HackDig : Dig high-quality web security articles for hacker

Cerber Version 6 Shows How Far the Ransomware Has Come (and How Far it’ll Go)

Additional analysis/insights by Alfredo Oliveira A little over a year after its first variants were found in the wild, Cerber (Detected by Trend Micro as RANSOM_CERBER family) now has the reputation for being the most prolific family of ransomware in the threat landscape. Since it first emerged in Russian underground marketplaces in March, 2016, Cerber has s
Publish At:2017-05-03 02:15 | Read:3231 | Comments:0 | Tags:Ransomware CERBER crypto-ransomware

Why These Online Criminals Actually Care About Your Convenience

  Get an inside view of ransomware in our new report: Evaluating the Customer Journey of Crypto-Ransomware   Customer service is not normally something associated with the perpetrators of crime. But crypto-ransomware, the digital demon that has been crippling businesses and plaguing consumers and has been referred to as an “epidemic”
Publish At:2016-07-19 01:50 | Read:3637 | Comments:0 | Tags:Security crypto-ransomware cybercrime ransomware

Chimera Crypto-Ransomware Wants You (As the New Recruit)

Victim or potential business partner? That’s the question raised by the crypto-ransomware named Chimera (Ransom_CRYPCHIM.A). At first glance, it might seem like your typical crypto-ransomware. However, there are three things that make Chimera stand out. Online Extortion The first is the threat of exposure: Chimera not only encrypts files, it also threatens t
Publish At:2015-12-04 06:25 | Read:2447 | Comments:0 | Tags:Malware chimera crypto-ransomware online extortion ransomwar

Chimera Ransomware Promises to Publish Encrypted Data Online

Ransomware continues to elevate itself as perhaps the most worrisome crossover threat affecting consumers and businesses.Already this week, we’ve had an update to the dangerous Cryptowall family of malware that includes new encryption features making that strain of ransomware harder to decrypt. This news came on the heels of a summer-long adoption of C
Publish At:2015-11-06 21:50 | Read:2441 | Comments:0 | Tags:Cryptography Malware Privacy Ransomware Anti-Botnet Advisory

Updated Cryptowall Encrypts File Names, Mocks Victims

Cryptowall has gotten a minor, but important facelift that might make it more difficult for researchers to tear apart and for victims to recover their encrypted data without paying a ransom.Spotted two days ago, the latest update to the ransomware has begun not only encrypting data on victims’ machines, but also file names, a first according to indepen
Publish At:2015-11-06 03:50 | Read:2086 | Comments:0 | Tags:Cryptography Malware Privacy Ransomware Bleeping Computer Cr

TorrentLocker Surges in the UK, More Social Engineering Lures Seen

Analysis and data by Paul Pajares (Fraud Analyst) and Jon Oliver (Senior Architect) We’ve noticed a recent increase in TorrentLocker-related emails being sent to users in several countries, particularly the United Kingdom and Turkey. From the latter half of May until June 10, there was a relative lull in TorrentLocker-related emails. However, over a pe
Publish At:2015-07-02 15:45 | Read:3978 | Comments:0 | Tags:Bad Sites Malware crypto-ransomware cybercrime ransomware

Magnitude Exploit Kit Uses Newly Patched Adobe Vulnerability; US, Canada, and UK are Most At Risk

Adobe may have already patched a Flash Player vulnerability last week, but several users—especially those in the US, Canada, and the UK —are still currently exposed and are at risk of getting infected with CryptoWall 3.0. The Magnitude Exploit Kit included an exploit, detected as SWF_EXPLOIT.MJTE, for the said vulnerability, allowing attackers to spread cryp
Publish At:2015-06-16 22:15 | Read:3091 | Comments:0 | Tags:Exploits Malware Vulnerabilities Adobe crypto-ransomware Cry

Fiesta Exploit Kit Spreading Crypto-Ransomware – Who Is Affected?

Exploits kits have long been used to deliver threats to users, but they seem to have gone retro: it was recently being used to deliver fake antivirus malware. We closely monitor exploit kit activity because of their widespread use (we discussed their use in malvertising recently), so it was no great surprise to see the Fiesta exploit kit being used to delive
Publish At:2015-04-20 16:50 | Read:2707 | Comments:0 | Tags:Malware crypto-ransomware fake antivirus Fiesta exploit kit

Crypto-Ransomware Sightings and Trends for 1Q 2015

It seems that cybercriminals have yet to tire of creating crypto-ransomware malware. Since the start of 2015, we have spotted several variants of crypto-ransomware plague the threat landscape. In January, the Australia-New Zealand region was beset by variants of TorrentLocker. But we soon discovered that TorrentLocker infections were not limited to that regi
Publish At:2015-04-01 06:05 | Read:2391 | Comments:0 | Tags:Malware CRYPAURA crypto-ransomware CryptoFortress file encry

CryptoWall 3.0 Ransomware Partners With FAREIT Spyware

Crypto-ransomware is once again upping the ante with its routines. We came across one crypto-ransomware variant that’s combined with spyware—a first for crypto-ransomware. This development just comes at the heels of the discovery that ransomware has included file infection to its routines. CryptoWall 3.0 We first encountered CryptoWall as the payload o
Publish At:2015-03-20 05:35 | Read:3234 | Comments:0 | Tags:Malware crypto-ransomware CryptoWall FAREIT file encryption

CryptoLocker Variant Coming After Gamers

Gamers may soon be feeling the pain of crypto-ransomware.A variant of CryptoLocker is in the wild that goes after data files associated with 20 different online games, locking downloadable content in an attempt to target younger computer users. Researchers at Bromium today said an unnamed compromised website is serving the malware. Victims are redirected
Publish At:2015-03-12 16:55 | Read:3058 | Comments:0 | Tags:Cryptography Malware Web Security Angler Exploit Kit Bromium

Notorious Malware Improvements and Enhancements of 2014

2014 was a year that was marked with numerous changes in the threat landscape. We saw a lot of improvements in existing malware, either with new evasion techniques or versions. We even saw some old techniques and attacks resurface in the landscape. Evasion Tactics We are seeing more malware incorporate Tor in their routines as a method of evasion. We have se
Publish At:2015-02-23 16:25 | Read:3566 | Comments:0 | Tags:Malware 2014 64-bit malware crypto-ransomware iOS Mac OS mac

CTB-Locker Ransomware Spoofs Chrome and Facebook Emails as Lures, Linked to Phishing

We recently talked about recent improvements to the CTB-Locker ransomware. To recap, the malware now offers a “free decryption” service, extended deadline to decrypt the files, and an option to change the language of the ransom message. We are seeing another wave of CTB-Locker ransomware making their way into the wild. What’s highly notable about this curren
Publish At:2015-02-12 12:15 | Read:3314 | Comments:0 | Tags:Malware crypto-ransomware ctb-locker CTB-Locker ransomware F

CTB-Locker Ransomware Includes Freemium Feature, Extends Deadline

Last July we came across a crypto-ransomware variant known as Critroni or Curve-Tor-Bitcoin (CTB) Locker. We observed recent improvements to the CTB malware, which now offer a “free decryption” service, extended deadline to decrypt the files, and an option to change the language of the ransom message. These new variants also demand payment of 3 B
Publish At:2015-01-21 19:15 | Read:4662 | Comments:0 | Tags:Bad Sites Malware bitcoin crypto-ransomware ctb-locker

Recent Crypto-Ransomware Attacks: A Global Threat

We noticed a recent influx of crypto-ransomware spreading in Australia. This recent wave rings similar to the hike of infections in the Europe/Middle East/Africa (EMEA) region we wrote about in early December. Upon further research and analysis, we concluded that the attackers behind these incidents could possibly belong to the same cybercriminal gang due to
Publish At:2015-01-14 11:30 | Read:3091 | Comments:0 | Tags:Malware crypto-ransomware TorrentLocker

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud