javascript

RAA Ransomware – Born From JavaScript

RAA is a brand new ransomware family which uses only JavaScript code to infect computers and encrypt their data In fact, RAA is not the first JS-based ransomware threat, however, it is...
ftp

Vulnerable FTP Servers Spread PhotoMiner Worm

Recently, it has become clear that PhotoMiner worm gets distributed via vulnerable FTP servers, infects public Web pages, spreads to Windows computers and sets up a mining process for the Monero...
smart tv

Got Android Smart TV? Prepare to Pay the Ransom!

The threat called FLocker (short for “Frantic Locker”) has been on the scene for a year already, and its creators are trying hard to keep it alive. Usually, Flocker is delivered...
bolek

Meet Bolek – a Self-spreading Successor of the Famous Zeus Trojan

Bolek is a new banking trojan which has arised from the leaked source code of Carberp and Zeus banking trojans. The developers of malware have combined their codes to create a...
gaming

Fake Gaming Torrents Campaign Spreads Malicious PUPs

Security experts from Symantec warn PC users of an ongoing malware distribution campaign which leverages interest in gaming piracy to install PUPs (Potentially Unwanted Programs) on users' PCs.The company reports that...
cryptxxx

CryptXXX Dumps Angler, Switches To Neutrino Exploit Kit

Researchers from SANS Internet Storm Center reported that the developers of CryptXXX 3.100 ransomware have switched its distribution from the Angler Exploit Kit to the Neutrino Exploit Kit.“This is not the...
online banking

Vawtrak Banking Malware Gets Stronger

About two years ago, SophosLabs published a paper entitled Vawtrak – International Crimeware-as-a-Service. The paper explained how hackers have adopted the “Pay As You Go” model which has become very popular...
necurs botnet

Dridex And Locky Spam Cut Off By Necurs Botnet

Necurs botnet has been classified as the largest malware distribution botnet today. However, it looks like the botnet is currently facing some technical problems and this downtime leads to a huge...
google chrome

Chrome PDF Reader’s Bug Allows Arbitrary Code Execution

Often, vulnerabilities in software are due to faulty implementations of elements developed by other code writers.CVE-2016-1681, the heap-based buffer overflow vulnerability affecting PDFium, the default PDF reader that is included in...
ultracrypter key

Do Not Pay UltraCrypter Ransom, You Will Never Get the Decryption Key

CryptXXX ransomware is in the spotlight again after the news that the decryption services on its payment website was not working properly. At the same time, Jigsaw ransomware, which is known...