Tutorials
 
How to hack
 
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
 
Hacker hands
 
password typist
 
virtual private network (VPN)
Hacked’s Wiki
CCN.LA
Trending Topics
Posts Tagged ‘Petya’
Most Recent
 
Read More
April 11, 2016

Online Tool Reportedly Rescues Victims of Petya Ransomware

An online tool claims to enable computers infected by Petya, a new ransomware, to retrieve data without the user having to pay a ransom, according to betanews.

Petya, like KeRanger and TelsaCrypt 4, targets enterprise users. But in addition, it encrypts complete hard drives instead of just a selection of files. Also known as Ransom_Peyta.A, Peyta ensures that victims are aware that their computers are infected. It overwrites the master boot record (MBR) to display a ransom note during reboot. It uses an encryption algorithm of military grade to lock users out of files. Then it directs users to the dark web using Tor browser to make a bitcoin ransom payment.

Petya [...]
6216
Tutorials
 
How to Hack
 
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
 
Freeware
 
Malware
Press Releases
 
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
 
SecurityScorecard Announces Data Science Partnership with Columbia University