Skip to content
info@precisionsec.comWe are online 24/7
X page opens in new windowLinkedin page opens in new window
PrecisionSec
Threat Intelligence Feeds
PrecisionSec
  • Home
  • Threat Intelligence Feeds
    • Malicious Domain Feed
    • Malicious IP Feed
    • Malware Feeds
      • Agent Tesla
      • Azorult
      • Cobalt Strike
      • Emotet
      • Nanocore RAT
      • njRAT
      • Lokibot
      • Trickbot
    • Ransomware Feed
  • Integrations
    • FortiGate Firewall
    • Microsoft Sentinel
    • MISP
    • OpenCTI
    • STIX/TAXII
  • Documentation
  • API
  • Contact
Search:
Search
  • Home
  • Threat Intelligence Feeds
    • Malicious Domain Feed
    • Malicious IP Feed
    • Malware Feeds
      • Agent Tesla
      • Azorult
      • Cobalt Strike
      • Emotet
      • Nanocore RAT
      • njRAT
      • Lokibot
      • Trickbot
    • Ransomware Feed
  • Integrations
    • FortiGate Firewall
    • Microsoft Sentinel
    • MISP
    • OpenCTI
    • STIX/TAXII
  • Documentation
  • API
  • Contact

Yearly Archives: 2017

You are here:
  1. Home
  2. 2017

Precisionsec-Blog-Locky-Actors-Adopt-QTLoader-to-Deliver-Ransomware

Locky Actors Adopt QTLoader to Deliver Ransomware

LockyBy precisionsecNovember 1, 2017

Starting October 19, 2017, the actors behind Locky distribution started using a new loader to drop their Ransomware. The new loader has been dubbed QTLoader or QTBot based on some strings and registry keys used by the malware. The use of the so-called QTLoader coincided with the adoption of the DDE AUTO feature of Office…

Precisionsec Blog Locky Ransomware Actors Adopt DDE Technique to Deliver Malware

Locky Ransomware Actors Adopt DDE Technique to Deliver Malware

LockyBy precisionsecOctober 19, 2017

The actors behind the Locky Ransomware family have adopted the recent highly publicized Dynamic Data Exchange (DDE) protocol vulnerability to deliver their malware. The DDE technique has been around for some time, but it was recently brought to attention by the people over at SensePost on October 9, 2017. The technique essentially allows for code…

Precisionsec Blog Packet Capture of WannaCry 2.0 Scanning SMB Port 445

Packet Capture of WannaCry 2.0 Scanning SMB Port 445

website securityBy precisionsecMay 15, 2017

On Friday May 12, 2017, version 2.0 of the WannaCry (WanaCry) Ransomware generated global interest due to infecting a number of systems in high profile government institutions across the globe including the NHS, Russian Interior Ministry, FedEx, the Russian Police, one of the largest cellphone operators in Russia (MegaFon), and the Frankfurt S-Bahn. The malware…

© PrecisionSec. All rights reserved.
Go to Top