• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Search results for: TorrentLocker

TorrentLocker Changes Attack Method, Targets Leading European Countries

  • Posted on:March 9, 2017 at 11:00 am
  • Posted in:Malware, Ransomware
  • Author:
    Jon Oliver (Senior Architect)
0

The TorrentLocker ransomware, which has been in a lull as of late, has recently come back with new variants that are using a new delivery mechanism that uses abused Dropbox accounts. This new type of attack is in line with our 2017 prediction that ransomware would continue to evolve beyond the usual attack vectors.

Read More
Tags: ransomwareTorrentLocker

Businesses Held for Ransom: TorrentLocker and CryptoWall Change Tactics

  • Posted on:September 22, 2015 at 9:03 pm
  • Posted in:Bad Sites, Malware, Spam
  • Author:
    Paul Pajares (Fraud Analyst) and Jon Oliver (Senior Architect)
0

Perpetrators behind ransomware have moved away from targeting consumers and tailored their attacks to extort small and medium-sized businesses (SMBs).This business segment make potentially good targets for ransomware since small businesses are less likely to have the sophisticated solutions that enterprises have. And at the same time, the owners often have the capacity to pay….

Read More
Tags: cryptoransomwareCryptoWallransomwareSpamTorrentLocker

TorrentLocker Surges in the UK, More Social Engineering Lures Seen

  • Posted on:July 1, 2015 at 11:32 pm
  • Posted in:Bad Sites, Malware
  • Author:
    Paul Pajares (Fraud Analyst) and Jon Oliver (Senior Architect)
0

We’ve noticed a recent increase in TorrentLocker-related emails being sent to users in several countries, particularly the United Kingdom and Turkey. From the latter half of May until June 10, there was a relative lull in TorrentLocker-related emails. However, over a period of just over two weeks (June 10 to June 28), we saw a recurrence…

Read More
Tags: crypto-ransomwarecybercrimeransomware

TorrentLocker Ransomware Uses Email Authentication to Refine Spam Runs

  • Posted on:February 27, 2015 at 3:40 pm
  • Posted in:Malware, Ransomware, Spam
  • Author:
    Jon Oliver (Senior Architect)
0

In monitoring the ransomware TorrentLocker, we noticed a new development in its arrival vector. In previous entries, we noted that a particular wave of the crypto-ransomware was using spammed messages that were designed to evade spam filters. Our research now shows that TorrentLocker malware are using emails that are designed to pass spam filters and…

Read More
Tags: DMARCemail authenticationSpamTorrentLocker

TorrentLocker Ransomware Hits ANZ Region

  • Posted on:January 11, 2015 at 2:00 pm
  • Posted in:Malware, Ransomware
  • Author:
    Paul Pajares (Fraud Analyst) and Christopher Ke (Web Threat Researcher, Deakin University)
0

We recently reported that the EMEA (Europe-Middle East-Africa) region experienced a surge in ransomware, specifically, crypto-ransomware attacks. It appears that these attacks are no longer limited to that region. Research from Trend Micro engineers shows that the ANZ (Australia-New Zealand) region is the latest to be greatly affected by this type of malware—this time by TorrentLocker…

Read More
Tags: ANZ regionAustraliacrypto-ransomwareMalwareNew ZealandransomwareTorrentLocker
Page 1 of 3123

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.