Ryuk ransomware develops worm-like capability

Credit to Author: Pieter Arntz| Date: Tue, 02 Mar 2021 20:07:12 +0000

French researchers have found a Ryuk ransomware variant that can spread laterally through an infected network.

Categories: Malwarebytes news

Tags:

(Read more…)

The post Ryuk ransomware develops worm-like capability appeared first on Malwarebytes Labs.

Read more

Talking Emotet’s takedown with Adam Kujawa: Lock and Code S02E02

Credit to Author: Malwarebytes Labs| Date: Mon, 15 Feb 2021 17:21:57 +0000

This week on Lock and Code, we talk to Adam Kujawa, security evangelist and director of Malwarebytes Labs, about the dangerous malware Emotet

Categories: Podcast

Tags:

(Read more…)

The post Talking Emotet’s takedown with Adam Kujawa: Lock and Code S02E02 appeared first on Malwarebytes Labs.

Read more

Extortion, precision malware, and ruthless scams. Read the State of Malware 2021 report

Credit to Author: Malwarebytes Labs| Date: Tue, 16 Feb 2021 14:00:00 +0000

Through the chaos and devastation of 2020, one form of business seems to have thrived—the creation and operation of malicious software.

Categories: Reports

Tags:

(Read more…)

The post Extortion, precision malware, and ruthless scams. Read the State of Malware 2021 report appeared first on Malwarebytes Labs.

Read more

Talking Emotet’s takedown with Adam Kujawa: Lock and Code S02E01

Credit to Author: Malwarebytes Labs| Date: Mon, 15 Feb 2021 17:21:57 +0000

This week on Lock and Code, we talk to Adam Kujawa, security evangelist and director of Malwarebytes Labs, about the dangerous malware Emotet

Categories: Podcast

Tags:

(Read more…)

The post Talking Emotet’s takedown with Adam Kujawa: Lock and Code S02E01 appeared first on Malwarebytes Labs.

Read more

What tracking an attacker email infrastructure tells us about persistent cybercriminal operations

Credit to Author: Eric Avena| Date: Mon, 01 Feb 2021 17:00:06 +0000

Sweeping research into massive attacker infrastructures, as well as our real-time monitoring of malware campaigns and attacker activity, directly inform Microsoft security solutions, allowing us to build or improve protections that block malware campaigns and other email threats, both current and future, as well as provide enterprises with the tools for investigating and responding to email campaigns in real-time.

The post What tracking an attacker email infrastructure tells us about persistent cybercriminal operations appeared first on Microsoft Security.

Read more

A week in security (January 25 – January 31)

Credit to Author: Malwarebytes Labs| Date: Mon, 01 Feb 2021 10:15:34 +0000

A privacy week special on Malwarebytes Labs with a special episode of our Lock & Code podcast, FLoC, Grindr, Emotet, and more.

Categories: A week in security

Tags:

(Read more…)

The post A week in security (January 25 – January 31) appeared first on Malwarebytes Labs.

Read more

Cleaning up after Emotet: the law enforcement file

Credit to Author: Threat Intelligence Team| Date: Fri, 29 Jan 2021 19:31:58 +0000

Following global law enforcement action to take over the Emotet botnet, a special update is being sent to clean up infected machines.

Categories: MalwareThreat analysis

Tags:

(Read more…)

The post Cleaning up after Emotet: the law enforcement file appeared first on Malwarebytes Labs.

Read more

Pow! Emotet’s down. Is it out?

Credit to Author: Malwarebytes Labs| Date: Wed, 27 Jan 2021 19:19:58 +0000

The the world’s most dangerous malware has suffered a serious blow in a coordinated strike by multiple law enforcement agencies.

Categories: MalwareMalwarebytes news

Tags:

(Read more…)

The post Pow! Emotet’s down. Is it out? appeared first on Malwarebytes Labs.

Read more