Cisco Talos Blog

October 13, 2016 11:07

LockyDump - All Your Configs Are Belong To Us

This post was authored by Warren Mercer and Matthew Molyett Summary Locky has continued to evolve since its inception in February 2016. This has made it difficult to track at times due to changes in the way in which it's distributed as well as various characteristics of the

July 25, 2016 11:01

Ransomware: Because OpSec is Hard?

This blog was authored by Edmund Brumaghin and Warren Mercer Summary Talos recently published research regarding a new variant of destructive ransomware, which we dubbed Ranscam. During further analysis of Ranscam samples, we discovered several indicators of compromise (IOCs

June 30, 2016 19:10

Gotta be SWIFT for this Spam Campaign!

This blog post was authored by Warren Mercer Summary Talos have observed a large uptick in the Zepto ransomware and have identified a method of distribution for the Zepto ransomware, Spam Email. Locky/Zepto continue to be well known ransomware variants and as such we will focus

April 27, 2016 11:51

The "Wizzards" of Adware

This post was authored by Warren Mercer with contributions from Matthew Molyett Executive Summary Talos posted a blog, September 2015, which aimed to identify how often seemingly benign software can be rightly condemned for being a piece of malware. With this in mind, this blog