Monday, July 6, 01:17 p.m.
Home security Nude photos as ransom: ransomware meets sextortion!

Nude photos as…. ransomware: ransomware meets sextortion!

An unusual reward is demanded by hackers to return data to their victims. What is this? Nude photos.

Η Emsisoft just released an update tool decryption for ransomware "Ransomwared", Which enables users to unlock their encryption archives, in which hackers have added the .ransomwared and .wanttits extensions.

In most cases, the cybercriminals behind them ransomware require monetary compensation to decrypt and return them data in victims. Ransomwared, however, demands an… unusual payment.

The hackers attack victims' systems, install ransomware, encrypt them data and then display a pop-up window asking for it payment their. But what is this payment? As we said, it's not money. The hackers they ask nude photos of the victims. In return, the attackers will provide the decryption key. Basically the message asks photos from "tits".


Obviously, the attackers are not referring to the cute bird, but to specific parts of the human body. The question is how does the attacker know that the nude photos really belong to victim; It does not concern us.

naked photos

Once one is available tool For Ransomwared decryption, victims do not need to send either nude photos or pictures of the bird! You can download the Ransomwared decryption tool here.

naked photos


Please enter your comment!
Please enter your name here

Absent Mia
Absent Mia
Being your self, in a world that constantly tries to change you, is your greatest achievement


Behave! alerts you to websites that scan your computer

A new browser extension called Behave! will warn you if a website uses scripts to perform scans or attacks ...

Try2Cry ransomware: Infects USB flash drives

A new ransomware known as Try2Cry is trying to "reach" other Windows computers by infecting USB flash drives, using Windows shortcuts (LNK files) ...

Bitcoin scam attracts people with "bait" celebrities!

A bitcoin multi-stage scam exposed and used personally identifiable information (PII) to deceive users by prompting them to sign up for a ...

iPhone: What to do to boost your security?

One of the most important features of iOS is security. Rarely does a malicious application pass to ...

COVID-19: New research looks for antibodies in blood donors

The American Red Cross is examining the blood that has come from donations, and is looking for COVID-19 antibodies that will give it ...

Digital Transformation and Business: What Does Its Failure Mean?

Digital transformation is usually a way for businesses to outperform their competitors and get rid of methods that ...

Covaxin: India releases COVID-19 vaccine in August

The whole planet is waiting for the release of the vaccine for coronavirus, while clinical trials have begun in many countries around the world ....

iOS 13.5.1: iPhone users report battery issues

Have you noticed any changes to your iPhone lately? Maybe, for example, the battery runs out quickly ...

Avaddon ransomware: Attacks through Excel 4.0 macros

Microsoft announced yesterday that Avaddon ransomware spread this week through an old technique that came to the fore again. The...

Apple: Prohibits updating Chinese Apps without permission

Apple is banning developers from updating existing apps in China's App Store if they don't have government approval.