Search results

Jump to navigation Jump to search
Results 1 – 42 of 142
Advanced search

Search in namespaces:

  
  
  
  
  
  
  
  
  
  
  
  
  
  
  

Page title matches

  • 9 bytes (1 word) - 15:30, 14 December 2014
  • |Image=AutoIT Ransomware.png |Abstract=We get from twitter a ransomware here, we do a fast analyse on it.
    379 bytes (65 words) - 21:53, 5 August 2015
  • |Image=Ransomware crimeware kits.png |Link=http://www.symantec.com/connect/blogs/ransomware-crimeware-kits
    857 bytes (127 words) - 21:49, 5 August 2015
  • |Link=http://blogs.mcafee.com/mcafee-labs/ransomware-holds-up-victims |Abstract=The current “ransomware” campaign uses a novel approach to extort money from naive Internet users
    1,022 bytes (140 words) - 22:04, 5 August 2015
  • |Image=fake-fbi-ransomware-analysis.png |Link=http://blogs.avg.com/news-threats/fake-fbi-ransomware-analysis/
    925 bytes (131 words) - 22:12, 5 August 2015
  • ...ck. Very interesting, turns out this slightly modified ZeuS 2.x includes a ransomware feature. |Keyword=Ransomware,
    1 KB (192 words) - 11:52, 19 March 2016
  • |Image=Ransomware Fake MSE.png |Link=http://www.malekal.com/2012/08/20/ransomware-fake-microsoft-security-essentials/
    1 KB (144 words) - 12:57, 31 July 2015
  • |Link=http://www.malekal.com/2012/09/18/ransomware-trojan-casier-panel/ www.malekal.com
    381 bytes (40 words) - 16:28, 7 February 2015
  • |Image=Ransomware and Silence Locker control panel.png |Link=http://www.symantec.com/connect/blogs/ransomware-and-silence-locker-control-panel
    1 KB (161 words) - 21:51, 5 August 2015
  • |Abstract=This week, we have received a number of reports on yet another ransomware, BandarChor. This ransomware is not exactly fresh. The first infections that we've noticed related to th
    659 bytes (99 words) - 22:34, 10 August 2015
  • ...=http://volatility-labs.blogspot.com.es/2012/09/movp-13-desktops-heaps-and-ransomware.html ...in alternate desktops (i.e. so the current logged-on user doesn't see) to ransomware that locks users out of their own desktop. We'll see some examples of both
    706 bytes (97 words) - 16:28, 7 February 2015
  • ...our Cryptowall blogpost, we briefly mentioned the more advanced family of ransomware CTB-Locker, which uses elliptic curve cryptography for file encryption and This week, another ransomware emerged using the same cryptography for encryption. It was first spotted by
    857 bytes (124 words) - 15:21, 14 December 2014
  • |Link=https://threatpost.com/samsam-ransomware-evolves-its-tactics-towards-targeting-whole-companies/131519/ ...ous tactics, SamSam operators are now launching thousands of copies of the ransomware at once into individual organizations, each of which has been carefully sel
    612 bytes (76 words) - 17:36, 1 May 2018
  • |Group=Ransomware, Wiper,
    735 bytes (108 words) - 11:10, 23 March 2019
  • ...tps://labsblog.f-secure.com/2016/03/21/the-graphic-design-of-maktub-locker-ransomware/ |Abstract=A new crypto-ransomware family calling itself “Maktub Locker” has emerged. Maktub is Arabic for
    325 bytes (36 words) - 11:27, 23 March 2016
  • |Link=http://blog.trendmicro.com/trendlabs-security-intelligence/new-crypto-ransomware-emerge-in-the-wild/ |Abstract=Just like other ransomware variants, the Cryptoblocker malware, detected as TROJ_CRYPTFILE.SM, will en
    977 bytes (136 words) - 22:13, 5 August 2015
  • |Link=http://blog.trendmicro.com/trendlabs-security-intelligence/jigsaw-ransomware-plays-games-victims/ ...ard, and a creepy one at that. We have recently encountered a nasty crypto-ransomware family called JIGSAW. Reminiscent to the horror film Saw, this malware toys
    769 bytes (110 words) - 10:03, 1 May 2016
  • |Image=Ransomware gets professional targeting Switzerland Germany and Austria.png |Abstract=In March I blogged about a ransomware which has been targeting various countries, locking down the victims comput
    1 KB (176 words) - 21:29, 5 August 2015
  • |Abstract=The Ransomware Casier (which is in my opinion the grand son of Goldenbaks ) has new clothe
    603 bytes (79 words) - 18:59, 7 February 2015
  • |Link=http://blog.trendmicro.com/trendlabs-security-intelligence/reveton-ransomware-spreads-with-old-tactics-new-infection-method/ |Abstract=Similar to older REVETON or police ransomware variants, the recent wave of REVETON malware variants detected as TROJ_REVE
    1,005 bytes (141 words) - 15:29, 14 December 2014

Page text matches

  • |Group=Ransomware, Cryptolocker |Link=https://www.bleepingcomputer.com/news/security/revil-ransomware-gangs-web-sites-mysteriously-shut-down/
    714 bytes (89 words) - 22:52, 14 July 2021
  • |Link=http://blog.malwarebytes.org/intelligence/2013/07/fbi-ransomware-now-targeting-apples-mac-os-x-users/ ...inals, well known for not re-inventing the wheel, have ‘ported’ the latest ransomware Trojan to OS X, not by using some complicated exploit but rather leveraging
    423 bytes (52 words) - 22:54, 5 August 2015
  • |Group=Ransomware, |Link=https://blog.trendmicro.com/trendlabs-security-intelligence/dharma-ransomware-uses-av-tool-to-distract-from-malicious-activities/
    848 bytes (108 words) - 16:13, 12 May 2019
  • |Introduction=[[Silent Winlocker]] is a kit to create a police ransomware botnet. The versions range from 1 to 5. |Group=Police lock, Ransomware,
    268 bytes (34 words) - 15:50, 8 August 2015
  • |Link=http://threatpost.com/critroni-crypto-ransomware-seen-using-tor-for-command-and-control/107306 ...des a number of unusual features and researchers say it’s the first crypto ransomware seen using the Tor network for command and control.
    636 bytes (89 words) - 22:10, 5 August 2015
  • |Group=Ransomware, |Link=https://blog.malwarebytes.com/threat-analysis/2018/01/gandcrab-ransomware-distributed-by-rig-and-grandsoft-exploit-kits/
    913 bytes (125 words) - 15:03, 18 July 2018
  • |Abstract=The objective of the mission is to make a complete analysis of a ransomware called Rannoh/Matsnu. The objective is to be able to understand how this ransomware works, to control if
    610 bytes (92 words) - 21:50, 5 August 2015
  • |Link=https://www.bleepingcomputer.com/news/security/locky-ransomware-switches-to-the-lukitus-extension-for-encrypted-files/ ...u are infected with this ransomware, you are not infected with the Lukitus Ransomware, as some sites may call it. You are instead infected by Locky, which is usi
    684 bytes (92 words) - 18:27, 23 August 2017
  • |Image=Ransomware and Silence Locker control panel.png |Link=http://www.symantec.com/connect/blogs/ransomware-and-silence-locker-control-panel
    1 KB (161 words) - 21:51, 5 August 2015
  • |Image=fake-fbi-ransomware-analysis.png |Link=http://blogs.avg.com/news-threats/fake-fbi-ransomware-analysis/
    925 bytes (131 words) - 22:12, 5 August 2015
  • |Link=https://www.proofpoint.com/us/threat-insight/post/cryptxxx-new-ransomware-actors-behind-reveton-dropping-angler ...s the number one exploit kit by volume, making the potential impact of new ransomware in the hands of experienced actors with access to this vector quite signifi
    1,008 bytes (138 words) - 22:34, 19 April 2016
  • |Group=Ransomware,
    30 bytes (3 words) - 17:36, 1 May 2018
  • |Group=Ransomware,
    30 bytes (3 words) - 23:12, 3 February 2017
  • |Group=Ransomware,
    30 bytes (3 words) - 16:10, 12 May 2019
  • |Link=https://www.bleepingcomputer.com/news/security/cerber-dominates-ransomware-landscape-after-lockys-demise/ ...Cerber ransomware family has risen to take Locky's place at the top of the ransomware mountain after new Locky versions stopped coming out last year, and spam op
    525 bytes (67 words) - 11:36, 16 April 2017
  • |Group=Cryptolocker, Ransomware
    45 bytes (4 words) - 13:27, 11 July 2021
  • {{Botnet|Group=Ransomware, Cryptolocker}}
    41 bytes (4 words) - 22:35, 18 July 2015
  • |Group=Cryptolocker, Ransomware
    45 bytes (4 words) - 13:30, 11 July 2021
  • |Group=Cryptolocker, Ransomware
    45 bytes (4 words) - 13:31, 11 July 2021
  • |Group=Cryptolocker, Ransomware
    45 bytes (4 words) - 13:33, 11 July 2021

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)