Ahnlab Ransomware
Find the latest threat intelligences direct from AhnLab’s security experts
Threat Analysis_Operation Shadow Force
Operation Shadow Force
This analysis report will examine Operation Shadow Force that had been hidden behind legitimate certificates for the last seven years.
DownLoadThreat Analysis
Five Malicious Sextortion Apps
This analysis report will examine the top five malicious applications being used for sextortion scams.
DownLoad
Ahnlab Anti-ransomware Tool (beta)
The Evolution of Magniber Ransomware. This analysis report will examine the recent malicious activities of Magniber ransomware from changes in exploited vulnerability to shellcode. PDF Downloads; Sour Lemon Duck: PowerShell Malware Exploiting SMB Vulnerability. Ransomware is a type of malware that encrypts your important files such as documents and images, making them inaccessible. The attackers then demand a ransom to unlock the files. This report presents the latest ransomware trends and best practices for ransomware response using the AhnLab MDS (Malware Defense System). In this phase, the malware attempts to inject the ransomware payload into an Ahnlab antivirus process. In order to do so, the second loader checks to see if Ahnlab antivirus is installed on the target machine. If the Ahnlab V3 Lite software service V3 Service exists, it checks if the file autoup.exe is available. AhnLab released a report on “Ransomware Trends in the 1st Quarter of 2016,” analyzing 13 kinds of ransomware that have been discovered in the first quarter of this year. This report explains notable features of ransomware discovered in the first quarter of 2016. Download the report to read more about ransomware trends.
Ahnlab Ransomware
Issue Report
Ahnlab Malware
The Evolution of Magniber Ransomware This analysis report will examine the recent malicious activities of Magniber ransomware from changes in exploited vulnerability to shellcode. DownLoad | |
Sour Lemon Duck: PowerShell Malware Exploiting SMB Vulnerability This analysis report presents the kill-chain, primary functions, and internal proliferation methods of Lemon Duck in full detail. DownLoad | |
Operation Kabar Cobra: Tenacious cyber-espionage by Kimsuky This report describes the latest attacks by Kimsuky Group including main methods, and changes in their purpose and targets. DownLoad | |
Full Discloser of Andariel, a Subgroup of Lazarus Threat Group This report describes the several cyberattacks by Andariel Threat Group including main methods, and changes in their purpose and targets DownLoad | |
Ghosts Dwelling in the USB Memory This analysis report will examine the the malware that has been dwelling in the USB memory during the last decade. DownLoad | |
Detailed Analysis of Red Eyes Hacking Group This report takes a closer look at the main activities of Red Eyes and another group that may be affiliated with it. DownLoad | |
Analysis Report on Attacks Targeting South Korea This report shows attacks targeting South Korea; attack method and hacking groups. DownLoad | |
Targeted Attacks on Defense Industry This report presents analysis of attacks on defense industry which can be serious concerns to national security. DownLoad |