Announcement

thumbnail

Please be informed that there may be a disruption to the following services due to schedule planned maintenance as listed below:-

START DATE/ TIME
Sunday, 04 June 2023 (12:00am)

END DATE/ TIME
Sunday, 04 June 2023 (03:00am)

thumbnail

Please be informed that there may be a disruption to the following services due to schedule planned maintenance as listed below:-

START DATE/ TIME
Sunday, 21 May 2023 (12:00am)

END DATE/ TIME
Sunday, 21 May 2023 (03:00am)

thumbnail

Please be informed that there may be a disruption to the following services due to schedule planned maintenance as listed below:-

START DATE/ TIME
Sunday, 07 May 2023 (12:00am)

END DATE/ TIME
Sunday, 07 May 2023 (03:00am)

thumbnail

Please be informed that there may be a disruption to the following services due to schedule planned maintenance as listed below:-

START DATE/ TIME
Sunday, 23 Apr 2023 (12:00am)

END DATE/ TIME
Sunday, 23 Apr 2023 (03:00am)

thumbnail

Please be informed that there may be a disruption to the following services due to schedule planned maintenance as listed below:-

START DATE/ TIME
Sunday, 09 Apr 2023 (12:00am)

END DATE/ TIME
Sunday, 09 Apr 2023 (03:00am)

Virus & Security Alert

Vulnerability Name Severity Advisory Date
Ransom.MSIL.EGOGEN.THEBBBC

Threat type: Ransomware

Aliases: Trojan:MSIL/XWormRAT.A!MTB (MICROSOFT)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: High

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It adds certain registry entries to disable the Task Manager. This action prevents users from terminating the malware process, which can usually be done via the Task Manager.

It terminates itself if it detects it is being run in a virtual environment.

It encrypts files with specific file extensions. It drops files as ransom note. It avoids encrypting files with the following file extensions.

05/06/2023
Ransom.Win32.NOKO.YPDFA

Threat type: Ransomware

Aliases:

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note. It avoids encrypting files with the following file extensions.

05/06/2023
Ransom.PS1.LOCKBIT.AA

Threat type: Ransomware

Aliases: Trojan:Win32/Leonem (MICROSOFT); Win32/Filecoder.Lockbit.M trojan (NOD32)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note. It avoids encrypting files with the following file extensions.

11/05/2023
Ransom.Win32.LOCKBIT.EOD

Threat type: Ransomware

Aliases:

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It drops files as ransom note. It avoids encrypting files with the following file extensions.

11/05/2023
Ransom.Win32.CRYPTOLOCK.E

Threat type: Ransomware

Aliases: Trojan-Ransom.FileCrypter (IKARUS)

Platforms: Windows

Overall Risk Rating: Low

Damage Potential: Medium

Distribution Potential: Low

Reported Infection: Low

Information Exposure: Low

Overview:

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

It terminates itself if it detects it is being run in a virtual environment.

26/04/2023
  • 24 x 7 Hotline

    088-234101

  • Tel (Working Hours)

    088-234101

  • Office Opening Hours:

    Mon - Fri: 8:00am - 5:00pm