Tag Sophos

SamSam Ransomware Attacks Thwarted Nearly $6 Million in Extortion Payments

Since its emergence in December 2015, SamSam ransomware has evolved into a lucrative venture for cybercriminals, extracting nearly $6 million from its victims. Recent findings from Sophos reveal that the operators of SamSam have garnered over $5.9 million, drawn from 233 targeted victims, with an escalating profit trend averaging approximately…

Read MoreSamSam Ransomware Attacks Thwarted Nearly $6 Million in Extortion Payments

Citrix NetScaler Warning: Ransomware Attackers Targeting Critical Vulnerability

Unpatched Citrix NetScaler Systems Targeted in Suspected Ransomware Attack Recent developments in cybersecurity have revealed that unpatched Citrix NetScaler systems facing the internet are being exploited by unidentified threat actors, likely in the context of a ransomware operation. Cybersecurity firm Sophos has identified this activity cluster as STAC4663, which is…

Read MoreCitrix NetScaler Warning: Ransomware Attackers Targeting Critical Vulnerability

Microsoft Issues October 2023 Updates Addressing 103 Vulnerabilities, Including 2 Currently Exploited Threats

In its October 2023 Patch Tuesday update, Microsoft has addressed a total of 103 vulnerabilities across its software platforms, including two critical zero-day vulnerabilities actively exploited in the wild. This update highlights the ongoing importance of patch management in maintaining cybersecurity defenses. Among the identified vulnerabilities, 13 are categorized as…

Read MoreMicrosoft Issues October 2023 Updates Addressing 103 Vulnerabilities, Including 2 Currently Exploited Threats

CISA Includes Three Actively Exploited Security Vulnerabilities in KEV Catalog

On Thursday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) expanded its Known Exploited Vulnerabilities (KEV) catalog, adding three identified security flaws currently under active exploitation. This action underscores the ongoing priority for organizations to remain vigilant and address vulnerabilities promptly to protect their systems. The newly cataloged vulnerabilities include…

Read MoreCISA Includes Three Actively Exploited Security Vulnerabilities in KEV Catalog

North Korean Hackers Distribute Trojanized CyberLink Software in Supply Chain Attack

A recent cybersecurity incident involving a North Korean state-sponsored group known as Diamond Sleet has emerged as a significant threat to businesses. This group has been distributing a compromised version of a legitimate application developed by the Taiwanese company CyberLink, leveraging a supply chain attack to target downstream customers. According…

Read MoreNorth Korean Hackers Distribute Trojanized CyberLink Software in Supply Chain Attack

CACTUS Ransomware Targets Qlik Sense Vulnerabilities in Focused Attacks

Recent CACTUS Ransomware Campaign Targets Qlik Sense Vulnerabilities A new ransomware campaign, identified as CACTUS, has been leveraging recently revealed security vulnerabilities within Qlik Sense, a cloud analytics and business intelligence platform. This operation has sparked significant concern among cybersecurity experts, marking the first known use of these vulnerabilities by…

Read MoreCACTUS Ransomware Targets Qlik Sense Vulnerabilities in Focused Attacks

Gootkit RAT Leverages SEO Tactics for Malware Distribution via Compromised Websites

The Gootkit malware framework, which has been recognized for distributing banking Trojans, has recently undergone significant enhancements that enable it to deliver a broader spectrum of malicious software, including ransomware variants. According to researchers from Sophos, Gabor Szappanos and Andrew Brandt, the Gootkit malware family has been in existence for…

Read MoreGootkit RAT Leverages SEO Tactics for Malware Distribution via Compromised Websites