🔍 New connection between ransomware groups: Play, RansomHub, and DragonForce linked to the same threat actor A recent report by Kaspersky reveals that a threat actor, known as "Knight," is linked to the operations of the ransomware groups Play, RansomHub, and DragonForce. This finding suggests possible collaboration or reuse of tools among these criminal gangs. 🕵️ Investigation details Kaspersky's analysis identified similarities in the techniques, tools, and procedures (TTPs) used by these three groups. In particular, the use of similar data exfiltration tools, as well as shared communication patterns and command structures, was observed. The "Knight" actor has been active since at least 2022 and has participated in multiple high-profile ransomware campaigns. Their connection to these three groups suggests a level of organization and cooperation that could increase the effectiveness of their attacks. ⚠️ Implications for cybersecurity This connection highlights the growing sophistication and collaboration among ransomware groups. Organizations must be vigilant of these shared tactics and reinforce their security measures, especially in protecting sensitive data and preventing exfiltration. 🛡️ Key recommendations - Implement network segmentation to limit lateral movement - Constantly monitor outgoing traffic to detect data exfiltration - Keep systems updated and apply security patches - Perform regular backups and verify their integrity - Train staff in phishing recognition and social engineering techniques For more information visit: https://enigmasecurity.cl #Ransomware #Cybersecurity #ThreatIntelligence #Kaspersky #PlayRansomware #RansomHub #DragonForce #CyberThreats #InfoSec Let's connect to continue discussing cybersecurity trends: https://lnkd.in/eGvmV6Xf 📅 Tue, 09 Sep 2025 10:36:21 +0000 🔗Subscribe to the Membership: https://lnkd.in/eh_rNRyt
Kaspersky reveals link between ransomware groups Play, RansomHub, and DragonForce
More Relevant Posts
-
🔐 New Cyber Threat: Innovative Tactics from Underground Ransomware Gangs 📌 Executive Summary An underground ransomware group has developed innovative tactics that represent a significant threat to global cybersecurity. These new methodologies include advanced evasion techniques, improved propagation methods, and more sophisticated extortion strategies. The attackers are using customized approaches to maximize the impact of their operations, making detection and mitigation more difficult. 🛡️ Main Identified Tactics - Use of enhanced encryption algorithms that complicate data recovery without paying the ransom - Implementation of double extortion techniques, threatening to leak sensitive information in addition to encrypting data - Exploitation of zero-day vulnerabilities and legitimate access tools to evade detection - Highly targeted and personalized phishing campaigns to deceive users 🚨 Impact and Consequences These tactics represent a concerning evolution in the threat landscape, with the capacity to affect organizations of all sizes and sectors. The sophistication of these attacks requires proactive security measures and defense-in-depth solutions. 💡 Security Recommendations - Implement security patches regularly and in a timely manner - Perform frequent backups and verify their integrity periodically - Continuously train staff in cybersecurity awareness - Adopt extended detection and response (XDR) solutions - Establish tested and updated incident response plans For more information visit: https://enigmasecurity.cl 🎯 Support our research efforts and share this information with your network. Your donation at https://lnkd.in/er_qUAQh helps us continue protecting the community. Let's connect and talk about cybersecurity: https://lnkd.in/ej-vFb7f #Ransomware #Cybersecurity #CyberThreat #InfoSec #Hacking #Infosec #CyberAttacks #DataProtection #CyberDefense #ZeroDay 📅 2025-08-27T06:37:42 🔗Subscribe to the Membership: https://lnkd.in/eh_rNRyt
To view or add a comment, sign in
-
-
🔐 New Cyber Threat: Innovative Tactics from Underground Ransomware Gangs 📌 Executive Summary An underground ransomware group has developed innovative tactics that represent a significant threat to global cybersecurity. These new methodologies include advanced evasion techniques, improved propagation methods, and more sophisticated extortion strategies. The attackers are using customized approaches to maximize the impact of their operations, making detection and mitigation more difficult. 🛡️ Main Identified Tactics - Use of enhanced encryption algorithms that complicate data recovery without paying the ransom - Implementation of double extortion techniques, threatening to leak sensitive information in addition to encrypting data - Exploitation of zero-day vulnerabilities and legitimate access tools to evade detection - Highly targeted and personalized phishing campaigns to deceive users 🚨 Impact and Consequences These tactics represent a concerning evolution in the threat landscape, with the capacity to affect organizations of all sizes and sectors. The sophistication of these attacks requires proactive security measures and defense-in-depth solutions. 💡 Security Recommendations - Implement security patches regularly and in a timely manner - Perform frequent backups and verify their integrity periodically - Continuously train staff in cybersecurity awareness - Adopt extended detection and response (XDR) solutions - Establish tested and updated incident response plans For more information visit: https://enigmasecurity.cl 🎯 Support our research efforts and share this information with your network. Your donation at https://lnkd.in/evtXjJTA helps us continue protecting the community. Let's connect and talk about cybersecurity: https://lnkd.in/ekPbsNy7 #Ransomware #Cybersecurity #CyberThreat #InfoSec #Hacking #Infosec #CyberAttacks #DataProtection #CyberDefense #ZeroDay 📅 2025-08-27T06:37:42 🔗Subscribe to the Membership: https://lnkd.in/eh_rNRyt
To view or add a comment, sign in
-
-
🔍 How We Detected a Ransomware Attack in 5 Minutes Using Elastic Security 💡 In today’s world, ransomware attacks represent one of the biggest threats to organizations. Detection speed is crucial to minimizing impact. 🚨 Real Case: We detected a ransomware attack in just 5 minutes from the start of malicious activity. The attacker used living off the land techniques, native system tools, and legitimate processes to evade traditional detection methods. 📊 Tools Used: - Elastic Security Suite - Custom Detection Rules - Process Behavior Analysis - Real-Time Network Activity Monitoring 🔧 Identified Techniques: - Use of certutil to download malicious payloads - Execution of obfuscated PowerShell scripts - Lateral movement via WMI and SMB - Activation of ransomware with deletion of volume shadows ✅ Thanks to our behavior-based detection system and specific rules, we were able to: - Immediately alert the security team - Isolate compromised devices - Prevent the spread of ransomware - Preserve evidence for forensic analysis 📈 Lessons Learned: - Continuous monitoring is essential - Detection rules must be updated regularly - Behavior analysis outperforms traditional signatures - Rapid response minimizes damage For more information visit: https://enigmasecurity.cl 💙 Support our work to continue sharing cybersecurity analysis: https://lnkd.in/er_qUAQh Connect on LinkedIn: https://lnkd.in/eGvmV6Xf #Ransomware #Cybersecurity #ElasticSecurity #ThreatDetection #IncidentResponse #CyberDefense #SOC #SecurityOperations #ThreatHunting #CyberAttack 📅 Fri, 29 Aug 2025 13:37:25 GMT 🔗Subscribe to the Membership: https://lnkd.in/eh_rNRyt
To view or add a comment, sign in
-
-
🚨 𝗠𝗮𝗹𝘄𝗮𝗿𝗲 & 𝗥𝗮𝗻𝘀𝗼𝗺𝘄𝗮𝗿𝗲: 𝗛𝗼𝘄 𝗖𝘆𝗯𝗲𝗿𝗰𝗿𝗶𝗺𝗶𝗻𝗮𝗹𝘀 𝗢𝗽𝗲𝗿𝗮𝘁𝗲 🚨 Ransomware remains one of the most dangerous cyber threats today. It doesn’t just target systems—it targets people. By exploiting human trust and technical vulnerabilities, attackers can lock critical files and demand payment for their release. 🔎 How does it work? It often starts with: 📎 Malicious email attachments 📩 Phishing attempts ⬇️ Infected downloads 🌐 Compromised websites 💻 Remote access exploits From there, ransomware installs itself, connects back to command-and-control servers, encrypts data, and eventually demands a ransom—leaving victims stuck between data loss and financial extortion. 💡 Key Takeaways: 1.Never click on suspicious links or attachments. 2.Keep your security solutions and systems up to date. 3.Regularly back up critical data offline. 4.Educate teams about phishing and social engineering tactics. Cybersecurity isn’t just an IT issue—it’s a business survival issue. Staying vigilant can mean the difference between continuity and chaos. 👉 What’s your organization doing today to strengthen resilience against ransomware? 🔔 Follow Cyber Press ® for more cybersecurity tips! #CyberSecurity #Ransomware #Malware #InfoSec #CyberAwareness
To view or add a comment, sign in
-
-
🔒 New Version of ToneShell Backdoor with Enhanced Features and Broader Reach 📌 Executive Summary A new variant of the ToneShell malware has been detected, an advanced backdoor that has incorporated improved functions to evade detection and expand its remote control capabilities. Developed in C++, this malware uses obfuscation techniques and encrypted communication to operate stealthily on compromised systems. Its primary objective is to establish persistent access, steal information, and allow remote execution of commands. 🛡️ Key Features - Encrypted Communication: Uses encryption algorithms to protect its communication channels with command and control (C2) servers. - Advanced Persistence: Integrates into the system through mechanisms that allow it to reactivate after reboots. - Remote Command Execution: Enables attackers to execute arbitrary instructions on the infected device. - Evasion of Detection: Employs anti-analysis techniques to hinder identification by security solutions. ⚠️ Impact and Risks ToneShell represents a significant threat to organizations, as it facilitates unauthorized access to corporate networks and can be used as a backdoor for more complex attacks, such as ransomware or theft of confidential data. Its continuous evolution suggests that threat actors are investing in improving their tools. 🔍 Security Recommendations - Keep all systems and software updated. - Implement security solutions capable of detecting malicious behaviors. - Monitor network traffic for suspicious communications. - Conduct regular cybersecurity awareness training. For more information visit: https://enigmasecurity.cl 💙 Support our informative work by donating at: https://lnkd.in/er_qUAQh 👥 Connect and discuss cybersecurity: https://lnkd.in/eGvmV6Xf #ToneShell #Cybersecurity #Malware #Backdoor #ThreatIntelligence #Infosec #InformationSecurity #CyberThreats #Ransomware #DataProtection 📅 Fri, 12 Sep 2025 15:01:52 +0000 🔗Subscribe to the Membership: https://lnkd.in/eh_rNRyt
To view or add a comment, sign in
-
-
🔒 A threat actor installed EDR on their own systems to evade detection 📌 A cybercriminal group has implemented an unusual strategy: installing endpoint detection and response (EDR) tools on their own compromised operating systems. The goal is to analyze and evade the detection capabilities of security products, allowing them to operate undetected in compromised environments. 🔍 Security researchers discovered that the attackers used a legitimate EDR tool to test their malware against security defenses before deploying it in target environments. This approach allows them to refine their evasion techniques and ensure their malicious activity goes unnoticed. ⚠️ This tactic represents a significant evolution in cybercriminal methodologies, demonstrating their increasing sophistication and understanding of enterprise security technologies. Organizations must reinforce their defenses with continuous monitoring and behavioral analysis to detect anomalous activities even when attackers use legitimate tools. 💡 Key recommendations: - Implement layered security controls - Monitor unauthorized use of security tools - Conduct regular security configuration audits - Keep all detection systems updated For more information visit: https://enigmasecurity.cl 🛡️ Support our cybersecurity community to continue sharing vital information. Your donation makes our work possible: https://lnkd.in/er_qUAQh Connect with us on LinkedIn for more security insights: https://lnkd.in/eGvmV6Xf #Cybersecurity #ThreatIntelligence #EDR #CyberDefense #InfoSec #Hacking #CyberAttack #CyberSecurityNews 📅 Wed, 10 Sep 2025 15:06:40 +0000 🔗Subscribe to the Membership: https://lnkd.in/eh_rNRyt
To view or add a comment, sign in
-
-
🔍 How We Detected a Ransomware Attack in 5 Minutes Using Elastic Security 💡 In today’s world, ransomware attacks represent one of the biggest threats to organizations. Detection speed is crucial to minimizing impact. 🚨 Real Case: We detected a ransomware attack in just 5 minutes from the start of malicious activity. The attacker used living off the land techniques, native system tools, and legitimate processes to evade traditional detection methods. 📊 Tools Used: - Elastic Security Suite - Custom Detection Rules - Process Behavior Analysis - Real-Time Network Activity Monitoring 🔧 Identified Techniques: - Use of certutil to download malicious payloads - Execution of obfuscated PowerShell scripts - Lateral movement via WMI and SMB - Activation of ransomware with deletion of volume shadows ✅ Thanks to our behavior-based detection system and specific rules, we were able to: - Immediately alert the security team - Isolate compromised devices - Prevent the spread of ransomware - Preserve evidence for forensic analysis 📈 Lessons Learned: - Continuous monitoring is essential - Detection rules must be updated regularly - Behavior analysis outperforms traditional signatures - Rapid response minimizes damage For more information visit: https://enigmasecurity.cl 💙 Support our work to continue sharing cybersecurity analysis: https://lnkd.in/evtXjJTA Connect on LinkedIn: https://lnkd.in/g34EbJGn #Ransomware #Cybersecurity #ElasticSecurity #ThreatDetection #IncidentResponse #CyberDefense #SOC #SecurityOperations #ThreatHunting #CyberAttack 📅 Fri, 29 Aug 2025 13:37:25 GMT 🔗Subscribe to the Membership: https://lnkd.in/eh_rNRyt
To view or add a comment, sign in
-
-
🚨 Major Cyber Threat Alert: SystemBC Malware Now Powers Massive Proxy Network with 1,500+ Servers! 🤖🔓 A new report details the alarming evolution of the SystemBC malware, transforming it from a simple backdoor into a massive, sophisticated proxy network for ransomware groups. Here’s what you need to know: ▪️ From Backdoor to Powerhouse: SystemBC aka RotaJakob is no longer just a persistence tool. It has morphed into a full-fledged proxy network, dubbed "SystemBC Relay Network," acting as a critical middleman for remote access and data exfiltration. ⚙️ ▪️ Massive Infrastructure Uncovered: Researchers have identified over 1,500 malicious servers power this network, highlighting the immense scale and resources available to threat actors. 📈 ▪️ Fueling Ransomware Attacks: This network is a key enabler for major ransomware operations like LockBit and Black Basta, providing them with anonymous, encrypted communication channels to control infected systems. 💻🔒 ▪️ Evades Traditional Defenses: By routing malicious traffic through these proxies, attackers can better hide their activity, bypass network defenses, and maintain a stealthy, persistent presence on victim networks. 🛡️➡️❌ This shift signifies a move towards more professional, resilient, and scalable criminal infrastructures. It's a stark reminder that the tools used by cybercriminals are constantly adapting to be more evasive and effective. How is your organization enhancing its network monitoring to detect these kinds of sophisticated, encrypted proxy threats? Are you prioritizing traffic analysis alongside traditional signature-based defenses? 🤔 #CyberSecurity #ThreatIntelligence #Ransomware #SystemBC #Malware #InfoSec #CyberThreats #NetworkSecurity #CyberAware #CyberDefense Link:https://lnkd.in/demPcgdV #cybersecurity #infosec
To view or add a comment, sign in
-
-
In today's rapidly evolving cybersecurity landscape, a striking 74% of organizations have experienced a phishing attack in the past year. This statistic underscores the persistent threat that phishing poses, even as businesses invest heavily in cybersecurity measures. Organizations must remain vigilant, as attackers continually refine their tactics to bypass traditional defenses (source: https://lnkd.in/djNC7tub). The significance of this trend is profound. Phishing attacks often serve as the gateway to more severe breaches, leading to financial loss and reputational damage. As remote work becomes the norm, the attack surface expands, making it imperative for companies to bolster their email security and employee training programs. For those in regulated industries, staying compliant with standards like NIST's guidelines on email security can be a crucial step. Regular updates and audits of cybersecurity practices are not just best practices—they're essential for maintaining trust and compliance. As we look to the future, how do you foresee the role of AI in combating phishing threats? Could it be the key to staying one step ahead of cybercriminals? #CyberStrategy #TechTrends #ComplianceReady #Insight
To view or add a comment, sign in
-
🔒 CYBER THREAT: Threat actors are exploiting Windows Scheduled Tasks for persistence and privilege escalation 📌 EXECUTIVE SUMMARY: A new security report reveals that cyber attackers are actively exploiting the Windows Scheduled Tasks feature to maintain persistent access to compromised systems and escalate privileges. This technique allows threat actors to regularly execute malicious code without detection by leveraging a legitimate operating system tool. ⚠️ ATTACK MECHANISM: - Attackers create or modify existing scheduled tasks - Configure tasks to execute malicious payloads at specific intervals - Use task names that appear legitimate to evade detection - Leverage system privileges to execute code with elevated permissions 🎯 PRIMARY OBJECTIVES: - Maintain persistence on compromised systems - Execute malware recurrently - Escalate administrator privileges - Evade traditional security mechanisms 🛡️ SECURITY RECOMMENDATIONS: - Regularly monitor scheduled tasks on critical systems - Implement EDR solutions that detect suspicious modifications - Apply the principle of least privilege to service accounts - Validate the legitimacy of all scheduled tasks - Keep systems updated with the latest security patches For more information visit: https://enigmasecurity.cl 💡 Support our cybersecurity community with a donation to continue sharing critical information: https://lnkd.in/er_qUAQh Connect on LinkedIn for more security insights: https://lnkd.in/eGvmV6Xf #Cybersecurity #WindowsSecurity #ThreatIntelligence #CyberAttack #ScheduledTasks #Persistence #PrivilegeEscalation #InfoSec #CyberDefense #MalwareDetection 📅 2025-08-25T06:36:49 🔗Subscribe to the Membership: https://lnkd.in/eh_rNRyt
To view or add a comment, sign in
-
More from this author
-
✨ ¡La Transformación Impulsada por la IA ya Está Aquí! 🚀 ¿Estás preparado para liderar esta ola? ✨
Luis Oria Seidel 3mo -
La Evolución de la Ciberseguridad 2010-2025: Un Análisis Exhaustivo del Impacto de la IA y la Automatización
Luis Oria Seidel 5mo -
¿Cuál es el proceso completo de un pentest, desde su ejecución inicial hasta la escalada de privilegios?
Luis Oria Seidel 6mo