360 Total Security

Magniber Ransomware Gets Upgraded Again to Infect Windows Systems

The virus program itself has not changed much and can infect multiple versions of Windows operating systems. The virus uses the RSA+AES encryption scheme when encrypting files.

Poulight Trojan: A “txt file” can steal all your secrets

The Poulight Trojan has been put into use since last year and has complete and powerful functions to steal information. This attack proved that it has begun to spread and use overseas.

DarkWorld Ransomware Disguises as Commonly Used Software

Recently, 360 Security Center detected a ransomware that disguised as commonly used software and appeared on the network. The virus called itself DarkWorld in the ransom letter.

Secret stealing Trojan active in Brazil releases the new framework SolarSys

The SolarSys framework, which is mainly active in Brazil, is mainly composed of JavaScript backdoors, mail worms, and multiple spy modules. It uses the DGA algorithm to generate domain names randomly.

CrazyCoin,-the-master-of-double-mining,-double-white-utilization,-and-resource-utilization

After infecting users’ machines, it will download mining and stealing modules , And implanted the double pulsar backdoor program, each module cooperates with each other and performs its own duties.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags