For a couple of weeks, we have been observing a malvertising campaign that uses decoy websites to redirect users to the…
Month: February 2018
Encryption 101: ShiOne ransomware case study
In part one of this series, Encryption 101: a malware analyst’s primer, we introduced some of the basic encryption concepts used…
Human Factor Podcast: Jenny Radcliffe and Chris Boyd
A little while ago, I was invited to take part in Jenny Radcliffe’s Human Factor Podcast. With 44 episodes strong (and…
How to protect your computer from malicious cryptomining
Noticing that your computer is running slow? While sometimes a telltale sign of malware infection, these days that seems doubly true….
The state of malicious cryptomining
While cryptocurrencies have been around for a long time and used for legitimate purposes, online criminals have certainly tarnished their reputation….
A week in security (February 19 – February 25)
Last week on Malwarebytes Labs, we gave readers a primer on encryption, took a stab at that Deepfakes tool Internet users seem to…
Deepfakes FakeApp tool (briefly) includes cryptominer
A few weeks ago, we took a look at a forum dedicated to Deepfake clips where the site was pushing Coinhive…
Avzhan DDoS bot dropped by Chinese drive-by attack
The Avzhan DDoS bot has been known since 2010, but recently we saw it in wild again, being dropped by a…
Drive-by download campaign targets Chinese websites, experiments with exploits
During our web crawls we sometimes come across bizarre findings or patterns we haven’t seen before. This was the case with…
How to build an incident response program: GDPR guidelines
In today’s computing world, it is not a matter of “if” an organization will get compromised, but “when.” That’s why, in…