Ransomware

15 Results / Page 2 of 2

Background

News + Malware + Botnet + Ransomware Mjolnir Security / March 18, 2023

Emotet’s New Strategy: Exploiting Microsoft OneNote to Spread Malware and How Mjolnir Security Can Help

Introduction Emotet, a notorious banking Trojan, has been wreaking havoc in the cybersecurity world for years. With its sophisticated and ever-evolving techniques, this malware has become a significant threat to individuals and organizations alike. In this blog post, we’ll discuss how Emotet is now utilizing Microsoft OneNote to spread its ...

Cybercrime + News + Malware + Ransomware + APT + Threat Intelligence + Breach + Cyber security Mjolnir Security / November 28, 2022

Qakbot Malware Used By Black Basta In Series of Ransomware Attacks

Qakbot Malware Attacks Resurrected By Black Basta Hacker Collective Qakbot Malware Utilized as a Means of Cyber Extortion in Canada Qakbot malware and ransomware attacks have soared across the globe as a new hacker group known as “Black Basta” has targeted a number of Canadian corporations. Qakbot ransomware sometimes referred ...

todayFebruary 3, 2021

  • 202
  • 1
Featuredstar
close

News + Malware + Botnet + Ransomware Mjolnir Security

Fall of Emotet

On January 27, 2021, news broke from Europol that a collaborative effort had effectively taken down and disrupted one of the most significant botnets in the past decade – Emotet. This global action and collaborative initiative incorporated authorities in the Netherlands, Germany, the United States, the United Kingdom, France, Lithuania, ...

todayDecember 15, 2017

  • 122
close

Threat Intelligence + Breach + News + Malware + Ransomware + Backdoor Mjolnir Security

Remote Desktop Server Owners beware, new HC7 GOTYA Ransomware Installed via Remote Desktop Services

There was a time when most Server Administrations/Network Administrators would just change the port 3389 to any other and/or change default login username to a RDP server and assume its secure. While this may best practice, it doesnt really help as a simple nmap scan reveals the listening port and ...