Dharma Ransomware Has A New Extension

Posted by Jordan Kadlec on Apr 18, 2017 4:44:33 PM
submit to reddit

A new ransomware that appends .wallet to the end of encrypted files has appeared over the last couple of weeks. After further research, it has been determined that this is a newer variant of CrySiS ransomware called Dharma.

Read More

Topics: Business, Ransomware

Healthcare Organizations are Biggest Targets for Ransomware

Posted by Jordan Kadlec on Apr 11, 2017 2:49:58 PM
submit to reddit

In 2016, several hospitals and healthcare organizations were hit with ransomware attacks. In fact, between October 2016 and February 2017, 42.77% of cyberattacks targeted healthcare organizations. With ransomware attacks predicted to quadruple by 2020, cybersecurity spending is also predicted to exceed $65 billion for the healthcare industry.

Read More

Topics: Cyber Threats, Ransomware, Phishing

March Ransomware in Review

Posted by Jordan Kadlec on Apr 5, 2017 2:20:50 PM
submit to reddit

March was a month where a lot of small ransomware variants appeared but never came to fruition. There was, however, an update on CryptoLocker making its return, Cerber added a couple of new features, and Android ransomware appears to be here to stay. We also have a list of decryptors that were released, enabling you to recover your files without paying the ransom.

Read More

Topics: Cyber Threats, Data Breach, Ransomware, Ransomware Decrypters, decrypters

Matrix Ransomware - CryptoStopper Can Help!

Posted by Jordan Kadlec on Apr 4, 2017 12:18:15 PM
submit to reddit

We recently had an individual inquire about a form of ransomware named Matrix. Unfortunately, there is currently no way to decrypt files that are encrypted by the Matrix ransomware without paying the ransom. We have included that transcript of the conversation between our Security Analyst and the tech who has had a client infected by Matrix. Too many of our conversations go this way. Having CryptoStopper would have prevented this and having CryptoStopper in your cyber security arsenal will prevent this from happening to you.

Read More

Topics: Cyber Threats, Ransomware, decrypters

Star Trek Themed Ransomware

Posted by Jordan Kadlec on Mar 29, 2017 12:49:35 PM
submit to reddit

A new ransomware variant named ‘Kirk’ after popular Star Trek character James. T. Kirk recently hit the cybersecurity scene. Like most forms of ransomware, Kirk Ransomware immediately starts encrypting a victim’s files once the malware has been installed. Besides the Star Trek theme, the most interesting characteristic of Kirk Ransomware is the currency demanded for the ransom payment, Monero.

Read More

Topics: Cyber Threats, Ransomware, Star Trek, Kirk, Kirk Ransomware

Double Agent: The Zero-Day That Could Last for Months

Posted by Jordan Kadlec on Mar 27, 2017 10:06:06 AM
submit to reddit

A zero-day attack named Double Agent has been discovered that exploits a 15-year-old feature in Windows from XP through Windows 10. The attack has the ability to take over antivirus software on machines running Windows and turns them into a weaponized Trojan capable of attacking the very system it was designed to protect. 

Read More

Topics: Cyber Threats, Data Breach, Zero Day, Zero Day Attacks, Zero Day Vulnerability

Ransomware Decrypters | Where to Find the Antidote

Posted by Jordan Kadlec on Mar 21, 2017 10:43:03 AM
submit to reddit

While no one wants to be hit with ransomware, the fact is that one in two businesses will be infected with some type of ransomware in 2017. Knowing where to find a possible antidote or decrypter can be a vital part of recovering your encrypted files without paying a ransom.

Known Decrypters

Read More

Topics: Cyber Threats, Ransomware, Ransomware Decrypters, decrypters

Spear Phishing Examples

Posted by Jordan Kadlec on Mar 16, 2017 9:59:49 AM
submit to reddit

Phishing is one of the most common attack vectors hackers use to initially infiltrate a user’s system. Phishing is an attempt to obtain user credentials, financial data, or other sensitive information by emulating a legitimate email communication. Phishing emails can also be used to trick a user into clicking on a malicious attachment or link that is embedded into an email. Spear phishing, on the other hand, is a targeted phishing campaign where hackers first research their target individual or company to increase their chance of success. By doing this, hackers attempt to appear more trustworthy as a legitimate business entity thus making the target less suspicious. Spear phishing presents a much greater threat than phishing in general as the targets are often high-level executives of large corporations.

Read More

Topics: Cyber Threats, Data Breach, Phishing, Spear Phishing

Top 7 Revelations of Vault 7

Posted by Jordan Kadlec on Mar 9, 2017 11:50:51 AM
submit to reddit

WikiLeaks dropped a bombshell on Tuesday, March 7th when it began a new series of leaks on the U.S. Central Intelligence Agency. Code-named Vault 7, Year Zero is the first series and is comprised of 8,761 documents and files from inside the Central Intelligence Agency’s (CIA) high-security network. Below are 7 revelations from Vault 7.

Read More

Topics: Cyber Threats, Data Breach, Press Release

Advanced Persistent Threats and Ransomware

Posted by Jordan Kadlec on Mar 6, 2017 8:00:00 AM
submit to reddit

Advanced Persistent Threats (APT) and ransomware have been the most dreaded types of malware over the last couple of years. While there are clear and distinct differences between APTs and ransomware, we are now seeing the two being paired together to create a type of hybrid malware.

Read More

Topics: Cyber Threats, Data Breach, Business, Ransomware