An anonymous bidding mechanism enhances the REvil group’s double-extortion game.
Check out our list of top 10 things to do to protect your organization from the deepening scourge of ransomware.
A decade-old botnet is using infected computers to send out sextortion emails, in a wide-scale campaign with the potential to reach millions of victims.
The malware landscape continues to evolve with the re-emergence of the GandCrab operators and a continued spearphishing attack spreading the LookBack RAT.
Despite claiming they were retiring, GandCrab’s authors have been linked to the REvile/Sodinokibi ransomware via a technical analysis.
A detailed look at underground forums shows that cybercriminals aren’t sure where to look on the heels of the GandCrab ransomware group shutting its doors – and low-level actors are taking advantage of that by developing their own strains.
Malware infection technique called TxHollower gets updated with stealthy features.
After a year of success, its operators say they earned millions — and are ready to retire.
Bad actors are looking to hit financial and banking firms in Canada with geo-specific campaigns touting malware like Emotet, GandCrab and Ursnif.
From ZIP attachments spreading Gandcrab, to DOC files distributing Trickbot, researchers tracked five widescale spam campaigns in 2019 that have made use of malicious attachments.