Thursday, April 16, 2026
HomeRansomware

Ransomware

Qilin Ransomware Gains Momentum with Legal Support for Affiliates

The notorious Qilin ransomware gang has announced a groundbreaking addition to their criminal enterprise: a dedicated "legal department" offering on-demand legal assistance to their affiliates.  This development, announced in June 2025 on a Russian-speaking darknet forum, represents a significant evolution in ransomware operations, potentially making...

Gunra Ransomware Strikes – Windows Systems Under Attack as Files Are Encrypted and Shadow Copies Erased

A new ransomware strain called Gunra has emerged as a significant threat to Windows systems, leveraging code from the notorious Conti ransomware group to execute sophisticated attacks that encrypt files and eliminate recovery options. First identified in April 2025, this malware exhibits enhanced capabilities...

Cyber Attack – Hackers Use Malicious .HTA Files to Spread Red Ransomware

Security researchers at CloudSEK have uncovered a sophisticated malware delivery campaign using Clickfix-themed websites to distribute Epsilon Red ransomware, marking a dangerous evolution in social engineering tactics. The campaign leverages malicious.HTA files and ActiveX objects can silently execute shell commands, bypassing traditional security measures...

FBI Alerts on Cybercriminal Network Tied to Ransomware-as-a-Service Operators

The Federal Bureau of Investigation has issued a stark warning about "Hacker Com," a sophisticated subset of an international cybercriminal ecosystem known as "The Com" that poses escalating threats to both digital infrastructure and physical safety. This primarily English-speaking network comprises multiple interconnected groups...

BlackSuit Ransomware’s Data Leak Platform and Negotiation Portal Taken Down

A significant victory against cybercrime this week through Operation Checkmate, a coordinated effort that successfully seized the primary infrastructure used by the BlackSuit ransomware group. The operation has effectively dismantled the gang's ability to communicate with victims and distribute stolen data, marking a major...

How Ransomware Gangs Exploit RMM Tools to Breach and Steal Corporate Data

In recent months, cybersecurity researchers have observed a surge in ransomware gangs weaponizing legitimate Remote Monitoring and Management (RMM) tools to compromise organizations and steal sensitive data. For IT teams, RMM solutions are indispensable for remotely managing corporate systems yet that same trust and...