Ransomware

Ransomware news and articles. Stay up to date with the latest cyber crime trends. Enjoy exciting stories of cybercriminals using online extortion. From hackers and organized crime to some nation state sponsored hackers. The Cyber Post brings you world wide cyber security news dedicated to ransomware.

In today’s digital age criminals are always lurking on the web. Whether it be phishing attacks or straight up digital extortion, many threats exist. But the cyber post is here to educate its readers. Learn from experts and cybersecuirty industry vets on how you can better protect your data. Enjoy reading on how thieves and hackers employ tricks to steal your personal information. So then you can use this information to better protect your own identity.

Top 3 Ransomware Threats Active in 2025

0
You arrive at the office, power up your system, and panic sets in. Every file is locked, and every system is frozen. A ransom demand flashes on your screen:...

Ransomware Extortion Drops to $813.5M in 2024, Down from $1.25B in 2023

0
Feb 06, 2025Ravie LakshmananCybercrime / Ransomware Ransomware attacks netted cybercrime groups a total of $813.5 million in 2024, a decline from $1.25 billion in 2023. The total amount extorted during the...

Crazy Evil Gang Targets Crypto with StealC, AMOS, and Angel Drainer Malware

0
A Russian-speaking cybercrime gang known as Crazy Evil has been linked to over 10 active social media scams that leverage a wide range of tailored lures to deceive victims...

What Is Attack Surface Management?

0
Attack surfaces are growing faster than security teams can keep up – to stay ahead, you need to know what's exposed and where attackers are most likely to strike. With...

How Interlock Ransomware Infects Healthcare Organizations

0
Ransomware attacks have reached an unprecedented scale in the healthcare sector, exposing vulnerabilities that put millions at risk. Recently, UnitedHealth revealed that 190 million Americans had their personal and...

Ransomware Targets ESXi Systems via Stealthy SSH Tunnels for C2 Operations

0
Jan 28, 2025Ravie LakshmananRansomware / Threat Intelligence Cybersecurity researchers have found that ransomware attacks targeting ESXi systems are also leveraging the access to repurpose the appliances as a conduit to...

TRIPLESTRENGTH Hits Cloud for Cryptojacking, On-Premises Systems for Ransomware

0
Jan 23, 2025Ravie LakshmananCloud Security / Cryptojacking Google on Wednesday shed light on a financially motivated threat actor named TRIPLESTRENGTH for its opportunistic targeting of cloud environments for cryptojacking and...

QakBot-Linked BC Malware Adds Enhanced Remote Access and Data Gathering Features

0
Jan 23, 2025Ravie LakshmananMalware / Threat Intelligence Cybersecurity researchers have disclosed details of a new BackConnect (BC) malware that has been developed by threat actors linked to the infamous QakBot...

Experts Find Shared Codebase Linking Morpheus and HellCat Ransomware Payloads

0
Jan 23, 2025Ravie LakshmananThreat Intelligence / Data Breach An analysis of HellCat and Morpheus ransomware operations has revealed that affiliates associated with the respective cybercrime entities are using identical code...

Python-Based Malware Powers RansomHub Ransomware to Exploit Network Flaws

0
Jan 16, 2025Ravie LakshmananEndpoint Security / Ransomware Cybersecurity researchers have detailed an attack that involved a threat actor utilizing a Python-based backdoor to maintain persistent access to compromised endpoints and...