Short Summary

The rise of DeathGrip ransomware, a Ransomware-as-a-Service (RaaS) model, highlights the decreasing barrier to entry for cybercriminals. With tools like LockBit 3.0 and Yashma/Chaos readily available, even those with minimal skills can launch sophisticated attacks. DeathGrip promotes its services through Telegram, offering features such as advanced encryption, security evasion techniques, and system manipulation capabilities.…

Read More

“`html Short Summary:

Hunters International, a ransomware group that emerged in October 2023, has quickly become the 10th most active ransomware group in 2024. They operate as a Ransomware-as-a-Service (RaaS) provider, facilitating attacks by less sophisticated actors. Their tactics include data exfiltration, sophisticated encryption techniques, and targeting various sectors opportunistically, while avoiding Russian-influenced regions.…

Read More

Threat Actor: RADAR | RADAR Victim: Change Healthcare | Change Healthcare Price: $22 million Exfiltrated Data Type: Healthcare data

Key Points :

ALPHV group received a $22 million ransom from Change Healthcare. The data-exfiltrating affiliate was left unpaid and turned to RansomHub for payment.

Threat Actor: RADAR | RADAR Victim: Long Island Plastic Surgery (LIPSG) | Long Island Plastic Surgery Price: Reduced ransom (exact amount not specified) Exfiltrated Data Type: Medical data

Key Points :

ALPHV allegedly received a reduced ransom from LIPSG.…
Read More

“`html Short Summary:

The article discusses Mandiant’s detection of multiple intrusions involving the QAKBOT botnet and the subsequent deployment of BASTA ransomware by the threat cluster UNC4393. The group has shown a significant operational tempo, with over 40 intrusions across various industries, including healthcare. The article details the evolution of UNC4393’s tactics, malware usage, and its shift from readily available tools to custom malware development.…

Read More

The Eldorado ransomware group, which reportedly emerged in March, operates a new Ransomware-as-a-Service (RaaS) platform featuring locker variants specifically designed for VMware ESXi and Windows systems. However, this group, which is thought to be of Russian origin, might have older ties.

This post delves into the origins, tactics, and impact of Eldorado, providing a comprehensive overview of this notorious cybercriminal organization.…

Read More

Summary: A recent Europol report highlights the fragmentation of the ransomware-as-a-service (RaaS) landscape following the disruption of major groups, complicating attribution and defense strategies. The report notes a shift towards independent operations among affiliates, utilizing modified tools, while small and medium-sized businesses are increasingly targeted due to their perceived vulnerabilities.…

Read More

Summary: The Qilin ransomware group has targeted the healthcare sector, demanding a $50 million ransom from Synnovis, impacting several NHS hospitals. Known for its Ransomware-as-a-Service model, Qilin has evolved its tactics and tools since its emergence in 2022, compromising over 150 organizations globally.

Threat Actor: Qilin | Qilin Victim: Synnovis | Synnovis

Key Point :

Qilin exploits vulnerabilities in Fortinet devices and Veeam Backup & Replication software for initial access.…
Read More

Summary: The Scattered Spider cybercrime group is using RansomHub and Qilin ransomware variants in its attacks, indicating a potential power shift among hacking groups.

Threat Actor: Scattered Spider | Scattered Spider Victim: Various victims, including Las Vegas casinos | Las Vegas casinos

Key Point :

The Scattered Spider cybercrime group, also known as Octo Tempest, is considered one of the most sophisticated and threatening groups currently in operation.…
Read More
Executive SummaryNew evidence shows FIN7 is using multiple pseudonyms to mask the group’s true identity and sustain its criminal operations in the underground market FIN7’s campaigns demonstrate the group’s adoption of automated SQL injection attacks for exploiting public-facing applications AvNeutralizer (aka AuKill), a highly specialized tool developed by FIN7 to tamper with security solutions, has been marketed in the criminal underground and used by multiple ransomware groups SentinelLabs has discovered a new version of AvNeutralizer that utilizes a technique previously unseen in the wild to tamper with security solutions, leveraging the Windows built-in driver ProcLaunchMon.sys…
Read More

Key Points

In June 2024, ReliaQuest responded to detections from an endpoint detection and response (EDR) tool signaling the beginning of a ransomware attack by the “Medusa” ransomware group that resulted in the encryption of various hosts in a customer environment. Since 2022, the Ransomware-as-a-Service (RaaS) group Medusa has targeted organizations in the technology, education, manufacturing, and healthcare sectors by taking advantage of unpatched vulnerabilities and hijacking legitimate accounts.…
Read More