Tag
Trigona Ransomware Employing Custom Data Exfiltration Tool
2 rules 4 TTPs 1 IOCTrigona ransomware is using a custom data exfiltration tool named 'uploader_client.exe' to steal data from compromised environments, enhancing speed and evasion.
Payouts King Ransomware Abusing QEMU VMs for Defense Evasion
2 rules 8 TTPs 1 CVE 1 IOCThe Payouts King ransomware is leveraging QEMU VMs as a reverse SSH backdoor to execute payloads, store malicious files, and establish covert remote access tunnels, bypassing endpoint security measures.
SaaS Notification Pipeline Phishing and Medusa Ransomware Exploitation
1 rule 1 TTP 1 CVE 2 IOCsThreat actors are weaponizing legitimate SaaS notification pipelines to deliver phishing and spam emails, bypassing traditional email authentication protocols, and Storm-1175 is exploiting CVE-2026-1731 to deploy Medusa ransomware.
Qilin Ransomware EDR Killer Infection Chain
2 rules 3 TTPs 1 IOCQilin ransomware employs a malicious msimg32.dll in a multi-stage infection chain to disable endpoint detection and response (EDR) solutions by evading detection and terminating EDR processes.
M-Trends 2026: Evolving Threat Landscape
3 rules 10 TTPsThe M-Trends 2026 report highlights the increasing sophistication of threat actors, including voice phishing attacks targeting SaaS environments, ransomware groups actively destroying recovery capabilities, and espionage groups exploiting edge devices for persistent access, revealing a shift towards faster hand-offs between initial access brokers and ransomware deployers.
Interlock Ransomware Campaign Targeting Enterprise Firewalls
2 rules 3 TTPsThe Interlock ransomware campaign is targeting enterprise firewalls to encrypt sensitive data and demand ransom payment.
Warlock Group Deploys Web Shells, Tunnels, and Ransomware
2 rules 4 TTPsThe Warlock group utilizes web shells and tunneling to deploy ransomware within compromised environments, impacting victim data confidentiality and availability.
Active Exploitation of Apache ActiveMQ RCE Vulnerability (CVE-2023-46604)
2 rules 2 TTPsCVE-2023-46604 is a remote code execution vulnerability affecting Apache ActiveMQ that is actively exploited in the wild by ransomware operators, allowing remote attackers to execute arbitrary shell commands.
Potential Veeam Credential Access via SQL Commands
2 rules 5 TTPsAttackers can leverage sqlcmd.exe or PowerShell commands like Invoke-Sqlcmd to access Veeam credentials stored in MSSQL databases, potentially targeting backups for destructive operations such as ransomware attacks.
JetBrains TeamCity Relative Path Traversal Vulnerability (CVE-2024-27199)
2 rules 1 TTP 1 CVEA relative path traversal vulnerability in JetBrains TeamCity (CVE-2024-27199) could allow limited administrative actions and has been linked to ransomware attacks.
Potential Ransomware Behavior - Note Files Dropped via SMB
2 rules 4 TTPsThis rule detects potential ransomware behavior by identifying the creation of multiple files with the same name over SMB by the SYSTEM account, potentially indicating remote execution of ransomware dropping note files.
PowerShell Share Enumeration via ShareFinder or Native APIs
2 rules 1 TTPDetection of PowerShell scripts employing ShareFinder functions or Windows share enumeration APIs to discover accessible network shares for reconnaissance, lateral movement, or ransomware deployment.
Detection of Wevtutil.exe Used to Disable Event Logs
2 rules 1 TTPThe execution of `wevtutil.exe` with parameters to disable event logs is a tactic commonly employed by ransomware to evade detection and hinder forensic investigations, leading to a significant reduction in visibility for defenders.
Third-party Backup Files Deleted via Unexpected Process
2 rules 2 TTPsThis detection identifies the deletion of backup files by processes outside of the backup suite, specifically targeting Veritas and Veeam backups, which may indicate an attempt to prevent recovery from ransomware.
PaperCut NG/MF Improper Authentication Vulnerability (CVE-2023-27351)
2 rules 1 TTP 1 CVECVE-2023-27351 is an improper authentication vulnerability in PaperCut NG/MF that allows remote attackers to bypass authentication via the SecurityRequestFilter class, leading to potential ransomware deployment.