article thumbnail

Phishing uses Colonial Pipeline ransomware lures to infect victims

Bleeping Computer

The recent ransomware attack on Colonial Pipeline inspired a threat actor to create create a new phishing lure to trick victims into downloading malicious files. [.].

Phishing 114
article thumbnail

Simply Explained: Ransomware, Phishing, Zero Trust

Cisco Security

For example, what is ransomware and how does it work? What does phishing mean? What’s ransomware? Ransomware is a special type of harmful software. Initially, ransomware attackers simply left the locked data where it was. What’s phishing? Phishing is a simple and popular way for hackers trick and hook you.

Phishing 118
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LockBit Green and phishing that targets organizations

SecureList

For this post, we selected three private reports, namely those related to LockBit and phishing campaigns targeting businesses, and prepared excerpts from these. Phishing and a kit Recently we stumbled upon a Business Email Compromise (BEC) case, active since at least Q3 2022. Adopting the ransom note makes the least sense.

Phishing 116
article thumbnail

Ransomware review: February 2024

Malwarebytes

This article is based on research by Marcelo Rivero, Malwarebytes’ ransomware specialist, who monitors information published by ransomware gangs on their Dark Web sites. This provides the best overall picture of ransomware activity, but the true number of attacks is far higher.

article thumbnail

‘Snatch’ Ransom Group Exposes Visitor IP Addresses

Krebs on Security

The victim shaming site operated by the Snatch ransomware group is leaking data about its true online location and internal operations, as well as the Internet addresses of its visitors, KrebsOnSecurity has found. The victim shaming website for the Snatch ransomware gang. 226 , currently assigned to Matrix Telekom in Russia.

article thumbnail

Legal Threats Make Powerful Phishing Lures

Krebs on Security

Some of the most convincing email phishing and malware attacks come disguised as nastygrams from a law firm. Please download and read the attached encrypted document carefully. Previous detections of this trojan have been associated with ransomware, but the attackers in this case can use the trojan to install malware of their choice.

Phishing 279
article thumbnail

US cyber and law enforcement agencies warn of Phobos ransomware attacks

Security Affairs

US CISA, the FBI, and MS-ISAC issued a joint CSA to warn of attacks involving Phobos ransomware variants observed as recently as February 2024 US CISA, the FBI, and MS-ISAC issued a joint cyber security advisory (CSA) to warn of attacks involving Phobos ransomware variants such as Backmydata , Devos, Eight, Elking, and Faust.