framapiaf.org est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Un service Mastodon fourni par l'association d’éducation populaire Framasoft.

Administré par :

Statistiques du serveur :

1,4K
comptes actifs

#ransomware

297 messages55 participants26 messages aujourd’hui
cR0w :cascadia:<p>Lantronix listed by Play.</p><p>:dumpster_fire_gif: :ablobcatpopcorn: :dumpster_fire_gif: </p><p><a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a></p>
ransomwatch (unofficial)<p>New <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> post!</p><p>Title: All Book Covers<br>Group: play<br>Discovered: 2025-04-22 18:46:47.456243</p>
CTI.FYI<p>🚨New ransom group blog post!🚨</p><p>Group name: play<br>Post title: All Book Covers<br>Info: <a href="https://cti.fyi/groups/play.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">cti.fyi/groups/play.html</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://infosec.exchange/tags/cti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cti</span></a> <a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintelligence</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Efani<p>😵💫 Ransomware with a meme twist: the latest Fog attacks come with DOGE-themed ransom notes — mocking victims and even offering free decryption if they "spread the malware".</p><p>Researchers at Trend Micro have been tracking a surge in attacks from the Fog ransomware group, which has now hit over 100 confirmed victims since January. While earlier variants relied on compromised VPN credentials, the latest campaigns use phishing emails to deliver a malicious “Pay Adjustment[dot]zip ” file that drops the ransomware via PowerShell.</p><p>Key observations:<br>- Initial infection begins with a ZIP file and LNK shortcut <br>- PowerShell downloads scripts and executables for system profiling, lateral movement, and encryption <br>- A QR code leads to Monero payment options <br>- Political commentary and YouTube links are embedded directly in the code <br>- Sectors hit include tech, education, manufacturing, and transportation</p><p>💰 The ransom notes reference the satirical Department of Government Efficiency (DOGE), making absurd demands like “list five tasks you accomplished last week” or “pay one trillion dollars.” In one version, victims are told they can decrypt their system for free — if they forward the malware.</p><p>This marks a shift in behavior:<br>- Originally, Fog didn’t exfiltrate data or run leak sites <br>- Now, researchers report double-extortion tactics and faster attack cycles <br>- In some incidents, data was encrypted within two hours of initial access</p><p>🛡️ Trend Micro and Darktrace urge organizations to:<br>- Monitor Fog IoCs <br>- Segment networks <br>- Keep offline, tested backups <br>- Train teams to spot phishing attempts <br>- Patch VPNs and remote access infrastructure</p><p>At <span class="h-card" translate="no"><a href="https://infosec.exchange/@Efani" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Efani</span></a></span>, we believe even “troll” ransomware is no joke. Whether done for profit or chaos, the operational damage from Fog attacks can be severe. Stay vigilant — even the ransom notes are engineered for distraction.</p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ransomware</span></a> <a href="https://infosec.exchange/tags/FogRansomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FogRansomware</span></a> <a href="https://infosec.exchange/tags/DOGE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DOGE</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/EfaniSecure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EfaniSecure</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentResponse</span></a></p>
RedPacket Security<p>[INCRANSOM] - Ransomware Victim: franklin nursing home - <a href="https://www.redpacketsecurity.com/incransom-ransomware-victim-franklin-nursing-home/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redpacketsecurity.com/incranso</span><span class="invisible">m-ransomware-victim-franklin-nursing-home/</span></a></p><p><a href="https://mastodon.social/tags/incransom" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>incransom</span></a> <a href="https://mastodon.social/tags/dark_web" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dark_web</span></a> <a href="https://mastodon.social/tags/data_breach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>data_breach</span></a> <a href="https://mastodon.social/tags/OSINT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSINT</span></a> <a href="https://mastodon.social/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://mastodon.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://mastodon.social/tags/tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tor</span></a></p>
RedPacket Security<p>[AKIRA] - Ransomware Victim: Diedrich Coffee - <a href="https://www.redpacketsecurity.com/akira-ransomware-victim-diedrich-coffee/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redpacketsecurity.com/akira-ra</span><span class="invisible">nsomware-victim-diedrich-coffee/</span></a></p><p><a href="https://mastodon.social/tags/akira" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>akira</span></a> <a href="https://mastodon.social/tags/dark_web" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dark_web</span></a> <a href="https://mastodon.social/tags/data_breach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>data_breach</span></a> <a href="https://mastodon.social/tags/OSINT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSINT</span></a> <a href="https://mastodon.social/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://mastodon.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://mastodon.social/tags/tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tor</span></a></p>
ransomwatch (unofficial)<p>New <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> post!</p><p>Title: franklin nursing home<br>Group: incransom<br>Discovered: 2025-04-22 16:46:25.080242</p>
CTI.FYI<p>🚨New ransom group blog post!🚨</p><p>Group name: incransom<br>Post title: franklin nursing home<br>Info: <a href="https://cti.fyi/groups/incransom.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">cti.fyi/groups/incransom.html</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://infosec.exchange/tags/cti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cti</span></a> <a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintelligence</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
AAKL<p>One can only hope the lowlife that targeted this outfit never finds himself in need of one of these kidney machines. Oh, but I forget - the perpetrators never age and live forever in infamy.</p><p>Halcyon: Kidney Dialysis Provider Services Disrupted by Ransomware <a href="https://www.halcyon.ai/blog/kidney-dialysis-provider-services-disrupted-by-ransomware" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">halcyon.ai/blog/kidney-dialysi</span><span class="invisible">s-provider-services-disrupted-by-ransomware</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a></p>
RedPacket Security<p>[QILIN] - Ransomware Victim: parrishleasing[.]com - <a href="https://www.redpacketsecurity.com/qilin-ransomware-victim-parrishleasing-com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redpacketsecurity.com/qilin-ra</span><span class="invisible">nsomware-victim-parrishleasing-com/</span></a></p><p><a href="https://mastodon.social/tags/qilin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>qilin</span></a> <a href="https://mastodon.social/tags/dark_web" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dark_web</span></a> <a href="https://mastodon.social/tags/data_breach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>data_breach</span></a> <a href="https://mastodon.social/tags/OSINT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSINT</span></a> <a href="https://mastodon.social/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://mastodon.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://mastodon.social/tags/tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tor</span></a></p>
RedPacket Security<p>[LYNX] - Ransomware Victim: amethystgroup[.]co[.]uk - <a href="https://www.redpacketsecurity.com/lynx-ransomware-victim-amethystgroup-co-uk/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redpacketsecurity.com/lynx-ran</span><span class="invisible">somware-victim-amethystgroup-co-uk/</span></a></p><p><a href="https://mastodon.social/tags/lynx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lynx</span></a> <a href="https://mastodon.social/tags/dark_web" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dark_web</span></a> <a href="https://mastodon.social/tags/data_breach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>data_breach</span></a> <a href="https://mastodon.social/tags/OSINT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSINT</span></a> <a href="https://mastodon.social/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://mastodon.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://mastodon.social/tags/tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tor</span></a></p>
RedPacket Security<p>[LYNX] - Ransomware Victim: R&amp;N Manufacturing - <a href="https://www.redpacketsecurity.com/lynx-ransomware-victim-r-n-manufacturing/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redpacketsecurity.com/lynx-ran</span><span class="invisible">somware-victim-r-n-manufacturing/</span></a></p><p><a href="https://mastodon.social/tags/lynx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lynx</span></a> <a href="https://mastodon.social/tags/dark_web" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dark_web</span></a> <a href="https://mastodon.social/tags/data_breach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>data_breach</span></a> <a href="https://mastodon.social/tags/OSINT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSINT</span></a> <a href="https://mastodon.social/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://mastodon.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://mastodon.social/tags/tor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tor</span></a></p>
ransomwatch (unofficial)<p>New <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> post!</p><p>Title: Bacton Transport Services<br>Group: ransomhouse<br>Discovered: 2025-04-22 14:40:14.327920</p>
CTI.FYI<p>🚨New ransom group blog post!🚨</p><p>Group name: ransomhouse<br>Post title: Bacton Transport Services<br>Info: <a href="https://cti.fyi/groups/ransomhouse.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">cti.fyi/groups/ransomhouse.html</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://infosec.exchange/tags/cti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cti</span></a> <a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintelligence</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
ANY.RUN<p>☣️ <a href="https://infosec.exchange/tags/PE32" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PE32</span></a> is a new <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> strain quickly gaining attention online</p><p>It engages in double extortion, uses a Telegram-based C2, and is steadily evolving</p><p>Read detailed technical breakdown from Mauro Eldritch👇<br><a href="https://any.run/cybersecurity-blog/pe32-ransomware-analysis/?utm_source=mastodon&amp;utm_medium=post&amp;utm_campaign=pe32_analysis&amp;utm_content=linktoblog&amp;utm_term=220425" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">any.run/cybersecurity-blog/pe3</span><span class="invisible">2-ransomware-analysis/?utm_source=mastodon&amp;utm_medium=post&amp;utm_campaign=pe32_analysis&amp;utm_content=linktoblog&amp;utm_term=220425</span></a></p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Kevin Thomas ✅<p>Trend Micro has identified a new ransomware group, CrazyHunter, actively targeting critical Taiwanese sectors such as healthcare, education, and manufacturing using advanced tactics including BYOVD (bring your own vulnerable driver) to bypass EDR defenses. The group leverages 80% open source tooling—including ZammoCide for privileged process termination via vulnerable drivers, Prince Ransomware Builder to generate ransomware payloads, and SharpGPOAbuse for lateral movement and privilege escalation via Group Policy Objects. With at least 10 confirmed victims, CrazyHunter exemplifies the growing trend of threat actors using low-cost, modifiable GitHub-hosted tools to scale sophisticated campaigns. <a href="https://defcon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://defcon.social/tags/Ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ransomware</span></a> <a href="https://www.darkreading.com/threat-intelligence/ransomware-gang-crazyhunter-critical-taiwanese-orgs" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">darkreading.com/threat-intelli</span><span class="invisible">gence/ransomware-gang-crazyhunter-critical-taiwanese-orgs</span></a></p>
ransomwatch (unofficial)<p>New <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> post!</p><p>Title: R&amp;N Manufacturing<br>Group: lynx<br>Discovered: 2025-04-22 12:39:49.617218</p>
CTI.FYI<p>🚨New ransom group blog post!🚨</p><p>Group name: lynx<br>Post title: R&amp;N Manufacturing<br>Info: <a href="https://cti.fyi/groups/lynx.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">cti.fyi/groups/lynx.html</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://infosec.exchange/tags/cti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cti</span></a> <a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintelligence</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Cybernews<p>Fog ransomware operators are now using DOGE-themed ransom notes to troll their victims, a new cybersecurity investigation has found.</p><p><a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a> <a href="https://infosec.exchange/tags/DOGE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DOGE</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/troll" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>troll</span></a> </p><p><a href="https://cnews.link/ransomware-gang-using-doge-themed-notes-2/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cnews.link/ransomware-gang-usi</span><span class="invisible">ng-doge-themed-notes-2/</span></a></p>
Pyrzout :vm:<p>Two Healthcare Orgs Hit by Ransomware Confirm Data Breaches Impacting Over 100,000 <a href="https://www.securityweek.com/two-healthcare-orgs-hit-by-ransomware-confirm-data-breaches-impacting-over-100000/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/two-healthcar</span><span class="invisible">e-orgs-hit-by-ransomware-confirm-data-breaches-impacting-over-100000/</span></a> <a href="https://social.skynetcloud.site/tags/DataBreaches" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DataBreaches</span></a> <a href="https://social.skynetcloud.site/tags/Ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ransomware</span></a> <a href="https://social.skynetcloud.site/tags/databreach" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>databreach</span></a> <a href="https://social.skynetcloud.site/tags/healthcare" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>healthcare</span></a> <a href="https://social.skynetcloud.site/tags/ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ransomware</span></a></p>