• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Search results for: cerber

Several Exploit Kits Now Deliver Cerber 4.0

  • Posted on:October 12, 2016 at 5:05 am
  • Posted in:Bad Sites, Ransomware, Vulnerabilities
  • Author:
    Joseph C Chen (Fraud Researcher)
0

We have tracked three malvertising campaigns and one compromised site campaign using Cerber ransomware after version 4.0 (detected as as Ransom_CERBER.DLGE) was released a month after version 3.0. More details of this latest iteration of Cerber are listed in a ransomware advertisement provided by security researcher Kafeine.

Read More
Tags: CERBERexploit kitsransomware

New Version of Cerber Ransomware Distributed via Malvertising

  • Posted on:August 31, 2016 at 8:28 pm
  • Posted in:Exploits, Malware, Ransomware
  • Author:
    Joseph C Chen (Fraud Researcher)
0

Cerber has become one of the most notorious and popular ransomware families in 2016. It has used a wide variety of tactics including leveraging cloud platforms and Windows Scripting and adding non-ransomware behavior such as distributed denial-of-service attacks to its arsenal. One reason for this popularity may be because it is frequently bought and sold as a service (ransomware-as-a-service, or RaaS).

The latest version of Cerber had functions found in earlier versions like the use of voice mechanism as part of its social engineering tactics. Similar to previous variants, Cerber 3.0 is dropped by the Magnitude and Rig exploit kits.

Read More
Tags: CERBERMagnitude exploit kitmalvertisingransomwarerig exploit kit

Cerber: A Case in Point of Ransomware Leveraging Cloud Platforms

  • Posted on:July 15, 2016 at 1:36 am
  • Posted in:Ransomware
  • Author:
    Trend Micro
0

Users may wrongly perceive that apps and programs running in the cloud are fail-safe, when it has been increasingly used as a vector to host and deliver malware. Conversely, by targeting cloud-based productivity platforms utilized by many enterprises, the malefactors are hoping to victimize users who handle sensitive corporate data that when denied access to can mean serious repercussions for their business operations.

Read More
Tags: CERBERoffice365ransomware

CERBER: Crypto-ransomware that Speaks, Sold in Russian Underground

  • Posted on:March 6, 2016 at 7:17 pm
  • Posted in:Bad Sites, Malware, Ransomware
  • Author:
    Rhena Inocencio (Threat Response Engineer)
0

Think about this, all your important files on the system are encrypted by no less than ransomware. Soon after, you receive ransom notes, one of which reads out the message and informs you that your files are held for ransom unless you pay the sum money.

Read More
Tags: CERBERcrypto-ransomwareransomware

A Closer Look at the Locky Poser, PyLocky Ransomware

  • Posted on:September 10, 2018 at 5:02 am
  • Posted in:Ransomware, Spam
  • Author:
    Trend Micro
0

While ransomware has noticeably plateaued in today’s threat landscape, it’s still a cybercriminal staple. In fact, it saw a slight increase in activity in the first half of 2018, keeping pace by being fine-tuned to evade security solutions, or in the case of PyLocky (detected by Trend Micro as RANSOM_PYLOCKY.A), imitate established ransomware families and ride on their notoriety.

In late July and throughout August, we observed waves of spam email delivering the PyLocky ransomware. Although it tries to pass off as Locky in its ransom note, PyLocky is unrelated to Locky. PyLocky is written in Python, a popular scripting language; and packaged with PyInstaller, a tool used to package Python-based programs as standalone executables.

Read More
Tags: machine learningPyLockyransomwareSpam
Page 2 of 7 ‹ 123 › »

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, MĂŠxico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, EspaĂąa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.