logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • GitHub Breach – Hackers Stole Code Signing Certificates From Repositories
  • Misconfiguration and vulnerabilities biggest risks in cloud security: Report
  • Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
  • Coalition Forecasts CVE Disclosure Spike in 2023
  • CVE-2023-23924: Critical-Severity RCE Flaw Found in Popular Dompdf Library

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2022-40034 (javaweb_blog) 23 January 2023
  • CVE-2022-4017 (booster_elite_woocommerce, booster_for_woocommerce, booster_plus_woocommerce) 23 January 2023
  • CVE-2022-4230 (wp_statistics) 23 January 2023
  • CVE-2022-3425 (google_analyticator) 23 January 2023
  • CVE-2021-43444 (server) 23 January 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

Moloch ransomware – new cryptovirus from the Makop ransomware family

Posted on 31 December 2020

From 2-spyware.com

Moloch ransomware

Moloch ransomware is a computer virus infection that encrypts all personal victim files on an affected device and demands a ransom for unlocking them. This file-locking parasite belongs to a relatively small Makop ransomware family compared to others, such as Djvu or Dharma.

Read more…

Posted in News

Post navigation

Previous post: Emotet campaign hits Lithuania’s National Public Health Center and several state institutions
Next post: Coldsnap: Python Snapshot Fuzzer
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.