GBH
GBH
Home Search

ransomware campaign - search results

If you're not happy with the results, please do another search

Hackers Use New Ransomware that Encrypts Files & Steals Tokens From Victim’s Machine

0
Security researchers at Cyble recently identified that the authors of ransomware now have access to a brand new malicious tool - AXLocker - which...
Hackers Exploit Critical VMware Flaw

Hackers Exploit Critical VMware Flaw to Drop Ransomware & Miners

0
Researchers at FortiGuard Labs noticed multiple malware campaigns targeting the VMware vulnerability to deploy cryptocurrency miners and ransomware on affected machines. The critical vulnerability is...
OldGremlin Hacker Group Expanded Toolkit With Dedicated Linux Ransomware

OldGremlin Hacker Group Expanded Toolkit With Dedicated Linux Ransomware

0
It appears that 16 malicious campaigns have been carried out by a Russian-speaking ransomware group called OldGremlin (aka TinyScouts).  A combination of these campaigns was...
Black Basta Ransomware Gang Infiltrates Networks Using Penetration Testing Tools

Black Basta Ransomware Gang Infiltrates Networks Using Penetration Testing Tools

0
The distribution of QAKBOT malware is resurrected once again by operators of the Black Basta ransomware group on September 8, 2022, after a short...
Ransomware Uses Remote Execution Utilities

New “Prestige” Ransomware Uses Remote Execution Utilities to Launch Destructive Attacks

0
Microsoft Threat Intelligence Center (MSTIC) found a new ransomware named “Prestige” ransomware targeting organizations in the transportation and associated logistics industries in Ukraine and...
Magniber Ransomware Weaponize JavaScript to Attack Windows Users

Magniber Ransomware Weaponize JavaScript to Attack Windows Users

0
Recently, the security researchers at HP's threat intelligence team have discovered a malicious campaign in which the threat actors are delivering Magniber ransomware and...
Callback Phishing Attack

Callback Phishing Attack Tactics Evolved – Successful Attack Drops Ransomware

0
Trellix released a recent report on the evolution of BazarCall social engineering tactics. Initially BazarCall campaigns appeared in late 2020 and researchers at Trellix...
QNAP Warns of DeadBolt Ransomware Attacks Exploiting a Zero-day Flaw

QNAP Warns of DeadBolt Ransomware Attacks Exploiting a Zero-day Flaw

0
QNAP Systems, Inc found a new DEADBOLT ransomware attacks that exploits zero-day vulnerability in Photo Station. QNAP urges all QNAP NAS users to update...
Conti Ransomware Operators Using ‘BazarCall’ Style Attack as an Initial Vector

Conti Ransomware Operators Using ‘BazarCall’ Style Attack as an Initial Vector

0
In the context of phishing attacks, a BazarCall style attack is a form of targeted phishing that uses a call-back methodology in order to...
Cybercriminals Impersonate as Cybersecurity Firms

Cybercriminals Impersonate as Cybersecurity Firms in Callback Phishing Campaigns

0
Threat actors have begun impersonating prominent security companies in a new callback phishing campaign. The primary purpose of this campaign is to make the...

Complete Free Website Security Check

Website

Recent Posts