Good news ! Hackbusters community is waiting for you !  https://discuss.hackbusters.com
KnowBe4 has been running the HackBusters site for a few years now, providing you with trending IT security news. We are expanding it and have launched a new exciting online community! The forum is divided into four main topics or categories: Social Engineering, Ransomware, Phishing and Security Awareness Training. You are invited to be one of the first to join us at: https://discuss.hackbusters.com.

The Week in Ransomware - January 11th 2019 - Access-as-a-Service

Security-lock-292-170

For the most part it has been a slow this week in terms of new ransomware variants being released. On the other hand, there has been quite a bit of interesting information that was released about Ryuk.

Researchers from FireEye and CrowdStrikereleased reports this week that explain how Ryukpartneredwith TrickBotin an access-as-a-service in order to gain access to infected networks. Other reports also came out that lead researchers to believe that the attackers behind Ryuk are Russian, rather than North Korean.

Contributors and those who provided new ransomware information and stories this week include: @demonslay335,@struppigel, @Seifreed, @fwosar, @jorntvdw, @malwareforme, @malwrhunterteam, @FourOctets, @BleepinComputer, @PolarToffee, @LawrenceAbrams, @ChristiaanBeek, @John_Fokker, @cglyer, @ItsReallyNick, @CrowdStrike, @FireEye, @McAfee_Labs, and@BBC.

January 5th 2019

MalwareHunterTeamdiscovered a very simply ransomware that is a batch file called Encoder.bat and uses...(continued)

View All Trending Stories