Ransomware Tag

NOTE: In this blog, we typically focus on specific aspects of malware, cybercrime, security threats, and network breaches. For this post, we thought we’d take a large step backward and provide some foundational information as context for understanding the capabilities and variations of today’s malware....

We were sitting around the campfire this week reading the latest Lastline Labs blogs post. We were ignited by some scorching questions regarding this shadowy malspam campaign. The burning issue on our minds was: Why would Smoke Loader go to the trouble of gaining a foothold...

By Oleg Boyarchuk and Stefano Ortolani Introduction When ransomware behavior is clearly exhibited, it is relatively easy for a sandbox or a personal A/V to assert detection; after all, in its simplest form, ransomware malware must at least: (1) search for files to be encrypted, and (2)...

One could argue that cybercriminals had a real break-out year in 2017. Huge data breaches, new malware techniques, and some headline-grabbing attacks. Our top 10 blog posts demonstrate the interest in what the bad guys are up to, and how to defend against it. From...

Over the last few years, we’ve seen a number of families of malware written specifically for the Mac OS X operating system. There was Flashback, and more recently the KeRanger ransomware. We’ve also seen more targeted attacks where Mac OS X malware was written to...

The Lastline Daily Dose program supports National Cyber Security Awareness Month (NCSAM) with daily tips and advice to help individuals and organizations detect and prevent malware-based cyberattacks. Throughout October, Lastline will offer a daily dose of advice via Twitter (@Lastlineinc), LinkedIn, Facebook, and other social...