A few days ago, NotPetya came into our purview, and left enterprises globally with many questions.
This week, CounterTack announced a Series D round of financing. This round of funding is led by new CounterTack investor Singtel Innov8 (venture capital arm of The Singtel Group), along with SAP National Security Services (SAP NS2 ™), also a new investor in CounterTack.
Topics: malware analysis, endpoint security, CounterTack, EDR, endpoint detection and response, Ransomware, endpoint software, threat scan, ETP, enterprise security, threat hunting, malware detection, Endpoint Threat Platform, endpoint security solution, memory analysis
The WannaCry ransomware started to hit companies worldwide this past Friday, setting off a wave a panic about what to do about it. The reality is this attack will continue to proliferate, and it will likely continue to command attention from CISOs to the boardroom to the media for the upcoming weeks. The attack was first reported to have started to hit companies in Europe and Asia this past Friday, and so far to-date, over 200,000 systems in 150 countries.
It’s been a few years since we have seen CryptoLocker on a regular basis, but now it seems to be making its rounds again via a new spam campaign. The new CryptoLocker variant has been around for many years, and has evolved over that time.
CryptoLocker used to be very popular back when the Zeus botnet was making its rounds. The way it worked was once a computer was infected with the Zeus malware, it would be used to push the CryptoLocker ransomware onto the machine.
Topics: malware analysis, endpoint security, CounterTack, EDR, endpoint detection and response, Ransomware, endpoint software, threat scan, ETP, CryptoLOcker, enterprise security, threat hunting, malware detection, Endpoint Threat Platform, Micah Graf, endpoint security solution, memory analysis
You can’t read the news these days without being blasted with yet another Ransomware story. Almost daily, there seems to be a new variant, a new name, and inevitably, new victims. The rise of Ransomware attacks shouldn’t come as a surprise, since its execution is quite simple and the demands on the victims are not onerous.Ransomware is not like an APT (Advanced Persistent Threat) - there is no need for long-term stealth operation, no need to explore the victim’s networks and resources, no need to steal credentials and no need to quietly and patiently exfiltrate sensitive data. With Ransomware, an exploit kit opens the door, and BANG, there it is, your PC is displaying a ransom note with detailed instructions on how to pay.