Interesting.Do anyone have this ransomware sample post it on Malware Vault for SUD and test the BB.I don't test the AV but @Der.Reisende and othe av tester will check.
KTS2018 detects the site as malicious, soon at MWHub:https://malwaretips.com/threads/fud-cryptolocker-downloader.69755/
Does only work with M$ Office and enabled Macros it seems. Did not work with my Office 2007 installation.
EDIT: AVG detects the payload via OnlineShield clicking on the link provided in the PDF.
The problem is many AV just have a list of bad sites, no heuristic or other method to detect them.Here is when different layer protection approach come into... in this case blocking the remote site would be enough to protect the user.
Certain together after exclusion will work but KIS is definitely enough. Maybe it just needs a little set KIS and it is.Hi sorry to be off topic but would KIS work with Webroot or is that too much?