Topic: double extortion
-
New "Vect" RaaS Variant Poses Critical Threat, Researchers Warn
A new, highly sophisticated ransomware-as-a-service operation named **Vect** is rapidly emerging, posing a critical threat by targeting organizations and actively recruiting affiliates for expansion. Vect distinguishes itself with custom-built malware using fast encryption techniques and advanced...
Read More » -
The Psychology of Ransomware: How Hackers Turn Data Into Fear
Modern ransomware has evolved into a sophisticated extortion model that weaponizes psychological pressure, legal fears, and reputational damage, moving beyond simple file encryption to target organizational trust and compliance. The threat landscape is now a decentralized network of affiliates us...
Read More » -
Ingram Micro Ransomware Attack Impacts 42,000 People
A ransomware attack on Ingram Micro in July 2025 compromised the personal data of over 42,000 people, including sensitive identification and employment records. The breach, claimed by the SafePay ransomware gang, caused major operational disruption and involved the theft of approximately 3.5 tera...
Read More » -
React2Shell flaw fuels ransomware attacks
The **React2Shell** vulnerability (CVE-2025-55182) is being actively exploited, allowing attackers to gain unauthorized server access and deploy ransomware in under a minute without authentication. Attackers used this flaw to deploy the **Weaxor ransomware**, a less sophisticated rebrand of older...
Read More » -
Stop These Common Security Breaches Before They Hit You
The most significant threats to organizational security come from three common methods: stolen credentials, phishing, and unpatched software vulnerabilities, which exploit human behavior and operational gaps. Stolen credentials are increasingly prevalent, with a 160% surge in leaks, and employees...
Read More » -
Kraken Ransomware Evolves With Advanced Benchmarking
In August 2025, the Kraken ransomware group emerged as a sophisticated threat, using SMB vulnerabilities for initial access, Cloudflare for persistence, and SSHFS for data exfiltration before deploying cross-platform malware. Kraken's ransomware features an advanced benchmarking process to optimi...
Read More » -
Kraken Ransomware Scans Systems for Fastest Encryption
Kraken ransomware uniquely tests a machine's performance to choose the most efficient encryption method, allowing it to encrypt data quickly without triggering system alerts by using temporary files to decide between full or partial encryption. It targets high-value organizations globally through...
Read More » -
Qilin Ransomware Exposes 40+ Victims Monthly
The Qilin ransomware group has intensified global attacks, listing over 40 new victims monthly and primarily targeting the manufacturing industry, along with professional services and wholesale trade. Qilin uses a double-extortion tactic, encrypting victims' data and stealing sensitive informatio...
Read More » -
Ransomware Profits Plummet as Victims Refuse to Pay
Ransomware payment rates have hit a record low of 23%, driven by improved corporate defenses and pressure from authorities not to pay cybercriminals. Attackers are increasingly using "double extortion" tactics, with data theft involved in over 76% of incidents, though payment rates for such attac...
Read More » -
Ransomware gang asked BBC reporter to hack media giant
A BBC cybersecurity journalist was targeted by the Medusa ransomware gang, which attempted to recruit him as an insider threat to gain network access in exchange for a share of a ransom payment. The Medusa gang is known for double-extortion tactics and has been linked to over 300 attacks on U.S. ...
Read More » -
Ransomware Surge Intensifies the Battle for Cyber Defenders
Ransomware attacks have surged dramatically, with a 20% increase in victims in the first half of the year, driven by the widespread Ransomware-as-a-Service model. The threat landscape is increasingly volatile, with 88 active groups and 35 new entities, making it difficult to track threats as atta...
Read More » -
2025's Top Cyber Threats: Ransomware, Outages & AI Attacks
The 2025 digital threat landscape is dominated by sophisticated ransomware, third-party vendor disruptions, and AI-driven social engineering campaigns. AI is amplifying social engineering attacks, making them more convincing and accounting for over half of cyber claims and losses in early 2025. R...
Read More »