Search results
Jump to navigation
Jump to search
Page title matches
- |Link=https://threatpost.com/samsam-ransomware-evolves-its-tactics-towards-targeting-whole-companies/131519/ ...ous tactics, SamSam operators are now launching thousands of copies of the ransomware at once into individual organizations, each of which has been carefully sel612 bytes (76 words) - 17:36, 1 May 2018
- |Link=http://blog.trendmicro.com/trendlabs-security-intelligence/new-crypto-ransomware-emerge-in-the-wild/ |Abstract=Just like other ransomware variants, the Cryptoblocker malware, detected as TROJ_CRYPTFILE.SM, will en977 bytes (136 words) - 22:13, 5 August 2015
File:Ransomware gets professional targeting Switzerland Germany and Austria.png |description={{en|1=Ransomware gets professional targeting Switzerland Germany and Austria}}(663 × 872 (209 KB)) - 02:06, 6 August 2015- |Group=Ransomware, Wiper,735 bytes (108 words) - 11:10, 23 March 2019
- |Image=Ransomware gets professional targeting Switzerland Germany and Austria.png |Abstract=In March I blogged about a ransomware which has been targeting various countries, locking down the victims comput1 KB (176 words) - 21:29, 5 August 2015
- |Link=http://blog.trendmicro.com/trendlabs-security-intelligence/reveton-ransomware-spreads-with-old-tactics-new-infection-method/ |Abstract=Similar to older REVETON or police ransomware variants, the recent wave of REVETON malware variants detected as TROJ_REVE1,005 bytes (141 words) - 15:29, 14 December 2014
- |Group=Ransomware, |Link=https://blog.trendmicro.com/trendlabs-security-intelligence/dharma-ransomware-uses-av-tool-to-distract-from-malicious-activities/848 bytes (108 words) - 16:13, 12 May 2019
- ...tp://www.welivesecurity.com/2014/12/22/win32virlock-first-self-reproducing-ransomware-also-shape-shifter/ |Abstract=Win32/VirLock is ransomware that locks victims’ screens but also acts as parasitic virus, infecting e727 bytes (93 words) - 23:46, 22 December 2014
- 567 bytes (84 words) - 12:51, 31 July 2015
- |Link=http://threatpost.com/critroni-crypto-ransomware-seen-using-tor-for-command-and-control/107306 ...des a number of unusual features and researchers say it’s the first crypto ransomware seen using the Tor network for command and control.636 bytes (89 words) - 22:10, 5 August 2015
- 772 bytes (88 words) - 22:32, 31 July 2015
- ...k=http://blog.trendmicro.com/trendlabs-security-intelligence/torrentlocker-ransomware-uses-email-authentication-to-refine-spam-runs/ ...vector. In previous entries, we noted that a particular wave of the crypto-ransomware was using spammed messages that were designed to evade spam filters. Our re687 bytes (85 words) - 00:26, 1 March 2015
- |Link=http://www.bleepingcomputer.com/news/security/petya-ransomware-skips-the-files-and-encrypts-your-hard-drive-instead/ ...pplications that download a file that when executed will install the Petya Ransomware on the computer. An example filename for the installer is Bewerbungsmappe-g1 KB (171 words) - 23:12, 27 March 2016
- |Link=https://www.proofpoint.com/us/threat-insight/post/cryptxxx-new-ransomware-actors-behind-reveton-dropping-angler ...s the number one exploit kit by volume, making the potential impact of new ransomware in the hands of experienced actors with access to this vector quite signifi1,008 bytes (138 words) - 22:34, 19 April 2016
- |Link=http://blog.malwarebytes.org/intelligence/2013/07/fbi-ransomware-now-targeting-apples-mac-os-x-users/ ...inals, well known for not re-inventing the wheel, have ‘ported’ the latest ransomware Trojan to OS X, not by using some complicated exploit but rather leveraging423 bytes (52 words) - 22:54, 5 August 2015
- |Group=Ransomware, |Link=https://blog.malwarebytes.com/threat-analysis/2018/01/gandcrab-ransomware-distributed-by-rig-and-grandsoft-exploit-kits/913 bytes (125 words) - 15:03, 18 July 2018
- |Link=http://blog.emsisoft.com/2012/04/11/the-accdfisa-malware-family-ransomware-targetting-windows-servers/ ...ACCDFISA malware family belongs to a malware category called “ransomware”. Ransomware is a special kind of malware that takes a system and its data hostage in an1 KB (202 words) - 16:12, 30 November 2014
- |Link=http://malware.dontneedcoffee.com/2012/06/ransomware-smile-youre-on-camera.html543 bytes (70 words) - 19:03, 7 February 2015
- |Link=https://www.bleepingcomputer.com/news/security/locky-ransomware-switches-to-the-lukitus-extension-for-encrypted-files/ ...u are infected with this ransomware, you are not infected with the Lukitus Ransomware, as some sites may call it. You are instead infected by Locky, which is usi684 bytes (92 words) - 18:27, 23 August 2017
- |Link=http://blog.trendmicro.com/trendlabs-security-intelligence/petya-crypto-ransomware-overwrites-mbr-lock-users-computers/ ...ng them hostage is not enough, cybercriminals who create and spread crypto-ransomware are now resorting to causing blue screen of death (BSoD) and putting their731 bytes (95 words) - 22:57, 27 March 2016
Page text matches
- ...our Cryptowall blogpost, we briefly mentioned the more advanced family of ransomware CTB-Locker, which uses elliptic curve cryptography for file encryption and This week, another ransomware emerged using the same cryptography for encryption. It was first spotted by857 bytes (124 words) - 15:21, 14 December 2014
- |Group=Police lock, Ransomware,43 bytes (5 words) - 00:02, 5 February 2015
- ...ed the arrest of an individual involved with a particular strain of police Ransomware known as Ransom.EY, detected by Symantec as Trojan.Ransomgerpo. ...but quickly evolved as the author obviously stole design ideas from other Ransomware gangs as shown in Figure 1.936 bytes (129 words) - 21:50, 5 August 2015
- |Group=Cryptolocker, Ransomware65 bytes (6 words) - 13:30, 11 July 2021
- |Group=Cryptolocker, Ransomware63 bytes (6 words) - 13:33, 11 July 2021
- |Group=Cryptolocker, Ransomware59 bytes (6 words) - 12:45, 11 July 2021
- |Group=Cryptolocker, Ransomware61 bytes (5 words) - 13:28, 11 July 2021
- |Group=Cryptolocker, Ransomware63 bytes (6 words) - 13:29, 11 July 2021
- |Group=Ransomware,61 bytes (6 words) - 15:16, 14 December 2014
- |Group=Police lock, Ransomware,66 bytes (8 words) - 22:17, 30 July 2015
- |Group=Cryptolocker, Ransomware,83 bytes (8 words) - 10:41, 4 December 2015
- |Group=Ransomware,71 bytes (8 words) - 14:59, 18 July 2018
- |Group=Cryptolocker, Ransomware,87 bytes (8 words) - 00:25, 1 March 2015
- |Image=Ransomware gets professional targeting Switzerland Germany and Austria.png |Abstract=In March I blogged about a ransomware which has been targeting various countries, locking down the victims comput1 KB (176 words) - 21:29, 5 August 2015
- ...a default Interpol design and new countries BE, CH, FI, IE (the ? 'Gaelic Ransomware' ), LU, SE past week, Urausy is now showing dedicated clothes to 3 new coun GR, DK, and NO (First - or not..see edit at the end - ransomware targeting Norway, hence this post)644 bytes (86 words) - 19:00, 7 February 2015
- |Abstract=This week, we have received a number of reports on yet another ransomware, BandarChor. This ransomware is not exactly fresh. The first infections that we've noticed related to th659 bytes (99 words) - 22:34, 10 August 2015
- |Group=Ransomware135 bytes (13 words) - 15:47, 8 August 2015
- ...k=http://blog.trendmicro.com/trendlabs-security-intelligence/torrentlocker-ransomware-uses-email-authentication-to-refine-spam-runs/ ...vector. In previous entries, we noted that a particular wave of the crypto-ransomware was using spammed messages that were designed to evade spam filters. Our re687 bytes (85 words) - 00:26, 1 March 2015
- |Group=Ransomware152 bytes (15 words) - 15:44, 8 August 2015
- |Group=Ransomware, Cryptolocker130 bytes (14 words) - 07:04, 15 July 2021