Results for: ransomware

SOC files
The SOC case files: Play ransomware targets manufacturing firm

The SOC case files: Play ransomware targets manufacturing firm

Incident summary A U.S.-based manufacturing company was recently targeted by the Play ransomware group in the early hours of the morning. The attackers broke into an under-protected domain controller at 1:00 am. At 3:20 a.m. the gang attempted to execute...

/ November 21, 2024 / 5 Comments
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: New ransomware variant to watch for

Cybersecurity Threat Advisory: New ransomware variant to watch for

A new ransomware family, Ymir, has been discovered. It is an unconventional combination of memory management functions (like malloc, memmove, and memcmp) that executes malicious code directly in the memory. Continue reading this Cybersecurity Threat Advisory to learn how to...

/ November 14, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Cicada3301 ransomware variant

Cybersecurity Threat Advisory: Cicada3301 ransomware variant

A new ransomware variant has been found, known as Cicada3301. It exhibits similarities to the defunct BlackCat (ALPHV) operation, and it targets both Windows and Linux systems. Review the details in this Cybersecurity Threat Advisory to learn how this variant...

/ September 6, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: VMware ESXi vulnerability exploited by BlackByte ransomware

Cybersecurity Threat Advisory: VMware ESXi vulnerability exploited by BlackByte ransomware

BlackByte ransomware group is actively exploiting CVE-2024-37085, a recently patched authentication bypass vulnerability in VMware ESXi hypervisors. The exploitation of this flaw has led to the deployment of ransomware across victim networks. BlackByte ransomware group has marked it as a...

/ September 3, 2024
ransomware threat
Threat Spotlight: How ransomware for rent rules the threat landscape

Threat Spotlight: How ransomware for rent rules the threat landscape

This year’s annual review of ransomware attacks looks at the threat from two perspectives. First, for the third year running we’ve taken a global sample of reported ransomware attacks and analyzed what they tell us about ransomware attackers and their...

/ August 21, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: VMware ESXi flaw exploited by ransomware group

Cybersecurity Threat Advisory: VMware ESXi flaw exploited by ransomware group

A VMware ESXi vulnerability, known as CVE-2024-37085, has been discovered and it is actively exploited by several ransomware groups. Review this Cybersecurity Threat Advisory to learn how to limit the impact of this flaw. What is the threat? CVE-2024-37085 is an...

/ August 1, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Play Ransomware expands

Cybersecurity Threat Advisory: Play Ransomware expands

A new Linux variant of the infamous Play Ransomware, also known as Balloonfly and PlayCrypt, was recently discovered. This variant targets VMware ESXi environments, indicating a strategic shift by the threat actors involved. Review this Cybersecurity Threat Advisory for recommendations...

/ July 24, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: New ShrinkLocker ransomware strains

Cybersecurity Threat Advisory: New ShrinkLocker ransomware strains

ShrinkLocker is a recent ransomware strain that leverages a legitimate Windows encryption feature, BitLocker, to lock victims out of their devices. It shrinks the partition, increasing the impact of the attack. Review this Cybersecurity Threat Advisory in detail to prevent...

/ June 5, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Black Basta ransomware surge

Cybersecurity Threat Advisory: Black Basta ransomware surge

The Cybersecurity and Infrastructure Security Agency (CISA) has issued advisories in response to the widespread of Black Basta ransomware attacks. Review the recommendations detailed in this Cybersecurity Threat Advisory to defend against ransomware attacks and extortion. What is the threat?...

/ May 16, 2024
Spring-cleaning checklist for defending against ransomware

Spring-cleaning checklist for defending against ransomware

Just like your home, your cybersecurity practices could use a spring-cleaning. It’s a great time to “dust off” you and your customers’ devices and data to ensure best practices are followed. Afterall, there is no greater mess than trying to...

/ April 5, 2024 / 12 Comments