Remove Cryptocurrency Remove Manufacturing Remove Ransomware
article thumbnail

Authorities released free decryptor for Phobos and 8base ransomware

Security Affairs

Japanese police released a free decryptor for Phobos and 8Base ransomware, letting victims recover files without paying ransom. Japanese authorities released a free decryptor for Phobos and 8Base ransomware , allowing victims to recover files without paying.

article thumbnail

Medusa ransomware hit over 300 critical infrastructure organizations until February 2025

Security Affairs

The Medusa ransomware operation hit over 300 organizations in critical infrastructure sectors in the United States until February 2025. The FBI, CISA, and MS-ISAC have issued a joint advisory detailing Medusa ransomware tactics, techniques, and indicators of compromise (IOCs) based on FBI investigations as recent as February 2025.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top Cybersecurity Trends to Watch Out For in 2025

Centraleyes

Ransomware Still Reigns Supreme Ransomware attacks continue to plague organizations globally, and 2024 will be no different. Attackers are becoming more organized, with ransomware-as-a-service (RaaS) operations providing easy access to malicious tools for even novice cybercriminals.

article thumbnail

Cybercrime Soars: FBI's 2024 Report Reveals $16.6 Billion in Losses

SecureWorld News

Top cybercrime categories: Phishing/spoofing: 193,407 complaints Extortion: 86,415 complaints Personal data breaches: 64,882 complaints Cryptocurrency-related scams: Nearly 150,000 complaints involved cryptocurrency, accounting for $9.3 Ransomware The IC3 recognized 67 new ransomware variants in 2024. billion in losses.

article thumbnail

IT threat evolution Q3 2024

SecureList

Interestingly, Twelve shares infrastructure, utilities and TTPs (Tactics, Techniques and Procedures) with the DARKSTAR ransomware group (formerly known as Shadow or COMET). This includes the use of the ngrok utility for tunneling, Radmin, AnyDesk and PuTTY for remote access, the Shamoon wiper and a leaked version of the LockBit ransomware.

article thumbnail

Verizon's 2025 DBIR: Threats Are Faster, Smarter, and More Personal

SecureWorld News

Public Sector: DoS attacks and ransomware remain major concerns. Manufacturing: IP theft and ransomware are top risks; OT/ICS systems still lag in basic controls. Trey Ford , CISO at Bugcrowd: "Ransomware teams, like every other criminal organization, are businesses.

article thumbnail

Chinese Cyberespionage Groups Probe SentinelOne in Sophisticated ShadowPad and PurpleHaze Campaigns

Penetration Testing

ShadowPad, a privately sold modular malware platform, was used in a global campaign spanning June 2024 to March 2025, compromising victims in manufacturing, government, finance, telecom, and research. These implants exfiltrated sensitive files such as certificates and cryptocurrency keys via a custom PowerShell exfiltration script.