An analysis of Cryptowall 2.0 reveals that the ransomware relies on complex encryption routines and sandbox detection capabilities to survive. It also uses Tor for command and control, and can execute on 32- and 64-bit systems.
Threatpost | The first stop for security news
Secure Hunter Anti -Malware
The post Inside Cryptowall 2.0 Ransomware Secure Hunter appeared first on Secure Hunter Anti-Malware.
http://ift.tt/1xEwNwj
Secure Hunter
No comments:
Post a Comment