New Ransomware CryptMix Attack! Fake Children’s Charity Information

A new ransomware named CryptMix is coming up recently. This new CryptMix Ransomware promises to give money to a children’s charity. However, it is obvioiusly another malicious threat similar to CryptXXX and CryptoWall. A new type of ransomware created and distributed by a group of crooks calling themselves the Charity Team is trying to encourage users to pay the ransom note by promising to give some of the money to a children’s charity organization. Researchers from Heimdal Security claim the ransomware first appeared last week, but MalwareHunterTeam has told Softpedia that samples of the same ransomware were seen starting more than a month ago. It’s said that this threat is a combination of other ransomware families, such as CryptoWall 3.0, CryptoWall 4.0 and the more recent CryptXXX. Hence, the researcher appropriately named the ransomware CryptMix. CryptMix infections occur via drive-by downloads on malicious sites.

CryptMix ransomware is mainly spread via spam email that includes links to unsafe websites. If the users log into the websites will be infected with exploit kits that leverage vulnerabilities in the users’ browsers and their plugins to install CryptMix.

As far as getting invasion into an infected computer system, this ransomware will start the encryption process automatically. It searches and starts to encrypt a whopping 862 different file types, and thru the .code file extension that they add at the end of each encrypted file, you can recognize CryptMix infections.

After the encryption process ends, the ransomware adds ransom notes on the infected PC. Nyxbone says CryptMix borrows the HTML ransom note from CryptXXX and the text-based ransom note from CryptoWall. The ransom note tells the user their files were locked with an RSA-2048 algorithm, gives them an ID, and urges them to send an email to one of two email addresses (xoomx[@] and xoomx[@] so that they recover their files. The crooks answer the victim’s email and provide them with a link and a password to the One Time Secret service, a website that lets users share password-protected messages.

To avoid unnecessary damage on your personal data and the computer system, you have to take effective operations to terminate the annoying redirecting and completely remove pop-ups in a timely means. If you want to get an effective way to get rid of CryptMix issue, feel free to download the most popular and legitimate anti-malware program – SpyHunter here.    

Read More

What you need to know about Fake Codes Scams

How Fake Codec Scams Work

You could come across this sort of scam via a link on social media or on a video-streaming website. You won’t find these ads on legitimate sites like Netflix and YouTube, but on lower-quality sites — the kind of sites where you can stream pirated videos, for example. You’ll see some sort of advertisement, pop-up window, or full-page ad trying to get you to download some kind of malware disgused as a codec, video player, or software update.

Read More

Prevent Browser Hijacking – What You Need to Know

Browser hijacking means that a malicious code has taken over and modified the settings of your web browser, without your permission. There are several ways a browser hijacker can reach a computer. It may come through an infected or misleading e-mail, file share or a drive-by download. Rogue security software developers are also known for browser hijacking, usually pretending that your system is infected and redirecting to their download page.

Read More

Fake Tech Support Call Scam Shows No Signs of Slowing Down

While we are familiar with hackers who try to take personal information via phishing techniques online, another well known scam involves a more old fashioned approach: the telephone. It starts with a person who claims to be a tech support employee of Microsoft. He or she calls unsuspecting people and tells them something is wrong with their PC, and demands several hundred dollars to “fix” the issue.

a typical scam

Read More

Evolution of Mobile Phones

A handheld mobile radio telephone service was envisioned in the early stages of radio engineering. In 1917, Finnish inventor Eric Tigerstedt filed a patent for a “pocket-size folding telephone with a very thin carbon microphone”. Early predecessors of cellular phones included analog radio communications from ships and trains. The race to create truly portable telephone devices began after World War II, with developments taking place in many countries. The advances in mobile telephony have been traced in successive “generations”, starting with the early “0G” (zeroth generation) services, such as Bell System’s Mobile Telephone Service and its successor, the Improved Mobile Telephone Service. These “0G” systems were notcellular, supported few simultaneous calls, and were very expensive.

Read More

How to Get More Followers on Twitter

1. To leave your reader a good impression, you need to be careful in these ways:

  • Make your bio clear and tidy.
  • Use a suitable picture.

2. Post several times a day regularly. Either too many or too few Twitters are not welcome. Tweet when most users are free to read, interesting Twitters attracts others when they are not so busy.

Read More