ransomware

Pierluigi Paganini November 08, 2016
Technical analysis of the Locker virus on mobile phones

Security experts from Cheetah Mobile Security Research Lab published an interesting Technical analysis of the mobile variant of the Locker virus. Blatant malicious behavior of the Locker virus The Locker virus can easily be identified by its blatant malicious behavior. Here are the tell-tail signs: Windows appear on the top of the home screen that […]

Pierluigi Paganini October 17, 2016
Reading the ‘High Crime Trends 2016’ Report from Group-IB

The Group-IB firm has published a report titled “High Crime Trends 2016” that includes interesting data about principal cybercrime trends. Group-IB, one of the global leaders in preventing and investigating high-tech crimes and online frauds, has published an interesting report titled “High Crime Trends 2016” that provides an interesting analyzing of current criminal activities. The Key Trends evaluate are evaluated […]

Pierluigi Paganini October 16, 2016
Symantec observed a surge of spam emails using malicious WSF files

Symantec observed a significant increase in the number of email-based attacks using malicious Windows Script File (WSF) attachments. Experts from Symantec are observing a significant increase in the number of email-based attacks leveraging malicious Windows Script File (WSF) attachments.  Over the past three months, threat actors have adopted the tactic in the wild, mostly criminal […]

Pierluigi Paganini October 13, 2016
Experts observed several malvertising campaigns deliver Cerber 4.0

Cerber 4.0 is the latest variant of the Cerber ransomware family that is becoming even more common in the malvertising campaign in the wild. Another variant of the notorious Cerber ransomware, the Cerber 4.0, appeared in the wild delivered by several exploit kits, including RIG, Neutrino, and Magnitude EKs. According to the experts from Trend Micro, the Cerber 4.0 first appeared in October […]

Pierluigi Paganini October 10, 2016
The fall of the Encryptor RaaS also thanks to Shodan

Law enforcement and security experts have dismantled the Encryptor RaaS architecture by localizing one of its servers with Shodan. Shodan is a search engine for internet-connected devices, it is a precious instrument for IT experts and hackers that use it to find assess systems exposed on the Internet. The information gathered via Shodan could allow attackers […]

Pierluigi Paganini October 02, 2016
TeamXRat spreads ransomware via RDP brute-force attacks

Malware researchers from Kaspersky have spotted the TeamXRat gang spreading a new ransomware in Brazil via RDP brute-force attacks. Cyber criminals are using stolen or weak remote desktop credentials to access systems and deliver file-encrypting ransomware. This is not a novelty in the criminal ecosystem, in March experts discovered a ransomware dubbed Surprise that was […]

Pierluigi Paganini September 22, 2016
RAUM tool allows to spread malware through torrent files

InfoArmor has discovered the RAUM tool in criminal forums, it is a special tool to distribute malware by packaging it with popular torrent files. It is not a novelty, torrent files are a privileged channel for malware diffusion, according to a study conducted by researchers at Digital Citizens Alliance and RiskIQ, almost one-third of the 800 torrent sites […]

Pierluigi Paganini September 16, 2016
Mamba: The new Full Disk Encryption Ransomware Family Member

A Brazilian Infosec research group, Morphus Labs, just discovered a new Full Disk Encryption (FDE) Ransomware this week, dubbed Mamba. Mamba, as they named it, uses a disk-level encryption strategy instead of the conventional file-based one. This may be just the beginning of a new era for the Ransomware. In this article, Renato Marinho (@renato_marinho), […]

Pierluigi Paganini August 27, 2016
New Locky Ransomware variant uses DLLs for distribution

A new Locky Ransomware variant has been spotted by researchers at Cyren, it uses DLLs for distribution. The Locky Ransomware is one of the most popular threats since its first detection in the wild early 2016. The ransomware has evolved over the time, crooks have improved it adding new evasion detection features and changing the distribution methods. Security experts […]

Pierluigi Paganini July 28, 2016
Locky Ransomware now relies on JavaScript instead downloaders 

A new ransomware campaign relies on a Locky variant that is distributed through JavaScript that includes the binary of the threat itself. Locky is one of the most infamous threats of the ransomware family and according to the experts it is in continuous evolution. The threat has been using JavaScript attachments as a distribution mechanism, but most […]