an

Ransom.Win64.ASTROLOCKER.THCBDBA

Threat type: Ransomware

Aliases: Win64/Filecoder.CI trojan (Nod32), Trojan-Ransom.FileCrypter (Ikarus)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes then deletes itself afterward.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




an

Ransom.Win32.ASTROLOCKER.A

Threat type: Ransomware

Aliases: BScope.TrojanRansom.Encoder (VBA32)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes then deletes itself afterward.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




an

TrojanSpy.MSIL.REDLINESTEALER.YXBDM

Threat type: Trojan Spy

Aliases: MSIL/Kryptik.AAHQ!tr(FORTINET); Trj/GdSda.A(PANDA)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: High

Overview:

This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive information.




an

TrojanSpy.MSIL.REDLINESTEALER.YXBDN

Threat type: Trojan Spy

Aliases: a variant of MSIL/Kryptik.AAHN trojan(NOD32); PWS-FCXD!F291EAD13EAD(NAI)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: High

Overview:

This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive information.




an

Trojan.X97M.PANDASTEAL.THDABBA

Threat type: Trojan

Aliases: HEUR:Trojan-Downloader.MSOffice.Agent.gen (KASPERSKY)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This is the Trend Micro detection for macros that drop the cryptocurrency wallet stealer known as Panda stealer.

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




an

Trojan.Win32.CVE20188120.E

Threat type: Trojan

Aliases: Exploit:Win32/CVE-2018-8120.A (MICROSOFT)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It takes advantage of certain vulnerabilities.




an

Trojan.Win32.CVE20190808.A

Threat type: Trojan

Aliases: Win32:CVE-2019-0808-K [Expl] (AVAST)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It takes advantage of certain vulnerabilities.




an

Ransom.Win32.SODINOKIBI.YABGC

Threat type: Ransomware

Aliases: N/A

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Medium

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




an

Ransom.Win32.BLACKMATTER.THGOCBA

Threat type: Ransomware

Aliases: Trojan-Ransom.BlackMatter (IKARUS)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Medium

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




an

Ransom.MSIL.CHAOS.A

Threat type: Ransomware

Aliases: HEUR:Trojan.MSIL.Fsysna.gen (Kaspersky);

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It encrypts files found in specific folders.




an

Ransom.Win32.LOCKBIT.YEBGW

Threat type: Ransomware

Aliases: Ransom:Win32/Lockbit.AA!MTB (MICROSOFT); W32/Lockbit.C2F8!tr.ransom (FORTINET)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




an

Trojan.W97M.CVE202140444.A

Threat type: Trojan

Aliases: HEUR:Exploit.MSOffice.Agent.gen (KASPERSKY)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It takes advantage of certain vulnerabilities.




an

Trojan.MSIL.WHISPERGATE.YXCAQ

Threat type: Trojan

Aliases: DoS:Win32/WhisperGate.I!dha (MICROSOFT)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




an

Trojan.Win32.WHISPERGATE.YXCAX

Threat type: Trojan

Aliases: DoS:Win32/WhisperGate.M (MICROSOFT)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It executes then deletes itself afterward.




an

Trojan.Win32.KILLMBR.YECCA

Threat type: Trojan

Aliases: Win32/KillMBR.NHQ trojan (NOD32)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: High

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




an

Ransom.Win32.LOCKBIT.YXCGD

Threat type: Ransomware

Aliases: Trojan-Ransom.BlackMatter(IKARUS), Ransom:Win32/Lockbit.STB(MICROSOFT)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




an

Ransom.Win64.DONOTRUN.A

Threat type: Ransomware

Aliases: Python/Filecoder.EK trojan, Python/Filecoder.EK trojan (NAI)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This ransomware locks the user out of their devices by locking the screen.

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note.




an

Ransom.Win32.RTMCOMMAND.THKBFBD

Threat type: Ransomware

Aliases: Ransom:Win32/RTMLocker.AA!MTB

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This ransomware encrypts all drives except the CD-ROM.

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note.




an

Ransom.Win64.CONTI.AA

Threat type: Ransomware

Aliases: Gen:Variant.Lazy.326686 (BITDEFENDER)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note.




an

Trojan.W97M.EMOTET.SMI

Threat type: Trojan

Aliases: HEUR:Trojan.Script.Generic (KASPERSKY); TrojanDownloader:O97M/Emotet.S!MTB (MICROSOFT)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This is a generic detection for all cases and instances of Emotet.

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.




an

Ransom.Win32.CRYPTOLOCK.E

Threat type: Ransomware

Aliases: Trojan-Ransom.FileCrypter (IKARUS)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It terminates itself if it detects it is being run in a virtual environment.




an

Ransom.Win32.LOCKBIT.EOD

Threat type: Ransomware

Aliases:

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




an

Ransom.PS1.LOCKBIT.AA

Threat type: Ransomware

Aliases: Trojan:Win32/Leonem (MICROSOFT); Win32/Filecoder.Lockbit.M trojan (NOD32)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




an

Ransom.MSIL.EGOGEN.THEBBBC

Threat type: Ransomware

Aliases: Trojan:MSIL/XWormRAT.A!MTB (MICROSOFT)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: High

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It adds certain registry entries to disable the Task Manager. This action prevents users from terminating the malware process, which can usually be done via the Task Manager.

It terminates itself if it detects it is being run in a virtual environment.

It encrypts files with specific file extensions. It drops files as ransom note. It avoids encrypting files with the following file extensions.




an

Ransom.Win32.NOKO.YPDFA

Threat type: Ransomware

Aliases:

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




an

Ransom.Win32.NOKO.THDABBC

Threat type: Ransomware

Aliases: Ransom:Win32/Nokonoko.PB!MTB (MICROSOFT); Win32:Nokoyawa-A [Trj] (AVAST)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




an

AndroidOS_SpyNote.GCLX

Threat type: Backdoor

Aliases:

Platforms: Android

Overall Risk Rating: High

Damage Potential: Low

Distribution Potential: Low

Reported Infection: Low

Information Exposure: High

Overview:




an

Ransom.Win32.SPOOSH.THGAGBC

Threat type: Ransomware

Aliases: Generic.Ransom.DCRTR.7E80656D (BITDEFENDER)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: High

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It connects to certain websites to send and receive information.

It drops files as ransom note. It avoids encrypting files with the following file extensions.




an

Centre completes auction of 8 critical mineral blocks in big step to bolster self-reliance

India's Ministry of Mines successfully auctions 8 critical mineral blocks, securing vital resources for electronics, EVs, defense, and renewable energy.




an

PDP, PC label govt's move as 'weak'; push fresh resolution to reinstate Article 370 and 35-A

Peoples Conference leader Sajad Lone said that the NC-led coalition regime moved a "weak" resolution in the J&K Assembly and alleged that Wednesday's episode was a fixed match between the ruling party and the opposition.




an

Amazon's rating trickery: How products are being swapped without changing reviews

The malpractice has been brought to light by tech-influencer who explains how the products listed on the site and the products rated can be two completely different items to begin with.




an

PM Modi's 'Bharat 6G Vision' poised to get another booster

In a bid to boost the Bharat 6G Vision, the government is working towards the development of a multi-port switch for a single broadband antenna that can cover all 2G, 3G, 4G and 5G bands.




an

PM Modi wishes Advani on his b'day, counts him among India's 'most admired' statesmen

Prime Minister Narendra Modi on Friday wished veteran BJP leader Lal Krishna Advani on his 97th birthday and said that he is among "India's most admired statesmen."




an

Rural markets outpace urban centres in growth for FMCG goods: NielsenIQ

India's fast-moving consumer goods (FMCG) sector grew 5.7 per cent by value and 4.1 per cent by volume in the July-September quarter driven by rural demand which grew faster than urban markets for the third consecutive quarter, according to the latest report by consumer intelligence firm NielsenIQ.




an

'Australia Today' news outlet responds after Canada blocks EAM Jaishankar's press meet

In the wake of the Canadian government's decision to block the social media platforms of Australian news outlet Australia Today, the organisation issued a statement




an

WHO Urges To Give Health Priority In Climate Change Prone Areas, Suggests Sustainable Alternatives

The WHO has issued a report urging the prioritization of health in climate action. The report, developed with over 100 organizations, calls for an end to fossil fuel reliance and investment in sustainable alternatives.




an

End Misuse Of Antibiotics, Urges Kerala Health Minister

Kerala Health Minister Veena George announced that a campaign against the indiscriminate use of antibiotics has commenced in all the state's 14 districts.




an

200 Indian women entrepreneurs set to raise Rs 850 cr from investors: Goldman Sachs

At least 200 women entrepreneurs in India are poised to raise an estimated Rs 850 crore ($100 million) from investors, helping to expand businesses and create new jobs, Goldman Sachs announced on Friday.




an

Gut microbiome changes may signal onset of rheumatoid arthritis

Researchers have identified changes in the gut microbiome makeup that lead to the onset of rheumatoid arthritis, providing a window of opportunity for targeted treatments.




an

Arjun is grateful to Rohit Shetty for trusting him when many were unwilling

Actor Arjun Kapoor recently expressed his gratitude towards filmmaker Rohit Shetty, acknowledging the trust the director placed in him when many others were hesitant.




an

In a global first, NTPC plant starts converting captured CO2 into methanol

Government-owned power giant NTPC announced on Friday that in "a major groundbreaking achievement," it has been "successful in the synthesis of CO2 captured from flue gas with hydrogen produced from a PEM electrolyser, which was then converted into methanol at NTPC's Vindhyachal plant."




an

Social media doing harm to youngsters, calling time on it: Australian PM Albanese

Australia's National Cabinet on Friday agreed to the government's proposed social media legislation - the first of its kind in the world - that sets a minimum age of 16 to access social media in the country.




an

India batting group will enjoy themselves batting in Durban, says Robin Uthappa

After India won the 2024 Men's T20 World Cup, there has been a marked change in the side's batting approach. With Rohit Sharma and Virat Kohli saying goodbye to the format and many first-choice players rested to play Tests, the batters have been as pacy as a Ferrari car when batting in T20Is.




an

Indian stock market ends flat, Nifty below 24,150

The Indian stock market closed flat on Friday as selling was seen in the auto, PSU bank, financial service, metal, and realty sectors at the end of trading.




an

NC's misdemeanors would hinder restoration of statehood in J&K, warns BJP

After holding a parallel assembly session, the BJP on Friday warned to form a parallel government in J&K to counter NC's dictatorial attitude.




an

Corruption an obstacle to economic progress: President Murmu

President Droupadi Murmu on Friday highlighted the need for integrity and honesty in the nation's fight against corruption which is an obstacle to economic progress.




an

Indian stock market remains on consolidation path, DIIs absorb heavy selling

The week saw Donald Trump returning to power in the US election amid a second consecutive rate cut by Fed this year, as the Indian stock market continued to experience consolidation due to heightened selling pressure from foreign institutional investors (FIIs).




an

Extremists target ISKCON amid persecution of Hindus in Bangladesh

Author and social activist Taslima Nasreen has expressed deep concern regarding the persecution of minorities in Bangladesh at the hands of Islamist extremists.




an

Malaika Arora wishes 'baby boy' Arhaan with cherished childhood memories

Actress Malaika Arora took to social media to wish her "baby boy," Arhaan Khan on his 22nd birthday.




an

Shiv Sena (UBT) expels ex-Hingoli MP Wankhede for 'anti-party' activities

In an abrupt move, the Shiv Sena (UBT) has expelled its former Hingoli Lok Sabha MP Subhash Wankhede from the party for alleged 'anti-party' activities