AL,

I am seeing lots of different version of ransomware .js downloaders 
(telescript, locky, and many others and variants) for which I have been feeding 
 the CalmAV team and creating sigs pushed out as winnow sigs in Steve’s feed.  
I can tell you that all that I have and am feeding have not been detected by 
ClamAV when I detected them.

> On Mar 15, 2016, at 2:15 PM, Al Varnell <alvarn...@mac.com> wrote:
> 
> That’s the KeRanger ransomeware which we dealt with last weekend.  Not 
> related to Teslacrypt AFAIK.
> 
> -Al-
> 
> On Tue, Mar 15, 2016 at 10:45 AM, Dennis Peterson wrote:
>> 
>> Already in the wild.
>> 
>> http://www.foxnews.com/tech/2016/03/07/new-mac-os-x-ransomware-targets-apple-users.html
> _______________________________________________
> Help us build a comprehensive ClamAV guide:
> https://github.com/vrtadmin/clamav-faq
> 
> http://www.clamav.net/contact.html#ml

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to