According to a recent study, malicious actors and threat groups are generating, spending and reinvesting $1.5 trillion worth of cybercrime profits.
The rate of ransomware is rising, largely due to the availability of exploit kits and ransomware-as-a-service (RaaS) packages in underground marketplaces.
Threat actors are reviving exploit kits to deliver cryptocurrency miners through malvertising campaigns. The Neptune exploit kit mines for Monero.
RSA, in collaboration with major security firms and GoDaddy, has identified and eliminated many of the subdomains used in the RIG exploit kit.
RoughTed, a malvertising scheme that bypasses ad blockers and delivers poisoned ads through redirections, has been active for over a year.
A recently discovered malvertising campaign known as Stegano uses steganography and other techniques that researchers have observed in similar attacks.
The recently discovered CryptoLuck ransomware is distributed by the RIG-E exploit kit, suggesting that it may target a large pool of victims.
With heavyweight exploit kits like Nuclear, Angler and Neutrino out of the picture, the Sundown exploit kit appears poised for growth in the near future.
According to the most recent Proofpoint threat report, nearly 97 percent of malicious emails observed in Q3 2016 contained Locky ransomware.
The RIG exploit kit appears to be the new guy on the cybercrime block, and it’s stepping up to void left by older, fledgling kits. Anti-malware firm Malwarebytes noted the sharp drop for the Angler exploit kit in June. An alleged major...