Saturday , December 21 2024
key

Malware Researchers detect 29 New Ransomwares in May

In May, cybersecurity experts found 29 new ransomware types. These malicious programs are a big danger to people and businesses. The cybercriminals keep improving their methods with each new type of ransomware, so it’s harder to detect and stop them.

Ransomware works by locking up important data on infected computers, making it impossible for users to access. Then, the criminals ask for a lot of money to unlock the data, putting victims in a difficult situation. This not only puts personal and private information at risk but also causes financial problems for the victims dailydarkweb reported.

Authority Denies
Hacker claim ransomware attack on Indonesia’s state bank BRI

Bank Rakyat Indonesia (BRI), the largest state bank by assets, has assured customers that their data and funds are secure...
Read More
Authority Denies  Hacker claim ransomware attack on Indonesia’s state bank BRI

London-based company “Builder.ai” reportedly exposed 1.2 TB data

Cybersecurity researcher Jeremiah Fowler reported to Website Planet that he found a non-password-protected 1.2 TB dataset containing over 3 million...
Read More
London-based company “Builder.ai” reportedly exposed 1.2 TB data

(CVE-2024-12727, CVE-2024-12728, CVE-2024-12729)
Sophos resolved 3 critical vulnerabilities in Firewall

Sophos has fixed three separate security vulnerabilities in Sophos Firewall.  The vulnerabilities CVE-2024-12727, CVE-2024-12728, and CVE-2024-12729 present major risks, such...
Read More
(CVE-2024-12727, CVE-2024-12728, CVE-2024-12729)  Sophos resolved 3 critical vulnerabilities in Firewall

“Workshop on Cybersecurity Awareness and Needs Analysis” held at BBTA

A time-demanding workshop on "Cybersecurity Awareness and Needs Analysis" was held on Thursday (December 19) at Bangladesh Bank Training Academy...
Read More
“Workshop on Cybersecurity Awareness and Needs Analysis” held at BBTA

CVE-2023-48788
Kaspersky reveals active exploitation of Fortinet Vulnerability

Kaspersky's Global Emergency Response Team (GERT) found that attackers are exploiting a patched SQL injection vulnerability (CVE-2023-48788) in Fortinet FortiClient...
Read More
CVE-2023-48788  Kaspersky reveals active exploitation of Fortinet Vulnerability

U.S. Weighs Ban on Chinese-Made Router TP-Link: WSJ reports

The US government is considering banning a well-known brand of Chinese-made home internet routers TP-Link due to concerns that they...
Read More
U.S. Weighs Ban on Chinese-Made Router TP-Link:  WSJ reports

Daily Security Update Dated: 18.12.2024

Every day a lot of cyberattack happen around the world including ransomware, Malware attack, data breaches, website defacement and so...
Read More
Daily Security Update Dated: 18.12.2024

CISA released best practices to secure Microsoft 365 Cloud environments

CISA has issued Binding Operational Directive (BOD) 25-01, requiring federal civilian agencies to improve the security of their Microsoft 365...
Read More
CISA released best practices to secure Microsoft 365 Cloud environments

Data breach! Ireland fines Meta $264 million, Australia $50m

The Irish Data Protection Commission fined Meta €251 million ($263.6 million) for GDPR violations related to a 2018 data breach...
Read More
Data breach! Ireland fines Meta $264 million, Australia $50m

Over 25K SonicWall VPN Firewalls exposed to critical flaws

More than 25,000 SonicWall SSL VPN devices are vulnerable to critical flaws, with 20,000 running outdated SonicOS/OSX firmware that is...
Read More
Over 25K SonicWall VPN Firewalls exposed to critical flaws

Wormhole
SHA-256: dff3fd0197c5ea432f58f62a5f40dfa8e0cdc3ecca36bcf3221962349fbd9a22
Extensions: .Wormhole

KUZA
SHA-256: 38514f16f9eac49a8bd59cfe7785a74b5eb0b6af88d0a3ea505a1997dab0bd91
Extensions: .Ripa

Qepi – Qehu
SHA-256: 8c12844b80c111537bb80e1bcb33d7db8cc334cfb15cc0e3496f7f793f5ed1b6
SHA-256: 78b8e716db280ca8806dfa21824b993c592c33baba2a238cf2bd839f454a9cbe
Extensions: .qepi – .qehu

Baaa
SHA-256: a566a28f3b860689ea801f9b2c454114e3d019c33017df7ef5859b78953b0415
Extensions: .baa

MALARIA
SHA-256: ac6ec3ca2a4592fb046ee52b214c89fd6b84164009a670703ea05021f0683172
Extensions: .Four random characters

Xam
SHA-256: 225e299bca1514858a1c31e85c05a2e7375f9f8d7095f5775dffe4d048e78892
Extensions: .xam

Qeza
SHA-256: 110eedf789feeb746b14dfc2d1a93aa580dfa110a4cb3073ce4d9460de5309cf
Extensions: .qeza

Vepi
SHA-256: 143292ae66435a28f45d126b6e75df33cb156cf9ae85ed16b01967d18bcfe50a
Extensions: .vepi

EnigmaWave
SHA-256: 7d6f763b685ede93123551f651e60829b4fab9f9794690448f67af18dc544588
Extensions: .EnigmaWave

Paaa
SHA-256: 2bd6f0743a3ecab9f463af0a244ccf98bcc0fe5a3f28f048dbb15112e5a214ff
Extensions: .paaa

Vehu
SHA-256: ced7e605bdf92c0e2a05709f6bb8c7a287e06839f5e21455857838644e68b991
Extensions: .vehu

Scrypt
SHA-256: aeeef616860df5ac0bcf37567fb1476d8d60ecc3d9eb6b82515ad5d5c3d5218d
Extensions: .Scrypt

Capibara
SHA-256: 923dddc478a17d0adf0c86d1b5eb709ea4b48114cbb2c0e72052bd69caae95b2
Extensions: .capibara

Lilium
SHA-256: 153a11e6dfe886a1950c874309f33cee72411bce30d283ece10b8f2d5870ca03
Extensions: .lilium

EDHST
SHA-256: d4b56f96610c77077b4171a6b01ac31cc2c633f41b686661608ae78b42de5744
Extensions: .EDHST

OPIX
SHA-256: 2e343f71bc6e378ca85932ffc75c4e64466ada12e6551901abf2c40c92eff803
Extensions: .OPIX

GhosHacker
SHA-256: 2e343f71bc6e378ca85932ffc75c4e64466ada12e6551901abf2c40c92eff803
Extensions: .red

Veza
SHA-256: 2ce2c104c964166cf5fc95d7c855c173533bf28b7053a398bb01e757fd0d94ea
Extensions: .veza

OCEANS
SHA-256: c9bd1abfb6e520d973284f2fbebaf14cd1cf5db7c2e2956e9d4a9b0564547b81
Extensions: .Four random characters

ZHO
SHA-256: 2ce2c104c964166cf5fc95d7c855c173533bf28b7053a398bb01e757fd0d94ea
Extensions: .Four random characters

Anyv
SHA-256: 4725df43c79dcfd0fe697f25b3de122951e18d7391323f0892a16558731f2e39
Extensions: .Anyv

EMBARGO
SHA-256: 98cc01dcd4c36c47fc13e4853777ca170c734613564a5a764e4d2541a6924d39
Extensions: .564ba1

SRC
SHA-256: 994fd55de0c9a0d2c9011155d76adfe71b4a6f3c5a0bb802269a204e959f61b7
Extensions: .SRC

CAMBIARE ROTTA
SHA-256: 524a898e18999ceac864dbac5b85fa2f14392e389b3c32f77d58e2a89cdf01c4
Extensions: .Four random characters

Zonix
SHA-256: b133659131275c23e39afef14d7e23d09b42cd7e93650b63d8669b8d20c5c751
Extensions: .ZoN

Nett
SHA-256: 1a024d3f05a2d28f7edc493c544f9622cc7610d06f3a25ebb35e46232ff368d6
Extensions: .nett

Wintz
SHA-256: bae187a00945be87c8f627b2b6943360c67eec4cbf518d46790f6898f9f64e17
Extensions: .Four random characters

Boost
SHA-256: b39912902d5a05d383c19dc93bace94d57b1287bd77b889b0f7cd1ba8433e82e
Extensions: .boost

QRYPT
SHA-256: 7628448a6ad01b9260b067d420d32564f33d750a09aeb76fb927ba15567efe84
Extensions: .qcrypt

(Media Disclaimer: This report is based on research conducted internally and externally using different ways. The information provided is for reference only, and users are responsible for relying on it. Infosecbulletin is not liable for the accuracy or consequences of using this information by any means)

Check Also

Ransomware

CRI Release New Ransomware Response Guidance

New guidance on ransomware, released during this week’s International Counter Ransomware Initiative (CRI) meeting, encourages …

Leave a Reply

Your email address will not be published. Required fields are marked *