Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Microsoft credits Encrypthub, hacker for 618+ violations, for disclosure in Windows
Global Security

Microsoft credits Encrypthub, hacker for 618+ violations, for disclosure in Windows

AdminBy AdminApril 5, 2025No Comments4 Mins Read
Microsoft Credits EncryptHub
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Microsoft crediting the cipher

Probably the lonely actor of the wolf for Encryption Microsoft was recognized by Persona for opening and reporting two Windows deficiencies last month, drawing a picture of a “contradictory” individual, which pursues a legitimate career in cybersecurity and persecution of cybercrime.

In the new a wide analysis Published by Outpost24 Krakenlabs, the Swedish security company revealed the future cybercriminator, who escaped from his hometown in Kharkiv, Ukraine, to a new place near the Romanian coast about 10 years ago.

Microsoft’s vulnerabilities were enlisted by a party called “Skorikari with Skorikari”, which was evaluated by another name used Encrypthub. The disadvantages in question were both recorded by Redmond as part of her Update on Tuesday patch Last month below –

  • Cve-2025-24061 (CVSS assessment: 7.8) -Microsoft Windows Mark-Off (Motw) Require
  • Cve-2025-24071 (CVSS assessment: 6.5) – Microsoft Windows File Explorer Spoofing Vulnerability

Engrypthub, also tracked under the Monikers-208 and Water Gamayun, was in the center of attention In the middle of 2024, as part of a company that used the Winrar branded site to distribute different types of malware, which were located on GitHub repository called “Encrypthub”.

Cybersecurity

In recent weeks the actor threatens has been attributed by Zero-Day Exploitation Another disadvantage of security in the Microsoft Management Console (CVE-2025-26633, CVSS: 7.0, aka MSC Eviltwin) to provide information thefts and previously unregistered back called SilentPrism and Darkwisp.

According to Prodaft, Encrypthub estimates over the last nine months of work over the last nine months of work over the past nine months of work.

“All data analyzed throughout our investigation indicate a single person’s actions,” said Hacker News Lidia Lopez, senior intelligence analyst at the threat of Outpost24.

“However, we cannot rule out the possibility of cooperation with other threat actors.

Outpost24 stated that he was able to assemble an Encrypthub Internet Champlies from “the actor’s overconfidence due to bad work practices”, revealing new aspects of his infrastructure and tools in the process.

It is believed that a person has retained a low profile after moving to an uncertain place in the Romanian area, studying computer sciences on his own, enrolling on online courses, looking for computer jobs on the side.

However, all actor’s threatening activities stopped sharply in early 2022, coincided with The beginning of the war with the Russ-Ukraine. Given this, Outpost24 stated that he had revealed the evidence that he assumed that he had been imprisoned at the same time.

“After the release, he resumed his job search, this time offering freelance internet development services and applications that have acquired a certain craving,” the company said. “But salaries were probably not enough, and after a brief time attempted Bug Bounty programs, we believe that it turned to cybercrime in the first half of 2024.”

One of the earliest Encrypthub businesses in cybercrime landscape is Variable theftWhich was first recorded by the Fortinet Fortinet laboratories in June 2024 as malware for rust theft, which extends through several channels.

Cybersecurity

In A Last interview Thanks to the G0NJXA security researcher, the threatening actor claimed that variable “gives results in systems where Ctealc or Rhadamantys (SIC) will never work” and that it “passes quality corporate antiviral systems”. They also stated that the theft was not only divided privately, but also the “integral” to another product of their victims, called Encryptrat.

“We were able to associate a pseudonym, which had previously been associated with the cipher,” Lopez said. “In addition, one of the domains associated with this company corresponds to the infrastructure associated with its legitimate freelance work. With our analysis, we evaluate the cybercrime activity of Encrypthub, began in March 2024. The Fortinet report is probably noting the first public documentation.”

ENGRIPTHB is said to be a lot on Openai Chatpto to help develop malware, even going to using it to help translate emails and messages and as a confessional tool.

“The Encrypthub case emphasizes how poorly prompt safety remains one of the most important weaknesses for cybercriminals,” Lopez said. “Despite the technical sophistication, the main mistakes – for example, the repeat use of passwords, exposed infrastructure and mixing personal with criminal activity – eventually led to it.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025

Learn the smarter way to protect modern applications

May 16, 2025

Meta to train AI on EU users since May 27 without consent; NOIB is threatened by lawsuits

May 15, 2025

Coinbase agents are bribed, data ~ 1% of users were traced; Attempted extortion of $ 20 million will not succeed

May 15, 2025

NPM malicious package uses Unicode Steganography, Google Calendar as C2 Chroper

May 15, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.