How ransomware gangs are connected, sharing resources and tactics

Credit to Author: Malwarebytes Labs| Date: Mon, 12 Apr 2021 11:59:03 +0000

New research by Analyst1 sheds light on the cooperation between some of the ransomware gangs dominating the cybersecurity news.

Categories: Ransomware

Tags:

(Read more…)

The post How ransomware gangs are connected, sharing resources and tactics appeared first on Malwarebytes Labs.

Read more

Report goes “behind enemy lines” to reveal SilverFish cyber-espionage group

Credit to Author: Pieter Arntz| Date: Mon, 22 Mar 2021 11:42:16 +0000

PRODRAFT researchers have uncovered a sophisticated cyber-espionage group with links to SolarWinds and EvilCorps.

Categories: Reports

Tags:

(Read more…)

The post Report goes “behind enemy lines” to reveal SilverFish cyber-espionage group appeared first on Malwarebytes Labs.

Read more

Ryuk ransomware develops worm-like capability

Credit to Author: Pieter Arntz| Date: Tue, 02 Mar 2021 20:07:12 +0000

French researchers have found a Ryuk ransomware variant that can spread laterally through an infected network.

Categories: Malwarebytes news

Tags:

(Read more…)

The post Ryuk ransomware develops worm-like capability appeared first on Malwarebytes Labs.

Read more

Extortion, precision malware, and ruthless scams. Read the State of Malware 2021 report

Credit to Author: Malwarebytes Labs| Date: Tue, 16 Feb 2021 14:00:00 +0000

Through the chaos and devastation of 2020, one form of business seems to have thrived—the creation and operation of malicious software.

Categories: Reports

Tags:

(Read more…)

The post Extortion, precision malware, and ruthless scams. Read the State of Malware 2021 report appeared first on Malwarebytes Labs.

Read more

What tracking an attacker email infrastructure tells us about persistent cybercriminal operations

Credit to Author: Eric Avena| Date: Mon, 01 Feb 2021 17:00:06 +0000

Sweeping research into massive attacker infrastructures, as well as our real-time monitoring of malware campaigns and attacker activity, directly inform Microsoft security solutions, allowing us to build or improve protections that block malware campaigns and other email threats, both current and future, as well as provide enterprises with the tools for investigating and responding to email campaigns in real-time.

The post What tracking an attacker email infrastructure tells us about persistent cybercriminal operations appeared first on Microsoft Security.

Read more

A week in security (January 25 – January 31)

Credit to Author: Malwarebytes Labs| Date: Mon, 01 Feb 2021 10:15:34 +0000

A privacy week special on Malwarebytes Labs with a special episode of our Lock & Code podcast, FLoC, Grindr, Emotet, and more.

Categories: A week in security

Tags:

(Read more…)

The post A week in security (January 25 – January 31) appeared first on Malwarebytes Labs.

Read more

International Action Targets Emotet Crimeware

Credit to Author: BrianKrebs| Date: Wed, 27 Jan 2021 14:20:16 +0000

Authorities across Europe on Tuesday said they’d seized control over Emotet, a prolific malware strain and cybercrime-as-service operation. Investigators say the action could help quarantine more than a million Microsoft Windows systems currently compromised with malware tied to Emotet infections.

Read more

The story of ZeroLogon

Credit to Author: Pieter Arntz| Date: Tue, 19 Jan 2021 18:37:09 +0000

ZeroLogon is a treasure for cybercriminals, an ongoing struggle for Microsoft, and a headache for everyone caught in the middle.

Categories: Exploits and vulnerabilities

Tags:

(Read more…)

The post The story of ZeroLogon appeared first on Malwarebytes Labs.

Read more