Cisco Talos Blog

October 13, 2016 11:07

LockyDump - All Your Configs Are Belong To Us

This post was authored by Warren Mercer and Matthew Molyett Summary Locky has continued to evolve since its inception in February 2016. This has made it difficult to track at times due to changes in the way in which it's distributed as well as various characteristics of the

July 25, 2016 11:01

Ransomware: Because OpSec is Hard?

This blog was authored by Edmund Brumaghin and Warren Mercer Summary Talos recently published research regarding a new variant of destructive ransomware, which we dubbed Ranscam. During further analysis of Ranscam samples, we discovered several indicators of compromise (IOCs

July 11, 2016 13:19

When Paying Out Doesn't Pay Off

This blog post was authored by Edmund Brumaghin and Warren Mercer Summary Talos recently observed a new ransomware variant targeting users. This ransomware shows that new threat actors are continuing to enter the ransomware market at a rapid pace due to the lucrative nature of

July 7, 2016 11:01

Connecting the Dots Reveals Crimeware Shake-up

This Post Authored by Nick Biasini For a couple of weeks in June the threat landscape was changed. Several high profile threats fell off the scene, causing a shake-up that hadn't been seen before. For a period of three weeks the internet was safer, if only for a short time.

June 30, 2016 19:10

Gotta be SWIFT for this Spam Campaign!

This blog post was authored by Warren Mercer Summary Talos have observed a large uptick in the Zepto ransomware and have identified a method of distribution for the Zepto ransomware, Spam Email. Locky/Zepto continue to be well known ransomware variants and as such we will focus

May 2, 2016 10:19

Cryptolocker 4 White Paper Available: The Evolution Continues

We are pleased to announce the availability of the Cryptolocker 4 white paper. Over the past year, Talos has devoted a significant amount of time to better understanding how ransomware operates, its relation to other malware, and its economic impact. This research has proven valu

April 15, 2016 11:29

Widespread JBoss Backdoors a Major Threat

Recently a large scale ransomware campaign delivering Samsam changed the threat landscape for ransomware delivery. Targeting vulnerabilities in servers to spread ransomware is a new dimension to an already prolific threat. Due to information provided from our Cisco IR Services Te

March 16, 2016 10:58

TeslaCrypt 3.0.1 - Tales From The Crypt(o)!

This post is authored by Andrea Allievi and Holger Unterbrink Executive Summary Ransomware is malicious software that is designed to hold users' files (such as photos, documents, and music) for ransom by encrypting their contents and demanding the user pay a fee to decryp

December 10, 2015 11:11

Threat Spotlight: CryptoWall 4 - The Evolution Continues

This post is authored byAndrea Allievi and Holger Unterbrink with contributions from Warren Mercer.   Executive Summary Over the past year, Talos has devoted a significant amount of time to better understanding how ransomware operates, its relation to other malware, and its ec