Security researchers observed that malware authors have made DeathRansom a proper crypto-ransomware family capable of encrypting victims files. Researchers found one sample used a combination of five different algorithms to successfully encrypt a users files. Security professionals should also ensure that they have the latest threat intelligence and that they are feeding this information to network monitoring tools that are properly configured to address the organization’s needs, according to Fortinet. The malware’s handlers implemented the change described above shortly after its discovery.”]

