Tuesday, March 25, 2025

Ransomware

Malicious VS Code Extensions Target Developers with ShibaCoin Ransomware

Researchers from Reversing Labs have identified two malicious Visual Studio Code (VS Code) extensions that are distributing ransomware to unsuspecting developers.The extensions, named "ahban.shiba" and "ahban.cychelloworld," are currently under...

Albabat Ransomware Expands Reach to Target Linux and macOS Platforms

A recent report from Trend Micro has revealed that a new variant of the Albabat ransomware now targets Linux and macOS platforms, marking a...

VanHelsingRaaS Emerges, Targeting Linux, BSD, ARM, and ESXi Systems

VanHelsingRaaS, a newly launched ransomware-as-a-service (RaaS) program, has quickly gained traction in the cybercrime ecosystem.Introduced on March 7, 2025, this RaaS platform offers...

MEDUSA Ransomware Deploys Malicious ABYSSWORKER Driver to Disable EDR

In a recent analysis by Elastic Security Labs, a malicious driver known as ABYSSWORKER has been identified as a key component in the MEDUSA...

VanHelsing Ransomware Targets Windows Systems with New Evasion Tactics and File Extension

The cybersecurity landscape has been recently disrupted by the emergence of the VanHelsing ransomware, a sophisticated strain identified by the CYFIRMA Research and Advisory...

RansomHub Affiliate Deploys New Custom Backdoor “Betruger” for Persistent Access

Symantec's Threat Hunter team has identified a sophisticated custom backdoor named "Betruger" linked to a RansomHub affiliate.This newly discovered backdoor appears to be...

Dragon RaaS Leading “Five Families” Crimeware with New Initial Access & Exploitation Tactics

Dragon RaaS, a ransomware group known for its blend of hacktivism and cybercrime, has emerged as a significant player in the "Five Families" crimeware...

Babuk2 Ransomware Issues Fake Extortion Demands Using Data from Old Breaches

Recent investigations by the Halcyon RISE Team have uncovered a concerning trend in the ransomware landscape: the Babuk2 group is issuing extortion demands based...

Hackers Use RMM Tools to Maintain Persistence and Navigate Networks Undetected

Threat actors have increasingly been leveraging legitimate remote monitoring and management (RMM) software to infiltrate and navigate through networks undetected.RMM tools, such as...

Threat Actors Steal 3.2 Billion Login Credentials and Infect 23 Million Devices Worldwide

In a stark revelation of the escalating cyber threat landscape, Flashpoint's latest intelligence report highlights the alarming rise in compromised credentials and malware infections.In...

SocGholish Exploits Compromised Websites to Deliver RansomHub Ransomware

SocGholish, a sophisticated malware-as-a-service (MaaS) framework, has been identified as a key enabler in the distribution of RansomHub ransomware.This malicious framework exploits compromised...