Wednesday, January 7, 2015

Inside Cryptowall 2.0 Ransomware Secure Hunter

An analysis of Cryptowall 2.0 reveals that the ransomware relies on complex encryption routines and sandbox detection capabilities to survive. It also uses Tor for command and control, and can execute on 32- and 64-bit systems.

Threatpost | The first stop for security news

Secure Hunter Anti -Malware



The post Inside Cryptowall 2.0 Ransomware Secure Hunter appeared first on Secure Hunter Anti-Malware.






http://ift.tt/1xEwNwj

Secure Hunter

No comments:

Post a Comment