In this post we will cover the Locky Bart ransomware. The developers of Locky Bart already had 2 very successful ransomware…
Month: January 2017
A look back at the Zyns iframer campaign
We often get asked about drive-by download attacks, how they work, and specifically about what sites people may have visited just prior to…
How do I get my employees to stop clicking on everything?
If you’ve been given responsibility for network security in a non-technical area of the business, there’s one eternal question that has…
Zbot with legitimate applications on board
Source code of the infamous ZeuS malware leaked in 2011. Since that time, many cybercriminals has adopted it and augmented with…
VirLocker’s comeback; including recovery instructions
VirLocker is in no way new, it has been making a mess of victim’s machines for quite a few years now….
Avoid these “Free Minecraft / Garry’s Mod” adverts
Garry’s Mod is a sandbox physics game which lets you manipulate ragdolls (effectively, static video game characters) into certain poses or player-made movies…
Understanding the basics of two-factor authentication
Two-factor authentication (2FA) is the least complex version of multi-factor authorization (MFA) and was invented to add an extra layer of…
Verified Twitter accounts compromised, get busy spamming
Update: Twitter only recommends that verified users enable 2FA on their accounts. They do, however, need to have a verified phone…
Malwarebytes Labs Blog Comment Safari
Comments on the Malwarebytes labs blog can be well written, valuable additions to our published work, and sometimes provide additional data…
New Mac backdoor using antiquated code
The first Mac malware of 2017 was brought to my attention by an IT admin, who spotted some strange outgoing network traffic from…