Tweety

Zablokovali ste používateľa @demonslay335

Naozaj chcete zobraziť tieto Tweety? Zobrazenie Tweetov neodblokuje používateľa @demonslay335

  1. Pripnutý Tweet
    24. 3. 2016

    ID is live! Special thanks to for the sub-domain.

    Späť
  2. Retweetol používateľ
    pred 15 hodinami
    Späť
  3. pred 14 hodinami

    Looks like has updated to v1.5.1.0. ID Ransomware picked up on example file named "[email protected] -1614714137-578233478334310455516964.fname-README.txt.doubleoffset"

    Späť
  4. Retweetol používateľ
    pred 17 hodinami

    ScammerLocker (Hidden Tear) ransomware: Ext: .jodis Based on name & the GUI (it won't appear if you just run, it will only encrypt & drop note), prob. will target scammers. 🤔 Also, first time I hear about IOTA related to RW.

    Späť
  5. Retweetol používateľ
    pred 19 hodinami

    New Ladon ransomware portal cdmsxo25y4lfht6v[.]onion cc:

    Späť
  6. pred 22 hodinami
    Späť
  7. 5. 3.

    , possible extension ".BLOCKED". Has a function for every possible drive of the system... talk about inefficient. Crashes with a 403 on trying to contact its C2, lol. Seems based on LightningCrypt and other junk ones according to

    Späť
  8. 5. 3.

    Weird changes for , this one appends extension "! ,--, Revert Access ,--, [email protected] ,--,.BlockBax_v3.2" (lots of spaces in there) to files.

    Späť
  9. 5. 3.

    Anyone familiar with command line? I'm not sure from the commands used by the malware in the screenshots if we can help victims decrypt.

    Späť
  10. Retweetol používateľ
    4. 3.
    Zobraziť toto vlákno
    Späť
  11. Retweetol používateľ
    5. 3.

    So, the new GandCrab is arrived. 👏 And they are using a new extension, note name & even TOR domain, so we are good (). Thanks guys. 😂 They now linking to the decryption tutorial on NoMoreRansom, and says that won't work...

    Zobraziť toto vlákno
    Späť
  12. Retweetol používateľ
    4. 3.
    Späť
  13. 4. 3.

    Interesting here, using extension ".Bitconnect" and some new extortion text wanting you to take a photo of yourself to post on Instagram.

    Späť
  14. Retweetol používateľ
    3. 3.

    just found this site infected with "Awesomeware" . an email for the list xD

    Späť
  15. 3. 3.

    If anyone has been hit by , please contact me. The current published decrypter can't decrypt your files right away, I have to actually bruteforce your keys manually at the present time.

    Späť
  16. 3. 3.

    I've updated detection on ID Ransomware. Seems they've started using "READ_ME.txt" for the note, which is way too generic... but I can detect based on format of the URLs in the note dynamically now.

    Späť
  17. Retweetol používateľ
    2. 3.
    Zobraziť toto vlákno
    Späť
  18. 1. 3.

    seems to be still out there. ID Ransomware just got a submission with note "=_HOW_TO_FIX_RQZLIN.txt" and Tor address royal25fphqilqft[.]onion. Seeing no references to this address yet, site is still up as of now.

    Späť
  19. 1. 3.

    Oh, we got 2 victim submissions to IDR this week that were false-positive for an old HiddenTear-based ransomware (sorry). This one definitely isn't HiddenTear.

    Zobraziť toto vlákno
    Späť
  20. 1. 3.

    Interesting spotted by , tries to use GPG to do its encryption for it, then sdelete. Supposed to use extension ".<number>.qwerty", but since I didn't have those exes bundled, just drops the note and does nothing. ¯\_(ツ)_/¯

    Zobraziť toto vlákno
    Späť
  21. 1. 3.

    ID Ransomware spotted a new extension for yesterday - ".id-<id>.[<email>].arrow"

    Späť

Načítavanie bude chvíľu trvať.

Twitter je preťažený alebo sa vyskytla neočakávaná chyba. Skúste to znova alebo navštívte stránku Twitter Status, ktorá obsahuje viac informácií.

    Môže sa vám páčiť aj

    ·