Tag: extortion
-
CISA, FBI Warn of Medusa Ransomware Impacting Critical Infrastructure
CISA and FBI warn of Medusa ransomware impacting over 300 victims across critical infrastructure sectors with double extortion tactics First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/cisa-fbi-warn-medusa-ransomware/
-
Medusa ransomware affiliate tried triple extortion scam up from the usual double demand
Feds warn gang still rampant and now cracked 300+ victims around the world First seen on theregister.com Jump to article: www.theregister.com/2025/03/13/medusa_ransomware_infects_300_critical/
-
Die entscheidende Rolle der Replikation bei der Gewährleistung der Datenausfallsicherheit
Tags: extortionDatenverluste und Ausfallzeiten sind kostspielig. Aktuelle Kennzahlen sprechen diesbezüglich eine deutliche Sprache: Nach Selbsteinschätzung der von Statista im Jahr 2024 befragten Unternehmen entfielen 13,4 Milliarden Euro der hochgerechneten Gesamtschadenssumme in Höhe von 266,6 Milliarden Euro in den letzten 12 Monaten auf die Erpressung mit gestohlenen oder verschlüsselten Daten. Für die Sicherheit der Geschäftskontinuität ist es……
-
The state of ransomware: Fragmented but still potent despite takedowns
Tags: ai, alphv, antivirus, attack, backup, cloud, control, cyber, cybercrime, cybersecurity, data, ddos, detection, endpoint, extortion, firewall, group, incident response, intelligence, law, leak, LLM, lockbit, malware, network, ransom, ransomware, service, software, tactics, threat, tool, usa, zero-trustRunners and riders on the rise: Smaller, more agile ransomware groups like Lynx (INC rebrand), RansomHub (a LockBit sub-group), and Akira filled the void after major takedowns, collectively accounting for 54% of observed attacks, according to a study by managed detection and response firm Huntress.RansomHub RaaS has quickly risen in prominence by absorbing displaced operators…
-
SilentCryptoMiner malware spread via YouTuber extortion
First seen on scworld.com Jump to article: www.scworld.com/brief/silentcryptominer-malware-spread-via-youtuber-extortion
-
Cybersecurity Snapshot: CSA Outlines Data Security Challenges and Best Practices, While ISACA Offers Tips To Retain IT Pros
Tags: advisory, ai, awareness, banking, best-practice, business, cloud, compliance, corporate, crime, crypto, cve, cyber, cybercrime, cybersecurity, data, defense, exploit, extortion, finance, fraud, governance, government, group, healthcare, infrastructure, iot, jobs, mail, malicious, microsoft, mitigation, monitoring, network, nis-2, privacy, qr, ransom, ransomware, regulation, resilience, risk, risk-assessment, risk-management, scam, service, strategy, technology, threat, tool, vmware, vulnerability, vulnerability-management, zero-dayCheck out best practices for shoring up data security and reducing cyber risk. Plus, get tips on how to improve job satisfaction among tech staff. Meanwhile, find out why Congress wants federal contractors to adopt vulnerability disclosure programs. And get the latest on cyber scams; zero-day vulnerabilities; and critical infrastructure security. Dive into six things…
-
Ransomware poseurs are trying to extort businesses through physical letters
The FBI is warning business leaders about the scam perpetrated by an unidentified threat group. First seen on cyberscoop.com Jump to article: cyberscoop.com/physical-mail-extortion-letters-target-executives/
-
FBI: Fake Ransomware Attack Claims Sent to US Executives via Snail Mail
An extortion group has been sending physical mail to corporate executives, threatening to leak their data unless a ransom is paid. The post FBI: Fake Ransomware Attack Claims Sent to US Executives via Snail Mail appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/fbi-fake-ransomware-attack-claims-sent-to-us-executives-via-snail-mail/
-
FBI Issues Urgent Warning About Data Extortion Scam Targeting Corporate Executives
The Federal Bureau of Investigation (FBI) has alerted businesses about a disturbing new data extortion scam targeting corporate executives. The scheme, which is being orchestrated by criminals posing as the “BianLian Group,” involves sending fraudulent letters to high-level professionals with threats of sensitive data leaks unless hefty ransom payments are made. First seen on thecyberexpress.com…
-
Medusa Ransomware Attacks Surge 42% with Advanced Tools Tactics
Medusa ransomware attacks have seen a significant increase, rising by 42% between 2023 and 2024, with a further escalation in early 2025. This surge is attributed to the group Spearwing, which operates Medusa as a ransomware-as-a-service (RaaS) model. Spearwing and its affiliates are known for conducting double extortion attacks, where they steal data before encrypting…
-
FBI Warns: Threat Actors Impersonating BianLian Group to Target Corporate Executives
The Federal Bureau of Investigation (FBI) issued a critical alert through its Internet Crime Complaint Center (IC3) warning of a novel cyber extortion campaign targeting corporate executives. Criminal actors impersonating the notorious BianLian ransomware group are leveraging physical mail to deliver threatening letters demanding Bitcoin payments under the guise of data exfiltration. The Cybersecurity and…
-
Emulating the Relentless RansomHub Ransomware
AttackIQ has released a new attack graph emulating the behaviors exhibited by RansomHub ransomware since its emergence in February 2024. This sophisticated ransomware employs double extortion techniques and shares notable similarities with Knight ransomware. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/emulating-the-relentless-ransomhub-ransomware/
-
Fighting Back: 4 Essential Ransomware Defense Strategies for CISOs in 2025
Focus on Cyber Hygiene, Advanced Tools and Rapid Response to Outsmart Attackers Modern cyberthreats require modern defense tactics. Ransomware now employs multilayered extortion tactics that target operations and reputations. With 68% of breaches involving human error, CISOs and leaders must focus on cyber hygiene, advanced security tools and rapid response strategies. First seen on govinfosecurity.com…
-
Ransomware Evolution: From Encryption to Extortion
Cybercriminals Use Artificial Intelligence and Physical Threats to Maximize Impact One-dimensional data encryption threats have morphed into more dangerous, multi-layered ransomware attacks that are expanding in scope and impact, creating an urgent need for organizations to fortify their defenses. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/blogs/ransomware-evolution-from-encryption-to-extortion-p-3816
-
Ransomware access playbook: What Black Basta’s leaked logs reveal
Tags: access, breach, credentials, cybercrime, dark-web, data, data-breach, extortion, group, login, malware, password, ransomware, service, software, theft, threat, toolFrom infostealer to ransomware: Infostealers are malware programs designed to scrape login information stored inside browser password stores and other applications. These threats are increasingly being offered as a service on cybercriminal forums, and according to a recent study, their prevalence has increased three-fold over the past year. The information stolen by such tools, known…
-
Ransomware criminals love CISA’s KEV list and that’s a bug, not a feature
1 in 3 entries are used to extort civilians, says new paper First seen on theregister.com Jump to article: www.theregister.com/2025/02/28/cisa_kev_list_ransomware/
-
Hacker behind over 90 high-profile data leaks worldwide arrested in Thailand
Authorities said they arrested a 39-year-old in Bangkok who was the hacker responsible for dozens of high-profile extortion cases. First seen on therecord.media Jump to article: therecord.media/hacker-arrested-bangkok-data-breaches-extortion
-
Prolific Data Extortion Actor Arrested in Thailand
A joint operation between the Thai and Singapore police has resulted in the arrest of a man allegedly responsible for over 90 data extortion attacks worldwide First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/data-extortion-actor-thailand/
-
5 things to know about ransomware threats in 2025
Tags: access, attack, authentication, awareness, backup, breach, ciso, cloud, control, credentials, cyber, dark-web, data, data-breach, defense, detection, encryption, exploit, extortion, finance, fraud, group, healthcare, identity, incident response, infrastructure, Internet, iot, law, leak, mfa, monitoring, network, password, ransom, ransomware, risk, scam, service, software, sophos, supply-chain, technology, threat, tool, update, vpn, vulnerability, zero-day2. Mid-size organizations are highly vulnerable: Industry data shows mid-size organizations remain highly vulnerable to ransomware attacks. “CISOs need to be aware that ransomware is no longer just targeting large companies, but now even mid-sized organizations are at risk. This awareness is crucial,” says Christiaan Beek, senior director, threat analytics, at Rapid7.Companies with annual revenue…
-
Drug-screening biz DISA took a year to disclose security breach affecting millions
If there’s something nasty on your employment record, extortion scum could come calling First seen on theregister.com Jump to article: www.theregister.com/2025/02/26/disa_data_breach/
-
Stürmer Maschinen von Ransomware-Attacke getroffen
Die Ransomware-Bande Lynx erpresst den Großhändler Stürmer Maschinen mit gestohlenen Daten.Die Ransomware-Bande Lynx hat den Maschinengroßhändler Stürmer Maschinen kürzlich auf ihre Opferliste gesetzt. Auf ihrer Leak-Seite im Darknet behaupten die Cyberkriminellen, einen Datensatz von 800 Gigabyte abgezogen zu haben. Um welche Daten es sich dabei genau handelt ist unklar. Informationen zur Lösegeldforderung und Frist gibt…
-
FBI and CISA warn about continuing attacks by Chinese ransomware group Ghost
Attacks are more focused on encryption than exfiltration: The Ghost attackers have sometimes exfiltrated data back to their Cobalt Strike Team servers or to the Mega.nz file-sharing service, but this has been rare and the amount of information stolen has been limited.According to FBI investigations, the group doesn’t regularly exfiltrate intellectual property or personally identifiable…
-
CL0P Ransomware Launches Large-Scale Attacks on Telecom and Healthcare Sectors
Tags: attack, cyber, data, exploit, extortion, group, healthcare, ransomware, tactics, vulnerability, zero-dayThe notorious CL0P ransomware group has intensified its operations in early 2025, targeting critical sectors such as telecommunications and healthcare. Known for its sophisticated tactics, the group has exploited zero-day vulnerabilities to infiltrate systems, steal sensitive data, and extort victims. This resurgence follows a relatively quieter 2024, during which CL0P listed only 27 victims compared…
-
US Army soldier linked to Snowflake extortion rampage admits breaking the law
That’s the way the cookie melts First seen on theregister.com Jump to article: www.theregister.com/2025/02/20/us_army_snowflake_theft/
-
BlackLock Ransomware Targets Windows, VMware ESXi, Linux Environments
BlackLock ransomware, first identified in March 2024, has rapidly ascended the ranks of the ransomware-as-a-service (RaaS) ecosystem, becoming the seventh most prolific group on data-leak sites by late 2024. The group employs a double extortion strategy, encrypting victims’ data while exfiltrating sensitive information to pressure organizations into paying ransoms. Its malware targets multiple environments, including…
-
Ransomware-Banden geben Opfern immer weniger Zeit
Tags: cyberattack, data, detection, endpoint, extortion, governance, government, malware, ransomware, tool, vulnerability, zero-dayRansomware-Gruppen haben den Zeitraum bis zur Lösegeldübergabe immer mehr verkürzt. Laut einer Analyse des Managed-Detection-and-Response-Unternehmens Huntress von Ransomware-Vorfällen im vergangenen Jahr beträgt die durchschnittliche Zeit bis zur Lösegeldforderung (TTR) etwa 17 Stunden. Bei einigen Gruppen sind es sogar nur vier bis sechs Stunden. Dieses Tempo steht in krassem Gegensatz zu der Vorgehensweise großer Ransomware-Gruppen vor…

