ALL POSTS Decrypting Chimera ransomware Malwarebytes Labs August 11, 2016 0 Comments We’ve recently wrote about the leak of keys for Chimera ransomware. In this, more technical post, we will describe how to utilize… Malvertising campaign delivers two exploit kits, same payload Jérôme Segura August 10, 2016 0 Comments Malvertising remains a favourite distribution platform for pushing out malware and we typically see certain exploit kits associated with particular campaigns. As… New celebrity death hoax hits Facebook Jovi Umawing August 9, 2016 0 Comments These past few days, it appears that Facebook (and YouTube) has become the launchpad to yet another celebrity death hoax. This… A week in security (Jul 31 – Aug 06) Malwarebytes Labs August 8, 2016 0 Comments Last week, we did an in-depth analysis of Smoke Loader, took a closer look into Neutrino exploit kit’s jQueryGate, found a… The reality of ransomware: an in-depth study Christopher Boyd August 5, 2016 0 Comments We recently sponsored a deep-dive study conducted by Osterman Research on the subject of Ransomware, and the results are a stark insight… Smoke Loader – downloader with a smokescreen still alive Malwarebytes Labs August 5, 2016 0 Comments This time we will have a look at another payload from recent RIG EK campaign. It is Smoke Loader (Dofoil), a… PUP Friday: Adware family EoRezo Pieter Arntz August 5, 2016 0 Comments EoRezo which is sometimes called Tuto4PC, is a family of software bundles that typically offers something useful for free and then… The curious case of recurring “Page disabled” Facebook scams Jovi Umawing August 4, 2016 0 Comments Remember those fake Facebook Security pages we’ve documented earlier this year? Here’s a quick refresher if not: Recently, we noticed a… A look into Neutrino EK’s jQueryGate Jérôme Segura August 3, 2016 0 Comments In the cybercrime landscape, Exploit Kits (EKs) are the tool of choice to infect endpoints by exploiting software vulnerabilities. However, a… Previous 1 … 465 466 467 468 469 … 614 Next Contributors Threat Center Podcast Glossary Scams