BTC $51524.6928
ETH $3102.2833
BNB $384.2776
SOL $103.2311
XRP $0.5405
ADA $0.5849
AVAX $36.9511
TRX $0.1377
DOGE $0.0856
wstETH $3587.3896
LINK $18.6494
DOT $7.8438
WETH $3100.0078
UNI $11.0945
MATIC $0.9971
WBTC $51554.8458
IMX $3.3401
ICP $12.4013
LTC $70.0025
BCH $266.3236
CAKE $3.1426
FIL $8.1456
ETC $27.0947
RNDR $7.2587
DAI $1.0009
KAS $0.1676
HBAR $0.1071
ATOM $10.3461
INJ $35.4309
VET $0.0467
TON $2.0697
OKB $50.3127
FDUSD $0.9994
LDO $3.3633
GRT $0.3004
ARB $1.8920
XMR $128.8577
TIA $16.5811
XLM $0.1156
STX $2.5143
ENS $22.4126
NEAR $3.6605
APEX $2.4601
WEMIX $2.0774
MKR $2060.5410
BEAM $0.0332
MNT $0.8950
BTC $51524.6928
ETH $3102.2833
BNB $384.2776
SOL $103.2311
XRP $0.5405
ADA $0.5849
AVAX $36.9511
TRX $0.1377
DOGE $0.0856
wstETH $3587.3896
LINK $18.6494
DOT $7.8438
WETH $3100.0078
UNI $11.0945
MATIC $0.9971
WBTC $51554.8458
IMX $3.3401
ICP $12.4013
LTC $70.0025
BCH $266.3236
CAKE $3.1426
FIL $8.1456
ETC $27.0947
RNDR $7.2587
DAI $1.0009
KAS $0.1676
HBAR $0.1071
ATOM $10.3461
INJ $35.4309
VET $0.0467
TON $2.0697
OKB $50.3127
FDUSD $0.9994
LDO $3.3633
GRT $0.3004
ARB $1.8920
XMR $128.8577
TIA $16.5811
XLM $0.1156
STX $2.5143
ENS $22.4126
NEAR $3.6605
APEX $2.4601
WEMIX $2.0774
MKR $2060.5410
BEAM $0.0332
MNT $0.8950
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • More than 100 hacker groups use ransomware in attacks


    Microsoft has reported that its security services tracked down more than 100 different hacker groups deploying ransomware during their attacks. The company says it is now tracking more than 50 unique ransomware families that were in active use until the end of last year.

    “Some of the more notorious ransomware in recent campaigns include Lockbit Black, BlackCat (aka ALPHV), Play, Vice Society, Black Basta, and Royal,” Microsoft said in a statement.

    However, protection strategies should focus less on payloads and more on the chain of actions that lead to their deployment. Because ransomware groups continue to target devices and servers that have not yet received the latest security patches and are vulnerable to malicious attacks.

    While new families of ransomware are constantly emerging, most attackers use similar tactics to break into and spread across networks. This makes us think that it is much more efficient to identify a threat before it is activated, even at the deployment stage. This is where the corporation needs to direct its efforts, and not to issue endless patches.

    Attackers are increasingly using tactics beyond phishing to carry out their attacks, Microsoft added, with groups such as DEV-0671 and DEV-0882 using newly patched Exchange Server vulnerabilities to compromise still vulnerable servers and deploy Cuba and Play ransomware.

    The Exchange team previously urged administrators to deploy the latest supported cumulative update themselves to secure on-premises Exchange servers and ensure they are always ready to install an emergency security update.

    Author DeepWeb
    KeePass does not accept user complaints about vulnerabilities in their systems
    Why does marijuana make you want to eat?

    Comments 0

    Add comment