It looks like the hackers have moved on after having some fun with SDRs, and are now focused on hacking for profit. To do that, they’ve got a plan to use ransomware and target companies with cyber insurance. Compared to spam messages, which typically have less than a one percent success rate, most studies show that at least one-third of ransomware victims pay. With SMBs poised … [Read more...]
Search Results for: ransomware
Hackers Take Tips From WannaCry and Petya Ransomware Attacks
Hackers are adding lessons they’ve learned from the worldwide spread of the WannaCry ransomware and Petya cyberattack to their playbook. According to an article in ZDNet, the hackers behind the Trickbot financial malware are testing a new version of Trickbot that uses a rough imitation of the EternalBlue security vulnerability to spread itself through an infected network like … [Read more...]
NotPetya: Ransomware or Wiper? – Daily Security Byte
Is Petya 2.0 really ransomware, or is it a "false flag" nation state attack designed to damage organizations in the Ukraine, while distracting the press? That's the question some researchers are asking of this new ransomware (or should I say wiper?). Today's video covers some of the latest details from researchers reverse engineering Petya 2.0. These experts have found … [Read more...]
Petya 2.0 Ransomware
If you've followed the news today, you've likely already seen reports of a new virulent ransomware variant spreading across the globe. Petya 2.0 (also called NotPetya by some researchers) has already claimed victims across Europe, Russia and the US. Known victims include Maersk, healthcare facilities in Pittsburgh, and several banks in Ukraine. Petya 2.0 works similarly to … [Read more...]
“Fileless” Ransomware – Daily Security Byte
Fileless malware is a recent type of malware that tries to evade detection by deleting all hard copies of its files, and just residing in a process running in memory. Fileless attacks can go even further by leveraging a software exploits to get themselves in memory without dropping any file at all. Unfortunately, cyber criminals have combined the stealthy nature of fileless … [Read more...]





