Threat analysis

MalwareBytesSecurity

‘FakeUpdates’ campaign leverages multiple website platforms

Credit to Author: Jérôme Segura| Date: Tue, 10 Apr 2018 15:00:00 +0000

Browser update? Do not trust, and do verify before downloading potential malware.

Categories:

Tags:

(Read more…)

The post ‘FakeUpdates’ campaign leverages multiple website platforms appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

LockCrypt ransomware: weakness in code can lead to recovery

Credit to Author: Malwarebytes Labs| Date: Wed, 04 Apr 2018 15:00:54 +0000

A lesser-known variant called LockCrypt ransomware has been creeping around under the radar since June 2017. We take a look inside its code and expose its flaws.

Categories:

Tags:

(Read more…)

The post LockCrypt ransomware: weakness in code can lead to recovery appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Exploit kits: Winter 2018 review

Credit to Author: Jérôme Segura| Date: Thu, 29 Mar 2018 15:00:00 +0000

In this Winter 2018 review, we check the pulse of exploit kits and their latest developments.

Categories:

Tags:

(Read more…)

The post Exploit kits: Winter 2018 review appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

An in-depth malware analysis of QuantLoader

Credit to Author: Malwarebytes Labs| Date: Wed, 28 Mar 2018 16:00:00 +0000

QuantLoader is a Trojan downloader that has been used in campaigns serving a range of malware, including ransomware, Banking Trojans, and RATs. In this post, we’ll take a high-level look at the campaign flow, as well as a deep dive into how the malware executes.

Categories:

Tags:

(Read more…)

The post An in-depth malware analysis of QuantLoader appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Encryption 101: Decryptor’s thought process

Credit to Author: Vasilios Hioureas| Date: Tue, 27 Mar 2018 15:00:00 +0000

In the previous parts 1, 2 and 3 of this series, we covered the basics of encryption, walked through a live example of a ransomware in detail, and talked about encryption weaknesses. In this part of the encryption 101 series, we will begin wrapping it up by going into detail on a ransomware with weak…

Categories:

Tags:

(Read more…)

The post Encryption 101: Decryptor’s thought process appeared first on Malwarebytes Labs.

Read More
MalwareBytesSecurity

Malicious cryptomining and the blacklist conundrum

Credit to Author: Jérôme Segura| Date: Mon, 26 Mar 2018 15:00:00 +0000

When threat actors take to free and disposable cloud services, the battle against malicious cryptomining becomes a lot more difficult.

Categories:

Tags:

(Read more…)

The post Malicious cryptomining and the blacklist conundrum appeared first on Malwarebytes Labs.

Read More