malware

MalwareBytesSecurity

Hancitor: fileless attack with a DLL copy trick

Credit to Author: Malwarebytes Labs| Date: Tue, 13 Mar 2018 16:00:00 +0000

Evading detection when distributing payloads is a key part of an effective malware campaign. Hancitor shows that it has yet another trick up its sleeve for that.

Categories:

Tags:

(Read more…)

The post Hancitor: fileless attack with a DLL copy trick appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Encryption 101: How to break encryption

Credit to Author: Vasilios Hioureas| Date: Tue, 06 Mar 2018 19:10:34 +0000

Continuing on in our Encryption 101 series, we now look at what it takes to break encryption. In order for something as powerful as encryption to break, there needs to be some kind of weakness to exploit. That weakness is often a result of an error in implementation.

Categories:

Tags:

(Read more…)

The post Encryption 101: How to break encryption appeared first on Malwarebytes Labs.

Read More
QuickHealSecurity

Beware! A new .Net Ransomware is encrypting files with .Lime

Credit to Author: Bajrang Mane| Date: Tue, 06 Mar 2018 11:49:53 +0000

Cases of the “Lime ransomware” have been recently reported to Quick Heal Security Labs. Our research team has analyzed these cases deeply and found some useful information. This post shares this information to help users stay safe from ransomware attacks. ‘Lime’ is a newly discovered .net ransomware; it is also…

Read More
MalwareBytesSecurity

Blast from the past: stowaway Virut delivered with Chinese DDoS bot

Credit to Author: hasherezade| Date: Thu, 01 Mar 2018 16:00:00 +0000

A recent Chinese drive-by attack dropped Virut, an ancient virus that’s been out of commission since 2013. So what was it doing in this modern attack?

Categories:

Tags:

(Read more…)

The post Blast from the past: stowaway Virut delivered with Chinese DDoS bot appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Encryption 101: ShiOne ransomware case study

Credit to Author: Vasilios Hioureas| Date: Wed, 28 Feb 2018 16:00:00 +0000

In this case study on ShiOne ransomware, part of our Encryption 101 series, we will be reviewing the encryption process line by line and showing the different methods ransomware can use to encrypt files.

Categories:

Tags:

(Read more…)

The post Encryption 101: ShiOne ransomware case study appeared first on Malwarebytes Labs.

Read More