Locky ransomware disguises itself as account suspensions and suspicious movements

One of the golden rules of computer security for the last twenty-or-so years has been to be extremely cautious of unsolicited emails. Yet, the same old tricks are still being used to successfully spread ransomware.
Read more in my article on the Hot f… Continue reading Locky ransomware disguises itself as account suspensions and suspicious movements

Inside the RIG Exploit Kit

In a deep analysis of RIG, Cisco Talos team outlined the way the exploit kit combines different web technologies such as DoSWF, JavaScript, Flash and VBscript to obfuscate attacks. Continue reading Inside the RIG Exploit Kit

Your shipment malspam email delivers Locky

The next in the never ending series of Locky downloaders is an email with the subject of  Your shipment  coming as usual from random companies, names and email addresses  with a semi-random named zip attachment starting with  shipment_ containing a … Continue reading →

Source

Continue reading Your shipment malspam email delivers Locky

Please find attached invoice no: 9233713731 malspam delivers Locky

The next in the never ending series of Locky downloaders is an email with the subject of  Please find attached invoice no: 9233713731 ( random numbers) pretending to  come from documenbt at your own email domain with a random named … Continue reading →

Source

Continue reading Please find attached invoice no: 9233713731 malspam delivers Locky