In this post, we will study one of the malicious executables recently delivered by RIG Exploit Kit. It is packed in a…
Month: July 2016
The IPExpo / Infosec Europe / Blogger Awards roundup
For the last few months, Malwarebytes has been representing at some of the biggest security events in England, along with a couple…
PUP Friday: Cleaning up with 5 star awards
Systweak’s RegClean Pro is quite a popular software. Top Ten Reviews, a consumer review portal based in Utah, has ranked it…
Five ways to stay safe online while playing Pokémon Go
Ah, Pokémon Go. Most of us have heard about it, played it, and (probably for some) been concerned by it. Since…
From Locky with love – reading malicious attachments
The common way of malware distribution, used i.e. by Locky ransomware are downloader scripts. They are spread in massive spam campaigns…
A look into some RIG exploit kit campaigns
In the past few weeks we’ve talked about the Neutrino and Magnitude exploit kits. This time, we take a look at…
Explained: Advanced Persistent Threat (APT)
An advanced persistent threat (APT) is a prolonged, aimed attack on a specific target with the intention to compromise their system…
Keys to Chimera ransomware leaked
When ransomware authors compete on the black market, sometimes victims benefit. This time we got access to private keys of the…
The little 419 scam that could
It has been six months since David and Carol Martin, a Scottish couple, won the lottery jackpot of £33,035,323—the highest National…
A week in security (Jul 17 – Jul 23)
Last week, we spotted a phishing scam that targeted Wikileak’s Twitter account; gave an account why tech support scammers are still…