Ilya Angelov, a 40-year-old Russian man, has been sentenced to two years in prison for his role in managing a botnet that facilitated ransomware attacks targeting U.S. companies. The botnet, associated with a cybercriminal group known as TA551, was used to deploy malicious software that locked users out of their systems until a ransom was paid. In addition to his prison sentence, Angelov was fined $100,000. This case underscores the ongoing challenges posed by international cybercrime, particularly how individuals can exploit technology to harm businesses and individuals across borders. The sentencing aims to deter similar cybercriminal activities and demonstrates law enforcement's commitment to addressing ransomware threats.
Articles tagged "Ransomware"
Found 177 articles
Infosecurity Magazine
Aleksei Volkov, a Russian cybercriminal, has been sentenced to 81 months in prison for his involvement with the Yanluowang ransomware. This ransomware has been linked to various attacks on organizations, encrypting files and demanding ransom payments for decryption. Volkov's arrest and sentencing mark a significant step in the ongoing efforts to combat ransomware and cybercrime. His actions not only impacted individual victims but also contributed to the broader threat posed by ransomware groups, which continue to target businesses and institutions worldwide. The case serves as a reminder of the legal consequences that cybercriminals face, hopefully deterring future attacks.
darkreading
Recent developments in ransomware attacks have seen threat actors using artificial intelligence to conduct faster and more sophisticated assaults. These attackers are bypassing traditional security measures by exploiting valid credentials, making it easier for them to infiltrate systems and access sensitive data. This new approach can lead to significant data breaches and financial losses for companies, as the speed and efficiency of these attacks increase. Organizations need to bolster their cybersecurity defenses and educate employees on credential management to mitigate these risks. The rise of AI in cybercrime highlights the urgent need for updated security strategies to keep pace with evolving threats.
Trio-Tech, a semiconductor services company, has reported that one of its subsidiaries in Singapore fell victim to a ransomware attack. Hackers deployed file-encrypting ransomware, compromising the subsidiary's network and potentially affecting its operations. While specific details about the extent of the damage or the data involved have not been disclosed, such incidents can severely disrupt business processes and lead to significant financial losses. This attack emphasizes the ongoing risks that companies in the tech sector face from cybercriminals, highlighting the need for robust cybersecurity measures and incident response plans. Companies must remain vigilant and prepared to safeguard against similar threats in the future.
Security Affairs
The WorldLeaks ransomware group has launched attacks against the City of Los Angeles, specifically targeting its Metro system, which resulted in a significant system shutdown. This breach forced the Metro to halt operations temporarily, disrupting public transit services. In addition to Los Angeles, two cities in the Bay Area have declared emergencies due to similar ransomware incidents. These attacks are part of a growing trend in which local governments and essential services are increasingly becoming targets for cybercriminals, raising concerns about the security of public infrastructure and the potential for widespread disruption. The implications of such breaches are serious, as they can hinder public safety and essential services.
The ransomware group known as Beast Gang has accidentally exposed files from their central cloud server, revealing their aggressive tactics for attacking network backups. These files show a clear strategy focused on targeting backup systems, which is a common method used by ransomware groups to ensure victims are more likely to pay the ransom. This incident raises serious concerns for organizations that rely on cloud services for data storage and highlights the importance of securing backup systems against potential ransomware attacks. As these tactics become more public, companies may need to reassess their cybersecurity measures to protect against such vulnerabilities. The exposure of these files could also lead to further attacks as other cybercriminals may adopt similar strategies.
Cameron Nicholas Curry, a tech worker from North Carolina, was found guilty of conducting an insider attack that resulted in the theft of sensitive corporate data from a Washington D.C.-based technology company. As his six-month contract was ending, Curry reportedly stole data and demanded a ransom of $2.5 million. This incident raises significant concerns about insider threats, where employees exploit their access to company information for personal gain. Companies need to be vigilant about monitoring employee activities, especially as contracts come to a close, to prevent similar attacks in the future. The case serves as a reminder of the potential risks posed by trusted employees and the importance of cybersecurity measures in protecting sensitive information.
SCM feed for Latest
The Interlock ransomware group has been exploiting a severe zero-day vulnerability in Cisco Secure Firewall Management Center software, identified as CVE-2026-20131, since January 26, prior to its public disclosure. This vulnerability allows for insecure deserialization, which can lead to unauthorized access and potential takeover of affected systems. Organizations using Cisco's Secure Firewall Management Center should be particularly vigilant, as the attacks have been ongoing for over a month, posing a significant risk to network security. The situation emphasizes the urgent need for timely security updates and monitoring to protect against such exploitation.
SCM feed for Latest
Researchers have uncovered a toolkit used by the Beast Ransomware group, detailing their methods from initial reconnaissance to the final encryption of files. This toolkit includes various tools that allow the attackers to gather intelligence on their targets, exploit vulnerabilities, and encrypt victims' data for ransom. The discovery is significant because it provides insight into the operational techniques of the group, potentially helping organizations bolster their defenses against future attacks. Companies in sectors that typically face ransomware threats should pay close attention to these findings and review their security measures accordingly. The information also serves as a reminder of the ongoing risks posed by ransomware actors, who continue to evolve their tactics.
The Hacker News
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has alerted government agencies about two significant security vulnerabilities affecting the Synacor Zimbra Collaboration Suite (ZCS) and Microsoft Office SharePoint. Both flaws, identified as CVE-2025-66376 and another not specified in the article, have been found to be actively exploited by attackers. The CVE-2025-66376 vulnerability has a CVSS score of 7.2, indicating a moderate to high risk. Organizations using these platforms are urged to apply the necessary patches to protect against potential attacks. The exploitation of these vulnerabilities underscores the need for timely updates and vigilance in cybersecurity practices, especially for government entities.
SCM feed for Latest
The University of Mississippi Medical Center and Passaic County in New Jersey have recently fallen victim to attacks from a ransomware group known as Medusa, which is believed to operate from Russia. This ransomware-as-a-service operation has claimed responsibility for the incidents, raising concerns about the security of healthcare and local government systems. The attacks can disrupt critical services and compromise sensitive data, which is particularly alarming in the healthcare sector where patient information is at stake. As ransomware attacks become increasingly common, organizations must prioritize their cybersecurity measures to protect against such threats and ensure they can continue to serve their communities effectively.
The Interlock ransomware gang has been actively exploiting a serious remote code execution vulnerability in Cisco's Secure Firewall Management Center (FMC) software since late January. This flaw, classified as having maximum severity, allows attackers to execute arbitrary code on affected systems, putting organizations at significant risk. Companies using this software should be particularly vigilant, as the vulnerability is being exploited in ongoing attacks. Cisco has not yet released a patch to address this issue, which raises concerns about the potential for widespread impact. Organizations relying on Cisco FMC should prioritize security measures and closely monitor any unusual activity to safeguard their networks.
The Hacker News
CVE-2026-20131Amazon Threat Intelligence has issued a warning regarding an active ransomware campaign known as Interlock, which is exploiting a significant vulnerability in Cisco's Secure Firewall Management Center (FMC) Software. This vulnerability, identified as CVE-2026-20131, has a maximum severity score of 10.0 and stems from an insecure deserialization of user-supplied Java byte streams. This flaw could allow attackers to gain root access without authentication, posing a serious risk to organizations using affected Cisco products. The exploitation of this vulnerability is concerning as it enables unauthorized access, potentially leading to data breaches and system compromises. Companies using Cisco FMC Software must take immediate action to protect their systems from this ongoing threat.
Marquis, a financial services provider based in Texas, recently reported that a ransomware attack in August 2025 compromised the personal data of over 672,000 individuals. The breach also had significant operational impacts, affecting 74 banks across the United States. The stolen data may include sensitive information, raising concerns about identity theft and privacy for those affected. This incident highlights the vulnerabilities in the financial sector and the ongoing threat posed by ransomware groups. Organizations in this space need to enhance their cybersecurity measures to protect both their operations and customer data.
As ransomware payments decline to historic lows, attackers are changing their tactics to adapt to the shrinking market. Research indicates that many ransomware actors are moving away from using sophisticated tools like Cobalt Strike and are instead relying on native Windows tools to carry out their attacks. This shift comes as the frequency of data theft incidents is increasing, suggesting that attackers are looking for ways to maintain their profitability despite the challenges. The implications of this trend are concerning for organizations, as it may lead to more widespread and varied attacks that are harder to detect and defend against. Companies need to stay vigilant and adapt their security measures to counter these evolving threats.