Gunter Ollmann on the Future of Ransomware, Exploit Kits, and IoT

Gunter Ollmann, CSO at Vectra networks, talks to Mike Mimoso about ransomware as a prototype for malware going forward, as well as the long-term future of exploit kits and whether IoT is something that can be secured sooner rather than later.

Continue reading Gunter Ollmann on the Future of Ransomware, Exploit Kits, and IoT

CryptXXX Ransomware Updates Ransom Note, Payment Site

CryptXXX ransomware has been updated with new ransom instructions and payment site, as well as the removal of special extensions appended to encrypted files. Continue reading CryptXXX Ransomware Updates Ransom Note, Payment Site

The Changing Face of Pseudo-Darkleech

The chameleon-like pseudo-Darkleech campaign, responsible for prolific exploit kit attacks and ransomware infections, has again made a change to its code that will frustrate researchers. Continue reading The Changing Face of Pseudo-Darkleech

Nuclear, Angler Exploit Kit Activity Has Disappeared

Researchers who study exploit kits are reporting that two major kits, Angler and Nuclear, may no longer be available. Continue reading Nuclear, Angler Exploit Kit Activity Has Disappeared

A look at the Angler-less exploit kit scene

For those tracking exploit kits, the disappearance of the Angler exploit kit last week was a major event. While a lot of questions remain, several clues pointed out that this was no ordinary break, and that something deeper was likely going on. After a… Continue reading A look at the Angler-less exploit kit scene

Realistic: Exploiting a computer on BIOS/ hardware level in less than an hour? (Infinite preparation time)

I wonder how hard it it to infect a laptop or netbook in 60 minutes or less in a way the victim cannot easily clean their machine by wiping hard disk drives.

Let’s assume the following:

The attacker has physical access to the machine. I… Continue reading Realistic: Exploiting a computer on BIOS/ hardware level in less than an hour? (Infinite preparation time)