![]() Although the Trojan itself has been intercepted by security software, it is still being used by users. The ransomware first appeared on August 7th and has been spreading since then. Trojans are bundled in the Windows Activator and spread through some foreign network disks. Through our precise analysis, we found this ransomware has a hidden configuration function, which can view and modify the key and prompt information used for encryption, and also obtain key decryption through this interface.įigure 1: The Activator bundled with ransomware Recently, 360 Security Center found a new kind of ransomware, which was spread by disguising as a Windows Activator. ![]() Windows Activator has been a popular tool for attackers to spread Trojan viruses.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |