Skip to content
Threat Feed

Tag

Ransomware

15 briefs RSS
high threat

Trigona Ransomware Employing Custom Data Exfiltration Tool

Trigona ransomware is using a custom data exfiltration tool named 'uploader_client.exe' to steal data from compromised environments, enhancing speed and evasion.

Windows +3 Trigona ransomware data exfiltration custom tool
2r 4t 1i
critical threat

Payouts King Ransomware Abusing QEMU VMs for Defense Evasion

The Payouts King ransomware is leveraging QEMU VMs as a reverse SSH backdoor to execute payloads, store malicious files, and establish covert remote access tunnels, bypassing endpoint security measures.

GOLD ENCOUNTER payouts-king ransomware qemu vm defense-evasion
2r 8t 1c 1i
high advisory

SaaS Notification Pipeline Phishing and Medusa Ransomware Exploitation

Threat actors are weaponizing legitimate SaaS notification pipelines to deliver phishing and spam emails, bypassing traditional email authentication protocols, and Storm-1175 is exploiting CVE-2026-1731 to deploy Medusa ransomware.

saas phishing ransomware medusa
1r 1t 1c 2i
critical threat

Qilin Ransomware EDR Killer Infection Chain

Qilin ransomware employs a malicious msimg32.dll in a multi-stage infection chain to disable endpoint detection and response (EDR) solutions by evading detection and terminating EDR processes.

Qilin Ransomware qilin edr-killer ransomware defense-evasion windows
2r 3t 1i
high threat

M-Trends 2026: Evolving Threat Landscape

The M-Trends 2026 report highlights the increasing sophistication of threat actors, including voice phishing attacks targeting SaaS environments, ransomware groups actively destroying recovery capabilities, and espionage groups exploiting edge devices for persistent access, revealing a shift towards faster hand-offs between initial access brokers and ransomware deployers.

Scattered Spider +10 threat-report ransomware phishing saas
3r 10t
high advisory

Interlock Ransomware Campaign Targeting Enterprise Firewalls

The Interlock ransomware campaign is targeting enterprise firewalls to encrypt sensitive data and demand ransom payment.

ransomware firewall network
2r 3t
critical threat

Warlock Group Deploys Web Shells, Tunnels, and Ransomware

The Warlock group utilizes web shells and tunneling to deploy ransomware within compromised environments, impacting victim data confidentiality and availability.

Warlock webshell ransomware tunneling
2r 4t
critical threat

Active Exploitation of Apache ActiveMQ RCE Vulnerability (CVE-2023-46604)

CVE-2023-46604 is a remote code execution vulnerability affecting Apache ActiveMQ that is actively exploited in the wild by ransomware operators, allowing remote attackers to execute arbitrary shell commands.

LockBit +2 activemq rce cve-2023-46604 ransomware
2r 2t
medium advisory

Potential Veeam Credential Access via SQL Commands

Attackers can leverage sqlcmd.exe or PowerShell commands like Invoke-Sqlcmd to access Veeam credentials stored in MSSQL databases, potentially targeting backups for destructive operations such as ransomware attacks.

Microsoft Defender XDR +1 veeam credential-access mssql windows ransomware
2r 5t
critical threat

JetBrains TeamCity Relative Path Traversal Vulnerability (CVE-2024-27199)

A relative path traversal vulnerability in JetBrains TeamCity (CVE-2024-27199) could allow limited administrative actions and has been linked to ransomware attacks.

exploited TeamCity cve-2024-27199 path-traversal ransomware jetbrains
2r 1t 1c
medium advisory

Potential Ransomware Behavior - Note Files Dropped via SMB

This rule detects potential ransomware behavior by identifying the creation of multiple files with the same name over SMB by the SYSTEM account, potentially indicating remote execution of ransomware dropping note files.

Elastic Defend ransomware impact lateral-movement windows
2r 4t
high advisory

PowerShell Share Enumeration via ShareFinder or Native APIs

Detection of PowerShell scripts employing ShareFinder functions or Windows share enumeration APIs to discover accessible network shares for reconnaissance, lateral movement, or ransomware deployment.

PowerShell discovery share-enumeration lateral-movement ransomware
2r 1t
high advisory

Detection of Wevtutil.exe Used to Disable Event Logs

The execution of `wevtutil.exe` with parameters to disable event logs is a tactic commonly employed by ransomware to evade detection and hinder forensic investigations, leading to a significant reduction in visibility for defenders.

Splunk Enterprise +2 defense-evasion ransomware windows
2r 1t
medium advisory

Third-party Backup Files Deleted via Unexpected Process

This detection identifies the deletion of backup files by processes outside of the backup suite, specifically targeting Veritas and Veeam backups, which may indicate an attempt to prevent recovery from ransomware.

Elastic Defend +5 impact backup deletion ransomware
2r 2t
critical threat

PaperCut NG/MF Improper Authentication Vulnerability (CVE-2023-27351)

CVE-2023-27351 is an improper authentication vulnerability in PaperCut NG/MF that allows remote attackers to bypass authentication via the SecurityRequestFilter class, leading to potential ransomware deployment.

exploited NG/MF papercut authentication-bypass ransomware cve-2023-27351
2r 1t 1c