A new development with Locky ransomware uses symmetric and asymmetric encryption to communicate with its control server to maximize its infection potential and make it harder to crack.Read more...
Entries filed under 'Java'
Threat Research Blog
The FireEye Labs team posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. They cover the full spectrum of exploits and vulnerabilities, including advanced malware and targeted threats.
April 22, 2016 11:00 AM By Jonell Baltazar , Joonho Sa | Threat Research, Advanced Malware
The actors behind the Locky ransomware are actively seeking new ways to install their malware on victim computers, and are using a new downloader on the current distribution framework -- which can be a new platform for installing other malware.Read more...
October 15, 2014 9:00 AM By Abhishek Singh | Vulnerabilities, Targeted Attack
June 4, 2010 3:53 PM By Julia Wolf