Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » RansomHub went dark on April 1; Partners escaped in Qilin, Dragonforce demanded control
Global Security

RansomHub went dark on April 1; Partners escaped in Qilin, Dragonforce demanded control

AdminBy AdminApril 30, 2025No Comments6 Mins Read
RansomHub Went Dark
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Ranshub went dark

Cybersecurity researchers showed it showed RansomHubThe Internet infrastructure “inexplicably” has been offline from April 1, 2025, which is concerned about the branches of the AS-A-Service (RAAS).

Singaporean Cybersecurity Group-IB – Note What it can lead to migration to Qilin, given that “disclosure of information on DLS (data leak site) has doubled since February.”

RansomHub estimates that first appeared in February 2024, stolen data from more than 200 victims. It replaced two loud groups of Raas, Lockbit and Blackcat to become a leader by grooming on their affiliates, including Scattered spider and An evil bodywith profitable payments.

“After the possible acquisition of the web application and the Source Code of the Ransomware of Knight (previously Cyclops) RansomHub quickly grew on the ransomware stage, thanks to the dynamic features of its multi-points and aggressive, branch model that offers significant financial stimuli,” the Group-Ib report said.

Ransom RansomHub is designed to work in Windows, Linux, FreeBSD and ESXI, as well as the X86, X64 and Arm architecture, avoiding the attacking companies located in the Commonwealth (CIS), Cuba, North Korea and China. It can also encrypt local and distant file systems via SMB and SFTP.

The affiliate panel used to customize the ransom through the web interface has a special section “Members”, where the participants of the affiliate group are given the opportunity to create their own accounts on the device.

Cybersecurity

The partners were also provided by the “killers” module at least June 2024 to stop and bypass security software using famous vulnerable drivers (Byovd). However, since then the tool has been stopped due to high detection rates.

Upon free and Trend MicroCyber-napades were also noted that use malicious Software for JavaScript known as Socgholish (aka fake

“On November 25, the group operators released a new note on their affiliate board, which announced that any attack on any state institution is strictly forbidden,” the company said. “Therefore, all partners were invited to refrain from such actions from high risk and a loss -free investment.”

GuidePoint Security, which also noted the downtime of the Ranshubub infrastructure, said the event chain led to “Partnership riots”, with the competitor Raas Group DragonForce, which stated at the RAMP forum that RansomHub “decided to go to our infrastructure” Ransware Cartel “.

It is worth noting that another actor raaas called Blacklock also evaluated To start cooperating with DragonForce after the latter abandoned the data leak in late March 2025.

“These discussions on the forums” ramp – Note.

“It remains to find out if this instability will write the beginning of the end for RansomHub, although we cannot but note that the group that has risen, promising stability and safety for branches may have failed and betrayed partners on both points.”

Secureworks Counter Personship About (CTU), which also tracked Dragonforce’s rebranding as a “cartel”, stated that efforts are part of the new business model designed to attract affiliates and increase profits, allowing branches to create their “brands”.

This is different from the traditional RAAS scheme when the main developers have created a dark web -infrastructure and recruit affiliates from cybercrime, which then attacks after accessing the target networks from the original access broker (IAB) in exchange for 70% revenue payments.

“In this DragonForce model provides its infrastructure and tools, but does not require affiliates to deploy its required program,” owned by Sophos – Note. “Advertising features include administrative and client panels, encryption and talks tools, file storage system, Tor -based leakage site and Support domain.”

Another extortion group that covers the new tactic is anubis, which came out in February 2025 and uses the option of extracting data only to put pressure on the victims, threatening to publish an “Investigative article” containing the analysis of the stolen data and report on the normative bodies or conformity.

“As the ransom ecosystem continues to bend and adapt, we see broader experiments with different operating models,” said Reeph Piling, the Director for Intelligence Secureworks Ctu. “Lockbit has mastered the affiliate scheme, but after the actions on forced execution, it is not surprising to see new schemes and methods that try and experience.”

Development is the same Imit Ransomware, this is actively focusing on health care after harvesting powers, using the executed Python, capable of stealing the clipboard content.

“The Elenor-Corp Mimic Ransomware version demonstrates enhancements compared to earlier versions, using complex anti-sytro measures, falsification of processes and encryption strategies,” Morphisec Michael Harelik – Note.

“This analysis emphasizes the developing sophistication of the ransomware attacks, emphasizing the need for active protection, rapid reaction to incidents and reliable high -risk recovery strategies such as healthcare.”

Cybersecurity

Some of the other notable compelling programs that have been observed in recent months, the following –

  • Crazywhich is aimed at Taiwanese Health, Education and Industry and uses byvd methods to bypass security measures with the open source tool specified Fasten
  • Elysisthe new option Ghost (Aka Clean)) Family redemptions that stop the tough list of services, disables the backup of the system, removes shadow copies and changes the load policy to make the system more difficult
  • Fogabused by the name of the Ministry of Government Effective Effectiveness (DOGE) and persons related to the government’s initiative in email and phishing
  • Hollcatwhich has For the initial access of the vulnerabilities of the zero day, for example, at the Atlasian Jiri to gain initial access
  • Hunters Internationalwhich rebranded and launched surgery only with extortion
  • Blockingwho used the shameful Clickfix Strategy for initiating a multi -stage attack chain that launches a useful Ransomware load, along with the back called “Rat” and “Steal, such as Lumma” and “Berserkstealer”
  • Doused by phishing -electronic mail that is disguised as an Authentification of Screenconnect to break the managed service provider (MSP) AITM PHISHING KIT and launch attacks on ransom on their customers (attributed to a partner named Stac4365)

These companies serve to highlight the constantly developing nature of the extorting programs and demonstrate the ability of the subjects to the threat to innovate in the conditions of violations and leaks of law enforcement agencies.

Really, new analysis 200,000 Internal Messages about Chat Black Basta At the Forum, the incident and security response teams (first) showed how the ransom group conducts its activity, focusing on advanced social engineering technologies and using VPN vulnerabilities.

“A participant known as” Nur “is instructed to identify the key goals in the organizations they seek to attack” first – Note. “Once they find a person influence (such as the head or personnel), they initiate contact through a phone call.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025

Google unfolds on the AI ​​Defense device to detect scam in Chrome and Android

May 9, 2025

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025

Google unfolds on the AI ​​Defense device to detect scam in Chrome and Android

May 9, 2025

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.