Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion

Ransomware actors are exploiting unpatched SimpleHelp RMM instances to target utility billing software customers, emphasizing the need for updates and threat mitigation. The attack pattern highlights ongoing vulnerabilities exploited by groups like DragonForce and others, with mitigation strategies recommended by CISA. #SimpleHelp #DragonForce…

Read More
Fog Ransomware: Unusual Toolset Used in Recent Attack

In May 2025, an unusual ransomware attack using the Fog ransomware targeted a financial institution in Asia, employing rare tools such as Syteca employee monitoring software and open-source pentesting utilities like GC2, Adaptix, and Stowaway. The attackers also established persistence on the network post-ransomware deployment, indicating possible espionage motives beyond typical ransomware objectives. #FogRansomware #Syteca #GC2 #Adaptix #Stowaway

Read More
CISA Issues Comprehensive Guide to Safeguard Network Edge Devices from Cyber Threats

A collaborative effort among international cybersecurity agencies has resulted in comprehensive guidance to protect network edge devices and appliances. The guidance addresses vulnerabilities in devices like firewalls, routers, IoT devices, and OT systems, emphasizing mitigation strategies and secure deployment practices. #CISA #EdgeDevices #CyberThreats #FirewallVulnerabilities #IoTSecurity…

Read More
Gone But Not Forgotten: Black Basta’s Enduring Legacy

The ransomware group Black Basta disbanded after internal chat leaks, but its tactics, especially mass email spam and Microsoft Teams phishing, continue to be used by former members and new groups. Emerging attack methods now include Python script execution with cURL for payload delivery, emphasizing the need for strong user education and vigilant defense strategies. #BlackBasta #MicrosoftTeamsPhishing #CactusRaaS

Read More
A Detailed Guide on Certipy

This article provides a comprehensive overview of Certipy, a toolkit used to exploit and defend Active Directory Certificate Services (AD CS). It details various attack techniques, including template misconfigurations, privilege escalation, certificate forging, and relay attacks, emphasizing the importance of proper security controls. #ActiveDirectoryCertificateServices #Certipy #ESC1 #ShadowCredentials #PKINIT

Read More
BlackSuit Continues Social Engineering Attacks in Wake of Black Basta’s Internal Conflict

The Black Basta ransomware group’s social engineering attacks sharply declined after December 2024, with evidence indicating that BlackSuit affiliates have adopted or absorbed their tactics. Rapid7’s analysis reveals sophisticated Java RAT and QEMU-based malware deployments, leveraging cloud services for command and control, and highlights ongoing evolution in attacker methods. #BlackBasta #BlackSuit #JavaRAT

Read More
Eggs in a Cloudy Basket: Skeleton Spider’s Trusted Cloud Malware Delivery

FIN6, also known as Skeleton Spider, employs sophisticated social engineering tactics leveraging professional job platforms to distribute the Moreeggs backdoor via cloud-hosted malicious infrastructure. Their campaigns utilize fake resumes, CAPTCHA protections, and environmental filtering to evade detection and deliver ransomware and credential theft malware. #FIN6 #Moreeggs #Skeleton_Spider

Read More