Support Scams fifth most common threat in July
Tech support scams from call centers in India have long been a nuisance to Windows users. The fraudsters are currently particularly active, as demonstrated by internal numbers from G DATA.
Support Scams fifth most common threat in July
Tech support scams from call centers in India have long been a nuisance to Windows users. The fraudsters are currently particularly active, as demonstrated by internal numbers from G DATA.
Abstractism: Cryptomining game removed from Steam Store
The game Abstractism prides itself with minimalistic graphics and limited functionality - but leads to even more work for computers. The reason: In the background, crypto currencies are mined on and the players are ripped off.
G DATA analysis discovers Dosfuscation in the wild
The code of a malware downloader was so cleverly hidden that our analysts initially assumed it was a corrupted file. However, an in-depth analysis shows that this is a novel method for disguising batch and power shell commands.
Where we go, we don't need files: Analysis of fileless malware "Rozena"
Fileless malware leverages exploits to run malicious commands or launch scripts directly from memory using legitimate system tools such as Windows Powershell. Code Red and SQL Slammer were pioneers of fileless malware which date back to the early 2000s. Currently, this type of malware is on the rise…
Fighting virtual fires: are you incident-ready?
Incident response is becoming increasingly important in a time where data breaches and downtime are the nightmare of many companies. Yet, incident response is often not handled as efficiently or effectively as it should be. In this article we are shining a light on the benefits of a good incident…
Microsoft patch fixes Office zero-day
The current patches of Microsoft close i.a. a critical vulnerability in Office, which has been exploited by massively spammed Dridex banking trojans. Updating is the best protection.
Spora - the Shortcut Worm that is also a Ransomware
Spora spreads via USB drives like Gamarue and Dinihou aka Jenxcus whilst also encrypting files. The sophistication of this threat could easily make it the new Locky. We discuss its infection and encryption procedure and show how it uses statistical values about encrypted files to calculate the…
Bochum Buying presents for Christmas online? Without doubt!
Holiday season is about to start and online shopping for Christmas is trending! Our experts forewarn you about current phishing and malware threats in our German G DATA SecurityBlog.
Bochum Microsoft Tech Support Scammers Use Screenlocker Ransomware
Microsoft recently published a new study about Tech Support Scams and its impact. Besides the well-known telephone, email and website scams, G DATA experts have encountered screenlocker ransomware in this area. Read more in our German G DATA SecurityBlog.
Encryption Trojan Locky: What you need to know about the ransomware
In recent months and perhaps even years, there has hardly been a single computer malware strain that has been so prominent in media reports as the ransomware Locky. The reports of tens of thousands of computers being infected every day are unsettling. Many users are wondering what can be done about…