
Ransomware

Storm-2603 spotted deploying ransomware on exploited SharePoint servers – Help Net Security
One of the groups that, in the past few weeks, has been exploiting vulnerabilities in on-prem SharePoint installation has been observed deploying Warlock ransomware, Microsoft shared on Wednesday. First attack spotted on July 7th On Saturday, Microsoft announced that attackers have been spotted exploiting a zero-day variant (CVE-2025-53770) of a SharePoint vulnerability (CVE-2025-49706) that the…

From Backup to Cyber Resilience: Why IT Leaders Must Rethink Backup in the Age of Ransomware
With IT outages and disruptions escalating, IT teams are shifting their focus beyond simply backing up data to maintaining operations during an incident. One of the key drivers behind this shift is the growing threat of ransomware, which continues to evolve in both frequency and complexity. Ransomware-as-a-Service (RaaS) platforms have made it possible for even…

4 Arrested Over Scattered Spider Hacking Spree
WIRED reported this week on public records that show the United States Department of Homeland Security urging local law enforcement around the country to interpret common protest activities and surrounding logistics—including riding a bike, livestreaming a police encounter, or skateboarding—as “violent tactics.” The guidance could influence cops to use everyday behavior as a pretext for…

Qilin Ransomware Adds
The threat actors behind the Qilin ransomware-as-a-service (RaaS) scheme are now offering legal counsel for affiliates to put more pressure on victims to pay up, as the cybercrime group intensifies its activity and tries to fill the void left by its rivals. The new feature takes the form of a “Call Lawyer” feature on the…

Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday disclosed that ransomware actors are targeting unpatched SimpleHelp Remote Monitoring and Management (RMM) instances to compromise customers of an unnamed utility billing software provider. “This incident reflects a broader pattern of ransomware actors targeting organizations through unpatched versions of SimpleHelp RMM since January 2025,” the…

A familiar playbook with a twist: 3AM ransomware actors dropped virtual machine with vishing and Quick Assist
Ransomware is usually a crime of opportunity. Attackers typically strike through an easily-discovered vulnerability or security weakness— unpatched Internet-facing software, vulnerable network edge devices or exposed inbound virtual private network ports lacking multifactor authentication are among the most common points of initial compromise. However, some attacks appear much more targeted and include significant pre-attack reconnaissance…

15 of the Biggest Ransomware Attacks in History | Informa TechTarget
Ransomware has become a favorite attack strategy for bad actors, with reports labeling it the most effective way for cybercriminals to monetize illegal access into networks. News of ransomware attacks appears daily. More troubling still are predictions that ransomware gangs are becoming more adept at using AI, and well-funded ones could soon use agentic…

Ransomware Trends, Statistics and Facts in 2025 | Informa TechTarget
While ransomware isn’t a new cybersecurity risk, it continues to receive attention at the highest levels of government worldwide. Ransomware has affected people’s ability to get healthcare, put gas in their vehicles and buy groceries. The financial effects of ransomware have also become particularly pronounced in recent years. Attacks on supply chains have caused more…

How to Prevent and Protect Against Ransomware | Informa TechTarget
The ransomware threat continues to plague organizations of all types and sizes. The SANS Institute reported a 73% increase in ransomware activity between 2022 and 2023, and Corvus Insurance identified 55 new ransomware groups in 2024. Preparation for a potential ransomware attack should be a priority. Take stock of existing cybersecurity controls and processes…

State-aligned APT groups are increasingly deploying ransomware – and that’s bad news for everyone
The blurring of lines between cybercrime and state-sponsored attacks underscores the increasingly fluid and multifaceted nature of today’s cyberthreats 07 Jan 2025 • , 5 min. read There was a time when the boundary between cybercrime and state-aligned threat activity was rather easy to discern. Cybercriminals were fuelled solely by the profit motive. And their…
- 1
- 2