All 101 Cybercrime Malwarebytes news Security world Threat analysis

July 29, 2016 - Systweak’s RegClean Pro is quite a popular software. Top Ten Reviews, a consumer review portal based in Utah, has ranked it as number one in their “Registry Repair Software” category. It also boasts of having won more than a hundred 5-star awards. Yet in spite of these, something is amiss. With praises for it also...

CONTINUE READINGNo Comments

July 29, 2016 - We look at one of the malicious executables recently delivered by RIG Exploit Kit that was packed in a .NET cryptor and includes similar features as one we found some time ago.

CONTINUE READINGNo Comments

July 29, 2016 - It's been a busy few months for the Malwarebytes team. Infosec Europe, Chelsea FC, radio interviews, and a certain Blogger Awards that you may have voted on recently. How did we do? You'll have to read on to find out!

CONTINUE READINGNo Comments

July 27, 2016 - Read on to learn how the latest downloaders used to deliver Locky ransomware and show how to statically decipher their hidden URLs.

CONTINUE READING2 Comments

July 26, 2016 - We've covered the Neutrino and Magnitude exploit kits. Now we take a look at number #3, RIG EK and the different distribution paths using packet captures collected by our honeypot. The campaigns for distribution involve malvertising and compromised sites (much like all other EKs) but there is a notable diversity in how many different ways RIG EK is being loaded and the type of payloads it is serving.

CONTINUE READINGNo Comments

Select your language