Researchers have spotted a malvertising campaign that is delivering two payloads to victims: the Vidar information stealer and GandCrab ransomware.
The creators of a ransomware-as-a-service threat dubbed Princess Evolution are looking for affiliates to spread the Rig exploit kit in exchange for 60 percent of what's stolen.
New ransomware attacks from GandCrab suggest that the authors are moving quickly to improve its ability to evade detection and impede analysis by security researchers.
According to security researchers, the Emotet Trojan is not only still active but has become more sophisticated and persistent in the four years since its initial discovery.
According to new research, exploit kit creators have been targeting some of the oldest and most common software flaws — even as the cyberthreat landscape shifts to more sophisticated attack vectors.
According to a recent study, malicious actors and threat groups are generating, spending and reinvesting $1.5 trillion worth of cybercrime profits.
The rate of ransomware is rising, largely due to the availability of exploit kits and ransomware-as-a-service (RaaS) packages in underground marketplaces.
Threat actors are reviving exploit kits to deliver cryptocurrency miners through malvertising campaigns. The Neptune exploit kit mines for Monero.
RSA, in collaboration with major security firms and GoDaddy, has identified and eliminated many of the subdomains used in the RIG exploit kit.
RoughTed, a malvertising scheme that bypasses ad blockers and delivers poisoned ads through redirections, has been active for over a year.