Home > Ventsislav Krastev

Author Archive: Ventsislav Krastev - Page 274

Ventsislav is a cybersecurity expert at SensorsTechForum since 2015. He has been researching, covering, helping victims with the latest malware infections plus testing and reviewing software and the newest tech developments. Having graduated Marketing as well, Ventsislav also has passion for learning new shifts and innovations in cybersecurity that become game changers. After studying Value Chain Management, Network Administration and Computer Administration of System Applications, he found his true calling within the cybersecrurity industry and is a strong believer in the education of every user towards online safety and security.

THREAT REMOVAL
san-francisco-subway-hit-by-ransomware-sensorstechforum

SF Subway Hit by Cryptom HDDCryptor Ransomware – Passengers Ride for Free

What researchers believe to be a variant of the notorious HDDCryptor malware family has hit the Muni subway system of San Francisco. The hack resulted in over 2,000 systems to become compromised and their hard drives to be encrypted. The…

THREAT REMOVAL
blackmoon-trojan-main-sensorstechforum

Remove M0on/Crypute Ransomware and Restore .m0on Encrypted Files

A ransomware virus using the .m0on file extension to encrypt files has been reported to cause havoc on user PC’s. The virus is also known as Crypute and uses the Advanced Encryption Standard(AES) algorithm to encrypt videos, pictures, audio files…

THREAT REMOVAL
ozoza-locker-ransom-note

Decrypt Files Encrypted by OzozaLocker and Remove It

A ransomware virus was discovered in late November 2016, going by the name OzozaLocker. The virus’s payload is an executable, called CryptoSolution.exe and it uses a maliciously configured script to encrypt files using the AES encryption algorithm. After encrypting the…

THREAT REMOVAL
cerber-5-0-ransomware-sensorstechforum-com

Cerber Ransomware 5.0 Unleashed – Remove and Restore Files

Malware researchers have recently detected the notorious Cerber ransomware to reach a new milestone, now calling itself 5.0.0. The new Cerber ransomware is distributed by the updated RIG-V exploit kit, which is regarded as a premium exploit using software for…

THREAT REMOVAL
how-fast-can-a-pc-virus-spread-sensorstechforum

Locky Infects U.S. Office of Personnel Management

Locky’s latest ransomware campaign has reportedly attacked one of the largest personnel data centers – the U.S. Office of Personnel Management. Experts fear that this hack may have resulted in the major data theft of approximately 22 million people. How…

THREAT REMOVAL
cerber-4-1-6-ransomware-infections-sensorstechforum

Cerber 4.1.6 Ransomware – Remove Virus and Restore Encrypted Files

And just when we thought the Cerber variants of its 4th version were over, the main competitors of Locky ransomware have surpised us with 4.1.6 iteration. The version does not include major improvements, but a new wallpaper as well as…

CYBER NEWS
shutterstock_223094779

Millions Stolen via ATM Malware Rigged to Make Machines Drop Cash

Hacking group with long history in banking attacks has been reported to cause infections to ATM machines, allowing them to rig the machines to directly spit cash on the street. All the crooks had to do is stay in front…

THREAT REMOVAL
aesir-files-virus-encrypted-locky-ransomware-sensorstechforum-com

Remove .aesir Files Virus (New Locky Ransomware)

The ransomware that is a mystery wrapped in an enigma inside a riddle for malware researchers has been released in yet another variant. The latest Locky ransomware does not cheat on its roots and uses the .aesir file extension –…

THREAT REMOVAL
data-encryption-stforum

Unlock92 Ransomware and .kukaracha Files – Remove and Restore Them

The new version of the popular among Russian users Unlock92 ransomware virus has been reported to be updated and now use the .kukaracha file extension which it adds to the files it encrypts. The Unlock92 ransomware then renders the files…

THREAT REMOVAL
malwarebytes-iphone-locked-screen

Scam on Apple iCloud with Ransomware Features

Malware researchers have uncovered what initially seemed to be ransomware on an iPhone – a type of malware that locks the device and demands money to be paid to unlock it. In March 2016, mac users have begun to exhibit…

THREAT REMOVAL
chip-ransomware-web-page-sensorstechforum

.CHIP Files Virus – Remove It and Restore Encrypted Files

Also known as CHIP Ransomware, malware researchers have estimated that this virus has already begun causing successful infections. It uses an RSA encryption algorithm which develops a unique decryption key for each file the CHIP ransomware encrypts. After doing so,…

THREAT REMOVAL
shelllocker-main-pic-sensorstechforum

Remove ShellLocker Ransomware and Restore .L0cked Files

“Your PC is locked by the ShellLocker” – this is what victims see when their wallpaper is changed with the skull wallpaper of the latest .net based ransomware, called ShellLocker. After this particular virus encrypts the files on the compromised…

THREAT REMOVAL
cryptoluck-ransomware-ransom-note-sensorstechforum

CryptoLuck Ransowmare Remove and Restore _luck Files

A dangerous ransomware virus has appeared on the dark web, known by the name CryptoLuck. The virus uses a powerful AES cipher to encrypt the files on the compromised computer after which generate a custom AES decryption keys and sends…

THREAT REMOVAL
cxparfaw8aits3z-jpg-large

New Razy v2 Ransomware – Remove It and Restore .razy1337 Files

Razy ransomware has been released in a second variant and this time the virus uses a more sophisticated and thoroughly checked code as well as advanced obfuscator. It may still employ the AES file encryption algorithm that will render the…

THREAT REMOVAL
anonymous-ransomware-screenlock-magicminecraft-sensorstechforum

MagicMinecraft Lockscreen Virus – Unlock Password Revealed

Malware researchers have managed to discover the unlock password for a screenlocker type of virus, known as MagicLocker. The malware is believed to be replicating primarily via several different methods, such as spam e-mails and fake game patches. After attack…

THREAT REMOVAL
filecoded-gingerbread-ransomware-sensorstechforum

Gingerbread Ransomware – Remove it And Restore Encrypted Files

Russian ransomware viruses have begun to become more and more frequent, adding new file extension to their variants and becoming more sophisticated. One example of that is Gingerbread ransomware which interestingly enough mocks it’s victims by telling them the child’s…

THREAT REMOVAL
ransomware-happy-locker-sensorstechforum-ransom-note-com

Happy Locker Ransomware Remove and Restore .happy Files

The Happy Locker ransomware Is everything but happiness for the users of the computers this nasty ransomware virus infects. The malware uses the .happy file extensions to the files it encrypts, using the same source code taken from the Hidden…

CYBER NEWS
chrome-battery-sensorstechforum

Researchers Raising Concerns over Microsoft Competitiveness and Interference

Many malware researchers with extensive experience remember that Microsoft was a huge leader In cyber-security policy, because it made efforts to fix multiple vulnerabilities in it’s code and work with the security community constantly. However, the situation has now changed…

THREAT REMOVAL
cryptolocker-wallpaper-malicious-sensorstechforum-com-new-en_files-txt

New CryptoLocker “en_files.txt” Virus Remove It and Restore Encrypted Files

“Your files are locked !.txt” – this is what the victims of one of the first ransomware viruses ever to exist see after their computers have been attacked and their files are encrypted. CryptoLocker has stopped infecting users and many…

THREAT REMOVAL
referral-spam-sharebutton-to-sensorstechforum-how-to-stop

Get Rid of ShareButton Refferal Spam Traffic Permanently

Refferal spam being released under multiple domain extensions (.xyz, .com, .info, .net, .to) has been reported to be associate with a web page advertising fake buttons under the unlicensed brand ShareButton. The most often related traffic with the ShareButton domains…

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree