

  • 49
 November 23, 2016

Estimated reading time: 3 minutes

The Locky ransomware, like all other ransomware, encrypts user data and demands a hefty ransom in exchange for the key that decrypts the data. A variant of this ransomware called ‘thor’ was recently found being distributed via a fake ‘Flash Player Update’ downloading website that goes by the name ‘’....

5 Compelling Reasons Not to Pay Ransom to Hackers

  • 34
 November 11, 2016

Estimated reading time: 3 minutes

Unless you’ve been living under a rock, you would know what a ransomware is and why are computer security folks constantly speaking about it. To put things into context, ransomware is a malicious software that locks your computer or encrypts the files stored in it. It then demands a ransom...

Alert! Ransomware is Being Spread through the Ammyy Admin Website

  • 236
 September 14, 2016

Estimated reading time: 2 minutes

This is a precautionary advisory for users who frequently visit the website of the popular remote desktop sharing software called Ammyy Admin. Quick Heal Labs has observed that a new variant of the Cerber3 Ransomware is being spread through the Ammyy Admin software on the official Ammyy Admin website. This...

Be Careful of the KMSPico Activator – It could be a Ransomware!

  • 67
 September 12, 2016

Estimated reading time: 1 minute

If you are using KMSPico Activator for activating your Windows or MS Office, then you could be risking yourself to a ransomware infection. Quick Heal Threat Research Labs has recently observed a new variant of ransomware called Domino that is using this activator as a carrier. The malware encrypts the...

How to Recover Files After a Ransomware Attack?

  • 15
 August 17, 2016
Recover data after a ransomware attack

Estimated reading time: 2 minutes

What if you know your data is securely backed up when a ransomware strikes and you don’t have to worry about recovering your files? The Backup and Restore feature of Quick Heal helps you achieve this. What is a Ransomware? Ransomware is a malware that either locks an infected computer...

Ransomware Getting Delivered Using Script Files

 August 16, 2016

Estimated reading time: 2 minutes

The ransomware threat has significantly grown over time. Each day, a new variant gets added to the ransomware family. Malware are usually delivered through exploit kits and spam emails. Speaking of spam emails, they are either loaded with malicious document files installing the malware or malware directly inside a ZIP...

Troldesh Ransomware brute-forcing its way into systems

  • 19
 August 11, 2016

Estimated reading time: 3 minutes

Ransomware creators deploy more than just one way to trap their victims. These include malicious email attachments, infected links, malvertising, and exploit kits. However, over the past few weeks, we have been observing criminals using a new carrier to deliver the ransomware malware. It mainly affects Windows Server Operating Systems....

7 Important Ransomware FAQs that you must know

  • 152
 August 5, 2016

Estimated reading time: 3 minutes

There can be no two way to the fact that Ransomware has easily become one of the biggest banes of digital security for individual users and enterprises alike. Ransomware is a malware that locks an infected computer or encrypts its files (converts the files into an unreadable form). It then...