the hidden enemy: malvertising and ransomware from 3rd... · our team was fully exposed and this...

73
The Hidden Enemy: Malvertising and Ransomware Brian Henger – Regional Vice President

Upload: others

Post on 27-Oct-2019

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

The Hidden Enemy: Malvertising and Ransomware Brian Henger – Regional Vice President

Page 2: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

All Staff

CEO

New Security Policy

Corporate Security Team

Don’t click that! Warm Regards, The Security Team

Dear Employees,

Page 3: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Malvertising (n) Malicious advertising is the use of online advertising to distribute malware (or scams) with little or no user interaction required.

And now a Short History Lesson…

Page 4: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

2007 2009 2011 2012 2013 2014 2015 2015

First noticed on Myspace and Rhapsody using Adobe Flash

2007

Page 5: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

2007 2009 2011 2012 2013 2014 2015 2015

Click-fraud scam on the NY Times website

2009

Page 6: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

2007 2009 2011 2012 2013 2014 2015 2015

2.5x increase from previous year Ads from Spotify serve malware that DOES NOT NEED THE USER TO CLICK!

2011

Page 7: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

2007 2009 2011 2012 2013 2014 2015 2015

LA Times was hit by a massive malvertising attack which

used the Blackhole exploit kit to infect users.

2012

Page 8: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

2007 2009 2011 2012 2013 2014 2015 2015

A campaign targeting Yahoo infected

machines with Banker Trojans

2013

Page 9: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

2007 2009 2011 2012 2013 2014 2015 2015

In its effort to battle malvertising, Google disabled more than

524 million bad ads and banned thousands of advertisers

2014

Page 10: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

2007 2009 2011 2012 2013 2014 2015 2015

Comparing the first half of 2015 to ALL of 2014

malvertising increased by 260%*

450,000 compared to 250,000*

First Half of 2015

*according to RiskIQ

Page 11: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

2007 2009 2011 2012 2013 2014 2015 2015

According to Google, in 2015 they disabled more than

780 million ads, an almost 50% increase from 2014.

2015

Page 12: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Some Examples

Page 13: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)
Page 14: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Malvertising attacks can also lead to Scams

Page 15: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

How Does It Work?

• Advertisers sign up with an

advertising network

• Advertisers bid in real time to get

their ads selected

• Bad Actors will serve out good ads for

a while before they switch to malverts

• Ads and advertising space is

increasingly being transacted

programmatically

• Billions of ads are displayed to users

in real-time

Page 16: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

• Ads are displayed in real time

• Ads are targeted to user profiles

• Billions of impressions every day

• 3rd-party advertisers can play

Pro’s

• Real-time brings opportunistic attacks

• The Malware can “target” too

• Bad actors can hide in the complexity

• Difficulty in tracking down offenders

Advertisers love this stuff: But it opens the door for:

Con’s

Page 17: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

How Bad Actors Get Onto Good Websites:

•Not all ad networks have strict criteria for advertisers

•An “impression” can go through many intermediaries

• Sellers don’t always know the buyers

• Some ad platforms allow newcomers in cheap!

Page 18: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Some Ad Platforms Allow Newcomers in Cheap!

Page 19: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Some Technical Stuff

Page 20: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

• Flash is a ubiquitous plugin that renders graphics and animations

• Heavily used by the ad industry

• Flash has zero-day vulnerabilities that can be exploited

• When the ad loads, so does the exploit!!!

Using Adobe’s Flash to Deliver Exploits

Page 21: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Vulnerabilities By Year

Page 22: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

• Domain

• Campaign ID

• Affiliate ID

• Real-time-buy info

• Actual ad content

SSL obfuscates all that good data!

The Ad Can Give Us Lots of Data

Page 23: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

How Malware uses “fingerprinting”

• Malware authors want to target victims of interest, and foil research labs

• Fingerprinting code prevents malware from running on machines that are:

• Virtual Machines

• Connected to a VPN

• Running certain advanced security products

• Some security products can detect when they are being fingerprinted (and use this as a “suspicious

indicator”)

• So now malvertising is changing to camouflaged its fingerprinting!

Page 24: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

POP QUIZ: Where is the fingerprinting code?

1x1 pixel GIF

Page 25: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)
Page 26: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Will malvertising affect me?

Page 27: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Do Your People Go To These Sites?

• There was a huge malvert attack recently

•Malvert ads were served to many high-profile sites

• These ads were delivering ransomware!

Page 28: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

MSN.COM

NYTIMES.COM

BBC.COM

AOL.COM

XFINITY.COM

NFL.COM REALTOR.COM

THEWEATHERNETWORK.COM

THEHILL.COM

NEWSWEEK.COM ANSWERS.COM

BOSTON.COM

CBS.COM

CBSSPORTS.COM

CHICAGOTRIBUNE.COM DAILYMOTION.COM

DICTIONARY.COM

REFERENCE.COM EHOW.COM

FOXNEWS.COM ANDROIDCENTRAL.COM

DRUDGEREPORT.COM

HUFFINGTONPOST.COM

LATIMES.COM

HOWTOGEEK.COM

LEGACY.COM

COX.COM

YAHOO.COM

NEWSWEEK.COM

NYDAILYNEWS.COM

NYPOST.COM

PHOTOBUCKET.COM

POLITICO.COM

REUTERS.COM ABOUT.COM

LENOVO.COM TOSHIBA.COM

THEBLAZE.COM

TIME.COM

THEGUARDIAN.COM

NYTIMES.COM

WHITEPAGES.COM

Page 29: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)
Page 30: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

What can I do?

• Keep your software patched

• Remove software you don’t use

• Run the latest browsers

• Keep your anti-malware software up to date

• Run an effective anti-exploit technology

• Train your staff on good security practices

Page 31: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Delivering The Payload: Ransomware

Page 32: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Ransomware (n) Malware that will encrypt or lock all personal files, and then demand payment of the “ransom” to decrypt or unlock them.

Page 33: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

How Malwarebytes got into Nascar

From: Joe Chisholm [mailto:[email protected]]

Sent: Wednesday, April 13, 2016 9:52 AM

To: Rebecca Kline <[email protected]>

Subject: NASCAR with Ransom Malware Victim Marketing Opportunity

Hi Rebecca!

I left you a voicemail earlier but I thought I would reach out and give you a little more information to what I was thinking about how we

could work together...

I work for CSLFR which is the fastest growing team in the NASCAR Sprint Cup Series... Recently last week our crew chief of our team was

hit with a ransom virus and his computer which holds tens of millions of dollars worth of data was corrupted and we were forced to pay

the ransom... Our team was fully exposed and this was a very scary time to say the least!

Page 34: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Ransomware Landscape

• 96% of US companies aren’t very confident in their defenses for stopping ransomware

• 80% of orgs were victims of a cyberattack in last year, 50% were victims of ransomware attacks

• Most heavily targeted industries for ransomware are healthcare and financial services

• 1 in 4 ransomware attacks targeted senior executives and the C-Suite

• 50% of corporate decision makers consider ransomware to be a “concern” or “extreme concern”

• Globally, nearly 40% of ransomware victims paid the ransom

Source: Osterman Research, July 2016

Page 35: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)
Page 36: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Ransom: $500 to $1,000

Page 37: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Modern Ransomware

• The encryption is nearly impossible to crack

• If you don’t have backups, the only way of getting your files back is to pay the ransom

• Are there decryptors? Not anymore…

Page 38: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Original File

AES Symmetric Key (different for each file)

Encrypted File

Encrypt the File’s Key

Encrypt the File

RSA Public Key from Master (Asymmetric Key)

Encrypted Key + File

Page 39: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Ransomware Detection: A behavioral approach

Page 40: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

The 4-step process

Step 1: Detect

• Constantly look for ransomware behaviors. When detected…

Step 2: Arrest

• Immediately halt the encryption process, and then…

Step 3: Remove

• Track down the ransomware and delete it, then…

Step 4: Remediate

• Restore any encrypted files (usually a manual process)

Page 41: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Step 1: Detecting Ransomware

Page 42: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Process X

Code

Code

Code

Thread

NiceCode

Open fileRead the fileClose the fileDownload somethingUpdate the screenWait for a keystroke……...

A Primer on Processes and Threads

Page 43: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Some Processes Have Only a Few Threads

Page 44: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Some Windows Programs Use LOTS of Threads

Page 45: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Ransomware

Code

RansomwareCode!

Find all the PHOTO filesEncrypt themRename themDestroy the originals

Find all the .DOC filesEncrypt themRename themDestroy the originals

Delete all the backups!Delete all the restore points!

What a Ransomware Process and Thread Does

Page 46: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Using “Behavior” to Look For Ransomware

• Watch all the threads in every process, looking for ransomware behaviors

• Some behaviors are more “suspicious” than others

• If too many of these happen, triggers a detection!

Page 47: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Detecting Ransomware by its Behavior

Suspicious Behaviors

• Deleting a file

• Writing new data to a file

• Renaming a file

Bad Behaviors

• Deleting the “Volume Shadows”

• Stopping the Volume Shadow Service

• Deleting Restore Points

• Using a “File Wipe” utility

• Supersede a file (e.g. change from .XLS to something else)

Really Bad Behaviors!!

• Looking for encryption keys

• Runs encryption command line

• Registry operations that indicate encryption

• Encrypting a file!

Page 48: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Step 2: Arresting the Encryption Process

Page 49: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Ransomware

Code

RansomwareCode!

Find all the PHOTO filesEncrypt themRename themDestroy the originals

Find all the .DOC filesEncrypt themRename themDestroy the originals

Delete all the backups!Delete all the restore points!

Arresting the Encryption Process (The easiest step!)

Page 50: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Step 3:

Removing the Ransomware, and why that is harder than it looks.

(but first, a short lesson)

Page 51: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Process X

Code

Code

Code

Process Y

Code

Code

Code

Code

Code

Threads can “inject” threads into other processes? What?!!

Page 52: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Process X

Code

Code

Code

New Process Z

Code

Code

Code

Code

Code

Threads can start processes and THEN “inject” threads?

Page 53: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Process X

Code

Code

Code

Code

Process Y

Code

Code

Code

Code

Process W

Code

Code

Code

Code

An “Injection Chain”

Page 54: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Ransomware

Code

Code

Code

Process Y

Code

Code

Code

Code

Code

Process W

Code

Code

Code

Code

Photos

Instigator

Ransomware uses “Injection Chains” to hide itself from detection

Page 55: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Cryptowall

Code

Code

Code

New Process ZCode

Code

Code

The Even Harder Part: CryptoWall 4 Techniques for Evasion – Code Injection

Page 56: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Cryptowall

Code

Code

Code

explorer.exe

Code

Code

Code

Photos

svchost.exe

Code

Code

The Even Harder Part: CryptoWall Injection Chain

Page 57: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

To track down and remove the actual instigator,

anti-ransomware programs must keep records of all the

processes, threads and injections.

Page 58: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Step 4: Remediate

Page 59: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Remediation and the Aftermath

• Restore from Backup

• Delete the encrypted files from the Backup History

• And BTW, make sure you have History enabled!

• Root-cause analysis

• Review file and server read/write permissions

• Review security technology (esp. Firewall)

• Train your staff

Page 60: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

The Villain of the Piece:

Vulnerabilities

Page 61: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Vulnerability (n):

A flaw or weakness in software that could be exploited to violate the system's security policy.

Page 62: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

35%

65%

80%

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

2013 2014 2015

Malware delivered through vulnerabilities (Malwarebytes Labs)

Page 63: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

From a study done by the ICT institute in The Netherlands, based on CVE data.

Page 64: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Where do all these Vulnerabilities come from?

The people who wrote the code!

Page 65: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

0

200

400

600

800

1000

1200

1400

1600

1800

Vulnerabilities by Vendor (2015, from CVE)

Page 66: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

About Malwarebytes

Page 67: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Founded in 2008, 400+ employees focused on the

“Infection Landscape.”

Malwarebytes is the global standard

for complete malware removal.

Malwarebytes’ agile research team keep our

customers in the fight against

malware.

We don’t just remove threats,

we prevent them—stopping data

breaches before they happen.

Crushes Malware. Restores Confidence.

Page 68: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

70,000+ Businesses protected

750,000,000 IT hours saved

605,000 Threats blocked

every hour

280,000,000+ Endpoints

protected

Trusted by Millions

Page 69: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Age of Threat

Level of Risk

Malware poses the largest risk on Zero Day, when little or no defenses exist for the new threat.

With an average dwell time of 200+ days, most security companies fall short of addressing new threats.

Malwarebytes ends that threat, delivering true zero-day protection that most endpoints are lacking.

DAY ZERO

Why Now? Why Us?

Page 70: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

How Malwarebytes Can Help: Multi-layered protection against malware, including ransomware

Profiling – fingerprinting detection and application hardening

Delivery – web blocking prevents access to phishing and malicious websites

Exploitation – signature-less exploit mitigation prevents shellcode execution

Payload Execution – signature-less app behavior protection, advanced heuristics

Malicious Behavior – signature-less ransomware behavior monitoring, C&C blocking, remediation engine

Detecting and stopping advanced threats throughout the attack chain:

Page 71: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Desktops + Laptops Data Center + Cloud Servers

Security & Management Tools

How Malwarebytes Can Help: Advanced threat removal

Page 72: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Let’s Take Your Questions

Learn More: malwarebytes.com/business

Latest News: blog.malwarebytes.com

Request a Trial: malwarebytes.com/business/licensing

Page 73: The Hidden Enemy: Malvertising and Ransomware from 3rd... · Our team was fully exposed and this was a very scary time to say the least! ... (e.g. change from .XLS to something else)

Thank You!