Ransomware 2025
2026()
2025()
2024()
2023()
Ransomware
Jak útočí
Klany
Techniky
Obrana
Popisky
Anti-Ramson Tool Rescue plan Anti-ransomware vaccine
Prevence
Video
Vývoj 2021
2020
2019
2018
0
1
2
| 17.12.25 | EstateRansomware | Patch or Peril: A Veeam vulnerability incident | RANSOMWARE | RANSOMWARE |
| 15.12.25 | CyberVolk | CyberVolk | A Deep Dive into the Hacktivists, Tools and Ransomware Fueling Pro-Russian Cyber Attacks | RANSOMWARE | RANSOMWARE |
|
15.11.25 |
In August 2025, Cisco
Talos observed big-game hunting and double extortion attacks carried out
by Kraken, a |
RANSOMWARE | RANSOMWARE | |
| 7.11.25 | BLATANTLY MALICIOUS | Ransomvibing appears in VS Code extensions | RANSOMWARE | RANSOMWARE |
| 2.11.25 | Agenda Ransomware | Agenda Ransomware Deploys Linux Variant on Windows Systems Through Remote Management Tools and BYOVD Techniques | RANSOMWARE | RANSOMWARE |
| 28.10.25 | Qilin Ransomware | Qilin Ransomware Combines Linux Payload With BYOVD Exploit in Hybrid Attack | RANSOMWARE | RANSOMWARE |
| 25.10.25 | Warlock Ransomware | The China-based actor behind the Warlock ransomware may not be a new player and has links to malicious activity dating as far back as 2019. | RANSOMWARE | RANSOMWARE |
| 25.10.25 | LockBit Returns | Key Takeaways LockBit is back. After being disrupted in early 2024, the ransomware group has ... | RANSOMWARE | RANSOMWARE |
| 25.10.25 | Pass-as-a-Service | “Premier Pass-as-a-Service” describes the emerging trend of advanced collaboration tactics between multiple China-aligned APT groups, notably Earth Estries and Earth Naga, that are making modern cyberespionage campaigns even more complex. | RANSOMWARE | RANSOMWARE |
| 25.10.25 | Agenda Ransomware | Trend™ Research identified a sophisticated Agenda ransomware attack that deployed a Linux variant on Windows systems. This cross-platform execution can make detection challenging for enterprises. | RANSOMWARE | RANSOMWARE |
| 25.10.25 | LockBit 5.0 | LockBit ransomware is one of the most active and notorious ransomware-as-a-service (RaaS) operations, first appearing in 2019 and having evolved through versions that we have analyzed and written about here and here. | RANSOMWARE | RANSOMWARE |
|
5.10.25 |
Block ransomware | Block ransomware proliferation and easily restore files with AI in Google Drive | RANSOMWARE | RANSOMWARE |
| 4.10.25 | YUREI RANSOMWARE | EXECUTIVE SUMMARY At CYFIRMA, we are committed to delivering timely insights into emerging cyber threats and the evolving tactics of cybercriminals targeting individuals and | RANSOMWARE | RANSOMWARE |
| 12.9.25 | HybridPetya | Introducing HybridPetya: Petya/NotPetya copycat with UEFI Secure Boot bypass | RANSOMWARE | RANSOMWARE |
| 25.7.25 | AA25 203A StopRansomware Interlock | Prevent initial access by implementing domain name system (DNS) filtering and web access firewalls, and training users to spot social engineering attempts. | RANSOMWARE | RANSOMWARE |
| 22.7.25 | Crux | Getting to the Crux (Ransomware) of the Matter | RANSOMWARE | RANSOMWARE |
| 22.7.25 | KAWA4096 | KAWA4096’s Ransomware Tide: Rising Threat With Borrowed Styles | RANSOMWARE | RANSOMWARE |
| 23.6.25 | Anubis | Anubis: A New Ransomware Threat | RANSOMWARE | RANSOMWARE |
| 8.6.25 | StopRansomware: Play Ransomware update | The advisory was updated to reflect new TTPs employed by Play ransomware group, as well as provide current IOCs/remove outdated IOCs for effective threat hunting | RANSOMWARE | RANSOMWARE |
| 29.5.25 | DragonForce | DragonForce actors target SimpleHelp vulnerabilities to attack MSP, customers | RANSOMWARE | RANSOMWARE |
| 27.4.25 | DragonForce | Ransomware Groups Evolve Affiliate Models | RANSOMWARE | RANSOMWARE |
| 21.4.25 | Interlock ransomware | Interlock is a ransomware intrusion set first observed in September 2024 that conducts Big Game Hunting and double extortion campaigns. | RANSOMWARE | RANSOMWARE |
|
29.3.25 |
Blacklock Ransomware: A Late Holiday Gift with Intrusion into the Threat Actor's Infrastructure |
RANSOMWARE | RANSOMWARE | |
|
24.3.25 |
VanHelsing RaaS Launch | VanHelsingRaaS is a new and rapidly growing ransomware-as-a-service (RaaS) affiliate program launched on March 7, 2025. The RaaS model allows a wide range of participants, from experienced hackers to newcomers, to get involved with a $5,000 deposit. | RANSOMWARE | RaaS |
|
20.3.25 |
Black Basta Ransomware | Analysis of Black Basta Ransomware Chat Leaks | RANSOMWARE | ANALYSIS |
|
16.3.25 |
Decrypting Encrypted files from Akira Ransomware | Decrypting Encrypted files from Akira Ransomware (Linux/ESXI variant 2024) using a bunch of GPUs | RANSOMWARE | ENCRYPTED |
|
16.3.25 |
SuperBlack | New Ransomware Operator Exploits Fortinet Vulnerability Duo | RANSOMWARE | RANSOMWARE |
| 7.3.25 | Medusa ransomware | The threat actors behind the Medusa ransomware have claimed nearly 400 victims since it first emerged in January 2023, with the financially motivated attacks witnessing a 42% increase between 2023 and 2024. | RANSOMWARE | RANSOMWARE |
| 26.2.25 | Black Basta Ransomware Playbook | Defense Lessons From the Black Basta Ransomware Playbook | RANSOMWARE | RANSOMWARE |
| 15.2.25 | RansomHub | RansomHub Never Sleeps Episode 1: The evolution of modern ransomware | RANSOMWARE | RANSOMWARE |
| 25.1.25 | ESXi Ransomware Attacks | ESXi Ransomware Attacks: Stealthy Persistence through SSH Tunneling | RANSOMWARE | RANSOMWARE |