An online tool claims to enable computers infected by Petya, a new ransomware, to retrieve data without the user having to pay a ransom, according to betanews.
Petya, like KeRanger and TelsaCrypt 4, targets enterprise users. But in addition, it encrypts complete hard drives instead of just a selection of files. Also known as Ransom_Peyta.A, Peyta ensures that victims are aware that their computers are infected. It overwrites the master boot record (MBR) to display a ransom note during reboot. It uses an encryption algorithm of military grade to lock users out of files. Then it directs users to the dark web using Tor browser to make a bitcoin ransom payment.Petya [...]
Researchers from security firm Palo Alto Networks have discovered the first-known case of functional ransomware targeting Apple users on the Mac OS X platform via a compromised version of popular BitTorrent downloader, Transmission.
One of the most prominent and intrusive cybersecurity threats for individuals and businesses alike, is ransomware. It spreads rapidly and easily through simple methods like malicious email campaigns targeting millions around the world. Until recently, ransomware – through infamous strains like CryptoWall — used to target users of the Windows operating system, the most widely used OS in the world.
However, as researchers from Palo Alto [...]