Home Search
ransomware campaign - search results
If you're not happy with the results, please do another search
RA World Ransomware Attack Windows Using Hacked Domain Control & Anti-AV Tactics
Threat actors use hacked domain control to host malicious content by leveraging legitimate domains to evade detection by security measures. Anti-AV tactics are employed to...
Huge Surge in Ransomware-as-a-Service Attacks targeting Middle East & Africa
The Middle East and Africa (MEA) region has witnessed a surge in ransomware-as-a-service (RaaS) attacks, posing a grave threat to digital security.This comprehensive...
LOCKBIT 3.0 Ransomware – Complete Malware Analysis Report
LockBit 3.0 is a sophisticated ransomware identified as a significant threat to organizations worldwide.This ransomware variant is designed to encrypt files on infected...
FBI, CISA warns Of ALPHV Blackcat Ransomware Attacking Hospitals
To raise awareness of the ALPHV Blackcat ransomware as a service (RaaS) that targets the US healthcare industry, the FBI, CISA, and the Department of...
Abyss Locker Ransomware Attacks Microsoft Windows and Linux Users
FortiGuard Labs has released a report detailing the emergence and impact of the Abyss Locker ransomware, which has been targeting Microsoft Windows and Linux...
US to Pay $15M for Info About Lockbit Ransomware Operator Data
In a significant move against cybercrime, the U.S. government has announced a bounty of up to $15 million for information that could lead to...
LockBit Ransomware Members Charged by Authorities, Free Decryptor Released
In a significant blow to one of the most prolific ransomware operations, authorities from the U.S. and U.K., in collaboration with international law enforcement,...
LockBit Ransomware Gang Disrupted by Global Law Enforcement Operation
Earlier this week, Europol and the UK's National Crime Agency announced they had successfully taken down the dark web platform associated with LockBit, a...
Alpha Ransomware Uses Living-Off-The-Land Tools To Attack Windows Computers
Ransomware utilizes living-off-the-land tools in Windows attacks for stealth and evasion. They can blend in with normal system activities by leveraging legitimate, built-in tools...
Akira Ransomware Actively Exploiting Cisco Anyconnect Vulnerability
Threat actors exploit Cisco AnyConnect vulnerabilities to gain unauthorized access to networks, compromise sensitive information, and potentially execute malicious activities. Exploiting these vulnerabilities allows attackers...