

For many of you, this is something you already know, since over 50% of our customers already run Malwarebytes as their sole security software, without any third-party antivirus. While signatures are still effective against threats like potentially unwanted programs, large portion of our malware detection events already come from our signature-less technologies like our Anti-Exploit and Anti-Ransomware that trend will only continue to grow. With the launch of Malwarebytes 3.0, we are confident that you can finally replace your traditional antivirus, thanks to our innovative and layered approach to preventing malware infections using a healthy combination of proactive and signature-less technologies. Our engineers have spent the last year building this product from the ground up and have combined our Anti-Malware, Anti-Exploit, Anti-Ransomware, Website Protection, and Remediation technologies all into a single product which we simply call “Malwarebytes.” And it scans your computer 4 times faster! Meanwhile, back in April, SentinelLabs reported how a LockBit subsidiary used the legitimate VMware command-line utility, VMwareXferlogs.exe, in a live deployment to sideload Cobalt Strike.I am thrilled to announce the launch of our next-generation product, Malwarebytes 3.0! This product is built to provide comprehensive protection against today’s threat landscape so that you can finally replace your traditional antivirus. The research was quickly followed by others who reported similar findings. Last week SentinelLabs reported on LockBit 3.0 (aka LockBit Black) and described how the latest iteration of this increasingly popular RaaS implemented a set of anti-analysis and anti-debugging routines.


LockBit has been getting quite a bit of attention lately. This is followed by the classic process: the blackmail software LockBit is used, the system is encrypted and a ransom demand is displayed. In this way, a victim's system is specifically infected. Advertisement Microsoft Defender Tool abusedĪt this point, the attackers exploit the Log4j vulnerability to MpCmdRun.exe Download the infected "mpclient" DLL file and the encrypted Cobalt Strike payload file from their command and control server.
