ALL POSTS From Locky with love – reading malicious attachments Malwarebytes Labs July 27, 2016 0 Comments The common way of malware distribution, used i.e. by Locky ransomware are downloader scripts. They are spread in massive spam campaigns… Keys to Chimera ransomware leaked Malwarebytes Labs July 26, 2016 0 Comments When ransomware authors compete on the black market, sometimes victims benefit. This time we got access to private keys of the… Explained: Advanced Persistent Threat (APT) Pieter Arntz July 26, 2016 0 Comments An advanced persistent threat (APT) is a prolonged, aimed attack on a specific target with the intention to compromise their system… A look into some RIG exploit kit campaigns Jérôme Segura July 26, 2016 0 Comments In the past few weeks we’ve talked about the Neutrino and Magnitude exploit kits. This time, we take a look at… The little 419 scam that could Jovi Umawing July 25, 2016 0 Comments It has been six months since David and Carol Martin, a Scottish couple, won the lottery jackpot of £33,035,323—the highest National… A week in security (Jul 17 – Jul 23) Malwarebytes Labs July 25, 2016 0 Comments Last week, we spotted a phishing scam that targeted Wikileak’s Twitter account; gave an account why tech support scammers are still… How to protect your IP address Sarah Enderby July 22, 2016 0 Comments You might not know it, but every time you go on the Internet, from checking your social media to playing games… Cross-platform malware Adwind infects Mac Thomas Reed July 22, 2016 0 Comments A colleague referred me to an article on a piece of cross-platform malware, called Adwind RAT (short for “remote access tool”), that… Online scams: Why haven’t we won yet? William Tsing July 21, 2016 0 Comments We here at Malwarebytes Labs have been posting on the ins and outs of tech support scams since 2013. (First post… Previous 1 … 471 472 473 474 475 … 618 Next Contributors Threat Center Podcast Glossary Scams