Search results
Jump to navigation
Jump to search
Page title matches
- 9 bytes (1 word) - 15:30, 14 December 2014
- |Image=AutoIT Ransomware.png |Abstract=We get from twitter a ransomware here, we do a fast analyse on it.379 bytes (65 words) - 21:53, 5 August 2015
- |Image=Ransomware crimeware kits.png |Link=http://www.symantec.com/connect/blogs/ransomware-crimeware-kits857 bytes (127 words) - 21:49, 5 August 2015
- |Link=http://blogs.mcafee.com/mcafee-labs/ransomware-holds-up-victims |Abstract=The current “ransomware” campaign uses a novel approach to extort money from naive Internet users1,022 bytes (140 words) - 22:04, 5 August 2015
- |Image=fake-fbi-ransomware-analysis.png |Link=http://blogs.avg.com/news-threats/fake-fbi-ransomware-analysis/925 bytes (131 words) - 22:12, 5 August 2015
- ...ck. Very interesting, turns out this slightly modified ZeuS 2.x includes a ransomware feature. |Keyword=Ransomware,1 KB (192 words) - 11:52, 19 March 2016
- |Image=Ransomware Fake MSE.png |Link=http://www.malekal.com/2012/08/20/ransomware-fake-microsoft-security-essentials/1 KB (144 words) - 12:57, 31 July 2015
- |Link=http://www.malekal.com/2012/09/18/ransomware-trojan-casier-panel/ www.malekal.com381 bytes (40 words) - 16:28, 7 February 2015
- |Image=Ransomware and Silence Locker control panel.png |Link=http://www.symantec.com/connect/blogs/ransomware-and-silence-locker-control-panel1 KB (161 words) - 21:51, 5 August 2015
- |Abstract=This week, we have received a number of reports on yet another ransomware, BandarChor. This ransomware is not exactly fresh. The first infections that we've noticed related to th659 bytes (99 words) - 22:34, 10 August 2015
- ...=http://volatility-labs.blogspot.com.es/2012/09/movp-13-desktops-heaps-and-ransomware.html ...in alternate desktops (i.e. so the current logged-on user doesn't see) to ransomware that locks users out of their own desktop. We'll see some examples of both706 bytes (97 words) - 16:28, 7 February 2015
- ...our Cryptowall blogpost, we briefly mentioned the more advanced family of ransomware CTB-Locker, which uses elliptic curve cryptography for file encryption and This week, another ransomware emerged using the same cryptography for encryption. It was first spotted by857 bytes (124 words) - 15:21, 14 December 2014
- |Link=https://threatpost.com/samsam-ransomware-evolves-its-tactics-towards-targeting-whole-companies/131519/ ...ous tactics, SamSam operators are now launching thousands of copies of the ransomware at once into individual organizations, each of which has been carefully sel612 bytes (76 words) - 17:36, 1 May 2018
- |Group=Ransomware, Wiper,735 bytes (108 words) - 11:10, 23 March 2019
- ...tps://labsblog.f-secure.com/2016/03/21/the-graphic-design-of-maktub-locker-ransomware/ |Abstract=A new crypto-ransomware family calling itself “Maktub Locker” has emerged. Maktub is Arabic for325 bytes (36 words) - 11:27, 23 March 2016
- |Link=http://blog.trendmicro.com/trendlabs-security-intelligence/new-crypto-ransomware-emerge-in-the-wild/ |Abstract=Just like other ransomware variants, the Cryptoblocker malware, detected as TROJ_CRYPTFILE.SM, will en977 bytes (136 words) - 22:13, 5 August 2015
- |Link=http://blog.trendmicro.com/trendlabs-security-intelligence/jigsaw-ransomware-plays-games-victims/ ...ard, and a creepy one at that. We have recently encountered a nasty crypto-ransomware family called JIGSAW. Reminiscent to the horror film Saw, this malware toys769 bytes (110 words) - 10:03, 1 May 2016
- |Image=Ransomware gets professional targeting Switzerland Germany and Austria.png |Abstract=In March I blogged about a ransomware which has been targeting various countries, locking down the victims comput1 KB (176 words) - 21:29, 5 August 2015
- |Abstract=The Ransomware Casier (which is in my opinion the grand son of Goldenbaks ) has new clothe603 bytes (79 words) - 18:59, 7 February 2015
- |Link=http://blog.trendmicro.com/trendlabs-security-intelligence/reveton-ransomware-spreads-with-old-tactics-new-infection-method/ |Abstract=Similar to older REVETON or police ransomware variants, the recent wave of REVETON malware variants detected as TROJ_REVE1,005 bytes (141 words) - 15:29, 14 December 2014
Page text matches
- |Group=Ransomware, Cryptolocker |Link=https://www.bleepingcomputer.com/news/security/revil-ransomware-gangs-web-sites-mysteriously-shut-down/714 bytes (89 words) - 22:52, 14 July 2021
- |Link=http://blog.malwarebytes.org/intelligence/2013/07/fbi-ransomware-now-targeting-apples-mac-os-x-users/ ...inals, well known for not re-inventing the wheel, have ‘ported’ the latest ransomware Trojan to OS X, not by using some complicated exploit but rather leveraging423 bytes (52 words) - 22:54, 5 August 2015
- |Group=Ransomware, |Link=https://blog.trendmicro.com/trendlabs-security-intelligence/dharma-ransomware-uses-av-tool-to-distract-from-malicious-activities/848 bytes (108 words) - 16:13, 12 May 2019
- |Introduction=[[Silent Winlocker]] is a kit to create a police ransomware botnet. The versions range from 1 to 5. |Group=Police lock, Ransomware,268 bytes (34 words) - 15:50, 8 August 2015
- |Link=http://threatpost.com/critroni-crypto-ransomware-seen-using-tor-for-command-and-control/107306 ...des a number of unusual features and researchers say it’s the first crypto ransomware seen using the Tor network for command and control.636 bytes (89 words) - 22:10, 5 August 2015
- |Group=Ransomware, |Link=https://blog.malwarebytes.com/threat-analysis/2018/01/gandcrab-ransomware-distributed-by-rig-and-grandsoft-exploit-kits/913 bytes (125 words) - 15:03, 18 July 2018
- |Abstract=The objective of the mission is to make a complete analysis of a ransomware called Rannoh/Matsnu. The objective is to be able to understand how this ransomware works, to control if610 bytes (92 words) - 21:50, 5 August 2015
- |Link=https://www.bleepingcomputer.com/news/security/locky-ransomware-switches-to-the-lukitus-extension-for-encrypted-files/ ...u are infected with this ransomware, you are not infected with the Lukitus Ransomware, as some sites may call it. You are instead infected by Locky, which is usi684 bytes (92 words) - 18:27, 23 August 2017
- |Image=Ransomware and Silence Locker control panel.png |Link=http://www.symantec.com/connect/blogs/ransomware-and-silence-locker-control-panel1 KB (161 words) - 21:51, 5 August 2015
- |Image=fake-fbi-ransomware-analysis.png |Link=http://blogs.avg.com/news-threats/fake-fbi-ransomware-analysis/925 bytes (131 words) - 22:12, 5 August 2015
- |Link=https://www.proofpoint.com/us/threat-insight/post/cryptxxx-new-ransomware-actors-behind-reveton-dropping-angler ...s the number one exploit kit by volume, making the potential impact of new ransomware in the hands of experienced actors with access to this vector quite signifi1,008 bytes (138 words) - 22:34, 19 April 2016
- |Group=Ransomware,30 bytes (3 words) - 17:36, 1 May 2018
- |Group=Ransomware,30 bytes (3 words) - 23:12, 3 February 2017
- |Group=Ransomware,30 bytes (3 words) - 16:10, 12 May 2019
- |Link=https://www.bleepingcomputer.com/news/security/cerber-dominates-ransomware-landscape-after-lockys-demise/ ...Cerber ransomware family has risen to take Locky's place at the top of the ransomware mountain after new Locky versions stopped coming out last year, and spam op525 bytes (67 words) - 11:36, 16 April 2017
- |Group=Cryptolocker, Ransomware45 bytes (4 words) - 13:27, 11 July 2021
- {{Botnet|Group=Ransomware, Cryptolocker}}41 bytes (4 words) - 22:35, 18 July 2015
- |Group=Cryptolocker, Ransomware45 bytes (4 words) - 13:30, 11 July 2021
- |Group=Cryptolocker, Ransomware45 bytes (4 words) - 13:31, 11 July 2021
- |Group=Cryptolocker, Ransomware45 bytes (4 words) - 13:33, 11 July 2021