Ransomware Campaign Alters Variants to Evade Detection

Status
Not open for further replies.
L

LabZero

Thread author
A recently uncovered operation has been mutating versions of ransomware to better avoid getting detected.

As part of the campaign, which researchers from Cambridge-based Cybereason have dubbed Kofer, attackers are tweaking certain variables of ransomware like CryptoWall 3.0 and Crypt0L0cker to evade static signature or hash-based detection.

While the malware variants are different, researchers have deduced that they’re being altered by one, singular group.

More
 

Solarquest

Moderator
Verified
Staff Member
Malware Hunter
Well-known
Jul 22, 2014
2,525
What are AV doing and what can they do to detect (proactively) these variants?
Are they using generic signatures? My inpression is most AV detect each sample by signature/hash after they got a sample or hope the BB detect it...only few have generic or good generic signatures/heuristic.....I might (hope to)be wrong...
 
Status
Not open for further replies.

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top