Tag: Locky ransomware
You are here: Home \ Locky ransomware
Researchers warn that the code behind this remote access trojan has been tweaked in an attempt to decrease antivirus detection.
For a second time this month, a Locky ransomware variant called IKARUSdilapidated is part of a calculated phishing attack targeting office workers with fake scanned image attachments.
Ransomware called IKARUSdilapidated is managing to slip into unsuspecting organizations as an unknown file.
Verizon’s Data Breach Investigations Report for 2017 shows big growth in the reported number of ransomware attacks and incidents involving cyberespionage.
The first large scale Locky campaign in months has been detected via the Necurs botnet.
Locky ransomware and Kovter click-fraud malware are being spread in the same email campaign for the first time, with malicious .lnk files being used to infect computers.
Researchers say the Necurs spam botnet is limping back into action with two new campaigns that could be the telltale signs of a future full-scale attack.
Microsoft malware researchers say Locky ransomware authors are changing tactics again to evade detection.
A massive Locky ransomware campaign spotted this month targets primarily the healthcare sector and is delivered in phishing campaigns. The payload, researchers at FireEye said, is dropped via .DOCM attachments, which are macro-enabled Office 2007 Word documents. Especially hard hit are hospitals in the United States followed by Japan, Korea and Thailand, according to research published Wednesday by...
Crooks behind the fast spreading CryptXXX ransomware updated the latest variant with better encryption technology and new methods to evade detection by researchers. This latest version of CryptXXX was spotted by researchers at SetinelOne that say the new updated sample has already earned ransomers approximately $50,000 in bitcoin payouts in the last 17 days. The...