Monday, April 27, 2015

Threat Spotlight: TeslaCrypt – Decrypt It Yourself

This post was authored by: Andrea Allievi , Earl Carter & Emmanuel Tacheau After the takedown of Cryptolocker, we have seen the rise of Cryptowall. Cryptowall 2 introduced “features” such as advanced anti-debugging techniques, only to have many of those features removed in Cryptowall 3. Ransomware is becoming an extremely lucrative business, leading to many variants and campaigns targeting even localized regions in their own specific languages. Although it is possible that these multiple variants are sponsored by the same threat actor, the most likely conclusion [...]

from Cisco Blog » Security http://ift.tt/1A653yN

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.