About Radamant

Radamant is a notorious ransomware strain known for its advanced encryption capabilities and aggressive tactics. First identified in 2016, Radamant has since evolved into a highly sophisticated malware variant, causing significant damage to individuals and organizations worldwide.

How it works?

Radamant typically infects systems through phishing emails, exploit kits, or remote desktop protocol (RDP) brute-force attacks. Once inside a network, it spreads rapidly, encrypting files on both local and networked drives using strong encryption algorithms.

After encrypting files, Radamant displays a ransom note demanding payment in exchange for a decryption key. Victims are often given a limited time to pay the ransom, with the threat of permanent data loss if they refuse to comply.

What is the target?

Radamant indiscriminately targets individuals, small businesses, and large enterprises across various industries. Its victims include healthcare organizations, financial institutions, government agencies, educational institutions, and private individuals.

The widespread impact of Radamant underscores the importance of robust cybersecurity measures and regular data backups to mitigate the risk of ransomware attacks.

Who created it?

The individuals or group behind Radamant remain largely unknown, operating under the guise of anonymity to avoid detection and prosecution. Like many ransomware strains, Radamant is often distributed through underground forums and sold as a service to other cybercriminals.

Its creators continue to update and adapt the malware to bypass security measures and exploit new vulnerabilities, posing an ongoing threat to the global cybersecurity landscape.

Warning

The information provided on this website is intended for educational purposes only. It should not be used to create, distribute, or execute any malicious software. We strongly condemn the use of malware for illegal or unethical activities.

Malware samples can cause harm to your computer system and compromise your security. Handle these samples with extreme care and only in isolated environments. Do not execute these samples on any system connected to the internet or any network containing sensitive information.

The maintainer and contributors of this repository, both past, present, and future, are not responsible for any loss of data, system damage, or other consequences resulting from the mishandling of the samples provided herein. Caution is advised when testing any file present in this repository.

View Sample on GitHub