Learning PowerShell: The basics

Credit to Author: Pieter Arntz| Date: Tue, 11 Jul 2017 15:00:15 +0000

Get acquainted with some of the basic principles of Powershell and get prepared for some basic usage of this versatile tool that is available on all modern Windows systems.

Categories:

Tags:

(Read more…)

The post Learning PowerShell: The basics appeared first on Malwarebytes Labs.

Read more

New social engineering scheme triggers on mouse movement

Credit to Author: Jérôme Segura| Date: Thu, 08 Jun 2017 18:49:21 +0000

No macro, no exploit. This attack uses mouse movement to launch malicious code in booby-trapped documents.

Categories:

Tags:

(Read more…)

The post New social engineering scheme triggers on mouse movement appeared first on Malwarebytes Labs.

Read more

Windows Defender ATP thwarts Operation WilySupply software supply chain cyberattack

Credit to Author: msft-mmpc| Date: Thu, 04 May 2017 16:29:18 +0000

Several weeks ago, the Windows Defender Advanced Threat Protection (Windows Defender ATP) research team noticed security alerts that demonstrated an intriguing attack pattern. These early alerts uncovered a well-planned, finely orchestrated cyberattack that targeted several high-profile technology and financial organizations. An unknown attacker was taking advantage of a silent yet effective attack vector: the compromised…

Read more

Report: Cybercrime climate shifts dramatically in first quarter

Credit to Author: Malwarebytes Labs| Date: Thu, 13 Apr 2017 09:00:09 +0000

The first quarter of 2017 brought with it some significant changes to the threat landscape and we aren’t talking about heavy ransomware distribution either. Threats which were previously believed to be serious contenders this year have nearly vanished entirely, while new threats and infection techniques have forced the security community to reconsider collection and analysis efforts.

Categories:

Tags:

(Read more…)

The post Report: Cybercrime climate shifts dramatically in first quarter appeared first on Malwarebytes Labs.

Read more

Improved scripts in .lnk files now deliver Kovter in addition to Locky

Cybercriminals are using a combination of improved script and well-maintained download sites in trying to install Locky and Kovter on more computers. A few months ago, we reported an email campaign distributing .lnk files with a malicious script that downloaded Locky ransomware on target computers. Opening the malicious .lnk files executed a PowerShell script that…

Read more