How Does The Sodinokibi Decryptor Work?

You will receive a decryptor executable, mostly called “000XXX-Decryptor.exe”. The decryptor can decrypt single files, folders or the entire computer including network drives, external HDDs and other removable devices. You also have the option to create a backup of the files, before starting the decryption process. The Sodinikibi decryptor is completely individual for each victim…

How Do I Remove The Sodinokibi Ransomware Virus?

Sodinokibi ransomware creates multiple Windows registry entries, creates hidden executable files and sometimes opens a backdoor in firewalls for further access. There are multiple steps necessary, including the cleaning up of the Windows registry, scanning for malware and the manual cleanup of the Sodinokibi ransomware. Depending on the system environment, it is sometimes safer and…

How Is Sodinokibi Ransomware Distributed?

The most common attack vector for Sodinokibi ransomware is utilized through email phishing with malicious attachments. It is followed up by an unsecured RDP-Connection (Remote Desktop Protocol) and security vulnerabilities. The cybergang behind this form of ransomware is extremely proactive in distributing and encrypting the data. But just like any other ransomware distribution, Sodinokibi can…

How Does The Phobos Decryptor Work?

Depending on the Phobos variant, there are different Phobos decryptor types. Phobos ransomware is based on a 2-way decryption process. You will receive a decryptor executable, most often called “decryptor.exe”, which scans the computer, network drives, external HDDs and other removable devices. After this scan has finished, you get a “request code.” This contains a…

How Do I Remove The Phobos Ransomware Virus?

Phobos ransomware creates multiple Windows registry entries, creates hidden executable files and sometimes opens a backdoor in firewalls for further access. There are multiple steps necessary, including the cleaning up of the Windows registry, scanning for malware and the manual cleanup of the Phobos ransomware. Depending on the system environment, it is sometimes safer and…