<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=885880844953016&amp;ev=PageView&amp;noscript=1">

Ransomware Attacks: A Quantum Leap from Quantity to Quality

Posted by Tom Bain on September 7, 2018 at 12:41 PM

The cybersecurity attack landscape moves fast, really fast. Last year, not a week passed that didn’t bring about news on a new ransomware incident. Of course ransomware’s very nature lends itself to newsworthy headlines based on how incredibly damaging to businesses this class of attacks can be.

Read More

Topics: Fileless Attacks, Ransomware, Cyber Security, Moving Target Defense

GandCrab Ransomware Version 4.0/4.1

Posted by Roy Moshailov on July 18, 2018 at 4:22 PM

July has been a busy month for the distributors of GandCrab ransomware. After about two months with no major update, the cybercrime gang behind GandCrab released version 4, and a few days later, version 4.1. The primary delivery method is via compromised WordPress websites, which have been hijacked to include fake crack application pages, which in turn redirect to the GandCrab executable. Other distribution methods are Exploit Kits (EK) and malicious email campaigns.

Read More

Topics: Threat Alerts, Custom Packer, Ransomware, Exploit Kit

Threat Profile: GandCrab Ransomware

Posted by Roy Moshailov on February 23, 2018 at 4:08 PM

GandCrab Ransomware

These days, most malware employs long chain attack and anti-analysis techniques to make it more difficult to detect the payload and harder to analyze by security researchers. Such is the case with GandCrab, a new ransomware strain that entered the scene late last month and is currently active.

Read More

Topics: Threat Profile, Custom Packer, Attack Analysis, Ransomware, Exploit Kit

Threat Profile: SIGMA Ransomware

Posted by Roy Moshailov on December 19, 2017 at 6:44 PM

 

Ransomware remained a major cybersecurity threat in 2017, leaving a trail of victims across all industries, company sizes and geographical borders. Phishing emails are the top ransomware delivery mechanism and they grow in number and sophistication daily. According to IBM, the number of ransomware-infected emails increased 6,000% this year. And the days of easily spotted spelling mistakes and obvious scams are long gone. Today’s phishing attacks are clever and subtle enough to trick even security veterans. 

Read More

Topics: Cyber Security, Ransomware, Sandbox evasion, Threat Profile

Preventing Bad Rabbit Is Only Remarkable If It's Unremarkable

Posted by Arthur Braunstein on October 27, 2017 at 1:55 PM

In the last 48 hours, a hurricane of e-mails has crossed my Inbox, with breathless and self-congratulatory subject lines like "Our latest release detects Bad Rabbit" and "XYZ now protects XYZ customers from Bad Rabbit." In other words, "If you use our product, you were exposed to Bad Rabbit, but now that we know about it (from someone else) we deployed an update." Once you decode the messages, it’s clear that the content is not newsworthy, differentiating or exciting, it’s just an excuse to partake in the latest frenzy.

Read More

Topics: Cyber Attacks, Cyber Security, Ransomware

Threat Profile: Jaff Ransomware

Posted by Morphisec Team on May 19, 2017 at 7:03 PM

Last week, a massive wave of spam email that infects victims with a new type of ransomware, dubbed "Jaff", flooded networks across Europe, North America and Australia. Estimates put the number of malicious emails in the tens of millions.

Read More

Topics: Cyber Attacks, Cyber Security, Endpoint Security, Ransomware, Threat Profile

Ransomware - Answer with a Solid Cyber Security Strategy

Posted by Arthur Braunstein on May 14, 2017 at 4:24 PM

Last week’s news about cyberattacks was sobering. Cybercrime is rampant and notorious. “WannaCry,” “Jaff,” and “Cerber” - the names of the attacks that got the most publicity - read like names of gangsters from the days of Prohibition, with unique personalities, techniques that range from brutal to devious, and a lurid line-up of targets and victims. Only the wanted posters are missing.

Read More

Topics: Ransomware, Cyber Attacks, Cyber Security

New Wave of Cerber Ransomware Sweeps the Globe – Can’t Surge Past Morphisec

Posted by Michael Gorelik on February 22, 2017 at 3:41 AM

Cerber ransomware is one of the most sophisticated and popular ransomware families, attacking victims across the globe. Additional popular ransomware families in the cybercriminal’s arsenal include Locky (Osiris), Spora, Shade and several others.

Read More

Topics: Ransomware, Cerber

Our Top 10 Blog Posts of 2016

Posted by Morphisec Team on January 20, 2017 at 12:28 PM

Cybersecurity had a turbulent 2016, to say the least. We saw the rise of ransomware, the emergence of IoT botnets, landmark security legislation and Yahoo’s disclosure about its 1-billion-record-hack, the largest in history.

Read More

Topics: APT, ASLR, Exploits, Angler Kit, Ransomware, Attack Analysis

Cybersecurity Predictions for  2017

Posted by Morphisec Team on December 14, 2016 at 1:02 AM

As an eventful 2016 draws to a close, what should we expect in cybersecurity for 2017? In this blog series, Morphisec’s security experts predict trends and technologies in 2017. Today’s post is from Netta Schmeidler, Morphisec VP Product.

Read More

Topics: Cyber Security, Ransomware, Cyber Security Predictions 2017, Cyber Attacks

Check out our Attack Analyses!

Take a deep dive into technical analyses of attacks prevented by Morphisec.

Subscribe to our Blog

Happy to keep you in the loop with industry insight, cyber security trends,  and cyber attack information and company updates.

Morphisec Named a Cool Vendor 2016

Morphisec is a Gartner Cool Vendor 2016

Each year Gartner identifies new Cool Vendors it considers innovative or transformative. Morphisec is honored be to named a Cool Vendor 2016. Here's more....

 

Recent Posts

Most Popular Posts