Remove Analysis Remove CMS Remove File names Remove Ransomware
article thumbnail

The Long Run of Shade Ransomware

Security Affairs

Since the beginning of the year, security firms observed a new intense ransomware campaign spreading the Shade ransomware. Between January and February, a new, intense, ransomware campaign has been observed by many security firms. Trend of malicious JavaScript downloading Shade ransomware (source: ESET).

article thumbnail

Gootkit delivery platform Gootloader used to deliver additional payloads

Security Affairs

The Javascript-based infection framework for the Gootkit RAT was enhanced to deliver a wider variety of malware, including ransomware. The framework was improved to deploy a wider range of malware, including ransomware payloads. ” reads the analysis published by researchers Gabor Szappanos and Andrew Brandt from Sophos.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Crooks use hidden directories of compromised HTTPS sites to deliver malware

Security Affairs

Hacked websites were used for several malicious purposes, experts observed compromised WordPress and Joomla websites serving Shade /Troldesh ransomware, coin miners, backdoors, and some times were involved in phishing campaigns. ” reads the analysis from Zscaler. ” reads the analysis from Zscaler. jpg and msges.

CMS 108
article thumbnail

Dacls RAT, the first Lazarus malware that targets Linux devices

Security Affairs

The group is considered responsible for the massive WannaCry ransomware attack, a string of SWIFT attacks in 2016, and the Sony Pictures hack. And our analysis shows that this is a fully functional, covert and RAT program targeting both Windows and Linux platforms, and the samples share some key characters being used by Lazarus Group.”

CMS 76