MENUMenuIcon OUR STORY

SLASHNEXT LABS

THE KNOWLEDGE CENTER

BLOG

VIEW CATEGORIESHIDE CATEGORIES
Icon admin

Inside a Phishing Network

Breaches, General, Phishing

Credential Phishing is an effective way to snatch someone’s confidential information.  Hacker’s create a look-a-like login page matching a global brand’s login (Google, Yahoo, Microsoft) and send a phishing email containing a link to the fake page. When a victim clicks on the phishing link, the fake page (which exactly resembles the brand’s login page) is …

Icon Read More
Icon admin

Jigsaw Ransomware

Malware, Ransomware

Jigsaw is the latest in a spate of Ransomware that encrypts files and offers to sell the victim a decryption key to get their data back.  Adding a new twist, Jigsaw threatens to delete one file every hour if the ransom is not paid in a timely manner. Jigsaw is capable of encrypting files that …

Icon Read More
Icon admin

PowerWare – A malware built on lies

Malware, Ransomware

A couple of weeks ago the folks at Carbon Black discovered a new Ransomware strain that they dubbed “PowerWare”. What makes PowerWare interesting is its ability to encrypt files using the Windows PowerShell scripting language.  Unlike other Ransomware, Powerware doesn’t need to install a binary on the infected machine. When enabled, Macros inside a weaponized …

Icon Read More
Icon admin

Mighty TeslaCrypt

Malware, Ransomware

Ransomware is not a new concept. Some early examples such as GpCode spread as early as 2006, but the recent surge of new highly advanced Ransomware is like nothing the world has ever seen. Most of what we see today can be traced back to CryptoLocker and CryptoWall.  These two ransomeware alone have netted their …

Icon Read More
Icon admin

Cerber Ransomware

Malware, Ransomware

“Cerber” is widely believed to have been developed by Russian coders and is the latest in a rash of ransomware spotted by SlashNext Labs.   It is distributed through Russian Hacking forums and is marketed by its developers as Ransomware-as-a-Service or RaaS, allowing them to earn a small commission on each payment the ransomware generates. When …

Icon Read More