A new ransomware called Ransom32 has been discovered that is created entirely out of Javascript, HTML, and CSS. This ransomware is part of a new Ransomware as a Service that allows anyone with a bitcoin address to create their own ransomware and distribute it.
5With file-encrypting ransomware on the rise, everyone needs to learn tips and tricks on how to protect yourself of mitigate the damages done by these infections. In this article we discuss a tip where Windows alerts you in a not so obvious way that something is not right.
4
Modern attacks have shifted focus to the browser, yet detection tools remain largely blind to the crucial activity happening there.
Join Push Security on February 11th for an interactive "choose-your-own-adventure" webinar on ClickFix, credential phishing, and other in-browser attacks we've observed in the wild.
The developer of the Radamant Ransomware Kit does not appear to be happy with Fabian Wosar and Emsisoft for the releases of decrypters that allow the victim's to recover their files for free. This displeasure is being shown in the names of their C2 servers and strings in the malware executable.
5A new Adobe Flash update has been released that fixes 19 reported vulnerabilities. All of these vulnerabilities are labeled critical as they could allow an attacker to take control of an affected system.
1It has been discovered that The Radamant Ransomware Kit has been for sale on underground malware and exploit sites for almost three weeks. This kit is a full turn-key solution that allows any budding criminal to distribute their own ransomware.
1On Christmas Day, due to configuration on Steam's servers, visitors were able to view cached pages of other user's accounts. This allowed them to see account details such as email addresses, mailing addresses, and other private information.
0The latest release of TeslaCrypt still refers to itself as version 2.2.0, but there are still some minor changes compared to the last release. These changes include minor differences in the ransom note and differ file header for the encrypted files.
0Microsoft announced Monday that they will no longer tolerate adware that utilizes man-in-the-middle attacks to inject advertisements into web browsers. These techniques do not use the browser's normal extensibility model and thus remove the choice from the end user.
1Last week we wrote about a new ransomware called the Ramadant Ransomware Kit that was encrypting files and adding the .RDM extension. Fabian Wosar, of Emsisoft, further analyzed the infection and was able to find a weakness in the encryption algorithm so that victim's can recover their files for free.
10A new ransomware is in the wild that has been dubbed Gomasom (GOogle MAil ranSOM) by Fabian Wosar of Emsisoft due to its use of gmail email addresses in the encrypted file names. This ransomware is particularly destructive as it will not only encrypt data files but will also encrypt executables.
11A new ransomware has been discovered called the Radamant Ransomware Kit that encrypts your data using AES-256 encryption and requires you to pay .5 Bitcoins, or approximately $230.88 USD, to get your files back. Any files encrypted by this ransomware will have the RDM extension added to them.
3A new zero-day vulnerability was discovered for the Grub bootloader that allows attackers to bypass Grub password authentication. A security notice released by researchers Hector Marco & Ismael Ripoll states that Grub versions 1.98 (December, 2009) through 2.02 (December, 2015) are affected by this bug.
0Apple developers will be glad to know that Swift has become open source as of version 2.2. Swift is a program language that was developed by Chris Lattner with the eventual contribution of programmers at Apple. An open source release of Swift will only allow it gain greater adoption by developers.
0A new ransomware called the XRTN Ransomware is in the wild that encrypts your data with RSA-1024 encryption using the open source Gnu Privacy Guard (GnuPG) encryption software. This ransomware is part of the same family as the VaultCrypt ransomware that we reported on in March.
0A man has been arrested by officers from the South East Regional Organised Crime Unit as part of the investigation into the hack on VTech servers. As reported earlier this month, the personal information of close to 5 million parents and 200,000 children was accessed by a hacker who broke into VTech's servers.
0Google has released version 47.0.2526.106 of Google Chrome today to resolve two Google discovered security vulnerabilities. These vulnerabilities are identified as CVE-2015-6792 and these private security issues from internal audits and fuzzing and are mentioned in issue 569486.
0Sophos has announced the purchase of Netherlands based security software company SurfRight for $31.8 million. HitmanPro has a history of developing innovative malware removal, APT remediation, and zero-day exploit protection solutions that will be used to strengthen the end point protection in Sophos' products.
0Unsecured MongoDB database servers allowed a "white-hat" hacker to access the account information for over 13 million MacKeeper users. MacKeeper is a program that supposedly optimizes your Mac so that it runs faster and safer..
0Epic Games has made Shadow Complex Remastered for the PC free till the end of December. Shadow Complex is a Metroidvania style side-scroller where you play as the hero, Jason, who is trying to find his abducted girlfriend.
0A new version of TeslaCrypt was released on Tuesday that contains some minor changes such as new ransom note names, a new name for the autorun entry, and a slight change to how it removes the Shadow Volume Copies.
8