Interesting.Do anyone have this ransomware sample post it on Malware Vault for SUD and test the BB.I don't test the AV but @Der.Reisende and othe av tester will check.More than 40 hours of virus circulating, and they enjoy the weekend!
For whom work AntiVirus company???
Whom they protect their clients or malware creators???
View attachment 143445
https://malwaretips.com/threads/fud-cryptolocker-downloader.69755/Interesting.Do anyone have this ransomware sample post it on Malware Vault for SUD and test the BB.I don't test the AV but @Der.Reisende and othe av tester will check.
KTS2018 detects the site as malicious, soon at MWHub:https://malwaretips.com/threads/fud-cryptolocker-downloader.69755/
Does only work with M$ Office and enabled Macros it seems. Did not work with my Office 2007 installation.
EDIT: AVG detects the payload via OnlineShield clicking on the link provided in the PDF.
Finally, thank God!ESET is first to detect it on VT
View attachment 143456
Does anyone know how to rescan withouth having the file?Finally, thank God!
Bravo for ESET!
The problem is many AV just have a list of bad sites, no heuristic or other method to detect them.Here is when different layer protection approach come into... in this case blocking the remote site would be enough to protect the user.
Certain together after exclusion will work but KIS is definitely enough. Maybe it just needs a little set KIS and it is.Hi sorry to be off topic but would KIS work with Webroot or is that too much?