HackMag

  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • Devops
  • HackMag

  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • Devops
  • Sign Up
  • Log In
  • Subscriptions
  • Log Out

Crypto-Ransomware: Russian Style. Large-scale Research on Russian Ransomware

Written by Fyodor Sinitsyn

Nowadays the Russian segment of the Web is not dominated by CryptoWall or CTB-Locker, Russia has seen the formation of an "ecosystem" consisting of other types of ransom trojans, which generally don't enter the global arena. Today, we will learn about some of them and, as a bonus, we will briefly run through some "fashionable" trends in global ransomware.

Read full article →


Protected by Qrator Labs
Recent Posts
  • Megadrone. Assembling a long-range and jammer-resistant hacker drone
  • Diving Deep into Cybersecurity: Unlocking Advanced Tech Discussions for the Inquisitive Minds
  • Poisonous fruit. How to assemble your own Wi-Fi Pineapple and put it to use
  • Invisible device. Penetrating into a local network with an ‘undetectable’ hacker gadget
  • Evil modem. Establishing a foothold in the attacked system with a USB modem
Recent Comments
  • Lev Emeliyanov on Poisonous fruit. How to assemble your own Wi-Fi Pineapple and put it to use
  • big_bad_wolfe on Poisonous fruit. How to assemble your own Wi-Fi Pineapple and put it to use
  • John Smith on Keep your eyes open! Hacking others IP and Web cameras while keeping yours safe
  • John Smith on Keep your eyes open! Hacking others IP and Web cameras while keeping yours safe
  • Denis on Software for cracking software. Selecting tools for reverse engineering
What do you think about HackMag.com domain name?
  • Add your answer
  • Add your answer
×
You or your IP had already vote.
Recent Posts
  • Megadrone. Assembling a long-range and jammer-resistant hacker drone
  • Diving Deep into Cybersecurity: Unlocking Advanced Tech Discussions for the Inquisitive Minds
  • Poisonous fruit. How to assemble your own Wi-Fi Pineapple and put it to use
  • Invisible device. Penetrating into a local network with an ‘undetectable’ hacker gadget
  • Evil modem. Establishing a foothold in the attacked system with a USB modem
Recent Comments
  • Lev Emeliyanov on Poisonous fruit. How to assemble your own Wi-Fi Pineapple and put it to use
  • big_bad_wolfe on Poisonous fruit. How to assemble your own Wi-Fi Pineapple and put it to use
  • John Smith on Keep your eyes open! Hacking others IP and Web cameras while keeping yours safe
  • John Smith on Keep your eyes open! Hacking others IP and Web cameras while keeping yours safe
  • Denis on Software for cracking software. Selecting tools for reverse engineering
  • Facebook

  • Twitter

  • Rss

HackMag.com © 2023

HackMag.com publishes high-quality translated content about information security, cyber security, hacking, malware and devops.