Encryption 101: Decryptor’s thought process

Credit to Author: Vasilios Hioureas| Date: Tue, 27 Mar 2018 15:00:00 +0000

In the previous parts 1, 2 and 3 of this series, we covered the basics of encryption, walked through a live example of a ransomware in detail, and talked about encryption weaknesses. In this part of the encryption 101 series, we will begin wrapping it up by going into detail on a ransomware with weak…

Categories:

Tags:

(Read more…)

The post Encryption 101: Decryptor’s thought process appeared first on Malwarebytes Labs.

Read more

A week in security (August 28 – September 3)

Credit to Author: Malwarebytes Labs| Date: Mon, 04 Sep 2017 17:00:53 +0000

Last week, we looked at what actions Kronos can perform in the final installment of a 2-part post. We also dived into Locky, again, a ransomware that just made a comeback, and found that its latest variant (as of this writing) has anti-sandboxing capabilities. This means that once Locky has determined that it’s residing in…

Categories:

Tags:

(Read more…)

The post A week in security (August 28 – September 3) appeared first on Malwarebytes Labs.

Read more