A new ransomware-as-a-service called SophosEncrypt is impersonating the well-known cybersecurity vendor, Sophos. The threat actors have cleverly adopted the company’s name to carry out their operation.
Yesterday, the ransomware was discovered by Malware Hunter Team. At first, Sophos believed it was a component of a red team exercise. The encryptor was not created by the Sophos X-Ops team, as confirmed by their recent tweet. They are currently carrying out an investigation into its release.
Hewlett-Packard Enterprise (HPE) warns that Aruba Instant On Access Points have hardcoded credentials, enabling attackers to skip normal authentication and...
Oracle's July 2025 Critical Patch Update includes 309 new security patches, with 127 addressing remotely exploitable vulnerabilities. SecurityWeek found about...
Cybersecurity researchers have revealed a new malware named MDifyLoader, linked to cyber attacks using security vulnerabilities in Ivanti Connect Secure...
U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a crucial vulnerability in Fortinet FortiWeb in its Known Exploited Vulnerabilities...
Security researcher Jeremiah Fowler discovered an online database exposing sensitive information from an adoption agency. Jeremiah Fowler Jeremiah specializes in...
“We found this on VT earlier and have been investigating. Our preliminary findings shows Sophos InterceptX protects against these ransomware samples,” tweeted Sophos.
Sophos X-Ops tweet
ID Ransomware has identified a submission from an infected victim as evidence that the Ransomware-as-a-Service operation is happening actively.
Although the specifics of the RaaS operation and its promotion remain largely unknown, Malware Hunter Team stumbled upon a sample of the encryptor, providing us with a valuable glimpse into its inner workings.