<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=439793516377641&amp;ev=PageView&amp;noscript=1">

CATEGORY ARCHIVES: security

Apple vs the FBI: Tech CEO Viewpoint

The FBI postponed a planned showdown with Apple saying it may not need the phone manufacturer’s help after all to gain access to information on an iPhone.

Read More

Share this:

Poseidon Has Taken Up Spearfishing

 

Read More

Share this:

The Many Heads of Ransomware: HydraCrypt New to the Scene

HydraCrypt is a new ransomware recently discovered by McAfee. Like some previous ransomware variants, HydraCrypt is distributed using the Angler exploit kit. HydraCrypt encrypts a victim’s files and appends the filenames with the extension “hydracrypt_ID_<8 random characters>”.

Read More

Share this:

Vipasana Ransomware Encrypts Offline

Vipassana is a form of meditation, not to be confused with Vipasana--a new Russian ransomware that emerged in December 2015.

Read More

Share this:

New: Chuingam/Xwin Ransomware

Chuingam, also called Xwin, is a new ransomware that is distributed via email containing a file attachment about "payment transfers." The file has a .cmd extension and is actually just an executable, so when the victim opens the file they get an error window and the malware starts downloading itself onto the computer.

Read More

Share this:

FBI: Ransomware on the Rise

According to the Wall Street Journal, the FBI is once again warning that ransomware is on the rise. The FBI made a similar statement in January 2015. This latest FBI message says it will be on the rise in 2016.

Read More

Share this:

ThreatSTOP Report: BlackEnergy

Attacks on critical infrastructure are a top concern for government officials and the private sector alike. The ramifications of losing power can be life threatening and have a negative impact on operations of businesses and public services.

Read More

Share this:

Locky, Not to be Confused with Lucky

 

Read More

Share this:

Don't Fall Prey to Ransomware

Ransomware is an ingenious method used by criminals to extract money from their victims. The basic scenario is:

Read More

Share this:

I Smell a (Trochulis) RAT

BACKGROUND

Read More

Share this:

Home Page

OTHER THREATSTOP OUTLETS

  1. ThreatSTOP on YouTube
  2. ThreatSTOP on Twitter