Be Aware

Criminals are constantly releasing new ransomware variants. To endpoint protection products  that  rely on   static analysis, these new variants bear no resemblance to earlier samples. As with other forms of malware,  ransomware creators apply runtime packers to the ransomware program, helping to conceal its purpose and avoid detection
until it has completed its core task. 


Incorporated with advanced encryption algorithms, this type of ransomware is designed to block system files and demand payment to provide the affected user with the key that will decrypt the blocked content. For example: Crypto Locker, Wannacry, Locky, CrytpoWall, etc.


This malware locks the person out of the OS, making it impossible for them to access the data saved on it. Here, the files are not encrypted, but the ransomware still asks for a ransom to unlock the infected device. For example: Police-themed ransomware or Win locker.


Master Boot Record (MBR) ransomware is a type of Locker ransomware. The MBR is a section of a hard drive that enables the Operating System to boot up. However, when the MBR ransomware attacks the drive, the boot process fails to complete and demands the payment of ransom as soon as possible. For example: Satana, Petya, etc.

Submit sample files:

After ransomware attack don't try to scan your system with antivirus, don't try to reinstall new operating system, never 
pay for ransom beacuse paying a ransom doesn't guarantee data recovery.

You can send some files for analysis by our experts. After analysis we will provide estimate for  decryption of your encrypted data which depends on following:
a)  Complete size of encrypted data.
b) Type of encryption.
c)  Level of encryption ( Single layer, double layer or multi layer)
d)  Ransomware category (Cryptoworm / Ransomware-as-a-Service / Automated Active Adversary)

e-mail your files as attachment in .rar   or .zip to

You can send also your files by  WeTransfer or Google Drive or OneDrive .

© Copyright 2001, All Rights Reserved.