Three former cybersecurity employees indicted in BlackCat ransomware scheme
The trio acted as affiliates of the BlackCat ransomware gang, breaching corporate networks, stealing sensitive data, encrypting systems, and demanding ransom payments.
The trio acted as affiliates of the BlackCat ransomware gang, breaching corporate networks, stealing sensitive data, encrypting systems, and demanding ransom payments.
The sanctions are part of a broader effort to curb North Korea’s global financial network that support the regime’s weapons development.
The attackers deployed two custom tools CurlyShell and CurlCat designed for remote code execution and covert communications.
The company disclosed that the exploit specifically targeted its V2 Composable Stable Pools.
The malware deploys a complex infrastructure that combines OpenSSH for Windows with a customized Tor hidden service.
The infection chain uses a loader and a .NET-based backdoor component that leverages OpenAI as a C&C channel.
Attackers have used a combination of spear-phishing emails, hijacked business conversations, and compromised accounts to post fake freight listings on load boards.
Ruter confirmed that the Chinese company has access to the bus’s software updates, diagnostics, and battery systems.
The malicious campaign used a ZIP attachment, which masqueraded as a VPN invoice.
BadCandy grants attackers root-level command execution on compromised systems.
Showing elements 301 - 310