Login Register
My Picture

Blog article by zyruslawr

zyruslawr wrote 2 articles and got 0 comments. The last article was submitted on 05/10/17

zyruslawr's gallery | Browse all blogs

  Online Fraud Detection, Cyber Security: Cerber Surpasses Locky to Become Dominant Ransomware Menace

Date Wednesday, May 10th 2017, 9:05 AM; Icon 174; Date 0; Attitude +0 | 0 | -0

Ransomware-as-a-Service is a hit with the tech illiterate
[url=www.theregister.co.uk]Cerber eclipsed Locky[/url] as the most common ransomware pathogen doing the rounds in the first three months of 2017.
Cerber's control of the cybercrime market rose from 70 per cent market share in January to 87 per cent in March, according to the latest cybercrime tactics report by Malwarebytes Lab.
The success of Cerber is down to its features (robust encryption, offline encryption etc) combined with the adoption of a Ransomware-as-a-Service business model, whereby the ransomware can be modified or leased. "It's also very easy for non-technical criminals to get their hands on a customised version of the ransomware," Malwarebytes reports.
Malwarebytes' findings follow reports from Microsoft that Cerber was topping its Windows 10 ransomware chart.
By contrast, the Locky ransomware (last year's number one) has dropped off the map, likely due to a switch in tactics by the cybercrooks behind the Necurs spam botnet. No new versions of Locky have appeared throughout the year to date, Malwarebytes reports.
Looking beyond Windows, the Mac threat landscape saw a surge of new malware and backdoors in Q1 2017, including a new ransomware (FindZip). Elsewhere two Android nasties - HiddenAds.lck, which locks the device and prevents the removal of an ad slinging nuisance, and Jisut, a mobile ransomware family - have been causing all sorts of problems, according to Malwarebytes.
The [url=www.onlineinfoblog.com]cybersecurity[/url] firm has built up a solid reputation for exposing the operations of tech support scammers. This form of fraud normally starts with a pop-up ad or phone call claiming that a prospective mark's machine is infected or underperforming. Once victims respond, the scammer's use a variety of social engineering tricks to coax victims into installing ineffective crudware or subscribing the worthless (or often damaging) services.
Tech support scammers, finding difficulty working with North American payment processors, have begun accepting alternate forms of payment, such as Apple gift cards and Bitcoin, it reports. Some scammer groups have started to scam each other. ®

  Write blog articles

Comments on this blog article

Spacer Spacer
Sorry there is no comment on this blog article yet. Would you like to be the first one to write a comment?

Drop your comment for this article

Spacer Spacer
  Sorry, guests can not post comments | Register

Search my blog


zyruslawr articles


Would you like to read more articles written by zyruslawr? Here are the latest posts.

Online Fraud Detection,
  Date 05/10/17 Icon 337 Date 0 comment(s)