Windows crypto-ransomware POC

Windows crypto-ransomware POC Credits: mauri870 Note: This project is purely academic, use at your own risk. I do not encourage in any way the use of this software illegally or to attack targets without their previous authorization The intent here is to disseminate and teach more about security in the actual world. Remember, security is […]

Microsoft Announces “Controlled Folder Access” to Fend Off Crypto-Ransomware

This fall, Microsoft plans to release a new Windows Defender feature called Controlled Folder Access, which blocks and blacklists unauthorized apps from making changes to files located inside specially-designated folders. Microsoft shipped the Controlled Folder Access feature as part of the Windows 10 Insider Preview Build 16232, released yesterday evening. New Windows Defender feature watches […]

BitTorrent distribution sites dropping crypto-ransomware on macOS

Cybercriminals prefer crypto-ransomware as it not only successfully targets Windows desktop but also those devices that run on MacOS or Linux. Now, according to ESET researchers, there is a new ransomware malware called “Patcher” targeting Mac users. The new ransomware is written in Swift and is called Patcher; it is being distributed through BitTorrent distribution […]

Wave of business websites hijacked to deliver crypto-ransomware

Sites exploited by SoakSoak bots give the gift of CryptXXX malware. If you’ve visited the do-it-yourself project site of Dunlop Adhesives, the official tourism site for Guatemala, or a number of other legitimate (or in some cases, marginally legitimate) websites, you may have gotten more than the information you were looking for. These sites are […]

Anatomy of a Crypto-Ransomware attack

Ransomware is a type of malware that forces its victims to pay the ransom through certain online payment methods in order to grant access to their systems, or to get their data back.   Below are all the steps of how any ransomware works by delivering the malware, to the encryption algorithm, finding local IP’s […]

Cryptostalker, a Tool to Detect Crypto-Ransomware on Linux

Softpedia talked with Sean Willians, author of Cryptostalker. A while back, we stumbled upon an interesting GitHub repo dubbed randumb, which included an example called Cryptostalker, advertised as a tool to detect crypto-ransomware on Linux. Cryptostalker and the original project randumb are the work of Sean Williams, a developer from San Francisco. Mr. Williams wanted to […]

Oxford School District Victim of hacker’s “Crypto-Ransomware”

Oxford, Miss. (TLV)—Sunday, Feb 7, The Oxford School District was attacked by an “unknown hacker” using “crypto-ransomware.” OSD has shut down all servers and is currently working to resume regular operation. Crypto-ransomware is a type of malware that restricts you from using some or all of your computer until a price is paid in a […]

New crypto-ransomware encrypts files then disguises them as quarantined

Researchers have found a new ransomware which shows your files are quarantined, actually the are not. Trend Micro has recently reported that a new ransomware variant targeting Russian speakers, was detected by their threat response engineer, Michael Marcos. BAT_CYRPVAULT.A or CRYPVAULT was evidenced to have been distributed as an attachment to spam emails. This particular ransomware […]