logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • ECHO project
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • Detection, isolation, and negotiation: Improving your ransomware preparedness and response
  • Automotive fabric supplier TB Kawashima announces cyberattack
  • Malware Loaders Opt for API Hammering to Evade Detection
  • New Android Banking Trojan ‘Revive’ Targeting Users of Spanish Financial Services
  • China’s blockchain boosters slam crypto as Ponzi scheme

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2021-40510 (mastro) 21 June 2022
  • CVE-2021-36761 (qlik_sense) 21 June 2022
  • CVE-2021-40511 (mastro) 21 June 2022
  • CVE-2021-39006 (qradar_wincollect) 21 June 2022
  • CVE-2022-22979 (spring_cloud_function) 21 June 2022

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

The new Hog ransomware decrypts victim files only if they are connected to its developer Discord server

Posted on 8 March 2021

From en.secnews.gr

The new Hog ransomware decrypts victim files only if they are connected to its developer Discord server

A new ransomware called “Hog” encrypts them Appliances unsuspecting users and decrypts them only if they connect to its developer Discord server. A few days ago, the MalwareHunterTeam discovers a (ongoing) Hog ransomware decryptor that asks victims to log on to Discord server of hackers to decrypt the archives their.

Read more…

Posted in News

Post navigation

Previous post: U.S. DOJ warns of fake unemployment benefit websites stealing data
Next post: Flagstar Bank customer data breached through Accellion hack
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.