Search results

Jump to navigation Jump to search
Results 1 – 95 of 142
Advanced search

Search in namespaces:

  
  
  
  
  
  
  
  
  
  
  
  
  
  
  

Page title matches

Page text matches

  • |Group=Ransomware, Cryptolocker |Link=https://www.bleepingcomputer.com/news/security/revil-ransomware-gangs-web-sites-mysteriously-shut-down/
    714 bytes (89 words) - 22:52, 14 July 2021
  • |Link=http://blog.malwarebytes.org/intelligence/2013/07/fbi-ransomware-now-targeting-apples-mac-os-x-users/ ...inals, well known for not re-inventing the wheel, have ‘ported’ the latest ransomware Trojan to OS X, not by using some complicated exploit but rather leveraging
    423 bytes (52 words) - 22:54, 5 August 2015
  • |Group=Ransomware, |Link=https://blog.trendmicro.com/trendlabs-security-intelligence/dharma-ransomware-uses-av-tool-to-distract-from-malicious-activities/
    848 bytes (108 words) - 16:13, 12 May 2019
  • |Introduction=[[Silent Winlocker]] is a kit to create a police ransomware botnet. The versions range from 1 to 5. |Group=Police lock, Ransomware,
    268 bytes (34 words) - 15:50, 8 August 2015
  • |Link=http://threatpost.com/critroni-crypto-ransomware-seen-using-tor-for-command-and-control/107306 ...des a number of unusual features and researchers say it’s the first crypto ransomware seen using the Tor network for command and control.
    636 bytes (89 words) - 22:10, 5 August 2015
  • |Group=Ransomware, |Link=https://blog.malwarebytes.com/threat-analysis/2018/01/gandcrab-ransomware-distributed-by-rig-and-grandsoft-exploit-kits/
    913 bytes (125 words) - 15:03, 18 July 2018
  • |Abstract=The objective of the mission is to make a complete analysis of a ransomware called Rannoh/Matsnu. The objective is to be able to understand how this ransomware works, to control if
    610 bytes (92 words) - 21:50, 5 August 2015
  • |Link=https://www.bleepingcomputer.com/news/security/locky-ransomware-switches-to-the-lukitus-extension-for-encrypted-files/ ...u are infected with this ransomware, you are not infected with the Lukitus Ransomware, as some sites may call it. You are instead infected by Locky, which is usi
    684 bytes (92 words) - 18:27, 23 August 2017
  • |Image=Ransomware and Silence Locker control panel.png |Link=http://www.symantec.com/connect/blogs/ransomware-and-silence-locker-control-panel
    1 KB (161 words) - 21:51, 5 August 2015
  • |Image=fake-fbi-ransomware-analysis.png |Link=http://blogs.avg.com/news-threats/fake-fbi-ransomware-analysis/
    925 bytes (131 words) - 22:12, 5 August 2015
  • |Link=https://www.proofpoint.com/us/threat-insight/post/cryptxxx-new-ransomware-actors-behind-reveton-dropping-angler ...s the number one exploit kit by volume, making the potential impact of new ransomware in the hands of experienced actors with access to this vector quite signifi
    1,008 bytes (138 words) - 22:34, 19 April 2016
  • |Group=Ransomware,
    30 bytes (3 words) - 17:36, 1 May 2018
  • |Group=Ransomware,
    30 bytes (3 words) - 23:12, 3 February 2017
  • |Group=Ransomware,
    30 bytes (3 words) - 16:10, 12 May 2019
  • |Link=https://www.bleepingcomputer.com/news/security/cerber-dominates-ransomware-landscape-after-lockys-demise/ ...Cerber ransomware family has risen to take Locky's place at the top of the ransomware mountain after new Locky versions stopped coming out last year, and spam op
    525 bytes (67 words) - 11:36, 16 April 2017
  • |Group=Cryptolocker, Ransomware
    45 bytes (4 words) - 13:27, 11 July 2021
  • {{Botnet|Group=Ransomware, Cryptolocker}}
    41 bytes (4 words) - 22:35, 18 July 2015
  • |Group=Cryptolocker, Ransomware
    45 bytes (4 words) - 13:30, 11 July 2021
  • |Group=Cryptolocker, Ransomware
    45 bytes (4 words) - 13:31, 11 July 2021
  • |Group=Cryptolocker, Ransomware
    45 bytes (4 words) - 13:33, 11 July 2021
  • ...our Cryptowall blogpost, we briefly mentioned the more advanced family of ransomware CTB-Locker, which uses elliptic curve cryptography for file encryption and This week, another ransomware emerged using the same cryptography for encryption. It was first spotted by
    857 bytes (124 words) - 15:21, 14 December 2014
  • |Group=Police lock, Ransomware,
    43 bytes (5 words) - 00:02, 5 February 2015
  • ...ed the arrest of an individual involved with a particular strain of police Ransomware known as Ransom.EY, detected by Symantec as Trojan.Ransomgerpo. ...but quickly evolved as the author obviously stole design ideas from other Ransomware gangs as shown in Figure 1.
    936 bytes (129 words) - 21:50, 5 August 2015
  • |Group=Cryptolocker, Ransomware
    63 bytes (6 words) - 13:33, 11 July 2021
  • |Group=Cryptolocker, Ransomware
    59 bytes (6 words) - 12:45, 11 July 2021
  • |Group=Cryptolocker, Ransomware
    61 bytes (5 words) - 13:28, 11 July 2021
  • |Group=Cryptolocker, Ransomware
    63 bytes (6 words) - 13:29, 11 July 2021
  • |Group=Cryptolocker, Ransomware
    65 bytes (6 words) - 13:30, 11 July 2021
  • |Group=Ransomware,
    61 bytes (6 words) - 15:16, 14 December 2014
  • |Group=Police lock, Ransomware,
    66 bytes (8 words) - 22:17, 30 July 2015
  • |Group=Ransomware,
    71 bytes (8 words) - 14:59, 18 July 2018
  • |Group=Cryptolocker, Ransomware,
    83 bytes (8 words) - 10:41, 4 December 2015
  • |Group=Cryptolocker, Ransomware,
    87 bytes (8 words) - 00:25, 1 March 2015
  • |Image=Ransomware gets professional targeting Switzerland Germany and Austria.png |Abstract=In March I blogged about a ransomware which has been targeting various countries, locking down the victims comput
    1 KB (176 words) - 21:29, 5 August 2015
  • ...a default Interpol design and new countries BE, CH, FI, IE (the ? 'Gaelic Ransomware' ), LU, SE past week, Urausy is now showing dedicated clothes to 3 new coun GR, DK, and NO (First - or not..see edit at the end - ransomware targeting Norway, hence this post)
    644 bytes (86 words) - 19:00, 7 February 2015
  • |Abstract=This week, we have received a number of reports on yet another ransomware, BandarChor. This ransomware is not exactly fresh. The first infections that we've noticed related to th
    659 bytes (99 words) - 22:34, 10 August 2015
  • |Group=Ransomware
    135 bytes (13 words) - 15:47, 8 August 2015
  • ...k=http://blog.trendmicro.com/trendlabs-security-intelligence/torrentlocker-ransomware-uses-email-authentication-to-refine-spam-runs/ ...vector. In previous entries, we noted that a particular wave of the crypto-ransomware was using spammed messages that were designed to evade spam filters. Our re
    687 bytes (85 words) - 00:26, 1 March 2015
  • |Group=Ransomware
    152 bytes (15 words) - 15:44, 8 August 2015
  • |Group=Ransomware, Cryptolocker
    130 bytes (14 words) - 07:04, 15 July 2021
  • |Group=Ransomware
    168 bytes (17 words) - 15:45, 8 August 2015
  • |Groupe2=Ransomware
    178 bytes (18 words) - 15:50, 8 August 2015
  • |Group=Ransomware, Police lock,
    102 bytes (11 words) - 18:22, 3 August 2015
  • |Abstract=A ransomware is a kind of malware that withholds some assets’ release. Ransomware attacks were first seen in
    1 KB (181 words) - 22:13, 5 August 2015
  • |Group=Ransomware, Cryptolocker,
    170 bytes (18 words) - 06:54, 15 August 2015
  • |Group=Ransomware,
    517 bytes (108 words) - 11:47, 23 March 2019
  • |Group=Police lock, Ransomware,
    135 bytes (17 words) - 18:23, 3 August 2015
  • |Link=http://blog.trendmicro.com/trendlabs-security-intelligence/jigsaw-ransomware-plays-games-victims/ ...ard, and a creepy one at that. We have recently encountered a nasty crypto-ransomware family called JIGSAW. Reminiscent to the horror film Saw, this malware toys
    769 bytes (110 words) - 10:03, 1 May 2016
  • |Abstract=Before, CTB-Locker, or Onion Ransomware, differed from other ransomware in the usage of the Tor Project’s anonymity network to shield itself from
    854 bytes (115 words) - 01:34, 2 March 2016
  • ...Mac. Given that Android is widely used in consumer electronics, the first ransomware attack on ‘smart’ devices may occur.
    1 KB (126 words) - 12:39, 19 March 2016

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)