blog.trendmicro.com/trendlabs-security-intelligence/qkg-filecoder-self-replicating-document-encrypting-ransomware
Preview meta tags from the blog.trendmicro.com website.
Linked Hostnames
19- 163 links toblog.trendmicro.com
- 12 links towww.trendmicro.com
- 3 links topartner.trendmicro.com
- 2 links toresources.trendmicro.com
- 2 links tosuccess.trendmicro.com
- 1 link tocloudone.trendmicro.com
- 1 link tonewsroom.trendmicro.com
- 1 link tosignin.v1.trendmicro.com
Thumbnail

Search Engine Appearance
qkG Filecoder: Document-Encrypting Ransomware
We encountered a few interesting samples of a file-encoding ransomware variant implemented entirely in VBA macros called qkG. It’s a classic macro malware infecting Microsoft Word’s Normal template upon which all new, blank Word documents are based.
Bing
qkG Filecoder: Document-Encrypting Ransomware
We encountered a few interesting samples of a file-encoding ransomware variant implemented entirely in VBA macros called qkG. It’s a classic macro malware infecting Microsoft Word’s Normal template upon which all new, blank Word documents are based.
DuckDuckGo
qkG Filecoder: Document-Encrypting Ransomware
We encountered a few interesting samples of a file-encoding ransomware variant implemented entirely in VBA macros called qkG. It’s a classic macro malware infecting Microsoft Word’s Normal template upon which all new, blank Word documents are based.
General Meta Tags
11- titleqkG Filecoder: Document-Encrypting Ransomware | Trend Micro (US)
- charsetUTF-8
- viewportwidth=device-width, initial-scale=1
- descriptionWe encountered a few interesting samples of a file-encoding ransomware variant implemented entirely in VBA macros called qkG. It’s a classic macro malware infecting Microsoft Word’s Normal template upon which all new, blank Word documents are based.
- robotsindex,follow
Open Graph Meta Tags
6- og:urlhttps://www.trendmicro.com/en_us/research/17/k/qkg-filecoder-self-replicating-document-encrypting-ransomware.html
- og:titleqkG Filecoder: Document-Encrypting Ransomware
- og:descriptionWe encountered a few interesting samples of a file-encoding ransomware variant implemented entirely in VBA macros called qkG. It’s a classic macro malware infecting Microsoft Word’s Normal template upon which all new, blank Word documents are based.
- og:site_nameTrend Micro
- og:imagehttps://www.trendmicro.com/content/dam/trendmicro/global/en/research/17/k/qkG-filecoder-ransomware.jpg
Twitter Meta Tags
5- twitter:cardsummary_large_image
- twitter:site@TrendMicro
- twitter:titleqkG Filecoder: Document-Encrypting Ransomware
- twitter:descriptionWe encountered a few interesting samples of a file-encoding ransomware variant implemented entirely in VBA macros called qkG. It’s a classic macro malware infecting Microsoft Word’s Normal template upon which all new, blank Word documents are based.
- twitter:imagehttps://www.trendmicro.com/content/dam/trendmicro/global/en/research/17/k/qkG-filecoder-ransomware.jpg
Link Tags
6- canonicalhttps://www.trendmicro.com/en_us/research/17/k/qkg-filecoder-self-replicating-document-encrypting-ransomware.html
- icon/content/dam/trendmicro/favicon.ico
- stylesheethttps://fonts.googleapis.com/css?family=Open+Sans:300,300i,400,400i,600
- stylesheet//customer.cludo.com/css/296/1798/cludo-search.min.css
- stylesheet/etc.clientlibs/trendresearch/clientlibs/clientlib-trendresearch.min.css
Emails
1Links
196- http://blog.trendmicro.com/trendlabs-security-intelligence/cerber-ransomware-evolution
- http://blog.trendmicro.com/trendlabs-security-intelligence/locky-ransomware-pushed-alongside-fakeglobe-upgraded-spam-campaigns
- http://www.trendmicro.com/internet-safety
- http://www.trendmicro.cz
- https://blog.trendmicro.com/content/dam/trendmicro/global/en/migrated/security-intelligence-migration-spreadsheet/trendlabs-security-intelligence/2017/11/qkG-macro-ransomware-1.png