Daily Dark Web
  • Home
  • Cyber Attacks
  • DarkWeb News
  • Data Breaches
  • Vulnerability
  • Ransomware News
  • Unauthorized Accesses
  • Contact
No Result
View All Result
  • Home
  • Cyber Attacks
  • DarkWeb News
  • Data Breaches
  • Vulnerability
  • Ransomware News
  • Unauthorized Accesses
  • Contact
No Result
View All Result
Daily Dark Web
No Result
View All Result
Home Ransomware News

29 New Ransomwares are Detected by Malware Researchers in May

June 5, 2024
Reading Time: 3 mins read
29 New Ransomwares are Detected by Malware Researchers in May

In May, cybersecurity experts have identified of 29 new variants of ransomware. These malicious programs, characterized by their insidious nature, pose a significant threat to individuals and businesses alike. With each new variant, cybercriminals are refining their tactics, making detection and mitigation increasingly challenging. Ransomware operates by encrypting valuable data on infected systems, rendering it inaccessible to users. Subsequently, the perpetrators demand exorbitant ransoms for the decryption keys, effectively holding critical information hostage. This nefarious practice not only jeopardizes the integrity of personal and sensitive data but also imposes substantial financial burdens on victims.

 

  • Wormhole
    • SHA-256: dff3fd0197c5ea432f58f62a5f40dfa8e0cdc3ecca36bcf3221962349fbd9a22
    • Extensions: .Wormhole
  • KUZA
    • SHA-256: 38514f16f9eac49a8bd59cfe7785a74b5eb0b6af88d0a3ea505a1997dab0bd91
    • Extensions: .Ripa
  • Qepi – Qehu
    • SHA-256: 8c12844b80c111537bb80e1bcb33d7db8cc334cfb15cc0e3496f7f793f5ed1b6
    • SHA-256: 78b8e716db280ca8806dfa21824b993c592c33baba2a238cf2bd839f454a9cbe
    • Extensions: .qepi – .qehu
  • Baaa

    SHA-256: a566a28f3b860689ea801f9b2c454114e3d019c33017df7ef5859b78953b0415
    Extensions: .baa

  • MALARIA

    SHA-256: ac6ec3ca2a4592fb046ee52b214c89fd6b84164009a670703ea05021f0683172
    Extensions: .Four random characters

  • Xam

    SHA-256: 225e299bca1514858a1c31e85c05a2e7375f9f8d7095f5775dffe4d048e78892
    Extensions: .xam

  • Qeza

    SHA-256: 110eedf789feeb746b14dfc2d1a93aa580dfa110a4cb3073ce4d9460de5309cf
    Extensions: .qeza

  • Vepi

    SHA-256: 143292ae66435a28f45d126b6e75df33cb156cf9ae85ed16b01967d18bcfe50a
    Extensions: .vepi

  • EnigmaWave

    SHA-256: 7d6f763b685ede93123551f651e60829b4fab9f9794690448f67af18dc544588
    Extensions: .EnigmaWave

  • Paaa

    SHA-256: 2bd6f0743a3ecab9f463af0a244ccf98bcc0fe5a3f28f048dbb15112e5a214ff
    Extensions: .paaa

  • Vehu

    SHA-256: ced7e605bdf92c0e2a05709f6bb8c7a287e06839f5e21455857838644e68b991
    Extensions: .vehu

  • Scrypt

    SHA-256: aeeef616860df5ac0bcf37567fb1476d8d60ecc3d9eb6b82515ad5d5c3d5218d
    Extensions: .Scrypt

  • Capibara

    SHA-256: 923dddc478a17d0adf0c86d1b5eb709ea4b48114cbb2c0e72052bd69caae95b2
    Extensions: .capibara

  • Lilium

    SHA-256: 153a11e6dfe886a1950c874309f33cee72411bce30d283ece10b8f2d5870ca03
    Extensions: .lilium

  • EDHST

    SHA-256: d4b56f96610c77077b4171a6b01ac31cc2c633f41b686661608ae78b42de5744
    Extensions: .EDHST

  • OPIX

    SHA-256: 2e343f71bc6e378ca85932ffc75c4e64466ada12e6551901abf2c40c92eff803
    Extensions: .OPIX

  • GhosHacker

    SHA-256: 2e343f71bc6e378ca85932ffc75c4e64466ada12e6551901abf2c40c92eff803
    Extensions: .red

  • Veza

    SHA-256: 2ce2c104c964166cf5fc95d7c855c173533bf28b7053a398bb01e757fd0d94ea
    Extensions: .veza

  • OCEANS

    SHA-256: c9bd1abfb6e520d973284f2fbebaf14cd1cf5db7c2e2956e9d4a9b0564547b81
    Extensions: .Four random characters

  • ZHO

    SHA-256: 2ce2c104c964166cf5fc95d7c855c173533bf28b7053a398bb01e757fd0d94ea
    Extensions: .Four random characters

  • Anyv

    SHA-256: 4725df43c79dcfd0fe697f25b3de122951e18d7391323f0892a16558731f2e39
    Extensions: .Anyv

  • EMBARGO

    SHA-256: 98cc01dcd4c36c47fc13e4853777ca170c734613564a5a764e4d2541a6924d39
    Extensions: .564ba1

  • SRC

    SHA-256: 994fd55de0c9a0d2c9011155d76adfe71b4a6f3c5a0bb802269a204e959f61b7
    Extensions: .SRC

  • CAMBIARE ROTTA

    SHA-256: 524a898e18999ceac864dbac5b85fa2f14392e389b3c32f77d58e2a89cdf01c4
    Extensions: .Four random characters

  • Zonix

    SHA-256: b133659131275c23e39afef14d7e23d09b42cd7e93650b63d8669b8d20c5c751
    Extensions: .ZoN

  • Nett

    SHA-256: 1a024d3f05a2d28f7edc493c544f9622cc7610d06f3a25ebb35e46232ff368d6
    Extensions: .nett

  • Wintz

    SHA-256: bae187a00945be87c8f627b2b6943360c67eec4cbf518d46790f6898f9f64e17
    Extensions: .Four random characters

  • Boost

    SHA-256: b39912902d5a05d383c19dc93bace94d57b1287bd77b889b0f7cd1ba8433e82e
    Extensions: .boost

  • QRYPT

    SHA-256: 7628448a6ad01b9260b067d420d32564f33d750a09aeb76fb927ba15567efe84
    Extensions: .qcrypt

Tags: EnigmaWavemalwareransomwareWormhole
ShareTweet

Related Posts

-
Ransomware News

Israeli Organizations Weizmann Institute, Mor-logistics, and Agura B.C. LTD Allegedly Breached by Handala Hacking Group

June 18, 2025
Moser Engineering and SPG Construction Allegedly Targeted by Qilin Ransomware
Ransomware News

Moser Engineering and SPG Construction Allegedly Targeted by Qilin Ransomware

June 16, 2025
Infinox Customer Data Emerges For Sale on Dark Web After Failed Ransom Negotiation
Ransomware News

Infinox Customer Data Emerges For Sale on Dark Web After Failed Ransom Negotiation

June 12, 2025
Saudi Automotive Platform Karage Allegedly Suffers Full Data Leak After Ignoring Ransom
Ransomware News

Saudi Automotive Platform Karage Allegedly Suffers Full Data Leak After Ignoring Ransom

June 12, 2025
French Ministry of Education Targeted by Alleged Ransomware Attack, Data of Over 40,000 Individuals Leaked
Ransomware News

French Ministry of Education Targeted by Alleged Ransomware Attack, Data of Over 40,000 Individuals Leaked

June 10, 2025
Al Tadawi Specialty Hospital Allegedly Breached by Nightspire Ransomware Group
Ransomware News

Al Tadawi Specialty Hospital Allegedly Breached by Nightspire Ransomware Group

June 9, 2025
Next Post
Threat Actor Claims to Have Leaked Facebook User Database (2024)

Threat Actor Claims to Have Leaked Facebook User Database (2024)

Dark Storm Team Targets Emirati Infrastructure, Cites UAE’s Support for Israel as Motive

Dark Storm Team Targets Emirati Infrastructure, Cites UAE's Support for Israel as Motive

Recommended Stories

Alleged Leak of Large User Login Database Raises Online Security Concerns

Alleged Leak of Large User Login Database Raises Online Security Concerns

December 14, 2024
Threat Actor Claims to Sell Access to an UK Bank Server

Threat Actor Claims to Sell Access to an UK Bank Server

June 19, 2024
Mexican Insurance Company PYLC’s Database Allegedly Breached, Exposing 63,000 Users’ Records

Mexican Insurance Company PYLC’s Database Allegedly Breached, Exposing 63,000 Users’ Records

March 20, 2024

Popular Stories

  • Threat Actor Claims Sale of Dell Database Containing 49 Million Customer Records

    Threat Actor Claims Sale of Dell Database Containing 49 Million Customer Records

    0 shares
    Share 0 Tweet 0
  • Threat Actor Claims to Have Leaked Database Containing Personal Information of 5 Million Salvadoran Citizens

    0 shares
    Share 0 Tweet 0
  • Deloitte Allegedly Suffers Major Data Breach – Source Code and GitHub Credentials Reportedly Leaked

    0 shares
    Share 0 Tweet 0
  • Threat Actor Claims Sale of State Grid Corporation of China (SGCC) Data, World’s Largest Utility Company

    0 shares
    Share 0 Tweet 0
  • New ATM Malware Threatens European Banking Security

    0 shares
    Share 0 Tweet 0
Daily Dark Web

Daily Dark Web© 2024

No Result
View All Result
  • Contact
  • Home
  • Newsletter
  • Privacy Policy

Daily Dark Web© 2024

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?