Source |
Security Affairs |
Identifiant |
1055656 |
Date de publication |
2019-03-06 08:26:00 (vue: 2019-03-06 10:00:38) |
Titre |
[SI-LAB] #OpJerusalem 2019 – JCry ransomware is now infecting Windows users |
Texte |
Over the last few days, a new ransomware campaign infected several users around the world as part of the #OpJerusalem campaign. SI-LAB analyzed this malware and noticed that it does not use sophisticated techniques. Criminals used UPX packer to protect malware code written in Go and a RSA public certificate is hardcoded inside malware to […]
|
Envoyé |
Oui |
Condensat |
#opjerusalem 2019 affairs analyzed appeared around campaign certificate code criminals days does first hardcoded infected infecting inside jcry lab last malware new not noticed now over packer part post protect public ransomware rsa security several sophisticated techniques upx use used users windows world written |
Tags |
Ransomware
Malware
|
Stories |
|
Notes |
|
Move |
|