360 Total Security Blog » Languages » English

Download 360 Total Security for Windows. Protect and optimize your computer with award-winning antivirus. Speed up, clean up and secure your PC. All for free.

Latest articles

Secret-stealing Trojan active in Brazil releases the new framework SolarSys

Recently, 360 Security Center has detected a variety of hacking Trojans through the fileless attack protection function,and Trojans spread through the new Trojan distribution framework. According to the framework’s peculiar naming method, we named it SolarSys. SolarSys is mainly active in Brazil (South America), and Brazil has always been one of the...

APT-C-43 steals Venezuelan military secrets to provide intelligence support for the reactionaries — HpReact campaign

In June 2020, 360 Security Center discovered a new backdoor Pyark written in Python by the fileless attack protection function. Through in-depth excavation and trace analysis of the backdoor, we discovered a series of advanced threat actions that have been active since 2019. By invading various military institutions in Venezuela, the attackers deployed...

Fileless attack protection,fully protect computer security

What is a fileless attack? Different from the traditional local disk-based PE executable file attack, fileless attack refers to a malicious attack in which the executable file as a malicious payload runs directly in the memory without being stored on the disk. In this way, the virus author avoids directly landing malicious payloads such as PE files...

New infection chain of njRAT variant

Recently, 360 Security Center has detected that a variant of the remote access tool njRAT is active. Compared with the early infection of the njRAT Trojan’s executable program landing method, the Trojan uses scripts such as powershell to implement executable program memory execution to complete data theft and other malicious behaviors. , Added more...

New variant of Phobos ransomware is coming

In recent years, the spread of ransomware has become increasingly severe, thousands of servers and databases around the world have been invaded and destroyed. Among them, the Phobos ransomware virus family is notorious for being evil all year round. The Phobos ransomware first appeared in December 2018, and it was named after the suffix Phobos was...

FlowEncryption file encryption

Recently, 360 Security Center has detected that a file encryption virus in the form of a hoax has appeared on the network. In view of the encrypted file suffix of the virus is named “.flowEncryption”, we named it “flowEncryption file encryption virus”. After encrypting the victim’s files, the virus does not ask the ransom victim for ransom, and maliciously...

Panther Ransomware Strikes Again

Recently, 360 Security Center detected that a Panther ransomware virus was extremely active. After in-depth analysis, it was found that this was another “poisoning” operation by the hacker group “Oldpanther”. We found that the organization began active at the end of May in this year, with supply chain attacks, the infectious virus Peviru lurking in...

YourFilesEncrypted ransomware decryption

Recently, 360 Security Center detected a new ransomware virus. The encrypted file suffix of the virus was named “.FlyBox”, and we named it “YourFilesEncrypted Ransomware Virus”. The main body of YourFilesEncrypted ransomware is an executable file packaged by pyinstaller, which uses the python module to encrypt the victim files, and deletes the shadow...

FileCry file encryption ransomware analysis

Recently, 360 Security Center detected a file ransomware named after WannaCry. In view of the virus’s ransomware pop-up window titled “FileCry”, we named it “FileCry ransomware”. After encrypting the victim’s file, the virus will request 0.035 bitcoins to decrypt the ransom. But user don’t need to worry,  360 Total Security can intercept and kill the...

XMRig variant mining Trojan rampantly doing evil

In recent years, relying on the advantages of Monero’s better hiding mechanism and mining algorithms, the endless stream of mining Trojans can more easily “latent” evil. Recently, 360 Security Brain has detected an XMRig Monero variant miner, in the form of a camouflage system WMI service, many countries around the world have “successfully captured”...

Discover, share and read the best on the web

Subscribe to RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters! Get unfiltered news feeds or filter them to your liking.

Get Inoreader
Inoreader - Subscribe to RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters!