According to a new report published by Kaspersky Lab, the number of ransomware infections suffered by companies threefold from January to September. The number of ransomware infections suffered by companies continues to increase and according to a new report published by the security firm Kaspersky Lab, it increased threefold from January to September. One in every five businesses […]
Malware researchers from the MalwareHunterTeam have discovered a new strain of ransomware dubbed Popcorn Time on the Dark Web. Malware researchers from MalwareHunterTeam have spotted a new ransomware, dubbed Popcorn Time, that appears to be still under development. The researchers at MalwareHunterTeam found the Popcorn Time ransomware code on the Dark Web. This ransomware comes with […]
Security experts from Checkpoint have discovered a new malware-based campaign through Facebook leveraging an image obfuscation trick dubbed ImageGate. Security experts from Checkpoint have discovered a new malware-based campaign through Facebook. Crooks leverage an image obfuscation trick, dubbed ImageGate, to spread the Locky ransomware via Facebook. Experts highlighted that the image obfuscation trick is able to bypass Facebook’s security checks. “Check […]
Researchers have discovered a new hacking campaign leveraging on Facebook Messenger to spread the Locky ransomware via SVG images. The Locky Ransomware is spread via a downloader, experts noticed that it is able to bypass Facebook defense measures by pretending to be a harmless image file. The campaign was first spotted during the weekend by the malware […]
Telecrypt ransomware is a new malware that abuses the instant messaging service Telegram for command and control (C&C) communications. Security experts from Kaspersky Lab have spotted a new Ransomware, called Telecrypt (Trojan-Ransom.Win32.Telecrypt), that abuses the Telegram instant messaging service for communications with command and control (C&C). The Delphi-written Trojan, which is currently targeting only Russian users, it exploits […]
Security experts from Cheetah Mobile Security Research Lab published an interesting Technical analysis of the mobile variant of the Locker virus. Blatant malicious behavior of the Locker virus The Locker virus can easily be identified by its blatant malicious behavior. Here are the tell-tail signs: Windows appear on the top of the home screen that […]
The Group-IB firm has published a report titled “High Crime Trends 2016” that includes interesting data about principal cybercrime trends. Group-IB, one of the global leaders in preventing and investigating high-tech crimes and online frauds, has published an interesting report titled “High Crime Trends 2016” that provides an interesting analyzing of current criminal activities. The Key Trends evaluate are evaluated […]
Symantec observed a significant increase in the number of email-based attacks using malicious Windows Script File (WSF) attachments. Experts from Symantec are observing a significant increase in the number of email-based attacks leveraging malicious Windows Script File (WSF) attachments. Over the past three months, threat actors have adopted the tactic in the wild, mostly criminal […]
Cerber 4.0 is the latest variant of the Cerber ransomware family that is becoming even more common in the malvertising campaign in the wild. Another variant of the notorious Cerber ransomware, the Cerber 4.0, appeared in the wild delivered by several exploit kits, including RIG, Neutrino, and Magnitude EKs. According to the experts from Trend Micro, the Cerber 4.0 first appeared in October […]
Law enforcement and security experts have dismantled the Encryptor RaaS architecture by localizing one of its servers with Shodan. Shodan is a search engine for internet-connected devices, it is a precious instrument for IT experts and hackers that use it to find assess systems exposed on the Internet. The information gathered via Shodan could allow attackers […]