Active ransomware attack uses impersonation and embedded advanced threats [source: barracuda]
In the last 24 hours, the Barracuda advanced security team has observed about 20 million attempts at a ransomware attack through an email attachment “Payment_201708-6165.7z.”
This attachment is a JavaScript file in a 7zip archive that the Barracuda ATP Dynamic Analysis Layer identifies as a “file-encryption/ransomware” type virus.
For more, click here.
Recommended Posts
Lazarus supply‑chain attack in South Korea [welivesecurity]
22 Nov 2020 - CIRT In Media, News Clipping
BlockThreat – Week 26, 2020
08 Jul 2020 - News Clipping