Ransomware: WannaCrypt

ransomware-600x441

Saat ini dan beberapa minggu ke depan akan marak diperbincangkan berkaitan dengan ransomware WannaCrypt. Berikut ini beberapa artikel terkait ransomware WannaCrypt yang dikutip dari beberapa sumber, mudah-mudahan dapat membantu bagi yang terkena ransomware tersebut:

  • Monitoring Dashboard WannaCrypt
  • blogs.technet.microsoft.com | WannaCrypt ransomware worm targets out-of-date systems
  • kominfo.go.id | Himbauan Agar Segera Melakukan Tindakan Pencegahan Terhadap Ancaman Malware Khususnya Ransomware Jenis WannaCRY
  • medium.com | Can files locked by WannaCry be decrypted: A technical analysis
  • id.wikipedia.org | Serangan perangkat pemeras WannaCry
  • Malware Protection Center – microsoft.com | Ransom: Win32/WannaCrypt
  • idsirtii.or.id | Press Release Pencegahan Ransomware Wannacry ID-SIRTII/CC | Apa itu WannaCry?
  • symantec.com | What you need to know about the WannaCry Ransomware | WannaCry Ransomware: Top 10 Ways Symantec Incident Response Can Help | WannaCry Ransomware: 6 Implications for the Insurance Industry | Data Center Security Server Advanced Stops WannaCry | WannaCry: Ransomware attacks show strong links to Lazarus group | WannaCry Ransomware: Information from Symantec
  • julismail.staff.telkomuniversity.ac.id | Ransomware wannacry

Baca lebih lanjut

Iklan

Ransomware: Cerber

20161005-cerber-1-125x100Berikut ini beberapa artikel terkait Cerber Ransomware yang dikutip dari beberapa sumber, mudah-mudahan dapat membantu bagi yang terkena ransomware tersebut:

 

  • vaksin.com | Cerber 3: Ransomware yang sadar marketing
  • bleepingcomputer.com | Cerber Ransomware switches to a Random Extension and Ends Database Processes
  • pcrisk.com | Cerber ransomware removal instructions
  • bleepingcomputer.com | Cerber Ransomware switches to .CERBER3 Extension for Encrypted Files
  • bugsfighter.com | How to remove Cerber3 ransomware and decrypt .cerber3 files
  • keonesoftware | Cerber3 ransomware removal: how to decrypt .cerber3 virus files
  • malwarefixes.com |  Remove Cerber3 Ransomware and Decrypt Files
  • bleepingcomputer.com | Check Point releases working Decryptor for the Cerber Ransomware

Baca lebih lanjut

Is Zepto ransomware the new Locky?

zeptoPaul Ducklin | 05 JUL 2016 | nakedsecurity.sophos.com | Graham Chantry, Fraser Howard and Benjamin Humphrey of SophosLabs 

Beware the latest arrival on the ransomware scene: Zepto. It’s very similar to the well-known Locky malware, and the consequences of an attack are the same: your files end up scrambled, at which point the crooks offer to sell you the decryption key.

Baca lebih lanjut

Ransomware scum target corporate Office 365 users in 0-day campaign

Theregister.co.uk | Richard Chirgwin | 28 Jun 2016 at 03:30

office365logoweb_1003666Spam flood tried to drop malicious macros in inboxes.

It’s 2016, and Microsoft Office macros are still a viable infection vector: security outfit Avanan says it’s spotted a week-long, large-scale malware attack against Office 365 users.

Baca lebih lanjut

Microsoft Office 365 hit with massive Cerber ransomware attack, report

office365logoweb_1003666Scmagazine.com | Doug Olenick, Online Editor |  June 27, 2016

Millions of Microsoft Office 365 users were potentially exposed to a massive zero-day Cerber ransomware attack last week that not only included a ransom note, but an audio warning informing victims that their files were encrypted.

Baca lebih lanjut

New Hybrid Banking Trojan ‘GozNym’ Steals Millions

New Hybrid Banking Trojan 'GozNym' Steals Millions

Databreachtoday.com | Mathew J. Schwartz (euroinfosec) | April 18, 2016 

Ransomware Repurposed to Target Business Accounts

A cybercrime gang has been using new malware to target business customers of banks in the United States and Canada and steal millions of dollars, primarily from business accounts, researchers at the IBM X-Force security group warn.

Baca lebih lanjut

The ransomware that knows where you live

BBC | 8 April 2016

Ransomware

The ransomware gives users a limited time in which to pay a ransom and recover their files Baca lebih lanjut