Saturday , February 22 2025
key

Malware Researchers detect 29 New Ransomwares in May

In May, cybersecurity experts found 29 new ransomware types. These malicious programs are a big danger to people and businesses. The cybercriminals keep improving their methods with each new type of ransomware, so it’s harder to detect and stop them.

Ransomware works by locking up important data on infected computers, making it impossible for users to access. Then, the criminals ask for a lot of money to unlock the data, putting victims in a difficult situation. This not only puts personal and private information at risk but also causes financial problems for the victims dailydarkweb reported.

B1ack’s Stash Releases 1 Million Credit Cards on a Deep Web Forum

On February 19, 2025, the illegal marketplace B1ack's Stash released over 1 million unique stolen credit and debit card details...
Read More
B1ack’s Stash Releases 1 Million Credit Cards on a Deep Web Forum

Cisco Confirms
Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom Networks

Cisco Talos reported that  Salt Typhoon, also known as FamousSparrow and GhostEmperor, has been spying on U.S. telecommunication providers using...
Read More
Cisco Confirms  Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom Networks

AWS Key Hunter
Test this free automated tool to hunt for exposed AWS secrets

A free tool is now available to scan public GitHub repositories for exposed AWS credentials. Security engineer Anmol Singh Yadav created...
Read More
AWS Key Hunter  Test this free automated tool to hunt for exposed AWS secrets

Check Point Flaw Used to Deploy ShadowPad and Ransomware

An unknown threat cluster has targeted European healthcare organizations, deploying PlugX and ShadowPad. In some cases, these intrusions resulted in...
Read More
Check Point Flaw Used to Deploy ShadowPad and Ransomware

CVE-2024-12284
Citrix Issues Security Update for NetScaler Console

Citrix has issued security updates for a serious vulnerability in the NetScaler Console and NetScaler Agent that could allow privilege...
Read More
CVE-2024-12284  Citrix Issues Security Update for NetScaler Console

CISA and FBI ALERT
Ghost ransomware to breach organizations in 70 countries

The FBI and CISA reported on Wednesday that the ransomware group Ghost has been exploiting software and firmware vulnerabilities as...
Read More
CISA and FBI ALERT  Ghost ransomware to breach organizations in 70 countries

Hacker chains multiple vulns to attack Palo Alto Firewall

Palo Alto Networks has issued urgent warnings about threat actors to exploit vulnerabilities in PAN-OS, the operating system powering its...
Read More
Hacker chains multiple vulns to attack Palo Alto Firewall

150 Gov.t Portal affected
Black-Hat SEO Poisoning Indian “.gov.in, .ac.in” domain

Indian government and educational websites, along with reputable financial brands, have experienced SEO poisoning, causing user traffic to be redirected...
Read More
150 Gov.t Portal affected  Black-Hat SEO Poisoning Indian “.gov.in, .ac.in” domain

CVE-2018-19410 Exposes 600 PRTG Instances in Bangladesh

The Cyber Threat Intelligence Unit of BGD e-GOV CIRT has found 600 vulnerable PRTG instances in Bangladesh, affected by the...
Read More
CVE-2018-19410 Exposes 600 PRTG Instances in Bangladesh

Builder claims Rs 150 cr for data loss; AWS faces FIR In Bengaluru

Amazon Web Services (AWS) has been named in an FIR after a builder claimed damages to the tune of Rs...
Read More
Builder claims Rs 150 cr for data loss;  AWS faces FIR In Bengaluru

Wormhole
SHA-256: dff3fd0197c5ea432f58f62a5f40dfa8e0cdc3ecca36bcf3221962349fbd9a22
Extensions: .Wormhole

KUZA
SHA-256: 38514f16f9eac49a8bd59cfe7785a74b5eb0b6af88d0a3ea505a1997dab0bd91
Extensions: .Ripa

Qepi – Qehu
SHA-256: 8c12844b80c111537bb80e1bcb33d7db8cc334cfb15cc0e3496f7f793f5ed1b6
SHA-256: 78b8e716db280ca8806dfa21824b993c592c33baba2a238cf2bd839f454a9cbe
Extensions: .qepi – .qehu

Baaa
SHA-256: a566a28f3b860689ea801f9b2c454114e3d019c33017df7ef5859b78953b0415
Extensions: .baa

MALARIA
SHA-256: ac6ec3ca2a4592fb046ee52b214c89fd6b84164009a670703ea05021f0683172
Extensions: .Four random characters

Xam
SHA-256: 225e299bca1514858a1c31e85c05a2e7375f9f8d7095f5775dffe4d048e78892
Extensions: .xam

Qeza
SHA-256: 110eedf789feeb746b14dfc2d1a93aa580dfa110a4cb3073ce4d9460de5309cf
Extensions: .qeza

Vepi
SHA-256: 143292ae66435a28f45d126b6e75df33cb156cf9ae85ed16b01967d18bcfe50a
Extensions: .vepi

EnigmaWave
SHA-256: 7d6f763b685ede93123551f651e60829b4fab9f9794690448f67af18dc544588
Extensions: .EnigmaWave

Paaa
SHA-256: 2bd6f0743a3ecab9f463af0a244ccf98bcc0fe5a3f28f048dbb15112e5a214ff
Extensions: .paaa

Vehu
SHA-256: ced7e605bdf92c0e2a05709f6bb8c7a287e06839f5e21455857838644e68b991
Extensions: .vehu

Scrypt
SHA-256: aeeef616860df5ac0bcf37567fb1476d8d60ecc3d9eb6b82515ad5d5c3d5218d
Extensions: .Scrypt

Capibara
SHA-256: 923dddc478a17d0adf0c86d1b5eb709ea4b48114cbb2c0e72052bd69caae95b2
Extensions: .capibara

Lilium
SHA-256: 153a11e6dfe886a1950c874309f33cee72411bce30d283ece10b8f2d5870ca03
Extensions: .lilium

EDHST
SHA-256: d4b56f96610c77077b4171a6b01ac31cc2c633f41b686661608ae78b42de5744
Extensions: .EDHST

OPIX
SHA-256: 2e343f71bc6e378ca85932ffc75c4e64466ada12e6551901abf2c40c92eff803
Extensions: .OPIX

GhosHacker
SHA-256: 2e343f71bc6e378ca85932ffc75c4e64466ada12e6551901abf2c40c92eff803
Extensions: .red

Veza
SHA-256: 2ce2c104c964166cf5fc95d7c855c173533bf28b7053a398bb01e757fd0d94ea
Extensions: .veza

OCEANS
SHA-256: c9bd1abfb6e520d973284f2fbebaf14cd1cf5db7c2e2956e9d4a9b0564547b81
Extensions: .Four random characters

ZHO
SHA-256: 2ce2c104c964166cf5fc95d7c855c173533bf28b7053a398bb01e757fd0d94ea
Extensions: .Four random characters

Anyv
SHA-256: 4725df43c79dcfd0fe697f25b3de122951e18d7391323f0892a16558731f2e39
Extensions: .Anyv

EMBARGO
SHA-256: 98cc01dcd4c36c47fc13e4853777ca170c734613564a5a764e4d2541a6924d39
Extensions: .564ba1

SRC
SHA-256: 994fd55de0c9a0d2c9011155d76adfe71b4a6f3c5a0bb802269a204e959f61b7
Extensions: .SRC

CAMBIARE ROTTA
SHA-256: 524a898e18999ceac864dbac5b85fa2f14392e389b3c32f77d58e2a89cdf01c4
Extensions: .Four random characters

Zonix
SHA-256: b133659131275c23e39afef14d7e23d09b42cd7e93650b63d8669b8d20c5c751
Extensions: .ZoN

Nett
SHA-256: 1a024d3f05a2d28f7edc493c544f9622cc7610d06f3a25ebb35e46232ff368d6
Extensions: .nett

Wintz
SHA-256: bae187a00945be87c8f627b2b6943360c67eec4cbf518d46790f6898f9f64e17
Extensions: .Four random characters

Boost
SHA-256: b39912902d5a05d383c19dc93bace94d57b1287bd77b889b0f7cd1ba8433e82e
Extensions: .boost

QRYPT
SHA-256: 7628448a6ad01b9260b067d420d32564f33d750a09aeb76fb927ba15567efe84
Extensions: .qcrypt

(Media Disclaimer: This report is based on research conducted internally and externally using different ways. The information provided is for reference only, and users are responsible for relying on it. Infosecbulletin is not liable for the accuracy or consequences of using this information by any means)

Check Also

Ransomware

CRI Release New Ransomware Response Guidance

New guidance on ransomware, released during this week’s International Counter Ransomware Initiative (CRI) meeting, encourages …

Leave a Reply

Your email address will not be published. Required fields are marked *