M
Mihir :-)
Thread author
FireEye researchers spotted a Lockyransomware campaign using Javascriptdownloaders to infect users instead of macro- or binary-based downloaders.
Threat actors are sending the malicious downloaders using malicious .zip and .rar files disguised as invoices, corporate documents, tax information, and other seemingly benign files in order to spread the new downloader.
Read more Locky ransomware spotted using Javascript downloader
Threat actors are sending the malicious downloaders using malicious .zip and .rar files disguised as invoices, corporate documents, tax information, and other seemingly benign files in order to spread the new downloader.
Read more Locky ransomware spotted using Javascript downloader