Recent Posts

Excorsist Ransomware Analysis

2 minute read

Instead of attacking companies to deploy ransomware, the thread actors behind the Exorcist 2.0 ransomware are using a different way of attacking companies.

Lets Analyze Wasted Locker

5 minute read

This blog post will explain the workings of the ransomware named Wasted Locker based on 3 different samples. Last weeks I read a lot of articles about compan...

Lets Analyze Ragnar Locker

2 minute read

After reading this article about the Ragnar Locker ransomware running in a Windows XP VM to prevent it from being detected. I thought why not just analyze it...