Cerber Ransomware Updates Configuration File
This blog post was written by Sudhanshu Dubey. McAfee Labs has recently analyzed Version 2 of Cerber, one of the...
Bing.VC Hijacks Browsers Using Legitimate Applications
Browser hijackers are a type of malware that modifies a web browser’s settings without the user’s permission. Generally a browser hijacker...
Taking Steps to Fight Back Against Ransomware
Ransomware is an attack in which malware encrypts files and extorts money from victims. It has become a favorite among...
No More Ransom: A New Initiative to Battle Ransomware
This blog was written by Bruce Snell. Ransomware has seen a huge increase over the past couple of years. According...
McAfee Teams With Industry, Law Enforcement to Thwart ‘Shade’ Ransomware
McAfee, Europol, Kaspersky Lab, and Dutch police have taken down the Shade ransomware botnet and captured encryption keys to unlock...
Phishing Attacks Employ Old but Effective Password Stealer
A few months ago we received a sample from a customer that turned out to be a password stealer (PWS). One...
JavaScript-PHP Joint Exercise Delivers Nemucod Ransomware
The ransomware Nemucod has been very prevalent in the last few months. Nemucod’s habit of frequently changing its delivery mechanism...
Microsoft’s June Patch Kills Potential CFG Bypass
After applying Microsoft’s June patch, we noticed some interesting changes that prevent a security bypass of Windows’ Control Flow Guard...
‘Thrones’ Jon Snow Appears to Employ Neutrino Exploit Kit
This blog post was written by Kalpesh Mantri. You read that right. Jon Snow appears to be back from the...
Zcrypt Expands Reach as ‘Virus Ransomware’
McAfee has recently seen a new kind of ransomware–Zcrypt—that can self-replicate. This “virus ransomware” arrives via email in a malicious...