Germán Fernández(@1ZRR4H) 's Twitter Profile Photo

⚠️ es un malware comúnmente utilizado en campañas de ransomware.

Este es un listado de máquinas comprometidas (bots) recolectadas desde uno de los paneles C2 activos en este momento: raw.githubusercontent.com/CronUp/EnAnali… 🛑🧐

⚠️ #SystemBC es un malware comúnmente utilizado en campañas de ransomware.

Este es un listado de máquinas comprometidas (bots) recolectadas desde uno de los paneles C2 activos en este momento: raw.githubusercontent.com/CronUp/EnAnali… 🛑🧐
account_circle
HackManac(@H4ckManac) 's Twitter Profile Photo

🚨 🚨

🇪🇸 : Espack Eurologistica has been listed as a victim by the Cactus ransomware group.

The hackers allegedly exfiltrated 11 GB of employees and executives' personal and corporate data, financials, database exports, etc.

Espack Eurologistica is a

🚨 #CyberAttack 🚨

🇪🇸 #Spain: Espack Eurologistica has been listed as a victim by the Cactus ransomware group. 

The hackers allegedly exfiltrated 11 GB of employees and executives' personal and corporate data, financials, database exports, etc.

Espack Eurologistica is a
account_circle
Dark Web Informer(@DarkWebInformer) 's Twitter Profile Photo

🚨 🚨RansomHub names Frontier🇺🇸. Revenue: $5.7 Billion.



Frontier announced that on April 14th, they detected that a third party had gained unauthorized access to portions of its

🚨#BREAKING🚨RansomHub #Ransomware names Frontier🇺🇸. Revenue: $5.7 Billion.

#DarkWeb #Cybersecurity #Security #Cyberattack #Cybercrime #Privacy #Infosec

Frontier announced that on April 14th, they detected that a third party had gained unauthorized access to portions of its
account_circle
elhacker.NET(@elhackernet) 's Twitter Profile Photo

Una única credencial comprometida de Citrix mediante un infostealer genera un rescate de 22M$ del ransomware BlackCat a una entidad sanitaria
infostealers.com/article/single…

Una única credencial comprometida de Citrix mediante un infostealer genera un rescate de 22M$ del ransomware BlackCat a una entidad sanitaria
infostealers.com/article/single…
account_circle
Total Cyber-Sec(@totalcybersec) 's Twitter Profile Photo

😱 Las son el objetivo principal de una de las mayores a nivel mundial. 🌏
Lucy Bravo nos comparte todos los detalles sobre el modo de operar del . 🪱

➡️ Comparte este contenido para que más personas se mantengan informadas. 🧐

account_circle
B r a t v a(@BratvaCorp) 's Twitter Profile Photo

I'm really impressed by NK APT tactics with recruiting their own hackers to US companies to gather then intelligence using some crazy ukrainian autist in the US who helped them with fake documents. Try to imagine now when ransomware groups will become so evil.

I'm really impressed by NK APT tactics with recruiting their own hackers to US companies to gather then intelligence using some crazy ukrainian autist in the US who helped them with fake documents. Try to imagine now when ransomware groups will become so evil.
account_circle
Dark Web Intelligence(@DailyDarkWeb) 's Twitter Profile Photo

Play group has announced 5 new victims on its blog site

🇨🇦 (1)
🇺🇸 (4)

🇨🇦 - NTV Canada
🇺🇸 - FPL Food
🇺🇸 - Walser Automotive Group
🇺🇸 - Elmhurst Group
🇺🇸 - Credit Central

Play #ransomware group has announced 5 new victims on its blog site

#Canada 🇨🇦 (1)
#USA 🇺🇸 (4)

🇨🇦 - NTV Canada
🇺🇸 - FPL Food
🇺🇸 - Walser Automotive Group
🇺🇸 - Elmhurst Group
🇺🇸 - Credit Central

#DarkWeb #cyberattack
account_circle
Winston Ighodaro(@Officialwhyte22) 's Twitter Profile Photo

🚨 Scenario: Ransomware Attack on a Small Business

Imagine owning an e-commerce store and an employee opens a seemingly legitimate email attachment, triggering ransomware that encrypts all business-critical files. Operations halt, and a ransom note demands Bitcoin.

Note: The

🚨 Scenario: Ransomware Attack on a Small Business

Imagine owning an e-commerce store and an employee opens a seemingly legitimate email attachment, triggering ransomware that encrypts all business-critical files. Operations halt, and a ransom note demands Bitcoin. 

Note: The
account_circle
Fusion Intelligence Center @ StealthMole(@stealthmole_int) 's Twitter Profile Photo

The LockBit ransomware gang has also made public the chat logs related to the negotiation with BSI. They demanded a ransom amount of 20 million USD dollars (295,619,469,026 IDR Rupiah).

The LockBit ransomware gang has also made public the chat logs related to the negotiation with BSI. They demanded a ransom amount of 20 million USD dollars (295,619,469,026 IDR Rupiah).
account_circle
HackManac(@H4ckManac) 's Twitter Profile Photo

🚨 🚨

🇪🇸 : Ayuntamiento de San Lorenzo de El Escorial has been listed as a victim by the LockBit 3.0 ransomware group.

The hackers allegedly exfiltrated 450 GB of data.

Ransom deadline: 13th Jun 24.

🚨 #CyberAttack 🚨

🇪🇸 #Spain: Ayuntamiento de San Lorenzo de El Escorial has been listed as a victim by the LockBit 3.0 ransomware group. 

The hackers allegedly exfiltrated 450 GB of data.

Ransom deadline: 13th Jun 24.

#Ransomware #LockBit
account_circle
vx-underground(@vxunderground) 's Twitter Profile Photo

Today RansomHub ransomware group claimed to ransom Frontier Communications. Frontier Communications is a large Internet Service Provider based out of Dallas, Texas.

Frontier Communications confirmed this by submitting a form 8-K to the SEC.

Information via Dominic Alvieri

Today RansomHub ransomware group claimed to ransom Frontier Communications. Frontier Communications is a large Internet Service Provider based out of Dallas, Texas.

Frontier Communications confirmed this by submitting a form 8-K to the SEC.

Information via @AlvieriD
account_circle
Fusion Intelligence Center @ StealthMole(@stealthmole_int) 's Twitter Profile Photo

The negotiation period has ended, and the LockBit ransomware group has finally made all the stolen data from Bank Syariah Indonesia public on the dark web.

The negotiation period has ended, and the LockBit ransomware group has finally made all the stolen data from Bank Syariah Indonesia public on the dark web.
account_circle
Claudia(@signorina37H) 's Twitter Profile Photo

L'importanza delle ricerche e delle analisi è cruciale quando ci sono di mezzo soldi, reputazione e posti di lavoro.

Ho già parlato di come basarsi su quello che un gruppo scrive, non deve essere oro colato.
Serve controllare, andare a fondo e verificare.

Perché se

L'importanza delle ricerche e delle analisi è cruciale quando ci sono di mezzo soldi, reputazione e posti di lavoro.

Ho già parlato di come basarsi su quello che un gruppo #ransomware scrive, non deve essere oro colato.
Serve controllare, andare a fondo e verificare.

Perché se
account_circle