ಟ್ವೀಟ್ಗಳು
- ಟ್ವೀಟ್ಗಳು
- ಟ್ವೀಟ್ಗಳು & ಪ್ರತಿಕ್ರಿಯೆಗಳು
- ಮಾಧ್ಯಮ
@demonslay335 ತಡೆಹಿಡಿಯಲಾಗಿದೆ
ನೀವು ಖಚಿತವಾಗಿಯೂ ಈ ಟ್ವೀಟ್ಗಳನ್ನು ನೋಡಲು ಬಯಸುವಿರಾ? ಟ್ವೀಟ್ಗಳನ್ನು ನೋಡುವುದು @demonslay335 ಅವರನ್ನು ತಡೆತೆರವುಗೊಳಿಸುವುದಿಲ್ಲ.
-
ಪಿನ್ ಮಾಡಿದ ಟ್ವೀಟ್
ID
#Ransomware is live! Special thanks to@malwrhunterteam for the sub-domain. http://id-ransomware.malwarehunterteam.com/ -
Polish Pabluk L0cker
#ScreenLocker UnlockCode=pabluk400 https://www.virustotal.com/en/file/68f7d9c38e8ee8d04bbdd11534eb227f030a2f71f1bae572f0da12298cbf0af6/analysis/ … So many Polish#malware seen recently ¯\_(ツ)_/¯pic.twitter.com/GGLNzGGpew
-
This
#Screenlocker comes with OpenSource-based#Ransomware and is spread as CashBillPending(Autosaved)1.pdf.exe. Extension .Harzhuangzi.https://twitter.com/jiriatvirlab/status/830081150081196035 …
-
-
Another day, another new ransomware found...
Looks like he is the developer of a crypter also.
More details later.
@BleepinComputerpic.twitter.com/jhWXvrFNUN
-
Another
#YourRansom#ransomware. This time, it is _not_ a joke build. ext: .gui https://www.hybrid-analysis.com/sample/6cd32149a5fde0bf525bb51f9a73de240a9f35db7e39d425e238b1e404de39d9?environmentId=100 … cc:@demonslay335@campuscodipic.twitter.com/SkJlYJGZlQ
-
DynA-Crypt not only Encrypts Your Files, but Also Steals Your Infohttps://www.bleepingcomputer.com/news/security/dyna-crypt-not-only-encrypts-your-files-but-also-steals-your-info/ …
-
After encryption, this form appears. Has no name. Source is full of the "Fadesoft" word, so calling it Fadesoft ransomware.
@BleepinComputerpic.twitter.com/3KIrRu2vsi
-
#DynA-Crypt#ransomware uses powershell. Comes with backdoor. (3/56) https://virustotal.com/en/file/644230b74727226bdbf6a65cb9dddc3d7557755c26fe64729cd6e834f5a005d5/analysis/ …pic.twitter.com/HoFTwOTvVQ
-
New
#ransomware "Serpent" targeting Danish Speakers: https://www.proofpoint.com/us/threat-insight/post/new-serpent-ransomware-targets-danish-speakers … -
*sigh* Another milestone for ID
#Ransomware I suppose. 300 ransomware families identifiable.pic.twitter.com/JXseECNyER
-
#Ransomware ext. '.id-%X%[email protected]_', notes 'COMO_ABRIR_ARQUIVOS.txt'. https://www.virustotal.com/en/file/cab632fca64fc77a1f55168ad94561a8e98e47a6b27adcb5419e81fee90c959b/analysis/ … Unpack https://www.virustotal.com/en/file/aa11bed283dfdc4a4822a38149040c3143cd25e14fc5e05ffc4eb05cbdeb5b76/analysis/1486566867/ …pic.twitter.com/1igxcLXVQ4
-
Interestingly blunt
#spam tactic... came right through filters, drops#Pony#Malware...#NotTodaypic.twitter.com/RSxulo6gkG
-
Erebus Ransomware Utilizes a UAC Bypass and Request a $90 Ransom Paymenthttps://www.bleepingcomputer.com/news/security/erebus-ransomware-utilizes-a-uac-bypass-and-request-a-90-ransom-payment/ …
-
Here is a demonstration video: https://www.youtube.com/watch?v=kzssD87DQKM … Thanks to
@BleepinComputer for it. -
MRCR1 now fakes
@Malwarebytes' AdwCleaner. Icon, VersionInfo and the cert.@BleepinComputer@demonslay335 cc@Fr33Tux@ToolsLibpic.twitter.com/UJ7N7IHIRX
-
There is a new ransomware. Called Cancer. It comes with this background.
No comment...
Will work on it later today.
@BleepinComputerpic.twitter.com/IrrY23jKrA
-
STUPID DECRYPTER (instruction and manual) https://decryptors.blogspot.ru/2017/02/stupid-decrypter.html …
-
#Ransomware Hunt: "Polski Ransomware". Ext. ".aes256", note "!!! - - ODZYSKAJ-PLIKI - - !!!.htm": http://pastebin.com/EBa2jxUq pic.twitter.com/dJpR6eSFbk
-
Open-sourced some code to interact with
@NetflixOSS's#Sketchy API using#PHP.https://github.com/Demonslay335/sketchy-api …
ಲೋಡಿಂಗ್ ಸಮಯ ಸ್ವಲ್ಪ ತೆಗೆದುಕೊಳ್ಳುತ್ತಿರುವಂತೆನಿಸುತ್ತದೆ.
Twitter ಸಾಮರ್ಥ್ಯ ಮೀರಿರಬಹುದು ಅಥವಾ ಕ್ಷಣಿಕವಾದ ತೊಂದರೆಯನ್ನು ಅನುಭವಿಸುತ್ತಿರಬಹುದು. ಮತ್ತೆ ಪ್ರಯತ್ನಿಸಿ ಅಥವಾ ಹೆಚ್ಚಿನ ಮಾಹಿತಿಗೆ Twitter ಸ್ಥಿತಿಗೆ ಭೇಟಿ ನೀಡಿ.
Michael Gillespie
Jiri Kropac
S!Ri
MalwareHunterTeam
Roland Dela Paz
BleepingComputer
Karsten Hahn
Jack
Jªn Poulsen
Jakub Kroustek
Amigo-A