Security Alerts & News
by Tymoteusz A. Góral

History
#1384 Locky ransomware now downloaded as encrypted DLLs
The Locky ransomware family has emerged as one of the most prominent ransomware families to date, being sold in the Brazilian underground and spreading via various exploits. Locky has, over time, become known for using a wide variety of tactics to spread–including macros, VBScript, WSF files, and now, DLLs.

Recently we encountered a new Locky variant (detected as RANSOM_LOCKY.F116HM) that used old tactics on the surface, but with some key technical changes. The emails that were used to distribute it were fairly pedestrian as far as these messages go, although it was part of a large-scale spam campaign.
Read more
#1387 BASHLITE family of malware infects 1 million IoT devices
#1386 Officials blame “sophisticated” Russian hackers for voter system attacks
#1385 How tech is helping a casino catch the cheats (VIDEO)
#1384 Locky ransomware now downloaded as encrypted DLLs
#1383 FBI detects breaches in US state voting systems
#1382 Meet USBee, the malware that uses USB drives to covertly jump airgaps
#1381 Cyber security should be expanded to other departments other than IT: CII-KPMG report
History
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12