Saturday , September 7 2024
key

Malware Researchers detect 29 New Ransomwares in May

In May, cybersecurity experts found 29 new ransomware types. These malicious programs are a big danger to people and businesses. The cybercriminals keep improving their methods with each new type of ransomware, so it’s harder to detect and stop them.

Ransomware works by locking up important data on infected computers, making it impossible for users to access. Then, the criminals ask for a lot of money to unlock the data, putting victims in a difficult situation. This not only puts personal and private information at risk but also causes financial problems for the victims dailydarkweb reported.

Cisco released security updates for two critical security flaws

CISCO released security updates for two critical security flaws impacting its smart Licensing Utility that could allow unauthenticated, remote attackers...
Read More
Cisco released security updates for two critical security flaws

OpenBAS: Cutting-edge breach and attack simulation platform

OpenBAS is a platform that helps organizations to plan, schedule, and conduct crisis exercises, adversary simulations, and breach simulations. OpenBAS...
Read More
OpenBAS: Cutting-edge breach and attack simulation platform

Critical Security Flaws Patched in Zyxel Networking Devices

Zyxel has released software updates to fix a serious security issue in certain access point (AP) and security router versions....
Read More
Critical Security Flaws Patched in Zyxel Networking Devices

CVE-2024-38811: CEV In VMware Fusion Unveiled

VMware released a security advisory for a major vulnerability in the VMware Fusion product. This vulnerability could be exploited by...
Read More
CVE-2024-38811: CEV In VMware Fusion Unveiled

CERT-IN Warns Vulnerabilities in Palo Alto Networks applications

Indian Computer Emergency Response Team (CERT-IN) issued advisories about multiple vulnerabilities in various Palo Alto Networks applications. Attackers could exploit...
Read More
CERT-IN Warns Vulnerabilities in Palo Alto Networks applications

How Malaysia’s Data Centre Industry Poised for Growth

Malaysia is quickly becoming a leading choice for investing in data centers. It aims to generate RM3.6 billion (US$781 million)...
Read More
How Malaysia’s Data Centre Industry Poised for Growth

RansomHub exfiltrated data over 210 victims: US alert

US authorities have issued a cybersecurity advisory about a ransomware group called RansomHub. The group is thought to have stolen data...
Read More
RansomHub exfiltrated data over 210 victims: US alert

Godzilla Fileless Backdoor Exploits Atlassian Confluence flaw

There is a new way to attack Atlassian Confluence using the vulnerability CVE-2023-22527. The Confluence Data Center and Server products...
Read More
Godzilla Fileless Backdoor Exploits Atlassian Confluence flaw

New Cicada ransomware targets VMware ESXi servers

The Cicada3301 ransomware is made in Rust and attacks Windows and Linux/ESXi hosts. Truesec researchers examined a version that targets...
Read More
New Cicada ransomware targets VMware ESXi servers

Monday hits two UK bank apps causes outages

Lloyds Bank and Virgin Money's internet banking services were down on Monday, causing trouble for users to access and view...
Read More
Monday hits two UK bank apps causes outages

Wormhole
SHA-256: dff3fd0197c5ea432f58f62a5f40dfa8e0cdc3ecca36bcf3221962349fbd9a22
Extensions: .Wormhole

KUZA
SHA-256: 38514f16f9eac49a8bd59cfe7785a74b5eb0b6af88d0a3ea505a1997dab0bd91
Extensions: .Ripa

Qepi – Qehu
SHA-256: 8c12844b80c111537bb80e1bcb33d7db8cc334cfb15cc0e3496f7f793f5ed1b6
SHA-256: 78b8e716db280ca8806dfa21824b993c592c33baba2a238cf2bd839f454a9cbe
Extensions: .qepi – .qehu

Baaa
SHA-256: a566a28f3b860689ea801f9b2c454114e3d019c33017df7ef5859b78953b0415
Extensions: .baa

MALARIA
SHA-256: ac6ec3ca2a4592fb046ee52b214c89fd6b84164009a670703ea05021f0683172
Extensions: .Four random characters

Xam
SHA-256: 225e299bca1514858a1c31e85c05a2e7375f9f8d7095f5775dffe4d048e78892
Extensions: .xam

Qeza
SHA-256: 110eedf789feeb746b14dfc2d1a93aa580dfa110a4cb3073ce4d9460de5309cf
Extensions: .qeza

Vepi
SHA-256: 143292ae66435a28f45d126b6e75df33cb156cf9ae85ed16b01967d18bcfe50a
Extensions: .vepi

EnigmaWave
SHA-256: 7d6f763b685ede93123551f651e60829b4fab9f9794690448f67af18dc544588
Extensions: .EnigmaWave

Paaa
SHA-256: 2bd6f0743a3ecab9f463af0a244ccf98bcc0fe5a3f28f048dbb15112e5a214ff
Extensions: .paaa

Vehu
SHA-256: ced7e605bdf92c0e2a05709f6bb8c7a287e06839f5e21455857838644e68b991
Extensions: .vehu

Scrypt
SHA-256: aeeef616860df5ac0bcf37567fb1476d8d60ecc3d9eb6b82515ad5d5c3d5218d
Extensions: .Scrypt

Capibara
SHA-256: 923dddc478a17d0adf0c86d1b5eb709ea4b48114cbb2c0e72052bd69caae95b2
Extensions: .capibara

Lilium
SHA-256: 153a11e6dfe886a1950c874309f33cee72411bce30d283ece10b8f2d5870ca03
Extensions: .lilium

EDHST
SHA-256: d4b56f96610c77077b4171a6b01ac31cc2c633f41b686661608ae78b42de5744
Extensions: .EDHST

OPIX
SHA-256: 2e343f71bc6e378ca85932ffc75c4e64466ada12e6551901abf2c40c92eff803
Extensions: .OPIX

GhosHacker
SHA-256: 2e343f71bc6e378ca85932ffc75c4e64466ada12e6551901abf2c40c92eff803
Extensions: .red

Veza
SHA-256: 2ce2c104c964166cf5fc95d7c855c173533bf28b7053a398bb01e757fd0d94ea
Extensions: .veza

OCEANS
SHA-256: c9bd1abfb6e520d973284f2fbebaf14cd1cf5db7c2e2956e9d4a9b0564547b81
Extensions: .Four random characters

ZHO
SHA-256: 2ce2c104c964166cf5fc95d7c855c173533bf28b7053a398bb01e757fd0d94ea
Extensions: .Four random characters

Anyv
SHA-256: 4725df43c79dcfd0fe697f25b3de122951e18d7391323f0892a16558731f2e39
Extensions: .Anyv

EMBARGO
SHA-256: 98cc01dcd4c36c47fc13e4853777ca170c734613564a5a764e4d2541a6924d39
Extensions: .564ba1

SRC
SHA-256: 994fd55de0c9a0d2c9011155d76adfe71b4a6f3c5a0bb802269a204e959f61b7
Extensions: .SRC

CAMBIARE ROTTA
SHA-256: 524a898e18999ceac864dbac5b85fa2f14392e389b3c32f77d58e2a89cdf01c4
Extensions: .Four random characters

Zonix
SHA-256: b133659131275c23e39afef14d7e23d09b42cd7e93650b63d8669b8d20c5c751
Extensions: .ZoN

Nett
SHA-256: 1a024d3f05a2d28f7edc493c544f9622cc7610d06f3a25ebb35e46232ff368d6
Extensions: .nett

Wintz
SHA-256: bae187a00945be87c8f627b2b6943360c67eec4cbf518d46790f6898f9f64e17
Extensions: .Four random characters

Boost
SHA-256: b39912902d5a05d383c19dc93bace94d57b1287bd77b889b0f7cd1ba8433e82e
Extensions: .boost

QRYPT
SHA-256: 7628448a6ad01b9260b067d420d32564f33d750a09aeb76fb927ba15567efe84
Extensions: .qcrypt

(Media Disclaimer: This report is based on research conducted internally and externally using different ways. The information provided is for reference only, and users are responsible for relying on it. Infosecbulletin is not liable for the accuracy or consequences of using this information by any means)

Check Also

coding

EXCLUSIVE
Analysis of 3 Ransomware Threats Active Right Now

Three emerging threats will be discussed below, along with how sandbox analysis can be utilized …

Leave a Reply

Your email address will not be published. Required fields are marked *