Friday, May 1, 2026
Tag:

ransomware

Ransomware Gang Unveils Custom Data-Theft Tool

Ransomware operators introduced a custom-built data exfiltration tool, signaling a notable evolution in attack techniques. Unlike most ransomware groups that rely on publicly available...

Gentlemen RaaS Hits Windows, Linux, and ESXi With New C-Based Locker

Gentlemen is a fast‑growing ransomware‑as‑a‑service (RaaS) operation now targeting Windows, Linux, NAS, BSD, and VMware ESXi with a new locker written in C for...

JanaWare Ransomware Hits Turkish Users via Tailored Adwind RAT

A newly analyzed ransomware campaign dubbed “JanaWare” is targeting users in Turkey by leveraging a customized version of the Adwind Remote Access Trojan (RAT). The...

QEMU Hijacked as Stealth Backdoor for Credential Theft, Ransomware

Attackers are increasingly abusing QEMU virtual machines to hide credential theft and ransomware staging inside “invisible” virtual environments, making detection and forensics significantly harder...

Payouts King Emerges: New Ransomware Operation Tied to Ex-BlackBasta Members

Payouts King is emerging as a technically sophisticated ransomware operation believed to be run by former BlackBasta affiliates, reusing their social‑engineering playbook while introducing...

JanaWare Ransomware Hits Turkish Users via Customized Adwind RAT

A new ransomware campaign dubbed “JanaWare”, leveraging a customized variant of the Adwind remote access Trojan (RAT) to target users in Turkey. The malware exhibits polymorphic behavior,...

EDR Killers Broaden Ransomware Tactics, ESET Warns

Ransomware gangs are rapidly expanding their use of EDR killers, moving beyond vulnerable drivers to a broader mix of scripts, anti‑rootkits, and driverless techniques. The company’s...

Microsoft Warns Storm-1175 Exploiting Web-Facing Vulnerabilities to Deploy Medusa Ransomware

Microsoft is warning that a fast‑moving threat actor it tracks as Storm‑1175 is aggressively exploiting vulnerabilities in internet‑exposed systems to deliver Medusa ransomware in...