blog.trendmicro.com/trendlabs-security-intelligence/qkg-filecoder-self-replicating-document-encrypting-ransomware

Preview meta tags from the blog.trendmicro.com website.

Linked Hostnames

19

Thumbnail

Search Engine Appearance

Google

https://blog.trendmicro.com/trendlabs-security-intelligence/qkg-filecoder-self-replicating-document-encrypting-ransomware

qkG Filecoder: Document-Encrypting Ransomware

We encountered a few interesting samples of a file-encoding ransomware variant implemented entirely in VBA macros called qkG. It’s a classic macro malware infecting Microsoft Word’s Normal template upon which all new, blank Word documents are based.



Bing

qkG Filecoder: Document-Encrypting Ransomware

https://blog.trendmicro.com/trendlabs-security-intelligence/qkg-filecoder-self-replicating-document-encrypting-ransomware

We encountered a few interesting samples of a file-encoding ransomware variant implemented entirely in VBA macros called qkG. It’s a classic macro malware infecting Microsoft Word’s Normal template upon which all new, blank Word documents are based.



DuckDuckGo

https://blog.trendmicro.com/trendlabs-security-intelligence/qkg-filecoder-self-replicating-document-encrypting-ransomware

qkG Filecoder: Document-Encrypting Ransomware

We encountered a few interesting samples of a file-encoding ransomware variant implemented entirely in VBA macros called qkG. It’s a classic macro malware infecting Microsoft Word’s Normal template upon which all new, blank Word documents are based.

  • General Meta Tags

    11
    • title
      qkG Filecoder: Document-Encrypting Ransomware | Trend Micro (US)
    • charset
      UTF-8
    • viewport
      width=device-width, initial-scale=1
    • description
      We encountered a few interesting samples of a file-encoding ransomware variant implemented entirely in VBA macros called qkG. It’s a classic macro malware infecting Microsoft Word’s Normal template upon which all new, blank Word documents are based.
    • robots
      index,follow
  • Open Graph Meta Tags

    6
    • og:url
      https://www.trendmicro.com/en_us/research/17/k/qkg-filecoder-self-replicating-document-encrypting-ransomware.html
    • og:title
      qkG Filecoder: Document-Encrypting Ransomware
    • og:description
      We encountered a few interesting samples of a file-encoding ransomware variant implemented entirely in VBA macros called qkG. It’s a classic macro malware infecting Microsoft Word’s Normal template upon which all new, blank Word documents are based.
    • og:site_name
      Trend Micro
    • og:image
      https://www.trendmicro.com/content/dam/trendmicro/global/en/research/17/k/qkG-filecoder-ransomware.jpg
  • Twitter Meta Tags

    5
    • twitter:card
      summary_large_image
    • twitter:site
      @TrendMicro
    • twitter:title
      qkG Filecoder: Document-Encrypting Ransomware
    • twitter:description
      We encountered a few interesting samples of a file-encoding ransomware variant implemented entirely in VBA macros called qkG. It’s a classic macro malware infecting Microsoft Word’s Normal template upon which all new, blank Word documents are based.
    • twitter:image
      https://www.trendmicro.com/content/dam/trendmicro/global/en/research/17/k/qkG-filecoder-ransomware.jpg
  • Link Tags

    6
    • canonical
      https://www.trendmicro.com/en_us/research/17/k/qkg-filecoder-self-replicating-document-encrypting-ransomware.html
    • icon
      /content/dam/trendmicro/favicon.ico
    • stylesheet
      https://fonts.googleapis.com/css?family=Open+Sans:300,300i,400,400i,600
    • stylesheet
      //customer.cludo.com/css/296/1798/cludo-search.min.css
    • stylesheet
      /etc.clientlibs/trendresearch/clientlibs/clientlib-trendresearch.min.css

Emails

1

Links

196