Saturday , June 21 2025
key

Malware Researchers detect 29 New Ransomwares in May

In May, cybersecurity experts found 29 new ransomware types. These malicious programs are a big danger to people and businesses. The cybercriminals keep improving their methods with each new type of ransomware, so it’s harder to detect and stop them.

Ransomware works by locking up important data on infected computers, making it impossible for users to access. Then, the criminals ask for a lot of money to unlock the data, putting victims in a difficult situation. This not only puts personal and private information at risk but also causes financial problems for the victims dailydarkweb reported.

Russia detects first SuperCard malware attacks via NFC

Russian cybersecurity experts discovered the first local data theft attacks using a modified version of legitimate near field communication (NFC)...
Read More
Russia detects first SuperCard malware attacks via NFC

Income Property Investments exposes 170,000+ Individuals record

Cybersecurity researcher Jeremiah Fowler discovered an unsecured database with 170,360 records belonging to a real estate company. It contained personal...
Read More
Income Property Investments exposes 170,000+ Individuals record

ALERT (CVE: 2023-28771)
Zyxel Firewalls Under Attack via CVE-2023-28771 by 244 IPs

GreyNoise found attempts to exploit CVE-2023-28771, a vulnerability in Zyxel's IKE affecting UDP port 500. The attack centers around CVE-2023-28771,...
Read More
ALERT (CVE: 2023-28771)  Zyxel Firewalls Under Attack via CVE-2023-28771 by 244 IPs

CISA Flags Active Exploits in Apple iOS and TP-Link Routers

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently included two high-risk vulnerabilities in its Known Exploited Vulnerabilities (KEV)...
Read More
CISA Flags Active Exploits in Apple iOS and TP-Link Routers

10K Records Allegedly from Mac Cloud Provider’s Customers Leaked Online

SafetyDetectives’ Cybersecurity Team discovered a public post on a clear web forum in which a threat actor claimed to have...
Read More
10K Records Allegedly from Mac Cloud Provider’s Customers Leaked Online

Canada 2nd largest airlines “WestJet” investigates cyberattack disrupting internal systems

WestJet, Canada's second-largest airline, is looking into a cyberattack that has affected some internal systems during its response to the...
Read More
Canada 2nd largest airlines “WestJet” investigates cyberattack disrupting internal systems

Paraguay 7.4 Million Citizen Records Leaked on Dark Web

Resecurity found 7.4 million records of Paraguayan citizens' personal information leaked on the dark web today. Last week, cybercriminals attempted...
Read More
Paraguay 7.4 Million Citizen Records Leaked on Dark Web

High-Severity Flaw in HashiCorp Nomad Allows Privilege Escalation

HashiCorp has revealed a critical vulnerability in its Nomad tool that may let attackers gain higher privileges by misusing the...
Read More
High-Severity Flaw in HashiCorp Nomad Allows Privilege Escalation

SoftBank: Over 137,000 personal info leaked

SoftBank has disclosed that personal information of more than 137,000 mobile subscribers—covering names, addresses, and phone numbers—might have been leaked...
Read More
SoftBank: Over 137,000 personal info leaked

Alert
Trend Micro Apex One Flaw Allow Attackers to Inject Malicious Code

Serious security vulnerabilities in Trend Micro Apex One could allow attackers to inject malicious code and elevate their privileges within...
Read More
Alert  Trend Micro Apex One Flaw Allow Attackers to Inject Malicious Code

Wormhole
SHA-256: dff3fd0197c5ea432f58f62a5f40dfa8e0cdc3ecca36bcf3221962349fbd9a22
Extensions: .Wormhole

KUZA
SHA-256: 38514f16f9eac49a8bd59cfe7785a74b5eb0b6af88d0a3ea505a1997dab0bd91
Extensions: .Ripa

Qepi – Qehu
SHA-256: 8c12844b80c111537bb80e1bcb33d7db8cc334cfb15cc0e3496f7f793f5ed1b6
SHA-256: 78b8e716db280ca8806dfa21824b993c592c33baba2a238cf2bd839f454a9cbe
Extensions: .qepi – .qehu

Baaa
SHA-256: a566a28f3b860689ea801f9b2c454114e3d019c33017df7ef5859b78953b0415
Extensions: .baa

MALARIA
SHA-256: ac6ec3ca2a4592fb046ee52b214c89fd6b84164009a670703ea05021f0683172
Extensions: .Four random characters

Xam
SHA-256: 225e299bca1514858a1c31e85c05a2e7375f9f8d7095f5775dffe4d048e78892
Extensions: .xam

Qeza
SHA-256: 110eedf789feeb746b14dfc2d1a93aa580dfa110a4cb3073ce4d9460de5309cf
Extensions: .qeza

Vepi
SHA-256: 143292ae66435a28f45d126b6e75df33cb156cf9ae85ed16b01967d18bcfe50a
Extensions: .vepi

EnigmaWave
SHA-256: 7d6f763b685ede93123551f651e60829b4fab9f9794690448f67af18dc544588
Extensions: .EnigmaWave

Paaa
SHA-256: 2bd6f0743a3ecab9f463af0a244ccf98bcc0fe5a3f28f048dbb15112e5a214ff
Extensions: .paaa

Vehu
SHA-256: ced7e605bdf92c0e2a05709f6bb8c7a287e06839f5e21455857838644e68b991
Extensions: .vehu

Scrypt
SHA-256: aeeef616860df5ac0bcf37567fb1476d8d60ecc3d9eb6b82515ad5d5c3d5218d
Extensions: .Scrypt

Capibara
SHA-256: 923dddc478a17d0adf0c86d1b5eb709ea4b48114cbb2c0e72052bd69caae95b2
Extensions: .capibara

Lilium
SHA-256: 153a11e6dfe886a1950c874309f33cee72411bce30d283ece10b8f2d5870ca03
Extensions: .lilium

EDHST
SHA-256: d4b56f96610c77077b4171a6b01ac31cc2c633f41b686661608ae78b42de5744
Extensions: .EDHST

OPIX
SHA-256: 2e343f71bc6e378ca85932ffc75c4e64466ada12e6551901abf2c40c92eff803
Extensions: .OPIX

GhosHacker
SHA-256: 2e343f71bc6e378ca85932ffc75c4e64466ada12e6551901abf2c40c92eff803
Extensions: .red

Veza
SHA-256: 2ce2c104c964166cf5fc95d7c855c173533bf28b7053a398bb01e757fd0d94ea
Extensions: .veza

OCEANS
SHA-256: c9bd1abfb6e520d973284f2fbebaf14cd1cf5db7c2e2956e9d4a9b0564547b81
Extensions: .Four random characters

ZHO
SHA-256: 2ce2c104c964166cf5fc95d7c855c173533bf28b7053a398bb01e757fd0d94ea
Extensions: .Four random characters

Anyv
SHA-256: 4725df43c79dcfd0fe697f25b3de122951e18d7391323f0892a16558731f2e39
Extensions: .Anyv

EMBARGO
SHA-256: 98cc01dcd4c36c47fc13e4853777ca170c734613564a5a764e4d2541a6924d39
Extensions: .564ba1

SRC
SHA-256: 994fd55de0c9a0d2c9011155d76adfe71b4a6f3c5a0bb802269a204e959f61b7
Extensions: .SRC

CAMBIARE ROTTA
SHA-256: 524a898e18999ceac864dbac5b85fa2f14392e389b3c32f77d58e2a89cdf01c4
Extensions: .Four random characters

Zonix
SHA-256: b133659131275c23e39afef14d7e23d09b42cd7e93650b63d8669b8d20c5c751
Extensions: .ZoN

Nett
SHA-256: 1a024d3f05a2d28f7edc493c544f9622cc7610d06f3a25ebb35e46232ff368d6
Extensions: .nett

Wintz
SHA-256: bae187a00945be87c8f627b2b6943360c67eec4cbf518d46790f6898f9f64e17
Extensions: .Four random characters

Boost
SHA-256: b39912902d5a05d383c19dc93bace94d57b1287bd77b889b0f7cd1ba8433e82e
Extensions: .boost

QRYPT
SHA-256: 7628448a6ad01b9260b067d420d32564f33d750a09aeb76fb927ba15567efe84
Extensions: .qcrypt

(Media Disclaimer: This report is based on research conducted internally and externally using different ways. The information provided is for reference only, and users are responsible for relying on it. Infosecbulletin is not liable for the accuracy or consequences of using this information by any means)

Check Also

Authority Denies
Hacker claim ransomware attack on Indonesia’s state bank BRI

Bank Rakyat Indonesia (BRI), the largest state bank by assets, has assured customers that their …

Leave a Reply

Your email address will not be published. Required fields are marked *