Chastitylock Ransomware locks Cellmate Chastity Device that is controlled via Qiui Bluetooth App. Attacker was able to exploit an Direct Object Reference Vulnerability in the API that can..
Chinese hackers moves in to lucrative market of ransomwares and Polar Ransomware is the choice of APT27. It use randomly generated key using AES + RSA 1024.
Babuk Locker Ransomware uses its own implementation of SHA256 hashing, ChaCha8 encryption, and Elliptic-curve Diffie–Hellman (ECDH) key generation and exchange algorithm to encrypt victim files and protection of the encryption keys.
16x Ransomware also know as Chinese ransomware encrypts its victim files and ask to send the code to 3475857701@qq.com email address for ransom amount and procedure to get back files.
Conti Ransomware is the successor of the notorious Ryuk Ransomware. It is contains unique features that separate it in terms of performance and focus on network-based targets.