iolo WW

Viruses

Discover essential defenses in the “Viruses” category at BugsFighter.com, where we provide comprehensive coverage on combating the myriad of digital threats that can compromise your devices and privacy. This section is dedicated to identifying, understanding, and removing viruses that affect computers, smartphones, and other digital platforms. From detailed analysis of new and evolving threats to step-by-step removal guides, our content is crafted to empower users with the knowledge they need to protect themselves. Whether you’re dealing with a stubborn infection or seeking to prevent future attacks, our expert advice and practical solutions are here to safeguard your digital life.

How to remove Osiris ransomware and decrypt .osiris files

0
Osiris Ransomware is newest variant of Locky ransomware. According to its name, new virus adds .osiris suffix to encrypted files and modifies filenames so they look like that: [8_random_characters]-[4_random_characters]-[4_random_characters]-[8_random_characters]-[12_random_characters].osiris. Osiris encrypts files with RSA-2048 and AES-128 algorithms that currently cannot be decrypted. Ransom is near 2.5 BitCoins (~$1880) and there is no earthly use to pay it. Osiris ransomware alters desktop background with typical image with text instructions. User can only make payment to anonymous Bitcoin wallets, so that police cannot keep track on malefactors.

How to remove Zzzzz ransomware and decrypt .zzzzz files

0
.zzzzz Ransomware is another variant of Locky ransomware, that adds .zzzzz extension to encrypted files. Virus encodes user files with asymmetric encryption algorithm and modifies filenames with 32-digit alphanumeric code. This makes it difficult to discern where certain files are and complicates decryption. After completing encryption ransomware creates 3 files (-INSTRUCTION.html, _6-INSTRUCTION.html, and -INSTRUCTION.bmp) and replaces desktop background image. In this files virus contains texts to persuade users to pay the ransom. Ransom is actually quite big - 3 BitCoins or ~$2200.

How to remove Aesir ransomware and decrypt .aesir files

0
Aesir Ransomware is another crypto-virus in the generation of Locky ransomware family. Virus uses RSA-2048 and AES-128 encryption algorithms. Aesir detects and encrypts more then 450 file types, and most sensitive are user documents, pictures and videos. Now it appends .aesir extension and has some minor technical changes in comparison to previous versions. This crypto-virus renames files with complex and random 24-character alphanumeric code separated by dashes. Ransom amount is huge: 3 BitCoins (~$2200) and there is no earthly use to pay it. Malefactors, who created this malware never send decryption keys. Aesir modifies desktop background with an image that contains information about the infection and instructions for user to pay.

How to remove Thor Ransomware and decrypt .thor files

0
Thor Ransomware is the newest version of the file-encryption virus. It comes from "Locky" ransomware family, that uses asymmetric cryptography (RSA-2048 and AES-128 encryption algorithms) and appends various file extensions to encrypted files. This family uses names of Thor comics character: .locky, .odin or some other random names. Now it uses .thor extension, and modifies the name to the set of 32 random letters and numbers. Technically, new virus uses same technology, but updated security keys, so old decryptors won't work. Ransom amount is the same: 3 BitCoins. Thor ransomware substitutes desktop background with image with information about the infection and instructions to pay the ransom.

How to remove Odin Ransomware and decrypt .odin files

0
Odin Ransomware is the latest version of the infamous Locky ransomware. As we know, previously it added .locky and .zepto extensions. Now it uses .odin extension. Technically, it is the same Locky virus, that uses same asymmetric cryptography. However, now key is changed and currently AutoLocky Decryptor that was able to decrypt .locky files can do nothing with .odin files.

How to remove Cerber3 ransomware and decrypt .cerber3 files

0
Cerber3 ransomware is new version of notorious Cerber virus that infected hundreds of thousands computers. It uses the same algorithms to infect computer and encrypt user files. Now it appends .Cerber3 to those files. Names of the files are changed to random 10 character sequence. Among other differences between Cerber3 and it predecessor are new ransomware note files (@__README__@.html, @__README__@.txt and @__README__@.url instead of #DECRYPT MY FILES#.txt, #DECRYPT MY FILES#.html, #DECRYPT MY FILES#.vbs). Text and html files contain identical instructions to pay the ransom, .url file opens Cerber3 website.

How to remove Cry Ransomware and decrypt .cry files

0
Cry Ransomware is crypto-virus, that infects Windows-based computers and encrypts data of different types. Usually, those are documents, music, photos, e-mails and other files, that can be very important for the user. Ransomware adds .cry extension to affected files and demands $150 ransom for decryption. If ransom is not paid within 100 hours, amount doubles to $300. Among peculiarities, that differentiates Cry virus from other threats of this kind - it creates old_shortcuts on the desktop and moves encrypted files to this folder.

How to remove Cerber Ransomware and decrypt .cerber files

0
Cerber is ransomware virus that uses AES encryption to encrypt user files. Usually it affects documents, photos, images, music, games and other types of personal data. Cerber adds .cerber extension to all encrypted files. Targeting personal information helps them to demand ransom ($500) for decryption. As there are no 100% working free decryption tools available many users pay the ransom to restore their files.