Results for ransomware

Threat Research

LooCipher: Can Encrypted Files Be Recovered From Hell?

Learn more about the LooCipher ransomware file encryption mechanism and take a look at the possibility of decrypting affected files without paying the ransom.

By Jasper ManuelJuly 10, 2019

Industry Trends

3 Trends Plaguing Healthcare Cybersecurity & How to Fight Them

Find out more about the three major trends plaguing healthcare cybersecurity in 2019.

By Sonia AristaJuly 03, 2019

Industry Trends

Cybercriminals Opt for Open Source Tools

By deploying an integrated security fabric that spans today’s distributed networks, IT security teams can stay ahead of the threat curve to better detect and respond to threats happening anywhere across the entire attack surface.

By FortinetJune 10, 2019

Industry Trends

Threat Intelligence and the Evolving Threat Landscape

As organizations continue to adopt and drive digital transformation (DX), staying ahead of the threat landscape and attack chain curves is becoming increasingly difficult to achieve. Learn more about the challenges and opportunities of DX, and the importance of threat intelligence to protect your network from the latest threats.

By Anthony GiandomenicoMay 31, 2019

Threat Research

A Closer Look at Satan Ransomware’s Propagation Techniques

Satan ransomware first appeared in early 2017, and since then threat actors have been constantly improving the malware to infect its victims more effectively and to maximize its profits. Learn more about how this malware finds new targets to attack.

Threat Research

Looking Into Anatova Ransomware

Anatova is a fairly new ransomware. It avoids infecting computers that are used in analysis and research labs. It systematically avoids infecting files and folders that are important to the stability of the computer system it is infecting.

By Raul AlvarezApril 11, 2019

Threat Research

LockerGoga: Ransomware Targeting Critical Infrastructure

LockerGoga is not at all exceptional in terms of sophistication, especially when compared to other ransomware families. However, it has a unique way of iterating through the files of the victim.

Industry Trends

Cyber and Physical Convergence is Creating New Attack Opportunities for Cybercriminals

The latest Fortinet Threat Landscape Report reveals that cybercriminals are constantly evolving the sophistication of their attacks—from continuing to exploit the vast insecurity of IoT devices, to morphing open source malware tools into new threats.

By FortiGuard SE TeamFebruary 20, 2019

Threat Research

Dharma Ransomware: What It’s Teaching Us

FortiGuard Labs has been monitoring the Dharma (also named CrySiS) malware family for a few years. As we demonstrate in our blog, even though the Dharma ransomware continues to be active, the attackers are not really updating their mode of operation, but continue to rely on a proven tactic to find and infect new victims, which is to leverage badly secured RDP services to gain access to the network.

Threat Research

Analyzing the New non-Beta Version of the Kraken Cryptor Ransomware

FortiGuard Labs recently detected new versions of Kraken Cryptor Ransomware. While the beta tag has been removed from its configuration, there are still numerous bugs in this ransomware, and the author is still continuously modifying its basic functions.

By Yueh-Ting ChenNovember 12, 2018