Thursday , November 21 2024
Ransomware

Researcher detect 21 New Ransomwares in August

In August, Cybersecurity researchers identified 21 new ransomware variants that threaten indivisual and business. Cybercriminals are improving their tactics, making it harder to detect and combat these malicious programs.

Ransomware encrypts valuable data, making it inaccessible, and then demands high ransoms for decryption keys. This puts personal data at risk and creates significant financial burdens for victims.

CVE-2024-51503
Trend Micro released updates for Deep Security Agent RCE

Trend Micro released a security update for Deep Security 20 Agent Manual Scan Command Injection RCE Vulnerability (CVE-2024-51503) that resolves...
Read More
CVE-2024-51503  Trend Micro released updates for Deep Security Agent RCE

Apple Releases Patch for two Actively Exploited Zero-Day

Apple released critical updates for its various products including for iOS, iPadOS, macOS, visionOS, and Safari to fix two zero-day...
Read More
Apple Releases Patch for two Actively Exploited Zero-Day

Maxar Space Data Leak, Company admit, Investigation ongoing!

Maxar Space Systems has verified a major data breach that exposed particular information of current and former workers. The breach...
Read More
Maxar Space Data Leak, Company admit, Investigation ongoing!

GitHub CLI Vulnerability Could Allow RCE

A security vulnerability (CVE-2024-52308) in the GitHub Command Line Interface (CLI) could allow remote code execution on users' devices. With...
Read More
GitHub CLI Vulnerability Could Allow RCE

“Sarcoma” ransomware group
Hacker to disclose “Popular Life Insurance” 36 GB of stolen data

“Sarcoma” ransomware group attacked a well known Bangladeshi insurance company named "Popular life insurance company ltd". The threat actor keeps...
Read More
“Sarcoma” ransomware group  Hacker to disclose “Popular Life Insurance” 36 GB of stolen data

BugHunt 2024: A Milestone Cyber security Competition held at Dhaka

Bug Hunt 2024, one of the largest cyber security competitions and conferences in Bangladesh, was successfully held at the ICT...
Read More
BugHunt 2024: A Milestone Cyber security Competition held at Dhaka

TP-Link DHCP Vulnerability Allow Attackers Takeover Routers Remotely

A serious security flaw has been found in some TP-Link routers, potentially enabling hackers to remotely access the affected devices.The...
Read More
TP-Link DHCP Vulnerability Allow Attackers Takeover Routers Remotely

WSJ reports
T-Mobile hacked in massive breach of telecom networks

The Wall Street Journal reported on Friday citing people familiar with the matter that T-Mobile’s network was among the systems...
Read More
WSJ reports  T-Mobile hacked in massive breach of telecom networks

Palo Alto Networks Confirms critical RCE zero-day actively exploited

"Palo Alto Networks has observed threat activity exploiting an unauthenticated remote command execution vulnerability against a limited number of firewall...
Read More
Palo Alto Networks Confirms critical RCE zero-day actively exploited

CISA, FBI Warns
Hacker compromised multiple teleco network at US

US authorities have revealed a major cyberespionage campaign by hackers, targeting information from Americans in government and politics. The FBI...
Read More
CISA, FBI Warns  Hacker compromised multiple teleco network at US

MaxCat
SHA-256: e420edd7ef3166249a9059ff68922a9a7cbe67da5b02813a14aef183baadcc
Extensions: .[Four random characters]

Prince
SHA-256: c6920ba9bb87871f59814b9bf9083677460dda7dabc2f5f0e88f1cfed00d2eda
Extensions: .ran

Blue
SHA-256: 718a1730a2ba1c4dd162a991e18276bffdda82fecbb9b9b039e4aab30f2358c6
Extensions: .blue

Zola
SHA-256: 814efbd86c0d4e11bfeb5b4bc06c1b6f378455837789637ce581b22777b3a81f
Extensions: .Zola

Pomoch
SHA-256: ce746a36f0e85da2b5a1c4ab72c78d048612a9e68968e734d962a071e0c65679
Extensions: .pomoch45

Griffin
SHA-256: 961ea6a0ec374ff52ea5081ccb5c8d59e95524fd185507e86e6129ef00793acd
Extensions: .griffin

AttackNew
SHA-256: 050ca66e8bdf252709ff0e37a9e492f52c41064a35ab5bd9c9a84b2146619b83
Extensions: .attacknew1

Hawk Eye
SHA-256: 68b1cb1f9283b7ff99abc912c4af170992e6744b2c595198f8b3a7bf42e0e4f3
Extensions: .[Four random characters]

Allarich
SHA-256: 5358ff649e3c0b9e6d2a3e4c16d5330f2cc412a7dd2050e1d140433d6c4dd60a
Extensions: .allarich

H0rus
SHA-256: b794e0ec1ff7904a12c9ba322288b435ff6f810b7e2a3329883d5797fa9c5d44
Extensions: .h0rus13

Datablack
SHA-256: 9c6f65782fc31a6f57285259cf881af9ec5a63d34daae86912940c99aa73e14c
Extensions: .Datablack

RDanger
SHA-256: d601d4e08bf2fd6e275b93ed87cb05846b0d914263aeeae35bf0bb0d0f353bcc
Extensions: .[unique ID]

Makop
SHA-256: f9dcdbe1929dd4606138f9c77b95c144acd4d711fd372f7bb075b8aa61a83b62
Extensions: .Makop

Insom
SHA-256: 7539168dceeb775031aac13a5c983894cc63375649097a617ea7fc389c2e757a
Extensions: .insom

Dice
SHA-256: 65e035d7abaafd2e8b11981292b07f65da440ec739b92dfd3d5d29b46a95c497
Extensions: .Dice

Razrusheniye
SHA-256: 863263e41695ac51bf1eebbb44053d472540c538d221147a3f0d2de5c8632382
Extensions: .raz

Pwn3d
SHA-256: cfba65d57035fe5d39f7fca987d6c0e0369d3457f7e31e8d6818c1da80b912c9
Extensions: .pwn3d

ELPACO-team
SHA-256: 9f6a696876fee8b811db8889bf4933262f4472ad41daea215d2e39bd537cf32f
Extensions: .ELPACO-team

PURGAT0RY
SHA-256: c5216b896c1c8c20ce45e0003ca6cf44f5ee27b142c5bd9831d3771379b6819d
Extensions: .PURGAT0RY

MoneyIsTime
SHA-256: dd09a2ef31d018fd83f186e3eaaccccdaa8a8c8779ced668abb06dc934d89a2d
Extensions: .moneyistime

MoneyIsTime
SHA-256: dd09a2ef31d018fd83f186e3eaaccccdaa8a8c8779ced668abb06dc934d89a2d
Extensions: .moneyistime

BloodForge Onyx
SHA-256: ! ALERT ! Brand new, there is only announcement
Extensions: ?

Check Also

Malware

New Malware Infect over 300,00 Chrome & Edge Users

A new malware campaign is currently installing fake Google Chrome and Microsoft Edge extensions through …

Leave a Reply

Your email address will not be published. Required fields are marked *