|

Adhubllka ransomware

TLP

TLP CLEAR

Author

Jordi M. Lobo

Summary

A new ransomware variant has emerged as part of the Adhubllka ransomware family, targeting individuals and small enterprises with smaller ransom demands to evade media attention. The ransomware spreads via phishing emails and employs a victim portal on Tor for decryption key delivery after ransom payment. Adhubllka has been previously mislabeled and associated with various aliases, used by threat groups like TA547 in campaigns targeting diverse sectors. Researchers anticipate potential rebranding of the Adhubllka family and its adoption by other cybercriminal groups. This underscores the need for robust endpoint security measures to combat evolving ransomware threats effectively.

TIMELINE

DATA

We are consistently providing data for attacks weekly hoping to contribute raising awareness to threats from their data.

CATEGORY

Ransomware

MITRE ATT&CK

Similar Posts

  • |

    F5 Server Audit

    TLP TLP TLP CLEAR Author Sebastien Tricaud Summary This week, we share data from an actively exploited attack from the CISA Known Exploited Vulnerabilities Catalog. This is the /var/log/audit.log file from the F5 boxes which were compromised. A critical security advisory, CVE-2023-46747, reveals an unauthenticated remote code execution vulnerability in the BIG-IP Configuration utility. This…

  • |

    Critical Vulnerabilities in WS_FTP Server

    TLP TLP TLP CLEAR Author Sebastien Tricaud Summary Caitlin Condon, an expert at Rapid7, has highlighted critical vulnerabilities in WS_FTP Server, a secure file transfer solution. These vulnerabilities, notably CVE-2023-40044 and CVE-2023-42657, were disclosed by Progress Software on September 27, 2023. CVE-2023-40044, a .NET deserialization flaw, allows remote code execution with a single HTTPS POST…

  • |

    BlackByte 2.0 Ransomware

    TLP TLP TLP CLEAR Authors Jordi M. Lobo Summary BlackByte 2.0 Ransomware Abuses Vulnerable Windows Driver to Disable Security Solutions, believed to be an offshoot of the now-discontinued Conti group, is part of the big game cybercrime crews, which zeroes in on large, high-profile targets as part of its ransomware-as-a-service (RaaS) scheme. The forensic analysis…

  • |

    Launching Detecteam

    Detecteam is a continuous Breach and Attack Simulation platform to enable you discover attacks you cannot detect. Have you noticed when an attack is found and described, the vendor’s security research team writes a fairly accurate document, update it over time with new discovers and provide a list of Indicator of Compromises (IoC) in the…