BleepingComputer
10.4K subscribers
41 photos
24.5K links
Latest news and stories from BleepingComputer.com

From a bleeping computer to a working computer.
Download Telegram
Latest news and stories from BleepingComputer.com
German Police Make Fun Of "Not Very Clever" ATM Robbers
Berlin police mocked a group of bungling crooks that tried to rob an ATM, but instead of malware they chose explosives, which they unwittingly placed near a device that issued bank statements, and not the actual money-dispensing ATM. [...]
Latest news and stories from BleepingComputer.com
Master Decryption Keys and Decryptor for the Crysis Ransomware Released.
The master decryption keys for the CrySiS Ransomware have been released this morning in a post on the BleepingComputer.com forums. At approximately 1 AM EST, a member named crss7777 created a post in the CrySiS support topic at BleepingComputer with a Pastebin link to a file containing the master decryption keys and how to use them. [...]
Latest news and stories from BleepingComputer.com
Researcher finds the Karma Ransomware being distributed via Pay-per-Install Network
A security researcher  has discovered the Karma Ransomware, which pretends to be a Windows optimization program called Windows-TuneUp. What is worse is that this sample was discovered as software that would potentially be distributed by a pay-per-install software monetization company when people install free software they download. [...]
Latest news and stories from BleepingComputer.com
Ransoc Ransomware Extorts Users Who Accessed Questionable Content
A new ransomware variant nicknamed Ransoc is currently distributed via malvertising campaigns and exploit kits, locking the user's desktop, searching for sensitive content, and employing the found information in an attempt to extort users who accessed questionable content into paying a ransom fee. [...]
Latest news and stories from BleepingComputer.com
CryptoLuck Ransomware being Malvertised via RIG-E Exploit Kits
A new ransomware called CryptoLuck has been discovered being distributed via the RIG-E exploit kit. This ransom also utilizes an interesting method of infecting a victim through the legitimate GoogleUpdate.exe executable and DLL hijacking. [...]