Tagged articles
54 articles
Page 1 of 1
Black & White Path
Black & White Path
May 8, 2026 · Information Security

Why VECT Ransomware Fails to Decrypt Large Files: A Technical Breakdown

Security researchers discovered that VECT ransomware unintentionally embeds the ChaCha20 key and nonce for files under 128 KB, allowing easy decryption, while its chunked encryption of larger files loses three of four nonces, rendering those files permanently unrecoverable even after ransom payment.

ChaCha20VECTencryption bug
0 likes · 5 min read
Why VECT Ransomware Fails to Decrypt Large Files: A Technical Breakdown
Black & White Path
Black & White Path
Apr 11, 2026 · Information Security

Inside the Exposed TheGentlemen Ransomware Toolkit on Proton66

In March 2026 Hunt.io researchers uncovered an open directory on the Russian bullet‑proof host Proton66 that contains the full TheGentlemen ransomware toolkit, complete with Mimikatz credential logs, ngrok tokens, and 21 MITRE ATT&CK techniques, providing a detailed view of the attackers' reconnaissance, privilege‑escalation, defense‑evasion, credential‑access, persistence, and encryption‑preparation stages.

MITRE ATT&CKMimikatzProton66
0 likes · 22 min read
Inside the Exposed TheGentlemen Ransomware Toolkit on Proton66
Black & White Path
Black & White Path
Apr 7, 2026 · Information Security

Ransomware ‘Shaming’ Attacks Surge: Over 2,000 Companies Exposed in 2026

Ransomware groups are increasingly using double‑extortion "shaming" tactics, publicly leaking stolen data to pressure victims, with Breachsense reporting more than 2,000 compromised firms in 2026, a 40% rise projected for the year, prompting new defensive strategies across industries.

cybersecuritydata breachdouble extortion
0 likes · 10 min read
Ransomware ‘Shaming’ Attacks Surge: Over 2,000 Companies Exposed in 2026
Black & White Path
Black & White Path
Mar 25, 2026 · Information Security

Nearly 1 PB of Data Allegedly Stolen from Outsourcing Giant Telus Digital

Telus Digital confirmed a breach in which the ShinyHunters group claims to have exfiltrated close to 1 petabyte of data by leveraging Google Cloud credentials stolen from a prior Salesloft/Drift breach, affecting numerous customers and prompting a $65 million ransom demand.

Google CloudSaaS supply chainShinyHunters
0 likes · 7 min read
Nearly 1 PB of Data Allegedly Stolen from Outsourcing Giant Telus Digital
Black & White Path
Black & White Path
Mar 12, 2026 · Information Security

Operation Cronos: How the FBI Turned Ransomware Takedown into Psychological Warfare

Operation Cronos demonstrated that law‑enforcement agencies can cripple a ransomware‑as‑a‑service group like LockBit not only by shutting down its infrastructure but also by launching a psychological campaign that exposed affiliates, destroyed the brand’s credibility, and leveraged legal and cryptocurrency actions to undermine future operations.

LockBitcybercrimeinformation security
0 likes · 9 min read
Operation Cronos: How the FBI Turned Ransomware Takedown into Psychological Warfare
Black & White Path
Black & White Path
Feb 21, 2026 · Industry Insights

2025 Global Crypto Crime Surge: Hackers and Ransomware Attacks Remain Rampant

TRM Labs reports that illicit cryptocurrency transactions jumped 145% to $1.58 trillion in 2025, driven by sanctions‑evasion trades, expanded state use, and better fund‑tracing tools, while hacker attacks, scams ($350 B inflow) and ransomware activity also intensified with new variants and evolving laundering methods.

BlockchainTRM Labscrypto scams
0 likes · 5 min read
2025 Global Crypto Crime Surge: Hackers and Ransomware Attacks Remain Rampant
Black & White Path
Black & White Path
Feb 15, 2026 · Information Security

How TA584 Leverages Tsundere Bot and XWorm for Ransomware Attacks

The TA584 threat group, acting as a high‑activity initial‑access broker, now employs the Tsundere Bot and XWorm remote‑access trojans in a multi‑stage phishing chain that culminates in ransomware deployment, with Proofpoint noting a two‑fold activity surge and expanded geographic reach in 2025.

C2 infrastructureTA584Tsundere Bot
0 likes · 5 min read
How TA584 Leverages Tsundere Bot and XWorm for Ransomware Attacks
Black & White Path
Black & White Path
Feb 11, 2026 · Industry Insights

Ransomware Attack Cripples US Payment Platform BridgePay, Leaving Merchants Cash‑Only for Over 3 Days

A ransomware attack on BridgePay, a leading US electronic payment provider, knocked out its core systems on February 6, causing a nationwide outage that forced merchants to accept only cash for more than three days; the company involved federal agencies, reported no card‑data breach, and listed multiple services as down.

BridgePayUS merchantscybersecurity
0 likes · 5 min read
Ransomware Attack Cripples US Payment Platform BridgePay, Leaving Merchants Cash‑Only for Over 3 Days
MaGe Linux Operations
MaGe Linux Operations
Sep 27, 2025 · Information Security

How to Build a Triple‑Layer Linux Data Fortress Against Ransomware

Learn how to protect Linux servers from ransomware by leveraging immutable storage principles, LVM snapshots, Rsync incremental backups, and Restic encrypted deduplication, while following a three‑tier defense strategy, practical scripts, monitoring, and evolving best‑practice guidelines for resilient data recovery.

LVMResticransomware
0 likes · 17 min read
How to Build a Triple‑Layer Linux Data Fortress Against Ransomware
Liangxu Linux
Liangxu Linux
Aug 9, 2025 · Information Security

How a Single Weak Password Sank a 158‑Year‑Old UK Logistics Firm

A 158‑year‑old British transport company was crippled by a ransomware attack after hackers guessed an employee's weak password, leading to full data encryption, massive financial loss, bankruptcy, and highlighting systemic IT security failures.

Akira groupCyberattackIT security
0 likes · 9 min read
How a Single Weak Password Sank a 158‑Year‑Old UK Logistics Firm
Swan Home Tech Team
Swan Home Tech Team
Jul 21, 2025 · Information Security

Phishing & Ransomware Defense: Tactics, Tools, and Systemic Strategies

This article dissects modern phishing and ransomware threats, detailing preparation, bait construction, email header spoofing, and open‑source tools like Gophish, then outlines comprehensive defensive measures—from endpoint security and threat intelligence to risk‑based response economics—offering a systematic, technology‑to‑tactics‑to‑strategy framework for information security teams.

Gophishinformation securityphishing
0 likes · 15 min read
Phishing & Ransomware Defense: Tactics, Tools, and Systemic Strategies
Efficient Ops
Efficient Ops
Jul 8, 2025 · Information Security

How the SafePay Ransomware Crippled Ingram Micro’s Global Operations

On July 4, 2025, Ingram Micro, the world’s largest IT distributor, suffered a crippling ransomware attack by the SafePay group that stole nearly 1 TB of confidential data, encrypted critical systems, and forced a 48‑hour outage, highlighting severe risks for global supply‑chain operations.

CyberattackIngram MicroSafePay
0 likes · 3 min read
How the SafePay Ransomware Crippled Ingram Micro’s Global Operations
Architects' Tech Alliance
Architects' Tech Alliance
Mar 3, 2025 · Industry Insights

Why Global Cyber Attacks Jumped 44% in 2025: Key Findings from Check Point’s Security Report

Check Point’s 2025 cybersecurity report, based on data from 170 countries, reveals a 44% surge in global attacks, rapid ransomware evolution, massive exploitation of edge devices, a 96% reuse of known vulnerabilities, and highlights urgent recommendations for CISOs to strengthen BYOD, patch management, and incident response.

BYODCISOIndustry Report
0 likes · 5 min read
Why Global Cyber Attacks Jumped 44% in 2025: Key Findings from Check Point’s Security Report
Java Architect Essentials
Java Architect Essentials
Oct 7, 2024 · Information Security

Insider Ransomware Attack by a Former Engineer: Case Study and Security Lessons

A disgruntled former infrastructure engineer at a U.S. industrial firm deleted backups, locked administrators, and demanded $750,000 in Bitcoin, leading to his arrest and highlighting the severe risks, legal consequences, and mitigation strategies associated with insider ransomware threats.

IT Governanceincident responseinformation security
0 likes · 10 min read
Insider Ransomware Attack by a Former Engineer: Case Study and Security Lessons
Open Source Linux
Open Source Linux
Dec 15, 2023 · Information Security

Understanding Ransomware: Types, Attack Methods, and Effective Defenses

This article explains what ransomware is, outlines its main variants such as encryption‑based, lock‑screen and doxware ransomware, describes common infection vectors like brute‑force, phishing and exploit kits, and provides practical network‑ and host‑side defenses as well as response steps if an attack occurs.

cybercrimedefenseencryption
0 likes · 9 min read
Understanding Ransomware: Types, Attack Methods, and Effective Defenses
MaGe Linux Operations
MaGe Linux Operations
Oct 16, 2022 · Information Security

Why DDoS Attacks Surged 203% in H1 2022: Insights from Radware Report

The 2022 H1 Radware report reveals a 203% rise in malicious DDoS attacks, a shift from pandemic‑related threats to patriotic hacker activity driven by the Russia‑Ukraine conflict, record‑size attacks, resurging RDoS ransomware, and retail and high‑tech sectors emerging as top targets.

2022 trendsDDoSnetwork attacks
0 likes · 5 min read
Why DDoS Attacks Surged 203% in H1 2022: Insights from Radware Report
MaGe Linux Operations
MaGe Linux Operations
Jul 28, 2022 · Information Security

GoodWill Ransomware Forces Victims to Do Good Deeds – How It Works

GoodWill ransomware, discovered by CloudSEK in Mumbai, encrypts all files and demands victims complete three charitable acts and post a personal essay on social media before providing a decryption key, blending malware tactics with forced philanthropy while employing .NET, UPX packing, AES encryption, and location detection.

GoodWillcybersecurityinformation security
0 likes · 6 min read
GoodWill Ransomware Forces Victims to Do Good Deeds – How It Works
MaGe Linux Operations
MaGe Linux Operations
Jul 24, 2022 · Information Security

When Ransomware Demands Good Deeds: Inside the GoodWill Malware

The GoodWill ransomware, discovered by CloudSEK in Mumbai, forces victims to perform three charitable acts, document them, and post a personal essay before providing a decryption key, while employing .NET, UPX packing, AES encryption, and location‑tracking techniques.

GoodWillcybersecuritymalware analysis
0 likes · 6 min read
When Ransomware Demands Good Deeds: Inside the GoodWill Malware
Open Source Linux
Open Source Linux
Jun 26, 2022 · Information Security

GoodWill Ransomware: When Hackers Demand Charity Instead of Money

The GoodWill ransomware, discovered by CloudSEK, encrypts victims' files and demands they perform three charitable acts—helping the homeless, feeding poor children, and financially assisting patients—while recording the process, revealing a bizarre blend of extortion and social engineering.

GoodWillcybersecurityransomware
0 likes · 7 min read
GoodWill Ransomware: When Hackers Demand Charity Instead of Money
MaGe Linux Operations
MaGe Linux Operations
Nov 13, 2021 · Information Security

Hive Ransomware Targets Linux: Bugs, New Features, and Industry Shift

Security researchers at ESET reveal that the Hive ransomware group has expanded its attacks to Linux and FreeBSD systems, releasing a buggy yet feature‑rich Linux variant written in Go, while noting a broader industry trend of ransomware operators developing Linux encryptors to compromise virtualized server environments.

GoHiveVirtualization
0 likes · 4 min read
Hive Ransomware Targets Linux: Bugs, New Features, and Industry Shift
JavaScript
JavaScript
Nov 10, 2021 · Information Security

Critical npm Package Hijack: How coa and rc Were Compromised and What to Do

A recent security breach compromised the popular npm packages coa and rc, injecting ransomware‑capable code that can steal browser passwords, record keystrokes and screenshots, prompting developers to lock specific versions and enable two‑factor authentication to protect their projects.

RCSecuritycoa
0 likes · 3 min read
Critical npm Package Hijack: How coa and rc Were Compromised and What to Do
21CTO
21CTO
Jul 12, 2021 · Information Security

Why Are the US and Russia Negotiating Over Ransomware Threats?

Recent high‑profile ransomware attacks on US critical infrastructure have prompted President Biden to call President Putin, urging Russia to curb ransomware groups like REvil and DarkSide, while both nations discuss cybersecurity negotiations and potential retaliatory actions.

US-Russiacritical infrastructurecybersecurity
0 likes · 6 min read
Why Are the US and Russia Negotiating Over Ransomware Threats?
21CTO
21CTO
Mar 15, 2021 · Information Security

How a Rookie SQL Mistake by a Former Facebook CTO Led to a $500K Gab Breach

A former Facebook engineer serving as Gab's CTO introduced a simple SQL injection flaw, which hackers exploited to steal data from 15,000 users, prompting a $500,000 ransom demand, code deletion, and a heated debate over CTO responsibilities and security best practices.

CTOGitSQL injection
0 likes · 8 min read
How a Rookie SQL Mistake by a Former Facebook CTO Led to a $500K Gab Breach
ITPUB
ITPUB
Dec 15, 2020 · Information Security

How Dark‑Web Ransomware Hijacks MySQL Databases and Sells Them for $550

The article explains how ransomware gangs steal MySQL databases, automate ransom‑payment portals on the dark web, auction unsold data, and accept Bitcoin, revealing the scale of over 85,000 databases for sale at roughly $500‑$550 each.

dark webdata breachinformation security
0 likes · 4 min read
How Dark‑Web Ransomware Hijacks MySQL Databases and Sells Them for $550
21CTO
21CTO
Dec 13, 2020 · Information Security

Inside the Dark Web: How MySQL Databases Are Ransomed for $500

Over 85,000 MySQL databases are being sold on the dark web for around $500 each, with attackers automating ransom notices via portals on sqldb.to and dbrestore.to, demanding Bitcoin payments, auctioning unpaid data after nine days, and targeting a range of database platforms since 2017.

Bitcoincybersecuritydark web
0 likes · 4 min read
Inside the Dark Web: How MySQL Databases Are Ransomed for $500
JD Cloud Developers
JD Cloud Developers
Dec 9, 2020 · Information Security

Secure Your Cloud After Ransomware: Backup, Encryption & Access‑Control Guide

Following a massive ransomware breach that encrypted thousands of servers and stole sensitive data, this guide outlines four essential self‑check steps—data backup, encryption, server permission management, and platform user access control—along with JD Cloud’s concrete best‑practice actions to harden your infrastructure.

access controlcloud securitydata backup
0 likes · 7 min read
Secure Your Cloud After Ransomware: Backup, Encryption & Access‑Control Guide
Laravel Tech Community
Laravel Tech Community
Nov 11, 2020 · Information Security

Bitcoin Ransomware Cases and Police Crackdown in China

The article describes how Bitcoin‑based ransomware such as WannaRen encrypts victims' files, the large‑scale attacks on Chinese enterprises and institutions, the police investigations that led to the arrest of the mastermind Ju Mou and his accomplices, and practical advice for preventing such threats.

BitcoinData Recoverycybersecurity
0 likes · 7 min read
Bitcoin Ransomware Cases and Police Crackdown in China
ITPUB
ITPUB
Apr 28, 2020 · Information Security

How a Bilibili Creator’s NAS Was Crippled by Buran Ransomware – Key Security Lessons

A popular Bilibili video creator’s privately built NAS was hijacked by the Windows‑targeting Buran ransomware, encrypting hundreds of gigabytes of video assets, prompting a ransom demand and exposing the critical need for robust NAS security, data backup, and awareness of ransomware tactics.

BuranNAS securitydata backup
0 likes · 13 min read
How a Bilibili Creator’s NAS Was Crippled by Buran Ransomware – Key Security Lessons
UCloud Tech
UCloud Tech
Mar 10, 2020 · Information Security

How a Game Company Defeated a 300G DDoS Ransom Attack with Cloud Defense

A Chinese game studio faced a massive 300 GB DDoS ransom attack, refused to pay, and, with UCloud's elastic high‑availability and Anycast cleaning technologies, repelled the assault while detailing the attackers' methods and offering a public‑cloud DDoS mitigation guide.

AnycastDDoSGame Industry
0 likes · 8 min read
How a Game Company Defeated a 300G DDoS Ransom Attack with Cloud Defense
Efficient Ops
Efficient Ops
Jan 16, 2020 · Information Security

What Are the Top 10 Cybersecurity Threats Predicted for 2020?

The article outlines ten major 2020 cybersecurity forecasts—including surging ransomware, sophisticated phishing, faster threat detection, expanding attack surfaces, emerging IoT security laws, stricter GDPR enforcement, OT security challenges, and the rise of managed security services—to help organizations prepare for the evolving threat landscape.

2020cybersecurityinformation security
0 likes · 13 min read
What Are the Top 10 Cybersecurity Threats Predicted for 2020?
MaGe Linux Operations
MaGe Linux Operations
Dec 3, 2019 · Information Security

How I Exposed a Camera‑Based Ransomware Ring: From Shodan Scan to Remote Control

A hacker recounts how a desperate request led to a full‑scale investigation of insecure IoT cameras, using Shodan to discover default credentials, reverse‑engineering a malicious Android app, infiltrating a cloud server, and ultimately dismantling a ransomware operation that harvested nude videos.

APK reverse engineeringIoT vulnerabilityRemote Access Trojan
0 likes · 10 min read
How I Exposed a Camera‑Based Ransomware Ring: From Shodan Scan to Remote Control
Architects' Tech Alliance
Architects' Tech Alliance
Apr 9, 2019 · Information Security

GandCrab V5.2 Ransomware: Global Impact, Attack Methods, and Defense Strategies

GandCrab V5.2, a Bitcoin‑based ransomware first seen in 2018, has recently surged across Brazil, the US, India, Indonesia, Pakistan and especially China, using spam‑email delivery, web‑inject attacks and known vulnerabilities, while remaining largely uncrackable and prompting security teams to recommend strict email hygiene, patching, and anti‑malware measures.

GANDCRABcryptocurrencyinformation security
0 likes · 7 min read
GandCrab V5.2 Ransomware: Global Impact, Attack Methods, and Defense Strategies
dbaplus Community
dbaplus Community
Mar 2, 2019 · Information Security

Home Ransomware Attack: GANDCRAB, Dark Web Payments, and Backup Strategies

After his father's PC was infected by the GANDCRAB ransomware, the author recounts the alarming symptoms, explains how ransomware works, explores the role of the dark web and DASH cryptocurrency in ransom demands, and shares practical backup methods—from simple USB copies to the 3‑2‑1 principle—to protect personal data.

BackupDASHGANDCRAB
0 likes · 15 min read
Home Ransomware Attack: GANDCRAB, Dark Web Payments, and Backup Strategies
ITPUB
ITPUB
Jan 3, 2018 · Information Security

How Ransomware Hijacks MySQL and What You Can Do to Stop It

The article explains how attackers compromise MySQL servers, create a WARNING table with ransom instructions demanding Bitcoin, and provides concrete SQL examples and four practical defense measures—including strong authentication, disabling public access, regular backups, and application hardening—to protect databases.

AuthenticationDatabase SecuritySQL injection
0 likes · 6 min read
How Ransomware Hijacks MySQL and What You Can Do to Stop It
MaGe Linux Operations
MaGe Linux Operations
Dec 28, 2017 · Operations

Top 12 Linux Ops Disasters of 2017 and What They Teach Us

From Hearthstone’s dual‑database crash to Uber’s massive data breach, this 2017 Linux operations roundup chronicles twelve critical incidents—highlighting backup failures, Docker rebranding, ransomware, BGP hijacking, and more—offering key lessons for sysadmins and DevOps professionals.

BGPBackupDocker
0 likes · 14 min read
Top 12 Linux Ops Disasters of 2017 and What They Teach Us
UCloud Tech
UCloud Tech
Jun 28, 2017 · Information Security

How the Petya Ransomware Exploits CVE-2017-0199 and MS17-010 – Prevention Tips

The Petya ransomware, spreading across Europe and affecting over 80 companies in Russia and Ukraine, leverages the CVE‑2017‑0199 RTF vulnerability for phishing and the MS17‑010 SMB flaw for internal propagation, encrypts the MFT to render systems unbootable, and can be mitigated by applying Windows patches, using strong passwords, and backing up data.

CVE-2017-0199MS17-010Petya
0 likes · 2 min read
How the Petya Ransomware Exploits CVE-2017-0199 and MS17-010 – Prevention Tips
Architects' Tech Alliance
Architects' Tech Alliance
May 15, 2017 · Information Security

Ransomware Defense: Attack Vectors, C2 Communication, Defensive Chain, and Enterprise Security Gaps

This article provides an in‑depth analysis of ransomware, detailing its typical propagation methods, common intrusion techniques, C2 communication behaviors, the defensive chain across reconnaissance, deployment and persistence stages, and highlights current enterprise security gaps and comprehensive protection strategies.

C2 communicationThreat Defenseenterprise security
0 likes · 13 min read
Ransomware Defense: Attack Vectors, C2 Communication, Defensive Chain, and Enterprise Security Gaps
Tencent IMWeb Frontend Team
Tencent IMWeb Frontend Team
May 14, 2017 · Frontend Development

This Week’s Top Tech Headlines: Ransomware, Linux on Windows, AI Moves

A weekly roundup covers the surge of ONION ransomware on Chinese campuses, Microsoft's addition of Linux distros to the Windows Store, major AI and AR investments, open‑source JavaScript optimization, IBM's API microgateway, shifting web‑server market shares, data's rising value, Google's Cloud Speech launch, and Android's Project Treble to curb fragmentation.

AILinuxcloud
0 likes · 8 min read
This Week’s Top Tech Headlines: Ransomware, Linux on Windows, AI Moves
MaGe Linux Operations
MaGe Linux Operations
May 14, 2017 · Information Security

Why the ONION & WNCRY Ransomware Hit 70 Countries – Protection Tips

The recent ONION and WNCRY ransomware outbreak, originating from leaked NSA tools like EternalBlue, rapidly infected over 70 nations, targeting hospitals, universities and other institutions, and this article explains the attack timeline, infection mechanisms, impact on Chinese campuses, and practical mitigation steps such as backups, patching, port blocking and domain filtering.

EternalBluePatch managementnetwork security
0 likes · 8 min read
Why the ONION & WNCRY Ransomware Hit 70 Countries – Protection Tips
Tencent Cloud Developer
Tencent Cloud Developer
Mar 10, 2017 · Information Security

Automated Exploitation of Common Vulnerabilities: MongoDB Ransomware, Struts2, Redis, and ElasticSearch Cases

The article shows how attackers automate mass exploitation of widely‑known flaws—scanning the Internet for open MongoDB, Redis, ElasticSearch or Struts2 services, using unauthenticated access or public PoCs to encrypt data, execute code, or build botnets, and stresses that timely patching and secure defaults are essential to stop such N‑day attacks.

ElasticsearchMongoDBStruts2
0 likes · 11 min read
Automated Exploitation of Common Vulnerabilities: MongoDB Ransomware, Struts2, Redis, and ElasticSearch Cases
Tencent Cloud Developer
Tencent Cloud Developer
Mar 1, 2017 · Information Security

MySQL Ransomware Attacks: Security Analysis and Hardening Guide

MySQL has become a ransomware target because many servers expose the database to the internet with empty or weak passwords, so administrators should audit open ports, enforce strong authentication, restrict access via security groups or iptables, bind services to internal IPs, and avoid using root or high‑privilege accounts to harden MySQL, MongoDB, and Redis against compromise.

Database SecurityMongoDB hardeningMySQL security
0 likes · 8 min read
MySQL Ransomware Attacks: Security Analysis and Hardening Guide
dbaplus Community
dbaplus Community
Feb 28, 2017 · Databases

How to Stop Bitcoin Ransomware Attacks on MySQL and Other Databases

This article reviews recent ransomware campaigns targeting MySQL, MongoDB, ElasticSearch, Hadoop, and Redis, explains how attackers exploit weak password policies, and provides concrete MySQL password‑policy settings, password‑less login configuration, and security checklists for multiple database platforms.

MongoDBPassword policymysql
0 likes · 13 min read
How to Stop Bitcoin Ransomware Attacks on MySQL and Other Databases
ITPUB
ITPUB
Jan 16, 2017 · Information Security

Why Thousands of MongoDB Databases Were Wiped and Ransomed – What You Must Do

Thousands of MongoDB databases were erased and replaced with ransom demands, yet almost no victims recovered their data, highlighting widespread misconfigurations, public exposure on Shodan, and the urgent need for proper security hardening of MongoDB deployments.

Database SecurityMongoDBShodan
0 likes · 4 min read
Why Thousands of MongoDB Databases Were Wiped and Ransomed – What You Must Do