A Microsoft Word zero-day vulnerability is being used to spread the Dridex banking Trojan in attacks that have bypassed mitigation efforts.
For a long time, exploit kits were the most prolific malware distribution vehicle available to attackers. Where did they go and what’s replaced them?
Dridex has undergone a massive update and now sports a new injection method for evading detection based on the technique known as AtomBombing.
Cerber ransomware leverages Dridex spambot network in massive new crypto-offensive targeting U.S. inboxes.
The post “I’m with Stupid” Locky network gets hacked and dissed appeared first on Avira Blog.
“Double-headed beast” Trojan, GozNym, drains $4 million from banks in past two weeks.
In our blog, we’ve already shown you several different types of interesting ransomware, each with their own peculiarities. Maktub for example, has a streamlined, clean and easy“payment-page” that perfectly explains how one can get the encrypted files back.
Locky ransomware may take an Easter Break, at least in terms of phishing email distribution. And it’s all about the bad guys finding the target audience, not their love of Easter Eggs.
The post Will Locky ransomware and the Dridex botnet take an Easter vacation? appeared first on Avira Blog.