Skip to content
info@precisionsec.comWe are online 24/7
X page opens in new windowLinkedin page opens in new window
PrecisionSec
Threat Intelligence Feeds
PrecisionSec
  • Home
  • Threat Intelligence Feeds
    • Malicious Domain Feed
    • Malicious IP Feed
    • Malware Feeds
      • Agent Tesla
      • Azorult
      • Cobalt Strike
      • Emotet
      • Nanocore RAT
      • njRAT
      • Lokibot
      • Trickbot
    • Ransomware Feed
  • Integrations
    • FortiGate Firewall
    • Microsoft Sentinel
    • MISP
    • OpenCTI
    • STIX/TAXII
  • Documentation
  • API
  • Contact
Search:
Search
  • Home
  • Threat Intelligence Feeds
    • Malicious Domain Feed
    • Malicious IP Feed
    • Malware Feeds
      • Agent Tesla
      • Azorult
      • Cobalt Strike
      • Emotet
      • Nanocore RAT
      • njRAT
      • Lokibot
      • Trickbot
    • Ransomware Feed
  • Integrations
    • FortiGate Firewall
    • Microsoft Sentinel
    • MISP
    • OpenCTI
    • STIX/TAXII
  • Documentation
  • API
  • Contact

Category Archives: Locky

You are here:
  1. Home
  2. Category "Locky"

Precisionsec-Blog-Locky-Actors-Adopt-QTLoader-to-Deliver-Ransomware

Locky Actors Adopt QTLoader to Deliver Ransomware

LockyBy precisionsecNovember 1, 2017

Starting October 19, 2017, the actors behind Locky distribution started using a new loader to drop their Ransomware. The new loader has been dubbed QTLoader or QTBot based on some strings and registry keys used by the malware. The use of the so-called QTLoader coincided with the adoption of the DDE AUTO feature of Office…

Precisionsec Blog Locky Ransomware Actors Adopt DDE Technique to Deliver Malware

Locky Ransomware Actors Adopt DDE Technique to Deliver Malware

LockyBy precisionsecOctober 19, 2017

The actors behind the Locky Ransomware family have adopted the recent highly publicized Dynamic Data Exchange (DDE) protocol vulnerability to deliver their malware. The DDE technique has been around for some time, but it was recently brought to attention by the people over at SensePost on October 9, 2017. The technique essentially allows for code…

© PrecisionSec. All rights reserved.
Go to Top