Dev Links |
Author |
Message |
delovski
Joined: 14 Jun 2006 Posts: 3524 Location: Zagreb
|
|
Back to top |
|
|
delovski
Joined: 14 Jun 2006 Posts: 3524 Location: Zagreb
|
|
Back to top |
|
|
delovski
Joined: 14 Jun 2006 Posts: 3524 Location: Zagreb
|
Posted: Tue Dec 20, 2016 4:46 pm Post subject: |
|
|
HN - Mac Malware Can Secretly Spy On Your Webcam and Mic - Here's How to Stay Safe
"Patrick Wardle, an ex-NSA staffer who heads up research at security intelli-
gence firm Synack, discovered a way for Mac malware to tap into your live
feeds from Mac's built-in webcam and microphone to locally record you even
without detection.
Wardle is the same researcher who has discovered a number of security
weaknesses in Apple products, including ways to bypass the Gatekeeper
protections in OS X.
Wardle also released a free tool called RansomWhere? earlier this year that
has generic detection capabilities for Mac OS X ransomware variants." |
|
Back to top |
|
|
delovski
Joined: 14 Jun 2006 Posts: 3524 Location: Zagreb
|
Posted: Wed Feb 22, 2017 12:54 pm Post subject: |
|
|
tr - I infected my Windows computer with ransomware to test
RansomFree's protection
"The secret to RansomFree's success is not in signature files similar to
antivirus applications, but rather in how it detects ransomware-like be-
havior (e.g., the local encryption of user data). This makes the appli-
cation good at doing its job, since all ransomware thus far has displayed
the same characteristics regardless of its payload." |
|
Back to top |
|
|
delovski
Joined: 14 Jun 2006 Posts: 3524 Location: Zagreb
|
Posted: Tue May 16, 2017 3:34 pm Post subject: |
|
|
c - WannaCry hackers had no intention of giving users their files back
"Firstly, the software is not like normal ransomware in that it hasn't used
a unique payment address that would identify which user has paid for their
files to be decrypted. Consequently, there is no way for the hackers to actually
know who has paid and who hasn't." |
|
Back to top |
|
|
XNote Kapetan
Joined: 16 Jun 2006 Posts: 532
|
|
Back to top |
|
|
Ike Kapetan
Joined: 17 Jun 2006 Posts: 3146 Location: Europe
|
Posted: Thu Jun 15, 2017 12:25 am Post subject: |
|
|
https://blog.fortinet.com/2017/06/09/macransom-offered-as-ransomware-as-a-service
Just recently, we here at FortiGuard Labs discovered a Ransomware-as-a-service (RaaS) that uses a web portal hosted in a TOR network which has become a trend nowadays. However, in this case it was rather interesting to see cybercriminals attack an operating system other than Windows. And this could be the first time to see RaaS that targets Mac OS. |
|
Back to top |
|
|
delovski
Joined: 14 Jun 2006 Posts: 3524 Location: Zagreb
|
Posted: Sat Jun 17, 2017 8:16 pm Post subject: |
|
|
hacker - New Fileless Ransomware with Code Injection Ability Detected in the Wild
"According to Trend Micro, Sorebrect was initially targeting Middle Eastern
countries like Kuwait and Lebanon, but from last month, this threat has started
infecting people in Canada, China, Croatia, Italy, Japan, Mexico, Russia, Taiwan,
and the U.S." |
|
Back to top |
|
|
delovski
Joined: 14 Jun 2006 Posts: 3524 Location: Zagreb
|
Posted: Mon Jul 06, 2020 9:33 am Post subject: |
|
|
osee - OSX.EvilQuest Uncovered
"Today, we triaged an interesting piece of new malware - detailing its
persistence, and capabilities.
Though new, our (free!) tools such as BlockBlock and RansomWhere? were able
to detect and thwart various aspects of the attack... with no apriori knowledge!" |
|
Back to top |
|
|
|