The operators of the “RagnarLocker” ransomware began an advertising campaign on Facebook to further extort the victim of one of their recent attacks. This was in addition to posting the details of the attack to their dark website, “Ragnar_Locker Leaks”. Using ransomware extortion websites has become commonplace, but this bold approach of using social media advertisements to publicize a ransomware attack represents a shift in extortion tactics for a ransomware group. Among the competitive ransomware market, criminal groups have attempted to differentiate themselves. Most have developed new methods to coerce their victims, contributing to the unprecedented advancements in ransomware activity observed throughout 2020. These new extortion tactics indicate that innovation in this space is unlikely to cease as 2021 approaches.
Most Recent Flipbooks
The Federal Security Service of the Russian Federation (FSB) conducted a series of raids and arrests against at least 20 members of the "REvil" ransomware group.
Researchers have discovered a critical vulnerability in the popular open-source Java SQL database H2
For 2022, cyber-security practitioners must be extraordinarily nimble and adept. Plus information on telegram dropping malware, North Korean group exploits Russia, and Log4j crisis spilling in to 2022
Log4j bug exposes fragility of digital ecosystem worldwide. Plus information on Magecart home for the holidays, Emotet regaining power, and Muddywater APT group hunts for airline data via Slack.
Microsoft has allegedly halted a long-term cyber-espionage operation of “NICKEL”, a threat group linked to the People’s Republic of China (PRC).
Success of UK security bill depends on Internet of Things users
The well-established “Mozi” peer-to-peer (P2P) botnet has developed new persistence capabilities.