Victim: www.hcisystems.net Country : US Actor: babuk2 Source: http:/7dikawx73goypgfi4zyo5fcajxwb7agemmiwqax3p54aey4dwobcvcyd.onion/blog/cc5adb91cc4cdf96bb0a1236b37f9a9fffc0dabee01e286e779e5de765c2f33a/ Discovered: 2025-01-27 07:22:03.582036 Published: 2025-01-27 07:20:50.923600 Description : Here are some key points about HCISystems from the provided website: HCISystems specializes in healthcare information technology solutions. The company offers a range of services, including electronic health records (EHR) systems.…
Read More

Victim: www.skywaycoach.ca Country : CA Actor: babuk2 Source: http:/7dikawx73goypgfi4zyo5fcajxwb7agemmiwqax3p54aey4dwobcvcyd.onion/blog/21d76746113e42307fe8fe34abb2cf5d6582549feab72e9293c63bedfd78b0ad/ Discovered: 2025-01-27 07:25:27.447091 Published: 2025-01-27 07:24:23.065378 Description : Here are some key points about Skyway Coach from their website: Skyway Coach offers charter bus services across Canada and the United States. The company provides a fleet of modern, comfortable coaches equipped with amenities for passenger convenience.…
Read More

Victim: Alo Center (hq.aloteknik.se) Country : SE Actor: lynx Source: http://lynxblog.net/leaks/67978a0305a779c3d32e2bfa Discovered: 2025-01-27 14:55:44.232013 Published: 2025-01-27 14:54:38.405314 Description : ALO started more than 80 years ago as a family-owned business in Sweden. Passionate about producing machines for sawblades since the beginning. Committed to originating principles of innovation and manufacturing.…
Read More

Victim: Aquasys Country : CZ Actor: dragonforce Source: http://z3wqggtxft7id3ibr7srivv5gjof5fwg76slewnzwwakjuf3nlhukdid.onion/blog/?post_uuid=2638ff55-c088-4975-b8e1-e387c80bdfbc Discovered: 2025-01-27 14:12:30.364590 Published: 2025-01-27 14:11:23.126449 Description : Specializes in construction Focuses on water infrastructure Expertise in environmental construction Transport network development Engineering network construction

About Country: CZ (Czech Republic)

– Cybersecurity Framework: The Czech Republic has established a comprehensive national cybersecurity strategy, governed by the National Cyber and Information Security Agency (NÚKIB).…

Read More

Victim: lhps.org Country : US Actor: incransom Source: http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/blog/disclosures/67977b1f038775d37837fdae Discovered: 2025-01-27 12:52:50.072423 Published: 2025-01-27 12:51:40.261889 Description : Founded in 1970 8th largest coeducational independent day school in the nation Two campuses totaling 42 acres in Orlando Approximately 1,950 students in grades Pre-K through 12 Rigorous college preparatory program Accredited by Florida Council of Independent Schools, Southern Association of Colleges and Schools, and Florida Kindergarten Council

About Country: US

– Cybersecurity Landscape: The US has a robust cybersecurity framework led by agencies such as the Department of Homeland Security (DHS) and the Cybersecurity and Infrastructure Security Agency (CISA).…

Read More
Sweden seizes ship suspected of Baltic Sea cable sabotage
Summary: Swedish authorities have seized the cargo ship Vezhen, suspected of damaging a communications cable in the Baltic Sea, prompting a preliminary investigation into sabotage. This event follows heightened scrutiny over subsea infrastructure due to previous incidents, including one involving the ship Eagle S. Various Swedish agencies, including the Security Service, are collaborating on this investigation amid rising tensions regarding maritime activities in the region.…
Read More

Victim: www.dvttechnologyltd.com Country : US Actor: babuk Source: http:/7dikawx73goypgfi4zyo5fcajxwb7agemmiwqax3p54aey4dwobcvcyd.onion/blog/720acf2ad8b733584750bc37aad17dfbd6accf6634e9ac4ca5348ae0e55f986c/ Discovered: 2025-01-27 07:32:23.071242 Published: 2025-01-27 07:31:17.618408 Description : www.dvttechnologyltd.com has been previously claimed by ransomhub. This could suggest a potential new attack. There may be a cross-claim between brands by the same threat actor. It indicates the possibility of recycling previously leaked stolen data.…
Read More

Victim: qed.co.ug Country : UG Actor: funksec Source: http://funkxxkovrk7ctnggbjnthdajav4ggex53k6m2x3esjwlxrkb3qiztid.onion/qed.co.ug Discovered: 2025-01-27 11:36:56.476038 Published: 2025-01-27 11:36:56.476038 Description : QED Solutions Ltd operates a Ugandan-based recruitment platform: qed.co.ug Connects employers with potential employees Offers a range of human resource services Services include recruitment, consultancy, and training Covers various sectors: finance, IT, sales, oil and gas Serves entities seeking small to large workforces

About Uganda (UG) – Cybersecurity Perspective

– Cybersecurity Framework: Uganda has established a national cybersecurity framework to enhance its capacity to protect its information systems and data.…

Read More

Victim: Kurosu & Co.SA – kurosu.com.py Country : PY Actor: babuk Source: http:/7dikawx73goypgfi4zyo5fcajxwb7agemmiwqax3p54aey4dwobcvcyd.onion/blog/9169dd48cabbf3e397e0a7a8e857dcab66598b3c22984607080f4a13b77b51e9/ Discovered: 2025-01-27 08:17:55.100458 Published: 2025-01-27 08:16:45.236899 Description : Kurosu & Co.SA – kurosu.com.py LEAKED

About Country PY (Paraguay) – Cybersecurity Perspective and Ransomware Cases

– Growing Digital Landscape: Paraguay has been rapidly adopting digital technologies, leading to increased internet usage and online services.…

Read More

Victim: www.shootinghouse.com.br Country : BR Actor: babuk Source: http:/7dikawx73goypgfi4zyo5fcajxwb7agemmiwqax3p54aey4dwobcvcyd.onion/blog/c0b63c60d94025eff1accba59f0f42fd8a932576faf925c2cd5044201bd98676/ Discovered: 2025-01-27 07:40:30.365873 Published: 2025-01-27 07:39:16.857312 Description : Here are the key points about the website www.shootinghouse.com.br: Offers various shooting experiences and packages. Features a range of firearms and equipment for use during sessions. Provides safety briefings and professional instruction.…
Read More

Victim: indianaerospaceandengineering.com Country : US Actor: babuk Source: http:/7dikawx73goypgfi4zyo5fcajxwb7agemmiwqax3p54aey4dwobcvcyd.onion/blog/3d79c34298c0c2d0e8e68a6fc7eeb5ca18135d5f5f1310a8ed008edac0f6de0a/ Discovered: 2025-01-27 07:42:58.246707 Published: 2025-01-27 07:41:46.075850 Description : Here are the key points extracted from the website “indianaerospaceandengineering.com”: Overview of Indiana Aerospace and Engineering’s mission and vision. Programs and courses offered in aerospace and engineering fields. Information on faculty expertise and industry experience.…
Read More

Victim: a top-tier law firm in Workers Compensation Defense! Country : Actor: babuk Source: http:/7dikawx73goypgfi4zyo5fcajxwb7agemmiwqax3p54aey4dwobcvcyd.onion/blog/59817f58a05bc6e9720a72bfca2c7857539f7a9ee0e56f52b937752d26bde155/ Discovered: 2025-01-27 08:10:50.962216 Published: 2025-01-27 08:09:43.481316 Description : Leading expertise in Workers Compensation Defense Experienced attorneys with a proven track record Comprehensive legal strategies tailored to clients’ needs Strong emphasis on minimizing client liability Exceptional client service and communication Up-to-date with the latest laws and regulations Innovative solutions to complex legal challenges Commitment to achieving favorable outcomes Collaborative approach with clients and stakeholders Registered with relevant professional associations

About Country: Cybersecurity Perspective and Ransomware Cases

– Cybersecurity Framework: The country has established a national cybersecurity strategy to defend against cyber threats and enhance resilience.…

Read More
Building a More Resilient Security Strategy Through Threat Intelligence Integration
Summary: Cyber attacks have surged by 104% in the past year, with 60% of organizations reporting understaffed security teams, creating a pressing need for effective security measures. Strategic integration of threat intelligence has emerged as a promising solution, enabling organizations to transition from reactive to proactive defense mechanisms.…
Read More
Cobalt Strike and a Pair of SOCKS Lead to LockBit Ransomware
This report details a significant security intrusion that began with the execution of a malicious file masquerading as a legitimate Windows utility, leading to the deployment of LockBit ransomware. The threat actor employed various techniques including data exfiltration through Rclone and significant lateral movement within the network using proxies and process injection methods.…
Read More
The Anatomy of a Threat: Insights from an Analyst
Cyberattacks are increasingly targeting various entities including managed service providers, businesses, and home users. Understanding the stages of these attacks, which range from reconnaissance to control, is essential for strengthening cybersecurity defenses. Threat intelligence plays a crucial role in helping organizations prepare for and respond to these threats effectively.…
Read More

Victim: www.fgse.cu.edu.eg Country : EG Actor: GDLockerSec Source: http://igziys7pres4644kbrtakxfbrwkyld64nxk5prpkgtcexwrrjgtfjzyd.onion/304bddb7-1ae9-48d1-b5d1-370e4a308575/ Discovered: 2025-01-26 19:29:25.544312 Published: 2025-01-26 19:28:20.980167 Description : Data size: 7MB Format: The content may be in various formats such as text, images, audio, or video. Compression: File size can often be reduced using compression techniques. Transfer: 7MB is generally manageable for transfer over standard internet connections.…
Read More