Select Page
Why Demand Ransom When You Can Crypto Mine?

Why Demand Ransom When You Can Crypto Mine?

Since the onset of malware, the ability to make money by attacking companies has become a lucrative business. As attacks became more and more prevalent, enterprises invested more in protecting themselves. They hired and trained threat researchers, and as more...
In-Memory .NET Attack “NanoCore RAT”

In-Memory .NET Attack “NanoCore RAT”

Malware is getting more and more sophisticated, especially when it comes to covering its tracks. Every day, we see modern malware employing innovative code-hiding techniques including obfuscation, bundling and infiltration — making the job of executable analysis...

SyncCrypt Ransomware

SlashNext has observed a major increase in malicious spam (malspam), email based attacks that distribute ransomware through email attachments. In fact, a new ransomware was discovered just last week distributing spam attachments containing Windows Script File (WSF)....

JS based PHP Ransomware

Malicious spam campaigns are among hackers’ favorite delivery channels for spreading malware to their targets. Recently, we have observed a malspam campaign delivering ransomware by spam email attachments containing a “.js” file named “UPS-Receipt-01878098.doc.js”. On...

Malspam Pushing BTCWare (OCEAN VARIANT) Ransomware

We recently observed a Malicious Spam campaign that pushes ransomware targeting Windows hosts. The adversary sends a zip archive in email without text in the message body. This zip archive is double coated – a zip archive within a zip archive. The second zip...

Kirk Ransomware Based on Star Trek Theme

Kirk is a newly discovered ransomeware. It is similar in function to other ransomeware but its authors (presumably fans of Gene Rodenberry’s iconic TV series) have borrowed character names for the encryption and decryption components. Two notable items related to Kirk...