Source: https://www.bleepingcomputer.com/
After effectively shutting down their entire operation for several months, between November and February, the Clop ransomware is now back, according to NCC Group researchers.
PCrisk found new STOP ransomware variants that append the .ewdf, .uihj, or .zfdv extensions to encrypted files.
All computer systems on the network of Costa Rica's public health service (known as Costa Rican Social Security Fund or CCCS) are now offline following a Hive ransomware attack that hit them this morning.
PCrisk found a new Phobos variant that appends the .decrypt extension and drops ransom notes named info.txt and info.hta.
PCrisk found a new VoidCrypt variant named MoonShadow that appends the .moonshadow extension and drops ransom notes named Decryption-Guide.HTA and Decryption-Guide.txt.
PCrisk found a new Dharma ransomware variant that appends the .r3tr0 extension.
The duration of ransomware attacks in 2021 averaged 92.5 hours, measured from initial network access to payload deployment. In 2020, ransomware actors spent an average of 230 hours to complete their attacks and 1637.6 hours in 2019.
Several U.S. federal agencies warned organizations today against paying ransom demands made by the Karakurt gang since that will not prevent their stolen data from being sold to others.
Foxconn electronics manufacturer has confirmed that one of its Mexico-based production plants has been impacted by a ransomware attack in late May.
Researchers analyzing the leaked chats of the notorious Conti ransomware operation have discovered that teams inside the Russian cybercrime group were actively developing firmware hacks.
A ransomware gang is taking extortion to a new level by publicly hacking corporate websites to publicly display ransom notes.
The Evil Corp cybercrime group has now switched to deploying LockBit ransomware on targets' networks to evade sanctions imposed by the U.S. Treasury Department's Office of Foreign Assets Control (OFAC).