Welcome to Smokey's Security Forums.
Guests have only limited access to the board and it's features, please consider registering to gain full access!
Registration is free and it only takes a few moments to complete.

Smokey's Security Forums

Please login or register.

Login with username, password and session length
Advanced search  


There's now a tool to test for NSA spyware

Has your computer been infected with a suspected NSA spying implant? A security researcher has come up with a free tool that can tell.
Luke Jennings of security firm Countercept wrote a script in response to last week’s high-profile leak of cyberweapons that some researchers believe are from the U.S. National Security Agency. It's designed to detect an implant called Doublepulsar, which is delivered by many of the Windows-based exploits found in the leak and can be used to load other malware.

There's now a tool to test for NSA spyware

Malware Log Analysis & Removal Help * OTL (OldTimer ListIt) Tutorials & Tools * Ransomware Encryption & Decrytion Techniques * Official Jetico Inc. Support Forums

Share this topic on FacebookShare this topic on MySpaceShare this topic on RedditShare this topic on TwitterAuthorTopic: New TorrentLocker Ransomware Variant Targets Denmark  (Read 53 times)

0 Members and 1 Guest are viewing this topic.

QuizmasterTopic starter

  • Flying Nurse
  • Seasonal Competition Team
  • *
  • Offline Offline
  • location: USA - Miami,FL
  • Posts: 22168
  • .: Surf Queen
    • WWW
New TorrentLocker Ransomware Variant Targets Denmark
« Reply #1 on: March 01, 2017, 04:53:21 PM »
New TorrentLocker Ransomware Variant Targets Denmark
1 March 2017, 4:46 pm

In the past few days, two large spam waves have crashed into Denmark, carrying TorrentLocker ransomware, the famous malware. 

It seems that this time around the ransomware was distributed with the help of Microsoft Word documents embedded with malicious macros, say the researchers from Heimdal Security. Users were tricked into downloading these malicious files which caused them quite a lot of troubles. 

It seems that if the victim enabled the macro by clicking on the "Enable Editing" button, a PowerShell code was executed, which, in turn, downloaded ransomware from the TorrentLocker family. 

Of course, the default option simply allows users to view the file. Tapping that aforementioned button, however, tips the first domino piece which eventually leads to your entire computer being locked up. 

This new TorrentLocker variant comes with a few new features, un... (read more)

Source: Softpedia News / Security

>> To obtain the full Softpedia Security News article, click the link in the first post line <<

* Permissions
You can't post new topics.
You can't post replies.
You can't post attachments.
You can't modify your posts.
BBCode Enabled
Smilies Enabled
[img] Enabled
HTML Disabled

Except where otherwise stated, all content, graphics, banners and images included © 2006 - 2017 Smokey Services™ -- All rights reserved
Design board graphics, banners and images by Meg&Millie - Emma aka Tinker

This site don't store profiling-, tracking-, third-party and/or any other non-essential cookie(s) on client computers and is fully compliant with the EU ePrivacy Directive
Smokey's don't use any Web Analytics/Analysis Service, and also don't use any browser fingerprinting techniques



Smokey's provide free fully qualified OTL (OldTimer ListIt) and FRST (Farbar Recovery Scan Tool) Log / Malware Analysis & Removal Help and System Health Checks