ransomware | Page 10


2014 marks the 10th anniversary of Cabir, the world's first mobile phone malware. To mark this occasion, Fortinet's FortiGuard Labs is taking a stroll down memory lane to examine the evolution and significance of mobile threats during the last 10 years. From Cabir to FakeDefend, the last decade has seen the number of mobile malware explode. In 2013, Fortinet's FortiGuard Labs has seen more than 1,300 new malicious applications per day and is currently tracking more than 300 Android malware families and more than 400,000 malicious Android... [Read More]
by RSS Michael Perna  |  Jan 21, 2014  |  Filed in: Industry Trends & News
FortiGuard's Global Security Strategist Derek Manky spoke with Network World's Keith Shaw late last week to discuss some hot topics in the threat landscape. Derek and Keith discuss at length BadBIOS, how it might work and where we may see it or other malware move in the near future. They also touch on the bug found in Supermicro IPMI that could allow low-level control of servers and wrap up with a discussion on the explosion of the Cryptolocker ransomware. Some more details on Cryptolocker and ransomware in general follows after the video link... [Read More]
by RSS Richard Henderson  |  Nov 18, 2013  |  Filed in: Industry Trends & News
Last month, Symantec blogged about an Android malware named Android.Fakedefender that is the first example of a Ransomware that we have seen on the Android platform. Fortinet detects this malware as Android/FakeDefend.A!tr The malware's operation can be broken down into 3 rough stages. For details of the modus operandus of this very sophisticated malware, read on.. CONVINCE USER THE PHONE IS INFECTED ('Fake AV' being the term of endearment for this in the security community) The malware disguises itself as an Anti-Virus application and,... [Read More]
by RSS Ruchna Nigam  |  Jul 12, 2013  |  Filed in: Security Research
date: 2013-10-14 06:00:00 -0700 category: "Security Research" Final panel on collateral damage in cyber-warfare This post is the third in a three part series. Click here for Part 1 and here for Part 2 Fabio Assolini, Andrey Makhnutin - PAC - the Problem Auto Config (or stealing bank accounts with a 1KB file) Proxy Auto Config are a so big problem in Bresil that Fabio renamed them "Problem Auto Config". They are very small malware which consist in just modifying the proxy server files browsers are meant to use. With Internet Explorer, the proxy... [Read More]
by RSS Axelle Apvrille  |  Jul 30, 2012  |  Filed in: Security Research
In Fortinet's Latest Threat Landscape Report, Fortinet looks back at the security predictions they made at the beginning of the year and compares them to where we are today. How right or wrong were they? See the info graphic below. Download the full report for even more threat landscape news. Report highlights include: - The increase of mobile malware on Android devices including new mobile ransomware - The continued proliferation of the ZeroAccess botnet and which countries are seeing the biggest infection rates - The Citadel botnet takedown -... [Read More]
by RSS Michael Perna  |  Jul 30, 2012  |  Filed in: Industry Trends & News
The W32/Seftad RansomWare has been spreading for a few days now, locking infected computers and trying to extort money for a recovery password. The infection is easily recognized by the text message below, which is displayed when the computer starts up, or rather fails to start. Your PC is blocked. All the hard drives were encrypted. Browse www.safe-data.ru to get an access to your system and files. Any attempt to restore the drives using other way will lead to inevitable data loss !!! Please remember Your ID: 773923, with its help your sign-on... [Read More]
by RSS Doug Macdonald  |  Dec 14, 2010  |  Filed in: Security Research
Two of Fortinet's FortiGuard Labs researchers will be on hand at next week's RSA Conference to present their research in the Fortinet booth theater (#2225). The presentations focus on ransomware and industrial spying, two hot topic areas that are on the minds of security professionals at enterprises today. Here is a bit of information: All Your Data Are Belong To Us Ransomware comes in many shapes and forms, with the most recent variation using malware masquerading as antivirus protection. The goal of an attacker is simple: cripple, lock down and... [Read More]
by RSS Rick Popko  |  Feb 26, 2010  |  Filed in: Security Research