#ransomwareasaservice — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #ransomwareasaservice, aggregated by home.social.
-
Inside Vect Ransomware-as-a-Service
Pulse ID: 69f97a709f2e7dddc097dbd2
Pulse Link: https://otx.alienvault.com/pulse/69f97a709f2e7dddc097dbd2
Pulse Author: Tr1sa111
Created: 2026-05-05 05:04:48Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #InfoSec #OTX #OpenThreatExchange #RansomWare #RansomwareAsAService #bot #Tr1sa111
-
Inside Vect Ransomware-as-a-Service
Vect ransomware emerged in January 2026 as a new threat actor operating a Ransomware-as-a-Service program with strategic partnerships that significantly expand its reach. The group has partnered with TeamPCP, known for supply chain attacks compromising security tools like Trivy, KICS, and LiteLLM, and BreachForums, distributing affiliate keys to forum members. With 25 published victims primarily targeting the United States and Technology sector, Vect maintains an open affiliate program requiring only a $250 invite code. The operation offers multi-platform ransomware payloads for Windows, Linux, and ESXi with sophisticated lateral movement capabilities and tiered commission structures reaching 89% for top affiliates. Analysis reveals connections to the defunct Devman ransomware through shared code strings and ransom note similarities, suggesting possible rebranding or code reuse.
Pulse ID: 69f3e870bcc7ccaa076150b1
Pulse Link: https://otx.alienvault.com/pulse/69f3e870bcc7ccaa076150b1
Pulse Author: AlienVault
Created: 2026-04-30 23:40:32Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #ICS #InfoSec #Linux #OTX #OpenThreatExchange #RAT #RansomWare #RansomwareAsAService #SupplyChain #UnitedStates #Windows #bot #AlienVault
-
Inside Vect Ransomware-as-a-Service
Vect ransomware emerged in January 2026 as a new threat actor operating a Ransomware-as-a-Service program with strategic partnerships that significantly expand its reach. The group has partnered with TeamPCP, known for supply chain attacks compromising security tools like Trivy, KICS, and LiteLLM, and BreachForums, distributing affiliate keys to forum members. With 25 published victims primarily targeting the United States and Technology sector, Vect maintains an open affiliate program requiring only a $250 invite code. The operation offers multi-platform ransomware payloads for Windows, Linux, and ESXi with sophisticated lateral movement capabilities and tiered commission structures reaching 89% for top affiliates. Analysis reveals connections to the defunct Devman ransomware through shared code strings and ransom note similarities, suggesting possible rebranding or code reuse.
Pulse ID: 69f3e870bcc7ccaa076150b1
Pulse Link: https://otx.alienvault.com/pulse/69f3e870bcc7ccaa076150b1
Pulse Author: AlienVault
Created: 2026-04-30 23:40:32Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #ICS #InfoSec #Linux #OTX #OpenThreatExchange #RAT #RansomWare #RansomwareAsAService #SupplyChain #UnitedStates #Windows #bot #AlienVault
-
Inside Vect Ransomware-as-a-Service
Vect ransomware emerged in January 2026 as a new threat actor operating a Ransomware-as-a-Service program with strategic partnerships that significantly expand its reach. The group has partnered with TeamPCP, known for supply chain attacks compromising security tools like Trivy, KICS, and LiteLLM, and BreachForums, distributing affiliate keys to forum members. With 25 published victims primarily targeting the United States and Technology sector, Vect maintains an open affiliate program requiring only a $250 invite code. The operation offers multi-platform ransomware payloads for Windows, Linux, and ESXi with sophisticated lateral movement capabilities and tiered commission structures reaching 89% for top affiliates. Analysis reveals connections to the defunct Devman ransomware through shared code strings and ransom note similarities, suggesting possible rebranding or code reuse.
Pulse ID: 69f3e870bcc7ccaa076150b1
Pulse Link: https://otx.alienvault.com/pulse/69f3e870bcc7ccaa076150b1
Pulse Author: AlienVault
Created: 2026-04-30 23:40:32Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #ICS #InfoSec #Linux #OTX #OpenThreatExchange #RAT #RansomWare #RansomwareAsAService #SupplyChain #UnitedStates #Windows #bot #AlienVault
-
Inside Vect Ransomware-as-a-Service
Vect ransomware emerged in January 2026 as a new threat actor operating a Ransomware-as-a-Service program with strategic partnerships that significantly expand its reach. The group has partnered with TeamPCP, known for supply chain attacks compromising security tools like Trivy, KICS, and LiteLLM, and BreachForums, distributing affiliate keys to forum members. With 25 published victims primarily targeting the United States and Technology sector, Vect maintains an open affiliate program requiring only a $250 invite code. The operation offers multi-platform ransomware payloads for Windows, Linux, and ESXi with sophisticated lateral movement capabilities and tiered commission structures reaching 89% for top affiliates. Analysis reveals connections to the defunct Devman ransomware through shared code strings and ransom note similarities, suggesting possible rebranding or code reuse.
Pulse ID: 69f3e870bcc7ccaa076150b1
Pulse Link: https://otx.alienvault.com/pulse/69f3e870bcc7ccaa076150b1
Pulse Author: AlienVault
Created: 2026-04-30 23:40:32Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #ICS #InfoSec #Linux #OTX #OpenThreatExchange #RAT #RansomWare #RansomwareAsAService #SupplyChain #UnitedStates #Windows #bot #AlienVault
-
Inside Vect Ransomware-as-a-Service
Vect ransomware emerged in January 2026 as a new threat actor operating a Ransomware-as-a-Service program with strategic partnerships that significantly expand its reach. The group has partnered with TeamPCP, known for supply chain attacks compromising security tools like Trivy, KICS, and LiteLLM, and BreachForums, distributing affiliate keys to forum members. With 25 published victims primarily targeting the United States and Technology sector, Vect maintains an open affiliate program requiring only a $250 invite code. The operation offers multi-platform ransomware payloads for Windows, Linux, and ESXi with sophisticated lateral movement capabilities and tiered commission structures reaching 89% for top affiliates. Analysis reveals connections to the defunct Devman ransomware through shared code strings and ransom note similarities, suggesting possible rebranding or code reuse.
Pulse ID: 69f3e870bcc7ccaa076150b1
Pulse Link: https://otx.alienvault.com/pulse/69f3e870bcc7ccaa076150b1
Pulse Author: AlienVault
Created: 2026-04-30 23:40:32Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CyberSecurity #ICS #InfoSec #Linux #OTX #OpenThreatExchange #RAT #RansomWare #RansomwareAsAService #SupplyChain #UnitedStates #Windows #bot #AlienVault
-
The Gentlemen & SystemBC: A Sneak Peek Behind the Proxy
The Gentlemen ransomware-as-a-service program has rapidly expanded since mid-2025, claiming over 320 victims with 240 attacks occurring in early 2026. The service provides multi-platform lockers for Windows, Linux, NAS, BSD, and ESXi, enabling comprehensive coverage of corporate environments. During an incident response engagement, an affiliate deployed SystemBC proxy malware for covert tunneling and payload delivery. Analysis of the SystemBC command-and-control server revealed a botnet of over 1,570 victims, primarily corporate and organizational targets. The intrusion progressed from domain controller compromise through credential validation, remote execution via administrative shares, and deployment of Cobalt Strike payloads. Attackers disabled defenses, established persistence through scheduled tasks and services, and ultimately deployed ransomware via Group Policy. The operation demonstrates sophisticated lateral movement capabilities, defense evasion techniques, and integration of mature post-exploit...
Pulse ID: 69e63f93a0ddbd53fcab3f51
Pulse Link: https://otx.alienvault.com/pulse/69e63f93a0ddbd53fcab3f51
Pulse Author: AlienVault
Created: 2026-04-20 15:00:35Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CobaltStrike #CyberSecurity #DomainController #InfoSec #Linux #Malware #OTX #OpenThreatExchange #Proxy #RAT #RansomWare #RansomwareAsAService #Troll #Windows #bot #botnet #AlienVault
-
The Gentlemen & SystemBC: A Sneak Peek Behind the Proxy
The Gentlemen ransomware-as-a-service program has rapidly expanded since mid-2025, claiming over 320 victims with 240 attacks occurring in early 2026. The service provides multi-platform lockers for Windows, Linux, NAS, BSD, and ESXi, enabling comprehensive coverage of corporate environments. During an incident response engagement, an affiliate deployed SystemBC proxy malware for covert tunneling and payload delivery. Analysis of the SystemBC command-and-control server revealed a botnet of over 1,570 victims, primarily corporate and organizational targets. The intrusion progressed from domain controller compromise through credential validation, remote execution via administrative shares, and deployment of Cobalt Strike payloads. Attackers disabled defenses, established persistence through scheduled tasks and services, and ultimately deployed ransomware via Group Policy. The operation demonstrates sophisticated lateral movement capabilities, defense evasion techniques, and integration of mature post-exploit...
Pulse ID: 69e63f93a0ddbd53fcab3f51
Pulse Link: https://otx.alienvault.com/pulse/69e63f93a0ddbd53fcab3f51
Pulse Author: AlienVault
Created: 2026-04-20 15:00:35Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CobaltStrike #CyberSecurity #DomainController #InfoSec #Linux #Malware #OTX #OpenThreatExchange #Proxy #RAT #RansomWare #RansomwareAsAService #Troll #Windows #bot #botnet #AlienVault
-
The Gentlemen & SystemBC: A Sneak Peek Behind the Proxy
The Gentlemen ransomware-as-a-service program has rapidly expanded since mid-2025, claiming over 320 victims with 240 attacks occurring in early 2026. The service provides multi-platform lockers for Windows, Linux, NAS, BSD, and ESXi, enabling comprehensive coverage of corporate environments. During an incident response engagement, an affiliate deployed SystemBC proxy malware for covert tunneling and payload delivery. Analysis of the SystemBC command-and-control server revealed a botnet of over 1,570 victims, primarily corporate and organizational targets. The intrusion progressed from domain controller compromise through credential validation, remote execution via administrative shares, and deployment of Cobalt Strike payloads. Attackers disabled defenses, established persistence through scheduled tasks and services, and ultimately deployed ransomware via Group Policy. The operation demonstrates sophisticated lateral movement capabilities, defense evasion techniques, and integration of mature post-exploit...
Pulse ID: 69e63f93a0ddbd53fcab3f51
Pulse Link: https://otx.alienvault.com/pulse/69e63f93a0ddbd53fcab3f51
Pulse Author: AlienVault
Created: 2026-04-20 15:00:35Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CobaltStrike #CyberSecurity #DomainController #InfoSec #Linux #Malware #OTX #OpenThreatExchange #Proxy #RAT #RansomWare #RansomwareAsAService #Troll #Windows #bot #botnet #AlienVault
-
The Gentlemen & SystemBC: A Sneak Peek Behind the Proxy
The Gentlemen ransomware-as-a-service program has rapidly expanded since mid-2025, claiming over 320 victims with 240 attacks occurring in early 2026. The service provides multi-platform lockers for Windows, Linux, NAS, BSD, and ESXi, enabling comprehensive coverage of corporate environments. During an incident response engagement, an affiliate deployed SystemBC proxy malware for covert tunneling and payload delivery. Analysis of the SystemBC command-and-control server revealed a botnet of over 1,570 victims, primarily corporate and organizational targets. The intrusion progressed from domain controller compromise through credential validation, remote execution via administrative shares, and deployment of Cobalt Strike payloads. Attackers disabled defenses, established persistence through scheduled tasks and services, and ultimately deployed ransomware via Group Policy. The operation demonstrates sophisticated lateral movement capabilities, defense evasion techniques, and integration of mature post-exploit...
Pulse ID: 69e63f93a0ddbd53fcab3f51
Pulse Link: https://otx.alienvault.com/pulse/69e63f93a0ddbd53fcab3f51
Pulse Author: AlienVault
Created: 2026-04-20 15:00:35Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CobaltStrike #CyberSecurity #DomainController #InfoSec #Linux #Malware #OTX #OpenThreatExchange #Proxy #RAT #RansomWare #RansomwareAsAService #Troll #Windows #bot #botnet #AlienVault
-
The Gentlemen & SystemBC: A Sneak Peek Behind the Proxy
The Gentlemen ransomware-as-a-service program has rapidly expanded since mid-2025, claiming over 320 victims with 240 attacks occurring in early 2026. The service provides multi-platform lockers for Windows, Linux, NAS, BSD, and ESXi, enabling comprehensive coverage of corporate environments. During an incident response engagement, an affiliate deployed SystemBC proxy malware for covert tunneling and payload delivery. Analysis of the SystemBC command-and-control server revealed a botnet of over 1,570 victims, primarily corporate and organizational targets. The intrusion progressed from domain controller compromise through credential validation, remote execution via administrative shares, and deployment of Cobalt Strike payloads. Attackers disabled defenses, established persistence through scheduled tasks and services, and ultimately deployed ransomware via Group Policy. The operation demonstrates sophisticated lateral movement capabilities, defense evasion techniques, and integration of mature post-exploit...
Pulse ID: 69e63f93a0ddbd53fcab3f51
Pulse Link: https://otx.alienvault.com/pulse/69e63f93a0ddbd53fcab3f51
Pulse Author: AlienVault
Created: 2026-04-20 15:00:35Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CobaltStrike #CyberSecurity #DomainController #InfoSec #Linux #Malware #OTX #OpenThreatExchange #Proxy #RAT #RansomWare #RansomwareAsAService #Troll #Windows #bot #botnet #AlienVault
-
AI is changing the ransomware game—making high-stakes attacks accessible even to amateurs and pushing average ransom payments into the millions. How are companies gearing up to fight back?
https://thedefendopsdiaries.com/how-ai-is-supercharging-the-ransomware-threat-landscape/
#ai
#ransomware
#cybersecurity
#threatlandscape
#ransomwareasaservice -
AI is changing the ransomware game—making high-stakes attacks accessible even to amateurs and pushing average ransom payments into the millions. How are companies gearing up to fight back?
https://thedefendopsdiaries.com/how-ai-is-supercharging-the-ransomware-threat-landscape/
#ai
#ransomware
#cybersecurity
#threatlandscape
#ransomwareasaservice -
AI is changing the ransomware game—making high-stakes attacks accessible even to amateurs and pushing average ransom payments into the millions. How are companies gearing up to fight back?
https://thedefendopsdiaries.com/how-ai-is-supercharging-the-ransomware-threat-landscape/
#ai
#ransomware
#cybersecurity
#threatlandscape
#ransomwareasaservice -
Organized and Criminal, Ransomware Gangs Run Up Profits – Source: securityboulevard.com https://ciso2ciso.com/organized-and-criminal-ransomware-gangs-run-up-profits-source-securityboulevard-com/ #NordStellarransomwarereport #SecurityBoulevard(Original) #ransomwareextortiontactics #RansomwareasaService(RaaS) #doubleextortionransomware #tripleextortionransomware #insiderthreatsransomware #rssfeedpostgeneratorecho #ransomwarerecruitment #organizedcybercrime #CyberSecurityNews #SecurityBoulevard
-
Emulating the Expedited Warlock Ransomware – Source: securityboulevard.com https://ciso2ciso.com/emulating-the-expedited-warlock-ransomware-source-securityboulevard-com/ #rssfeedpostgeneratorecho #SecurityBloggersNetwork #ransomwareasaservice #adversaryemulation #Broad-BasedAttacks #CyberSecurityNews #SecurityBoulevard #ransomware #ToolShell #Warlock #RaaS
-
Law enforcement operations seized BlackSuit ransomware gang’s darknet sites – Source: securityaffairs.com https://ciso2ciso.com/law-enforcement-operations-seized-blacksuit-ransomware-gangs-darknet-sites-source-securityaffairs-com/ #rssfeedpostgeneratorecho #informationsecuritynews #ITInformationSecurity #ransomwareasaservice #BlackSuitransomware #SecurityAffairscom #CyberSecurityNews #PierluigiPaganini #SecurityAffairs #BreakingNews #SecurityNews #CyberCrime #hacking #Malware #RaaS
-
Security Pros Say Hunters International RaaS Operators are ‘Changing Jerseys’ – Source: securityboulevard.com https://ciso2ciso.com/security-pros-say-hunters-international-raas-operators-are-changing-jerseys-source-securityboulevard-com/ #SecurityBoulevard(Original) #RansomwareasaService(RaaS) #rssfeedpostgeneratorecho #HuntersInternational #ThreatIntelligence #CyberSecurityNews #SecurityBoulevard #Threats&Breaches #Identity&Access #NetworkSecurity #MobileSecurity #SocialFacebook #SocialLinkedIn
-
Updated Response to CISA Advisory (AA23-352A): #StopRansomware: Play Ransomware – Source: securityboulevard.com https://ciso2ciso.com/updated-response-to-cisa-advisory-aa23-352a-stopransomware-play-ransomware-source-securityboulevard-com/ #rssfeedpostgeneratorecho #SecurityBloggersNetwork #ransomwareasaservice #adversaryemulation #BroadBasedAttacks #CyberSecurityNews #SecurityBoulevard #StopRansomware #ransomware #Playcrypt #Play
-
Emulating the Blazing DragonForce Ransomware – Source: securityboulevard.com https://ciso2ciso.com/emulating-the-blazing-dragonforce-ransomware-source-securityboulevard-com/ #rssfeedpostgeneratorecho #SecurityBloggersNetwork #ransomwareasaservice #adversaryemulation #Broad-BasedAttacks #CyberSecurityNews #SecurityBoulevard #DragonForce #ransomware #Mimikatz #Lockbit
-
Medusa Ransomware Strikes 300+ Targets: FBI & CISA Urge Immediate Action to #StopRansomware – Source: www.techrepublic.com https://ciso2ciso.com/medusa-ransomware-strikes-300-targets-fbi-cisa-urge-immediate-action-to-stopransomware-source-www-techrepublic-com/ #rssfeedpostgeneratorecho #SecurityonTechRepublic #ransomwareasaservice #SecurityTechRepublic #CyberSecurityNews #Cybersecurity #International #ransomware #Phishing #Security #BigData
-
Medusa Ransomware Surge: 60 Victims in 3 Months—Are You Next? https://thecyberexpress.com/fbi-and-cisa-warn-on-medusa-ransomware/ #Ransomwareasaservice #TheCyberExpressNews #Medusaransomware #TheCyberExpress #RansomwareNews #FirewallDaily #CyberNews #Advisory #cyble #CISA #FBI
-
#Ransomware im LLM: Forscher füttern ChatGPT mit Daten der "#BlackBasta"-Bande | Security https://www.heise.de/news/Einblicke-in-Ransomware-Geschaeft-ChatGPT-kennt-Interna-von-Black-Basta-10290984.html #RansomwareAsAService #RAAS #DataLeak #Datenleck #Malware
-
Authorities Seize 8Base Ransomware Infrastructure, Arrest Four Russians – Source: securityboulevard.com https://ciso2ciso.com/authorities-seize-8base-ransomware-infrastructure-arrest-four-russians-source-securityboulevard-com/ #SecurityBoulevard(Original) #DepartmentofJustice(DOJ) #rssfeedpostgeneratorecho #ransomwareasaservice #ThreatIntelligence #CyberSecurityNews #SecurityBoulevard #IncidentResponse #NetworkSecurity #SocialFacebook #SocialLinkedIn #CloudSecurity #Cybersecurity #datasecurity
-
FunkSec: A New Ransomware Group Buoyed by AI – Source: securityboulevard.com https://ciso2ciso.com/funksec-a-new-ransomware-group-buoyed-by-ai-source-securityboulevard-com/ #SecurityBoulevard(Original) #RansomwareasaService(RaaS) #rssfeedpostgeneratorecho #ThreatIntelligence #CyberSecurityNews #SecurityAwareness #SecurityBoulevard #SponsoredContent #NetworkSecurity #MobileSecurity #SocialLinkedIn #CloudSecurity #Cybersecurity #datasecurity #GenerativeAI #Hacktivists #ransomware #Spotlight #News
-
StopRansomware: RansomHub Ransomware
RansomHub is a ransomware-as-a-service variant that has targeted over 210 victims across various critical infrastructure sectors since February 2024. It employs a double-extortion model, encrypting systems and exfiltrating data. The ransom note provides victims with a client ID and instructions to contact the group via a Tor URL. Affiliates typically gain initial access through phishing, exploiting vulnerabilities, and password spraying. They use tools like Mimikatz for credential theft and privilege escalation, and move laterally using RDP, PsExec, and other methods. Data exfiltration varies by affiliate but may involve tools like PuTTY and AWS S3 buckets. The ransomware uses Curve 25519 encryption and implements intermittent encryption. It targets user files and networked shares, leaving a ransom note and deleting volume shadow copies.
Pulse ID: 66d204f1d658869764c07d47
Pulse Link: https://otx.alienvault.com/pulse/66d204f1d658869764c07d47
Pulse Author: AlienVault
Created: 2024-08-30 17:44:17Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#AWS #CyberSecurity #Encryption #Extortion #InfoSec #OTX #OpenThreatExchange #Password #Phishing #PsExec #RAT #RDP #RansomWare #RansomwareAsAService #StopRansomware #Word #bot #AlienVault
-
RansomHub Exploiting RDP Services To Exfiltrate Large Volumes Of Data https://cybersecuritynews.com/ransomhub-exploiting-rdp-exfiltration/ #RansomwareasaService(RaaS) #CyberSecurityNews #cybersecuritynews #DataExfiltration #cybersecurity #Ransomware #DataTheft
-
DISPOSSESSOR And RADAR Ransomware Emerging With RaaS Model https://gbhackers.com/dispossessor-and-radar-ransomware/ #RansomwareasaService(RaaS) #CybersecurityThreats #DataExtortionTactics #CyberCrime #DataBreach #Ransomware
-
New Eldorado Ransomware Attacking Windows And Linux Systems https://gbhackers.com/new-eldorado-ransomware-attacks-windows-linux/ #RansomwareasaService(RaaS) #EldoradoRansomware #CyberSecurityNews #cybersecurity #CyberCrime #Ransomware #Malware
-
FBI Recovers 7,000 LockBit Keys, Encourages Victims to Come Forward https://thecyberexpress.com/fbi-and-lockbit-victims/ #LockBitransomwareattacks #LockBitdecryptionkeys #Ransomwareasaservice #TheCyberExpressNews #CybersecurityNews #LockBitoperation #TheCyberExpress #LockBitVictims #FirewallDaily
-
Ransomware Group Creation Touched Yearly All Time High https://gbhackers.com/ransomware-creation-all-time-high/ #RansomwareasaService(RaaS) #CyberSecurityNews #RansomwareTrends #cybersecurity #CyberCrime #Ransomware
-
How Did Authorities Identify the Alleged Lockbit Boss? https://krebsonsecurity.com/2024/05/how-did-authorities-identify-the-alleged-lockbit-boss/ #DmitryYuriyevichKhoroshev #USDepartmentoftheTreasury #ConstellaIntelligence #khoroshev1@icloudcom #ransomwareasaservice #dhoroshev@gmailcom #Ne'er-Do-WellNews #DmitrijJuHoroshev #sitedev5@yandexru #ALittleSunshine #ICQnumber669316 #pin@darktowersu #Breadcrumbs #79521020220 #LockBitSupp #stairwellru #Ransomware #3k@xakepru #NeroWolfe #Putinkrab #Cerber
-
📬 LockBit: Darknet-Site lässt auf neue Enthüllungen schließen
#Cyberangriffe #DarkCommerce #Lockbit #LockbitSupp #NationalCrimeAgency #OperationCronos #RansomwareasaService #vxuntergrund https://sc.tarnkappe.info/e731e4 -
Cheap ‘Junk-Gun Ransomware’ Emerging on the Dark Web – Source: securityboulevard.com https://ciso2ciso.com/cheap-junk-gun-ransomware-emerging-on-the-dark-web-source-securityboulevard-com/ #SecurityBoulevard(Original) #RansomwareasaService(RaaS) #rssfeedpostgeneratorecho #ThreatIntelligence #CyberSecurityNews #SecurityBoulevard #NetworkSecurity #Cybersecurity #datasecurity #ransomware #Spotlight #endpoint #FEATURED #Malware #Sophos #News
-
📬 LockBit-Mitglied verurteilt: Vier Jahre Haft für Bandenmitglied
#Malware #Rechtssachen #Cyberkriminalität #FBI #Lockbit #LockBitRansomware #MichelleFuerst #MikhailVasiliev #RansomwareasaService https://sc.tarnkappe.info/f73233 -
📬 Täter gaben zu, den Epic Games Hack erfunden zu haben
#Cyberangriffe #Gaming #CyberDaily #EpicGames #Fortnite #Mogilevich #RansomwareasaService #RansomwareGang https://sc.tarnkappe.info/ac4731 -
IT-Trends: Professionalisierung der Cyberkriminalität 2024 https://www.it-daily.net/it-sicherheit/cybercrime/professionalisierung-der-cyberkriminalitaet-in-2024 #CyberCrime #Malware #Ransomware #OpenSource #MaaS #RaaS #MalwareAsAService #RansomwareAsAService
-
📬 Malware as a Service (MaaS) im Darknet: Hintergründe und Bedrohungen
#Hintergrundberichte #Malware #AlexanderZabrovsky #Backdoors #Botnets #Cyberkriminalität #Infostealer #kaspersky #Loader #MalwareasaService #RansomwareasaService https://tarnkappe.info/artikel/it-sicherheit/malware/malware-as-a-service-maas-im-darknet-hintergruende-und-bedrohungen-276234.html -
📬 Hive-Ransomware-Group: Hacker-Netzwerk zerschlagen
#Cyberangriff #DarkCommerce #europol #HackerNetzwerk #HiveRansomwareGroup #KriminalpolizeidirektionEsslingen #PolizeipräsidentUdoVogel #RansomwareasaService #USJustizministerium https://tarnkappe.info/artikel/cyberangriff/hive-ransomware-group-hacker-netzwerk-zerschlagen-264221.html -
📬 LockBit Ransomware erbeutet Daten italienischer Steuerzahler
#Hacking #Malware #BugBountyProgram #Hackerangriff #Lockbit #Lösegeldforderung #RansomwareAngriff #RansomwareasaService #RansomwareErpressung https://tarnkappe.info/artikel/hacking/lockbit-ransomware-erbeutet-daten-italienischer-steuerzahler-253068.html -
📬 Lesetipps: Krieg der Waschmaschinen, Big Brother Awards
#Lesetipps #Anonymous #bigbrotherawards #MicrosoftSecurity #RansomwareasaService #StefanundSven #SuperAgent https://tarnkappe.info/lesetipps/lesetipps-krieg-der-waschmaschinen-big-brother-awards-242109.html -
📬 REvil: Inlandsgeheimdienst FSB sprengt Hacker-Group #Hacking #Malware #GoldDust #HackerGroup #RansomwareasaService #RussischerInlandsgeheimdienstFSB #Sodinokibi https://tarnkappe.info/revil-inlandsgeheimdienst-fsb-sprengt-hacker-group/
-
📬 BlackMatter: Ransomware-Entwickler werfen das Handtuch #Malware #BlackMatter #FIN7 #RaaS #RansomwareasaService #REvil https://tarnkappe.info/blackmatter-ransomware-entwickler-werfen-das-handtuch/
-
Für Cybergangster fing das Jahr schlecht an: Auf die Verhaftungen von Emotet- und NetWalker-Drahtziehern folgten nun Festnahmen im Zusammenhang mit Egregor.
Ransomware Egregor: Mehrere Affiliates verhaftet, Leak-Website offline