Kudos from a ransomware writer
There is an active group of malware researchers who specialize in analyzing ransomware. G DATA malware researcher Karsten Hahn is a member of this community. Now a malware file has surfaced that is dedicated to him.
Kudos from a ransomware writer
There is an active group of malware researchers who specialize in analyzing ransomware. G DATA malware researcher Karsten Hahn is a member of this community. Now a malware file has surfaced that is dedicated to him.
Analysis: ZeuS Panda
In our first article on the intricacies of this malware, we already hinted at some of its complex inner workings. Now a full analysis is available. ZeuS has been a staple of online banking malware for many years now. Neither ZeuS nor its variant "Panda" are your average, run-of-the-mill Trojans.
Malware numbers of the first half of 2017
In this article we publish numbers about malware based on two ways of counting. The number of newly appeared malware specimen, and the number of prevented attacks on computers. During the first half of 2017 there were on average 47,4 attempted attacks per computer.
Rurktar - Spyware under Construction
The development of any kind of software takes time. Not every function that is planned for the final product is implemented right from the start. It does not come as a surprise that this is also true for the development of malware. At the G DATA Security Labs, a file has sparked the interest of our…
Error 404: Online gamers at risk!
For a long time, gaming was just considered “a bit of a laugh” or “something for the kids”. Unsurprisingly, the security aspect did not receive a lot of attention – it just wasn’t seen as a problem or particularly relevant. But today’s gamers are not just two players sitting side by side as a dot…
Who is behind Petna?
The news talk about a cyber attack when reporting about Petna and WannaCry. This implies purposeful activities aiming at causing damage. On the other hand, cyber-criminals who are in the blackmailing business with ransomware are mainly interested in making easy money. They failed both with WannaCry…
Petya is back - again
The Petya ransomware, about which the first reports were published in the G DATA blog, occasionally rears its head with some new features (last time as "GoldenEye"). This time is no different - except that this is the first time that Petya uses an exploit from the arsenal of an intelligence agency.…
WannaCry - it's not over
WannaCry's encryptor was deactivated by a kill switch. But the worm component is still active. It crawls the internet for vulnerable systems and captures them where possible. It has recently been hitting US hospitals. In addition, the case WannaCry shows that it could have been worse. Time to…
Warning: Massive "WannaCry" Ransomware campaign launched
An outbreak of the latest version of "WannaCry" has been claiming victims in several countries. The speed and ferocity of the outbreak has taken many by surprise. Researchers are as yet puzzled as to the origin of the outbreak which hit 11 countries within just three hours. So far Spain and Russia…
Wrapping up WannaCry - sort of
After the big infection wave that hit thousands of computers all over the world on Friday, May 12, we are taking a look at some things that WannaCry has taught us and some of the aspects that have surprised many.