
LokiBot: If not stealing, then extorting
This versatile mobile banking Trojan morphs into ransomware on detecting a removal attempt.
167 articles
This versatile mobile banking Trojan morphs into ransomware on detecting a removal attempt.
The post is being updated as our experts find new details on the malware.
We’ve already seen two large-scale ransomware attacks this year — we’re talking about the infamous WannaCry and ExPetr (also known as Petya and NotPetya). It seems that a third attack is on the rise: The new malware is called Bad Rabbit — at least, that’s the name indicated by the darknet website linked in the ransom note.
A new blocker called nRansom locks users out of their computers and demands not money, but nude pictures.
Living online is more comfortable than ever — do you really still need a helmet?
Global IT security problems like the recent Petya attack are of clear concern to large corpora-tions — but they affect common people as well.
Just a few hours ago, a global ransomware outbreak began, and it looks to be as big as the WannaCry story that broke not so long ago.
By now, everyone has heard about the WannaCry ransomware attack. So far we have two posts about it: one with a general overview of what happened, and another with advice
The outbreak of Trojan ransomware WannaCry has already caused a heap of trouble to all kinds of businesses. However, we expect that companies whose infrastructures employ embedded systems are feeling
The unprecedented outbreak of Trojan ransomware WannaCry has created a worldwide plague affecting home users and businesses. We have already posted some basics about WannaCry, and in this post we
A few days ago, an outbreak of the Trojan encryptor WannaCry started. It appears that the epidemic is global. We call it an epidemic since the extent of it is
The annual RSA conference will often overwhelm the average attendee. Between the great talks, the exhibition hall, the parties, and the city of San Francisco itself, there is a whole
One day in May 2016, Marion, a computer user from Germany, logged on to her home computer. She had no idea what lay in store for her. The first sign
People are downloading a new app, looking to get free access to Netflix accounts. What they’re actually getting is a malware strain called Netix that encrypts users’ data and demands $100 in
In April 2016 a young and ambitious trojan cryptor known by the name CryptXXX was released. It was distributed by the infamous Angler and Neutrino exploit kits. It’s creators certainly
It feels good when something you created does better than expected. When we posted recently about the NoMoreRansom project, which started as a joint initiative of Europol, the Netherlands police,
This post is intended for people who either never heard of ransomware or knew about it but didn’t really pay attention. We will explain in practical, down-to-earth language what ransomware
Imagine that your computer suddenly shows you a disturbing message: “It’s FBI. Illegal content has been detected on your device. You’ll be arrested for 20 years and fined for $200,000
In February 2016, another new strain of ransomware hit the scene, its name akin to what many victims feel when they are hit with ransomware – Crysis. Over the past nine months,
This article might save you some $300. That’s the average ransom extortionists ask their victims to pay to restore access to victims’ encrypted files or locked computers. It’s quite easy
Usually when we talk about encryptor ransomware, we recommend that victims do not pay the ransom. To begin with, paying encourages malware creators to continue their operations. It’s simple supply
It’s no secret: ransomware is a painful threat. And it’s not going to disappear anytime soon — with a few exceptions, of course. Good news: This is the story of one