Rombertik

May 6, 2015By Tyler Moffitt

Yesterday in the news we saw a huge spike in the interest of the Rombertik malware. Rombertik infiltrates the computer through email phishing attacks that drop as a .scr screen saver executable that contains the malware that…read more

AlphaCrypt

May 4, 2015By Tyler Moffitt

We’ve encountered yet another encrypting ransomware variant and at this point it’s expected since the scam has exploaded in popularity since it’s inception in late 2013. This one has a GUI that is almost…read more

The Threat Landscape is Expanding. Are You Ready for it?

March 3, 2015By Tyler Moffitt

This blog is syndicated from the LabTech Software Blog: http://www.labtechsoftware.com/blog/antivirus-and-anti-malware-tips/ Think your clients are covered? Think again. This year’s epic flu season isn’t relegated to humans alone. The burgeoning threat landscape is better equipped…read more

Vaporizer chargers can contain malware

November 21, 2014By Tyler Moffitt

Vaporizers (AKA E-cigarettes) have been gaining some serious traction and widespread use over the past few years. The sudden surge of popularity isn’t too surprising considering the fact that the health implications of…read more

CoinVault

November 14, 2014By Tyler Moffitt

  Today we encountered a new type of encrypting ransomware that looks to be of the cryptographic locker family. It employs the same method of encryption and has a very similar GUI (kills VSS,…read more

We analyze Cryptobot, aka Paycrypt

November 7, 2014By Tyler Moffitt

Recently during some research on encrypting ransomware we came across a new variant that brings some new features to the table. It will encrypt by utilizing the following javascript from being opened as an attachment…read more

Cryptographic Locker

September 5, 2014By Tyler Moffitt

It seems as though every few weeks we see a new encrypting ransomware variant. It’s not surprising either since the business model of ransoming files for money is tried and true. Whether it’s important work…read more

ZeroLocker

August 14, 2014By Tyler Moffitt

Recently in the news we saw FireEye and Fox-IT provide the ability to decrypt files encrypted by older crpytolocker variants. They used the command and control servers seized by the FBI during operation Tovar….read more

true