If you think that you will find here how to create a ransomware it is better to search another source than us.
For the users protection we didn’t show even the whole source of the Office Macro. Moreover after we decrypted the password of the macro (in order to view it) we unprotected the macro in order to not know the numbers of the characters of the original virus macro.
Now let’s start to view first the 4 minutes video made by us. Please DO NOT TRY ON YOUR PERSONAL computer to ‘play’ with viruses because it exist a very big possibility to get your computer harmed by the virus. Read more →
Today we present you another way for hackers to hijack your data.
Using a malware from an email or from an infected webpage, the intruders simply modify your hosts file (from /windows/system32/drivers/etc)
By making some changes here the intruder will have a few choices on what to do next. Now all depends on what did he need.
The most common intrusion on the hosts file it is combined with another changes made in your registry and your browsers. But simply modifying this small file could divert your request to another web sites.
As you will see, the virus is very fast, encrypting your data in seconds.