Tag: ransom
-
Cloak Ransomware Hits Virginia Attorney General’s Office, Disrupts IT Systems
Cloak ransomware group claims attack on Virginia attorney general’s office, demands ransom for stolen data. Investigation underway. Find out the impact and what’s being done. First seen on hackread.com Jump to article: hackread.com/cloak-ransomware-virginia-attorney-generals-office/
-
One-third of CNI organisations admit to paying ransomware according to new report from Bridewell
According to new research entitled Cyber Security in Critical National Infrastructure: 2025, from Bridewell, a leading UK-based cyber security services provider, one-third of UK CNI organisations targeted by ransomware admitted to paying the ransom a practice which has been hotly debated in recent times. Furthermore, a staggering 95% of UK Critical National Infrastructure (CNI) The…
-
Extortion Reboot: Ransomware Crew Threatens Leak to Snowden
Though the group initially stuck to classic ransomware TTPs before demanding the ransom, it went off script when it began threatening the group and detailing potential consequences the victim would face. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/ransomware-crew-leak-snowden-extortion-tactic
-
Scammers Pose as Cl0p Ransomware to Send Fake Extortion Letters
Scammers are sending fake extortion and ransom demands while posing as ransomware gangs, including the notorious Cl0p ransomware…. First seen on hackread.com Jump to article: hackread.com/scammers-pose-cl0p-ransomware-fake-extortion-letters/
-
Report on ransomware attacks on Fortinet firewalls also reveals possible defenses
Tags: access, attack, authentication, automation, backdoor, backup, ciso, control, credentials, cve, cybercrime, data, data-breach, defense, exploit, firewall, fortinet, group, infrastructure, Internet, lockbit, malicious, monitoring, network, password, radius, ransom, ransomware, risk, router, tactics, threat, tool, update, vpn, vulnerability, windowsSigns of intrusion: “This actor exhibits a distinct operational signature that blends elements of opportunistic attacks with ties to the LockBit ecosystem,” Forescout said in its analysis.”Mora_001’s relationship to the broader Lockbit’s ransomware operations underscores the increased complexity of the modern ransomware landscape where specialized teams collaborate to leverage complementary capabilities.”CISOs should note these consistent…
-
Live Ransomware Demo: See How Hackers Breach Networks and Demand a Ransom
Cyber threats evolve daily. In this live webinar, learn exactly how ransomware attacks unfold”, from the initial breach to the moment hackers demand payment.Join Joseph Carson, Delinea’s Chief Security Scientist and Advisory CISO, who brings 25 years of enterprise security expertise. Through a live demonstration, he will break down every technical step of a ransomware…
-
The most notorious and damaging ransomware of all time
Tags: access, android, attack, backdoor, backup, banking, botnet, breach, communications, computer, control, credentials, cryptography, cyber, cybercrime, dark-web, data, defense, detection, email, encryption, endpoint, exploit, extortion, finance, flaw, framework, germany, google, government, group, hacker, hacking, healthcare, infection, infrastructure, international, jobs, korea, law, lazarus, leak, linux, malicious, malware, microsoft, mobile, msp, network, north-korea, office, open-source, oracle, password, phishing, phone, powershell, ransom, ransomware, russia, service, software, spam, switch, technology, threat, tool, ukraine, update, usa, virus, vulnerability, windowsConti: History: First appearing in May 2020, the Conti RaaS platform is considered the successor to the Ryuk ransomware. As of January 2021, Conti is believed to have infected over 150 organizations and earned millions of dollars for its criminal developers and their affiliates. At least three new versions have been found since its inception.How it works: Conti uses the…
-
SafeBreach Coverage for US CERT AA25-071A (Medusa Ransomware)
SafeBreach has added coverage against the Medusa ransomware variant, which has been used to target critical infrastructure organizations, demand ransom payment, and threaten to leak stolen data. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/safebreach-coverage-for-us-cert-aa25-071a-medusa-ransomware/
-
Medusa Ransomware Turns Critical Infrastructure to Stone
FBI Ties Group to Triple-Extortion Tactics Involving Follow-On Ransom Demands. The Medusa ransomware group has been continuing to pummel critical infrastructure sectors across America, warns a joint U.S. government alert. The FBI said the group’s tactics include triple extortion, meaning it continues to shake victims down for a ransom, even after they’ve paid. First seen…
-
Smashing Security podcast #408: A gag order backfires, and a snail mail ransom demand
What happens when a healthcare giant’s legal threats ignite a Streisand Effect wildfire”¦ while a ransomware gang appears to ditch the dark web for postage stamps? First seen on grahamcluley.com Jump to article: grahamcluley.com/smashing-security-podcast-408/
-
The state of ransomware: Fragmented but still potent despite takedowns
Tags: ai, alphv, antivirus, attack, backup, cloud, control, cyber, cybercrime, cybersecurity, data, ddos, detection, endpoint, extortion, firewall, group, incident response, intelligence, law, leak, LLM, lockbit, malware, network, ransom, ransomware, service, software, tactics, threat, tool, usa, zero-trustRunners and riders on the rise: Smaller, more agile ransomware groups like Lynx (INC rebrand), RansomHub (a LockBit sub-group), and Akira filled the void after major takedowns, collectively accounting for 54% of observed attacks, according to a study by managed detection and response firm Huntress.RansomHub RaaS has quickly risen in prominence by absorbing displaced operators…
-
Ebyte Ransomware Targets Windows Users with Advanced Encryption Techniques
A new ransomware variant, known as Ebyte Ransomware, has emerged as a significant threat to Windows users. Developed in the Go programming language, this ransomware employs sophisticated encryption techniques, including ChaCha20 and Elliptic Curve Integrated Encryption Scheme (ECIES), to lock user files and demand ransom payments. The ransomware, inspired by Prince Ransomware, adds a unique…
-
Cybersecurity Snapshot: CSA Outlines Data Security Challenges and Best Practices, While ISACA Offers Tips To Retain IT Pros
Tags: advisory, ai, awareness, banking, best-practice, business, cloud, compliance, corporate, crime, crypto, cve, cyber, cybercrime, cybersecurity, data, defense, exploit, extortion, finance, fraud, governance, government, group, healthcare, infrastructure, iot, jobs, mail, malicious, microsoft, mitigation, monitoring, network, nis-2, privacy, qr, ransom, ransomware, regulation, resilience, risk, risk-assessment, risk-management, scam, service, strategy, technology, threat, tool, vmware, vulnerability, vulnerability-management, zero-dayCheck out best practices for shoring up data security and reducing cyber risk. Plus, get tips on how to improve job satisfaction among tech staff. Meanwhile, find out why Congress wants federal contractors to adopt vulnerability disclosure programs. And get the latest on cyber scams; zero-day vulnerabilities; and critical infrastructure security. Dive into six things…
-
Fake BianLian Ransom Demands Sent via Physical Letters to U.S. Firms
In a novel and concerning development, multiple U.S. organizations have reported receiving suspicious physical letters claiming to be from the BianLian ransomware group. These letters, sent via U.S. postal services, threaten recipients with data leaks unless substantial ransoms are paid within a specified timeframe. The letters are part of a campaign that GRIT assesses with…
-
FBI: Fake Ransomware Attack Claims Sent to US Executives via Snail Mail
An extortion group has been sending physical mail to corporate executives, threatening to leak their data unless a ransom is paid. The post FBI: Fake Ransomware Attack Claims Sent to US Executives via Snail Mail appeared first on SecurityWeek. First seen on securityweek.com Jump to article: www.securityweek.com/fbi-fake-ransomware-attack-claims-sent-to-us-executives-via-snail-mail/
-
FBI says scammers are targeting US executives with fake BianLian ransom notes
The FBI is warning that scammers are impersonating the BianLian ransomware gang using fake ransom notes sent to U.S. corporate executives. The fake ransom notes, first reported by U.S. cybersecurity company GuidePoint Security, claim that hackers have gained access to an organization’s network to steal sensitive data, and threaten to publish the stolen data unless…
-
FBI Issues Urgent Warning About Data Extortion Scam Targeting Corporate Executives
The Federal Bureau of Investigation (FBI) has alerted businesses about a disturbing new data extortion scam targeting corporate executives. The scheme, which is being orchestrated by criminals posing as the “BianLian Group,” involves sending fraudulent letters to high-level professionals with threats of sensitive data leaks unless hefty ransom payments are made. First seen on thecyberexpress.com…
-
Medusa Ransomware Claims 40+ Victims in 2025, Confirmed Healthcare Attacks
Symantec found that Medusa has listed almost 400 victims on its data leaks site since early 2023, demanding ransom payments as high as $15m First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/medusa-claims-victims-2025/
-
CISA, FBI warn of BianLian mail scam targeting executives with $500k ransom note
In an alert on Thursday, the FBI said scammers are mailing letters to corporate executives claiming that they stole sensitive data and will publish it unless a demand is paid in Bitcoin. First seen on therecord.media Jump to article: therecord.media/cisa-fbi-warn-bianlian-mail-scam-extortion
-
Cactus ransomware: what you need to know
Cactus is a ransomware-as-a-service (RaaS) group that encrypts victim’s data and demands a ransom for a decryption key. First seen on tripwire.com Jump to article: www.tripwire.com/state-of-security/cactus-ransomware-what-you-need-know
-
Would-be Extortionists Send “BianLian” Ransom Notes in the Mail
GuidePoint Security has received reports of multiple organizations receiving ransom letters in the mail First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/extortionists-bianlian-ransom/
-
Fake BianLian ransom notes mailed to US CEOs in postal mail scam
Scammers are impersonating the BianLian ransomware gang in fake ransom notes sent to US companies via snail mail through the United States Postal Service. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/fake-bianlian-ransom-notes-mailed-to-us-ceos-in-postal-mail-scam/
-
Scammers Mailing Ransom Letters While Posing as BianLian Ransomware
Scammers are impersonating BianLian ransomware, and mailing fake ransom letters to businesses. Learn the red flags and how… First seen on hackread.com Jump to article: hackread.com/scammers-mailing-ransom-letters-bianlian-ransomware/
-
UK Lawmakers Don’t Hear Fervor for Ransomware Payment Ban
Committee Witnesses Favor Resilience Over Bans. The British government should focus on building operational resilience rather than imposing ransom payment bans, security experts told a parliamentary committee. The British government in January floated a ban on public sector and critical infrastructure owners paying digital extortion. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/uk-lawmakers-dont-hear-fervor-for-ransomware-payment-ban-a-27636
-
Qilin Cybercrime Ring Claims Credit for Lee Newspaper Breach
The ransomware-as-a-service (RaaS) cybercrime group intends to leak the stolen information in just two days, it claims; but oddly, it doesn’t seek a ransom payment from its victim. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/qilin-cyber-gang-credit-lee-newspaper-breach
-
5 things to know about ransomware threats in 2025
Tags: access, attack, authentication, awareness, backup, breach, ciso, cloud, control, credentials, cyber, dark-web, data, data-breach, defense, detection, encryption, exploit, extortion, finance, fraud, group, healthcare, identity, incident response, infrastructure, Internet, iot, law, leak, mfa, monitoring, network, password, ransom, ransomware, risk, scam, service, software, sophos, supply-chain, technology, threat, tool, update, vpn, vulnerability, zero-day2. Mid-size organizations are highly vulnerable: Industry data shows mid-size organizations remain highly vulnerable to ransomware attacks. “CISOs need to be aware that ransomware is no longer just targeting large companies, but now even mid-sized organizations are at risk. This awareness is crucial,” says Christiaan Beek, senior director, threat analytics, at Rapid7.Companies with annual revenue…
-
Southern Water takes the fifth over alleged $750K Black Basta ransom offer
Leaked chats and spilled secrets as AI helps decode circa 200K private talks First seen on theregister.com Jump to article: www.theregister.com/2025/02/25/southern_water_black_basta_leak/
-
Leaked Black Basta Chat Logs Show Banality of Ransomware
‘He Is an Idiot,’ Dissatisfied Hacker Writes of Boss. Two hundred thousand internal chat messages from the Russian ransomware group Black Basta have been leaked online, supposedly in reprisal for the operation targeting Russian banks. The partial logs, spanning 13 months, detail negotiations with victims, ransoms paid, internal disagreements and more. First seen on govinfosecurity.com…

