Friday, May 24, 2024

Hellokity Ransomware Actors Returns Under New Name

The notorious cybercrime group previously known as Hellokity has reemerged under a new alias, “HelloGookie.”

This development was reported by the cybersecurity watchdog MonThreat via their Twitter account.

Hellokity, known for its high-profile cyber-attacks, has been a significant player in digital extortion.

The group gained notoriety for deploying ransomware to infiltrate corporate networks, encrypting data, and demanding hefty ransoms for decryption keys.

Their operations have caused disruptions across various sectors, impacting business operations and consumer data privacy.

Free Webinar | Mastering WAAP/WAF ROI Analysis | Book Your Spot

The Rebranding to HelloGookie

According to the details shared by MonThreat, Hellokity has not only changed its name but also appears to have upgraded its ransomware tools and tactics.

This rebranding could be an attempt to evade law enforcement and cybersecurity defenses that had adapted to their previous methodologies.

The return of Hellokity under the new moniker “HelloGookie” poses fresh challenges for cybersecurity professionals.

Organizations must stay vigilant and update their security protocols to counter the evolved strategies of this group.

The rebranding might also indicate a possible expansion in the group’s target industries or geographical focus.

Preventative Measures

Organizations are advised to enhance their cybersecurity by implementing robust data backup solutions, conducting regular security audits, and training employees on cybersecurity best practices.

It is also essential to keep all software up to date to mitigate vulnerabilities that ransomware could exploit.

The resurgence of Hellokity as HelloGookie is a stark reminder of the persistent threat cybercriminals pose in the digital age.

Businesses and individuals must remain proactive in their cybersecurity efforts to protect against such evolving threats.

Further updates from cybersecurity experts and law enforcement agencies are eagerly anticipated as the situation develops.

Looking to Safeguard Your Company from Advanced Cyber Threats? Deploy TrustNet to Your Radar ASAP


Latest articles

Hackers Weaponizing Microsoft Access Documents To Execute Malicious Program

In multiple aggressive phishing attempts, the financially motivated organization UAC-0006 heavily targeted Ukraine, utilizing...

Microsoft Warns Of Storm-0539’s Aggressive Gift Card Theft

Gift cards are attractive to hackers since they provide quick monetization for stolen data...

Kinsing Malware Attacking Apache Tomcat Server With Vulnerabilities

The scalability and flexibility of cloud platforms recently boosted the emerging trend of cryptomining...

NSA Releases Guidance On Zero Trust Maturity To Secure Application From Attackers

Zero Trust Maturity measures the extent to which an organization has adopted and implemented...

Chinese Hackers Stay Hidden On Military And Government Networks For Six Years

Hackers target military and government networks for varied reasons, primarily related to spying, which...

DNSBomb : A New DoS Attack That Exploits DNS Queries

A new practical and powerful Denial of service attack has been discovered that exploits...

Malicious PyPI & NPM Packages Attacking MacOS Users

Cybersecurity researchers have identified a series of malicious software packages targeting MacOS users.These...
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Free Webinar

Live API Attack Simulation

94% of organizations experience security problems in production APIs, and one in five suffers a data breach. As a result, cyber-attacks on APIs increased from 35% in 2022 to 46% in 2023, and this trend continues to rise.
Key takeaways include:

  • An exploit of OWASP API Top 10 vulnerability
  • A brute force ATO (Account Takeover) attack on API
  • A DDoS attack on an API
  • Positive security model automation to prevent API attacks

Related Articles