Remove 2020 Remove Encryption Remove Government
article thumbnail

Authorities released free decryptor for Phobos and 8base ransomware

Security Affairs

NoMoreRansom warns users to remove the malware first with a reliable antivirus before using the decryptor, or files may be re-encrypted repeatedly. In 2023, 8Base emerged from Phobos affiliates, using a modified encryptor and double extortion—encrypting and stealing data to force ransom payments.

article thumbnail

Russian Phobos ransomware operator faces cybercrime charges

Security Affairs

Evgenii Ptitsyn and others allegedly ran an international hacking scheme since November 2020, deploying Phobos ransomware to extort victims. Ptitsyn reportedly sold the ransomware on darknet forums under aliases like “derxan” and “zimmermanx,” enabling other criminals to encrypt data and demand ransom.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russia-linked group Nebulous Mantis targets NATO-related defense organizations

Security Affairs

PRODAFT researchers warn of Russia-linked APT group Nebulous Mantis targeting NATO-related defense organizations Nebulous Mantis, a Russian-speaking cyber espionage group (aka Cuba, STORM-0978 , Tropical Scorpius , UNC2596 ), used RomCom RAT and Hancitor since 2019 to target critical infrastructure, governments, and NATO-linked entities.

article thumbnail

Recent Cyber Attacks: Trends, Tactics, and Countermeasures

Hacker's King

In the digital age, cyber-attacks are a growing concern for individuals, businesses, and governments worldwide. These attacks often involve encrypting data and demanding a ransom for its decryption. Understanding the recent trends, tactics, and effective countermeasures is crucial for anyone concerned about cybersecurity.

article thumbnail

Operation SyncHole: Lazarus APT goes back to the well

SecureList

In the South Korean internet environment, the online banking and government websites require the installation of particular security software to support functions such as anti-keylogging and certificate-based digital signatures. The malware receives an RSA public key from the C2 and encrypts a randomly generated AES key using the public key.

Malware 139
article thumbnail

APT trends report Q3 2024

SecureList

However, P8 contains many built-in functions and redesigns of the communication protocol and encryption algorithm, making it a well-designed and powerful espionage platform. The secure USB drive was developed by a government entity in Southeast Asia to securely store and transfer files between machines in sensitive environments.

Malware 113
article thumbnail

Threat Spotlight: Credential Theft vs. Admin Control—Two Devastating Paths to VPN Exploitation

Digital Shadows

VPN Infrastructures Allure for Threat Actors PNs have become a fundamental part of network security for organizations worldwide, enabling secure remote access to systems, encrypting sensitive data during transmission, and protecting internal networks from unauthorized access. Rated CVSS 9.8,

VPN 133