We’ve seen how ransomware managed to become a threat category that sends consumers and enterprise reeling when it hits them. It has become a high-commodity malware that is used as payload to spam email, macro malware, and exploit kit campaigns. It also digs onto victims’ pockets in exchange for recovering files from their encrypted form. This is where Crowti, Tescrypt, Teerac, and Locky have been very active.Ransom:MSIL/Samas, which surfaced in the past quarter, has a different way of getting into the system – it has a more targeted approach of getting installed. We have observed that this threat requires other tools or components to aid its deployment:
Read more about Samas on our blog "No mas, Samas: What's in this ransomware's modus operandi?"
But yes, you can say "no mas" (translation from Spanish: no more) to Samas ransomware.
Though ransomware and macro-based malware are on the rise, there’s still something that you or your administrators can proactively do:
The following are recent top 10 most-detected threats in each category for the past seven days.
I want to...