HackDig : Dig high-quality web security articles for hacker

Security in Dog Years, Malware Analysis in Minutes

A few weeks ago, the security community had its security blanket ripped firmly away as the WannaCry ransomware ripped through hospitals, rail systems, telecommunication companies and more as it made its way around the globe. While the dust settles and researchers figure out the initial infection vector and develop recommendations for preventing future inci
Publish At:2017-06-01 11:15 | Read:4640 | Comments:0 | Tags:Incident Response Malware Threat Intelligence Advanced Malwa

The Day the Earth Stood Still for CryptoWall

It’s been the norm in the cybersecurity industry to be intrigued and at the same time be infuriated by the people behind any successful large-scale malware attack. Ransomware is one such example. It’s been slowly released in the wild since the early 2009, but CryptoWall redefined the meaning of ransomware and took it to the next level. Early ransomware used
Publish At:2016-11-21 23:35 | Read:3340 | Comments:0 | Tags:Featured antivirus CryptoWall malware ransomware ThreatSecur

A Close Look at TeslaCrypt 3.0 Ransomware

TeslaCrypt is yet another ransomware taking the cyber world by storm. It is mostly distributed via a spear phishing email and through the Angler exploit kit. The Angler exploits vulnerability in Adobe Flash. The Angler exploit downloads a variant of the ransomware upon success. TeslaCrypt 3.0 possesses various updates, one of which renders encrypted files ir
Publish At:2016-11-21 23:35 | Read:4898 | Comments:0 | Tags:Featured CryptoWall Ranswomare TeslaCrypt

Ransomware dominates the threat landscape

Ransomware! Ransom Software! Encrypting Ransomware! AHHH! No doubt the last year exposed you to this term numerous times and I doubt any of it was in reference to a good event. So, you might wonder why you have been hearing about it so much, truth be told Ransomware has been a pain in the side of computer security folks for nearly four years now. But it feel
Publish At:2016-06-07 23:00 | Read:4630 | Comments:0 | Tags:Cybercrime Malware cryptolocker cryptowall cryptxxx malverti

Admedia attacks now rely also on Joomla to serve ransomware

Operators running websites based on the WordPress and Joomla must be aware of a spike in the number of compromised platforms used in Admedia attacks. Not only WordPress CMS, threat actors behind the “Admedia attacks” are now looking with increasing interest to Joomla. This is the discovery made by the experts at the Internet Storm Center (ISC) th
Publish At:2016-02-22 15:20 | Read:3612 | Comments:0 | Tags:Breaking News Cyber Crime Malware Angler exploit kit CryptoW

Emergency. Hundreds of compromised WordPress sites serve TeslaCrypt ransomware

Operators running websites based on the WordPress must be aware of a spike in the number of compromised platforms used to deliver the TeslaCrypt ransomware. Administrators running websites based on the popular WordPress CMS must be aware of a spike in hacks that are resulting in the silent delivery of ransomware to the visitors. According to the experts at t
Publish At:2016-02-06 01:25 | Read:4040 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware CryptoWall Cybercr

CryptoWall 4 Targets Booking.com Customers

ThreatTrack Security Labs researchers caught wind of a phishing email masking itself as a Booking.com email. The malware-disguised email includes an “E-TICKET_CONFIRM.doc” attachment that, once downloaded, walks the user through steps to enable embedded macro codes that infect the computer with CryptoWall. CryptoWall 4 masked as a Bookings.com email. How It
Publish At:2016-01-29 04:50 | Read:4121 | Comments:0 | Tags:ThreatTrack Security Labs CryptoWall cybersecurity ransomwar

A Peek Behind the Cryptowall

Bridging static and dynamic analysis using Lastline process snapshottingAuthored by: Arunpreet Singh and Dr. Christopher Kruegel Scareware is a type of malware that takes advantage of people’s fear of revealing their private information, losing their critical data, or facing irreversible hardware damage. Ransomware is a particular cla
Publish At:2016-01-28 19:35 | Read:3876 | Comments:0 | Tags:Sandboxing FUSE APT Just-In-Time Decryption Cryptowall Ranso

Malvertising Campaign via Pop-under Ads Sends CryptoWall 4

We have caught a new malvertising campaign on the PopAds network launching the Magnitude exploit kit via pop-under ads. A pop-under is an ad window that appears behind the main browser window and typically remains open until the user manually closes it. Unsuspecting victims running outdated versions of the Flash Player were immediately infected with the Cryp
Publish At:2016-01-08 02:45 | Read:3934 | Comments:0 | Tags:Malvertising ads cryptowall exploit kit malvertising

Angler Exploit Kit Using Drive-By Campaigns to Drop CryptoWall 4.0 Ransomware

Earlier this fall, researchers struck a significant blow against the Angler Exploit Kit.Security blogger Graham Cluley explains in a blog post how analysts with Cisco’s Talos Security Intelligence and Research Group analyzed the exploit kit and traced one of the primary locations for its proxy servers back to Limestone Networks located in Dallas, TX. After s
Publish At:2015-12-07 16:55 | Read:4343 | Comments:0 | Tags:Featured Articles IT Security and Data Protection Angler Kit

Angler Exploit Kit Spreading Cryptowall 4.0 Ransomware

As expected, it didn’t take long for one of the most popular exploit kits, Angler, to start spreading the latest iteration of Cryptowall ransomware.A drive-by campaign that uses a one-two punch to drop Cryptowall 4.0 has been observed in the wild this week, according to researchers at Heimdal Security. First, the password stealing malware Pony is dro
Publish At:2015-12-03 05:35 | Read:2842 | Comments:0 | Tags:Malware Ransomware angler Cryptowall Cryptowall 4.0 exploit

Crooks use the Nuclear Exploit Kit to serve CryptoWall 4.0

The popular Nuclear Exploit Kit has been used for the first time to serve the ransomware CryptoWall 4.0. The Nuclear exploit kit is one of the privileged weapon in the arsenal of cyber criminal groups, now the popular crimeware kit has been used to serve the ransomware CryptoWall 4.0. In the past, criminal crews used the explo
Publish At:2015-11-27 05:35 | Read:3787 | Comments:0 | Tags:Breaking News Cyber Crime Malware CryptoWall CryptoWall 4.0

Cryptowall 4.0 comes from Russia, Bitdefender released a vaccine

Security experts at Bitdefender speculate that the newborn Cryptowall 4.0 has a Russian origin. The company released a vaccine software. Security experts at Bitdefender seem to have no doubt, the authors of the last variant of the popular Cryptowall ransomware, Cryptowall 4.0 are Russians. The experts came to this conclusion t
Publish At:2015-11-09 22:30 | Read:2491 | Comments:0 | Tags:Breaking News Cyber Crime Malware CryptoWall CryptoWall 4.0

Booming crypto ransomware industry employs new tricks to befuddle victims

Ransomware that uses strong cryptography to hold entire hard drives' worth of data hostage keeps getting nastier, as criminals attempt to find new ways to extort more people into paying increasingly hefty ransoms to recover their files.A case in point is Chimera, a relative newcomer to the crypto ransom racket that targets primarily businesses. In an attempt
Publish At:2015-11-06 18:35 | Read:4668 | Comments:0 | Tags:Law & Disorder Risk Assessment Technology Lab crypto ransomw

Updated Cryptowall Encrypts File Names, Mocks Victims

Cryptowall has gotten a minor, but important facelift that might make it more difficult for researchers to tear apart and for victims to recover their encrypted data without paying a ransom.Spotted two days ago, the latest update to the ransomware has begun not only encrypting data on victims’ machines, but also file names, a first according to indepen
Publish At:2015-11-06 03:50 | Read:2242 | Comments:0 | Tags:Cryptography Malware Privacy Ransomware Bleeping Computer Cr

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud