Results for: ransomware

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: BYOVD attacks leveraged by Medusa ransomware

Cybersecurity Threat Advisory: BYOVD attacks leveraged by Medusa ransomware

The Medusa ransomware-as-a-service (RaaS) operation has recently been observed using a malicious driver named ABYSSWORKER in Bring Your Own Vulnerable Driver (BYOVD) attacks. This technique allows threat actors to disable security software by exploiting legitimate, vulnerable drivers to gain kernel-level...

/ March 25, 2025
Medusa ransomware and its cybercrime ecosystem

Medusa ransomware and its cybercrime ecosystem

Greek mythology says the Medusa was once a beautiful woman until Athena’s curse transformed her into a winged creature with a head full of snakes. Because of her power to petrify anyone who looked directly upon her face, she is...

/ March 10, 2025
XDR 2024
XDR roundup 2024: Ransomware rises fourfold in a year of complex threats

XDR roundup 2024: Ransomware rises fourfold in a year of complex threats

In 2024, Barracuda Managed XDR logged many trillions of IT events to identify the critical security threats targeting organizations and neutralize malicious activity. Threat analysts in Barracuda Managed XDR’s Security Operations Center (SOC) have drawn on this unique dataset to highlight the...

/ February 14, 2025
SOC case files
The SOC case files: XDR detects Akira ransomware exploiting a ‘ghost’ account

The SOC case files: XDR detects Akira ransomware exploiting a ‘ghost’ account

This edition of the SOC case files showcases how Barracuda Managed XDR detects a breach via a ‘ghost’ account and an unprotected server. The SOC is part of Barracuda Managed XDR, an extended visibility, detection, and response (XDR) service that...

/ February 5, 2025 / 4 Comments
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Ransomware attacks on ESXi systems

Cybersecurity Threat Advisory: Ransomware attacks on ESXi systems

New ransomware attacks were discovered targeting ESXi systems that use stealthy SSH tunnels to direct traffic to command-and-control (C2) infrastructure, enabling attackers to remain undetected. Continue reading this Cybersecurity Threat Advisory to discover the key steps to safeguard your environment....

/ January 30, 2025
SOC files
The SOC case files: Play ransomware targets manufacturing firm

The SOC case files: Play ransomware targets manufacturing firm

Incident summary A U.S.-based manufacturing company was recently targeted by the Play ransomware group in the early hours of the morning. The attackers broke into an under-protected domain controller at 1:00 am. At 3:20 a.m. the gang attempted to execute...

/ November 21, 2024 / 5 Comments
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: New ransomware variant to watch for

Cybersecurity Threat Advisory: New ransomware variant to watch for

A new ransomware family, Ymir, has been discovered. It is an unconventional combination of memory management functions (like malloc, memmove, and memcmp) that executes malicious code directly in the memory. Continue reading this Cybersecurity Threat Advisory to learn how to...

/ November 14, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Cicada3301 ransomware variant

Cybersecurity Threat Advisory: Cicada3301 ransomware variant

A new ransomware variant has been found, known as Cicada3301. It exhibits similarities to the defunct BlackCat (ALPHV) operation, and it targets both Windows and Linux systems. Review the details in this Cybersecurity Threat Advisory to learn how this variant...

/ September 6, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: VMware ESXi vulnerability exploited by BlackByte ransomware

Cybersecurity Threat Advisory: VMware ESXi vulnerability exploited by BlackByte ransomware

BlackByte ransomware group is actively exploiting CVE-2024-37085, a recently patched authentication bypass vulnerability in VMware ESXi hypervisors. The exploitation of this flaw has led to the deployment of ransomware across victim networks. BlackByte ransomware group has marked it as a...

/ September 3, 2024
ransomware threat
Threat Spotlight: How ransomware for rent rules the threat landscape

Threat Spotlight: How ransomware for rent rules the threat landscape

This year’s annual review of ransomware attacks looks at the threat from two perspectives. First, for the third year running we’ve taken a global sample of reported ransomware attacks and analyzed what they tell us about ransomware attackers and their...

/ August 21, 2024