{"id":6871,"date":"2017-03-06T11:10:11","date_gmt":"2017-03-06T19:10:11","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/03\/06\/news-662\/"},"modified":"2017-03-06T11:10:11","modified_gmt":"2017-03-06T19:10:11","slug":"news-662","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/03\/06\/news-662\/","title":{"rendered":"Malwarebytes Labs Presents: The Cybercrime Tactics and Techniques Report"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 06 Mar 2017 18:04:31 +0000<\/strong><\/p>\n<p>Last year was interesting for malware distribution and development. While we still experienced a flood of ransomware and immense distribution of malware using malspam\/phishing\/exploit kits, some major players, such as TeslaCrypt and Angler EK, vanished, while some new names dominated.<\/p>\n<p><iframe  src='https:\/\/www.youtube.com\/embed\/H_P_tvmZxn0?version=3&#038;rel=1&#038;fs=1&#038;autohide=2&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;wmode=transparent' width=\"100%\" height=\"420\" frameborder=\"0\" ><\/iframe> <\/p>\n<p>In our first wrap-up of the threat landscape, we are going to cover the trends observed during the last few months of 2016, provide\u00a0an analyst\u2019s view of the threats, and offer some predictions for the beginning of 2017. Moving forward, every quarter we will bring you a view of the threat landscape through the eyes of Malwarebytes researchers and analysts.<\/p>\n<h3 style=\"text-align: center\"><a href=\"https:\/\/malwarebytes.box.com\/s\/l06xnf05nd9enqfrg1pya4mtbpw98bdv\" target=\"_blank\">READ THE FULL REPORT HERE<\/a><\/h3>\n<p>Thanks for reading and safe surfing!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/03\/malwarebytes-labs-presents-cybercrime-tactics-techniques-report\/\">Malwarebytes Labs Presents: The Cybercrime Tactics and Techniques Report<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/03\/malwarebytes-labs-presents-cybercrime-tactics-techniques-report\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 06 Mar 2017 18:04:31 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/03\/malwarebytes-labs-presents-cybercrime-tactics-techniques-report\/' title='Malwarebytes Labs Presents: The Cybercrime Tactics and Techniques Report'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2016\/04\/MB_LABS-01.png' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>In our first wrap-up of the threat landscape, we are going to cover the trends observed during the last few months of 2016, provide an analyst\u2019s view of the threats, and offer some predictions for the beginning of 2017. Moving forward, every quarter we will bring you a view of the threat landscape through the eyes of Malwarebytes researchers and analysts.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/malware-threat-analysis\/\" rel=\"category tag\">Malware<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/2016\/\" rel=\"tag\">2016<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ad-fraud\/\" rel=\"tag\">ad fraud<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cerber\/\" rel=\"tag\">cerber<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cybercrime\/\" rel=\"tag\">cybercrime<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/kovter\/\" rel=\"tag\">kovter<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/locky\/\" rel=\"tag\">Locky<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malwarebytes-labs\/\" rel=\"tag\">malwarebytes labs<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/predictions\/\" rel=\"tag\">predictions<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransomware\/\" rel=\"tag\">ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/report\/\" rel=\"tag\">report<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trends\/\" rel=\"tag\">trends<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/03\/malwarebytes-labs-presents-cybercrime-tactics-techniques-report\/' title='Malwarebytes Labs Presents: The Cybercrime Tactics and Techniques Report'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/03\/malwarebytes-labs-presents-cybercrime-tactics-techniques-report\/\">Malwarebytes Labs Presents: The Cybercrime Tactics and Techniques Report<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[2244,10499,10905,4503,10878,10795,3764,11530,4312,3765,11531,10494,11532],"class_list":["post-6871","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-2244","tag-ad-fraud","tag-cerber","tag-cybercrime","tag-kovter","tag-locky","tag-malware","tag-malwarebytes-labs","tag-predictions","tag-ransomware","tag-report","tag-threat-analysis","tag-trends"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6871","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6871"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6871\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6871"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}