TrueType Font vulnerabilities


Inside Cryptowall 2.0 Ransomware

An analysis of Cryptowall 2.0 reveals that the ransomware relies on complex encryption routines and sandbox detection capabilities to survive. It also uses Tor for command and control, and can execute on 32- and 64-bit systems.

Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.