Necurs Botnet Gets Proxy Module with DDOS Capabilities

Necurs Botnet Gets Proxy Module with DDOS Capabilities

Given the size of the Necurs botnet, if used for DDOS attacks, the damage could be massive, researchers say

Locky Adds Support for a New "S**T" Extension

Locky Adds Support for a New "S**T" Extension

New spam campaign has made victims all over the world

Locky Spam Numbers Go Down as Ransomware Switches to LNK Files

Locky Spam Numbers Go Down as Ransomware Switches to LNK Files

Locky group changes spam & infection technique

Locky Drops Offline Mode and Switches to New ODIN Extension

Locky Drops Offline Mode and Switches to New ODIN Extension

Locky offline mode experiment seems to end as ransomware operators revert back to using online C&C servers

New Locky Ransomware Version Delivered as DLL File

New Locky Ransomware Version Delivered as DLL File

Locky switches EXE binaries for DLL files

Locky Ransomware Spam Campaigns Switch to Macro-Based Distribution

Locky Ransomware Spam Campaigns Switch to Macro-Based Distribution

Dridex spam distribution stops altogether

Security Researcher Tricks Tech Support Scammer Into Installing Locky Ransomware

Security Researcher Tricks Tech Support Scammer Into Installing Locky Ransomware

Infosec researcher has fun at a crook's expense

Locky Ransomware Was Top Malware Threat for Q2 2016

Locky Ransomware Was Top Malware Threat for Q2 2016

Q2 quieter than Q1 thanks to Angler and Nuclear shutdowns

New Locky Spam Wave Delivers Entire Ransomware Inside JavaScript File

New Locky Spam Wave Delivers Entire Ransomware Inside JavaScript File

Locky ransomware continues to evolve, gets closer to 100% JS

Biggest Spam Flood in Years Distributes Locky Ransomware

Biggest Spam Flood in Years Distributes Locky Ransomware

Spam wave originated from Indian and Vietnamese IPs

Adobe Patches Flash Zero-Day Exploit Used to Deliver Cerber and Locky Ransomware

Adobe Patches Flash Zero-Day Exploit Used to Deliver Cerber and Locky Ransomware

CVE-2016-1019 used in Magnitude and Nuclear exploit kits

Security Experts Crack Dridex Admin Panel, Recover Victim Data

Security Experts Crack Dridex Admin Panel, Recover Victim Data

Security firm turns the table and hacks the bad guys

Ransomware Epidemic Makes Two New Victims, Hospitals in California and Indiana

Ransomware Epidemic Makes Two New Victims, Hospitals in California and Indiana

Ransomware infections are out of control, highly-efficient against hospitals, the bigger the hospital, the better

Dridex Botnet Has Replaced Banking Trojan with Locky Ransomware

Dridex Botnet Has Replaced Banking Trojan with Locky Ransomware

Group leader's arrest might have forced them to adapt

Locky Ransomware Makes Its First High-Profile Victim As It Continues to Spread

Locky Ransomware Makes Its First High-Profile Victim As It Continues to Spread

Locky ransomware infects computers at New Zealand hospital

  • Security
  • By Catalin Cimpanu
  • February 17th, 2016
Distributors of Dridex Banking Trojan Take a Break, Deliver Ransomware Instead

Distributors of Dridex Banking Trojan Take a Break, Deliver Ransomware Instead

A new ransomware family named Locky spreads to 446,000 users thanks to Dridex banking trojan affiliate