A new development with Locky ransomware uses symmetric and asymmetric encryption to communicate with its control server to maximize its infection potential and make it harder to crack.Read more...
Entries filed under 'Java'
Threat Research Blog
FireEye posts blog entries under threat research to present and discuss cyber attacks and threat intelligence from a technical perspective. These blog posts cover everything from exploits and vulnerabilities, to advanced malware and targeted attacks.
April 22, 2016 11:00 AM By Jonell Baltazar , Joonho Sa | Advanced Malware
The actors behind the Locky ransomware are actively seeking new ways to install their malware on victim computers, and are using a new downloader on the current distribution framework -- which can be a new platform for installing other malware.Read more...
October 15, 2014 9:00 AM By Abhishek Singh | Vulnerabilities, Targeted Attack
June 4, 2010 3:53 PM By Julia Wolf