The Qilin ransomware group has targeted Die Linke, a German political party, causing significant disruption to its IT systems. This attack not only resulted in a systems outage but also included threats of leaking sensitive data. The party confirmed that data had indeed been stolen during the breach. This incident raises concerns about the security of political organizations, especially in light of upcoming elections and the potential for sensitive information to be weaponized. As cyberattacks against political entities become more common, the implications for privacy and security in the political arena are increasingly serious.
Articles tagged "Ransomware"
Found 177 articles
BleepingComputer
The article discusses the rise of multi-extortion ransomware attacks, where attackers not only encrypt a victim's data but also threaten to leak sensitive information if their demands aren't met. This tactic adds pressure on victims, as the potential for public exposure can be damaging. Penta Security has developed a solution called the D.AMO platform, which aims to keep exfiltrated files encrypted, rendering them useless to attackers. This technology is crucial for organizations looking to protect their data from exploitation in such attacks. As ransomware tactics evolve, understanding and mitigating these risks is increasingly important for businesses of all sizes.
SCM feed for Latest
Recent reports indicate that ransomware attackers are increasingly using legitimate IT tools, such as Process Hacker and IOBit Unlocker, to bypass traditional antivirus software. These tools have deep access to operating system functions, allowing attackers to execute malicious activities without raising alarms. This trend poses significant risks to organizations, as it makes it harder for security systems to detect and prevent these kinds of attacks. Companies must reassess their security measures to account for the misuse of legitimate software, which could compromise sensitive data and disrupt operations. As attackers continue to evolve their tactics, it’s crucial for users and companies to stay vigilant and update their defenses accordingly.
The Akira ransomware group has been reported to gain access to systems and encrypt data in under an hour, according to research from Halcyon. This quick turnaround is alarming for organizations, as it emphasizes the speed at which attackers can operate. The group is also noted for their focus on creating effective decryptors, possibly to encourage victims to pay ransoms. This tactic highlights a concerning trend in ransomware operations, where attackers not only seek to breach systems but also aim to facilitate recovery, making it more likely that companies will comply with their demands. Businesses need to be aware of these evolving methods and strengthen their security measures to mitigate the risk of such attacks.
Infosecurity Magazine
Researchers at Halcyon report that a ransomware variant known as Akira can now execute a full attack in less than an hour. This rapid attack capability poses a significant risk to organizations, as it allows cybercriminals to inflict damage and demand ransom payments in a very short timeframe. The speed of these attacks could overwhelm traditional defenses and response strategies, putting sensitive data and operational continuity at risk. Companies should be aware of this evolving threat and consider enhancing their cybersecurity measures to mitigate potential impacts. This development underscores the need for vigilance and proactive security planning in the face of increasingly sophisticated ransomware tactics.
SCM feed for Latest
Cybersecurity incidents are increasingly being driven by identity theft, particularly through stolen login credentials. Reports indicate that attackers are using these stolen credentials as a primary way to infiltrate systems, leading to a surge in ransomware attacks. This trend poses significant risks for companies and individuals alike, as unauthorized access can lead to data breaches and financial losses. Organizations need to strengthen their security measures and educate users on the importance of password hygiene and multi-factor authentication to combat this rising threat. The alarming rise in credential abuse emphasizes the need for vigilance in cybersecurity practices.
Hackread – Cybersecurity News, Data Breaches, AI and More
Recent research from Seqrite has revealed that ransomware groups are increasingly using legitimate IT tools, such as IOBit Unlocker, to bypass antivirus software. This tactic, known as the 'dual-use dilemma,' allows attackers to exploit trusted software to carry out their malicious activities without raising immediate alarms. By repurposing these tools, they enhance their chances of successfully infiltrating systems and encrypting data for ransom. This trend poses a significant risk to organizations that rely on these tools for legitimate purposes, as it complicates detection and response efforts. As cybercriminals continue to adapt their methods, companies must remain vigilant and consider revising their security measures to account for the misuse of legitimate software.
Infosecurity Magazine
A recent report from cybersecurity firm ESET reveals that around 80% of UK manufacturers experienced a cyber incident over the past year, with many suffering financial losses as a result. This alarming statistic underscores the vulnerability of the manufacturing sector to cyber threats, which can range from ransomware attacks to data breaches. The financial impact of these incidents can be significant, affecting not just the companies involved but also their customers and supply chains. As manufacturers increasingly rely on digital technologies, the need for robust cybersecurity measures becomes even more pressing. Companies must prioritize their defenses to protect against these growing risks, as the consequences of inaction can be severe.
A recent report reveals that credential theft is a significant factor driving various cyberattacks, including ransomware incidents and breaches of Software-as-a-Service (SaaS) platforms. This trend indicates a shift in focus for cybersecurity efforts, moving from merely preventing breaches to actively detecting and responding to the misuse of legitimate access credentials. The report emphasizes that attackers are increasingly using stolen logins to carry out sophisticated attacks, which complicates the security landscape for many organizations. As a result, businesses must enhance their monitoring capabilities to identify unauthorized use of accounts and protect sensitive information. This shift is particularly crucial as nation-state actors also exploit these vulnerabilities for geopolitical purposes, further elevating the stakes in cybersecurity.
Infosecurity Magazine
TeamPCP, a group linked to the notorious Lapsus$ and Vect ransomware gangs, is reportedly investigating ways to profit from confidential information obtained through supply chain attacks. These attacks involve breaching a company's supply chain to steal sensitive data, which can then be sold or used for further cybercrimes. This shift towards monetizing stolen supply chain secrets raises serious concerns for organizations that rely on third-party vendors, as it exposes them to increased risks of data breaches and financial losses. The implications of such activities could be far-reaching, potentially impacting various industries that depend on secure supply chains. Companies should be vigilant about their supply chain security and consider enhancing their defenses against such exploitation.
At the BSides SF 2026 hacker conference, a researcher warned that Software as a Service (SaaS) and cloud assets are increasingly vulnerable to identity-based ransomware attacks. This type of attack exploits weaknesses in identity management systems, allowing attackers to gain unauthorized access and encrypt critical data. Organizations that rely on cloud services for their operations, especially those with inadequate security measures in place, are at significant risk. The researcher emphasized that as more businesses transition to these platforms, the need for robust identity protection becomes essential. Companies should prioritize enhancing their identity security protocols to mitigate these risks and protect sensitive customer information.
Recent reports indicate a significant decline in infrastructure attacks that could lead to physical consequences, specifically a 25% drop in incidents targeting operational technology (OT) at industrial and critical infrastructure sites. This decrease appears to be linked to a temporary lull in ransomware attacks and hackers' limited understanding of OT systems. While this might seem like positive news, the underlying issue remains that many attackers still lack expertise in these environments, which could change. This situation raises concerns about the long-term security posture of critical infrastructure, as attackers could eventually adapt and exploit these vulnerabilities. Companies operating in these sectors should remain vigilant and enhance their security measures to protect against potential threats in the future.
A pro-Ukrainian hacking group known as Bearlyfy has carried out over 70 cyber attacks against Russian companies since January 2025. Their recent campaigns have utilized a custom ransomware known as GenieLocker, which targets Windows systems. This group aims to disrupt operations in Russian businesses, indicating a strategic move in the ongoing conflict between Ukraine and Russia. The use of ransomware adds a financial pressure point, potentially crippling affected organizations. As these attacks continue, it raises concerns about the security of critical infrastructure and business operations in the region.
Infosecurity Magazine
The Iranian ransomware group Pay2Key has resurfaced, according to research from Halcyon and Beazley Security. This group is known for targeting various organizations and has been linked to significant ransomware attacks in the past. Their re-emergence poses a renewed risk to businesses, particularly those that may not have updated their security measures since the group's last activity. Companies should be vigilant and review their cybersecurity protocols to defend against potential attacks. The return of Pay2Key highlights the ongoing threat posed by state-sponsored groups in the cybercrime space.
SCM feed for Latest
Fortinet's FortiGuard Labs has released its 2026 Global Threat Landscape Report, revealing significant trends in cybersecurity threats. The report indicates a rise in sophisticated attacks targeting both enterprise and personal systems, particularly through ransomware and phishing schemes. These attacks are increasingly leveraging artificial intelligence to bypass traditional security measures. Companies across various sectors, including finance and healthcare, are particularly vulnerable, as attackers exploit their reliance on digital infrastructure. The findings stress the urgent need for organizations to enhance their security protocols and invest in advanced threat detection technologies to protect sensitive data and maintain operational integrity.