Skip to content

US offers $10m bounty for Russian ransomware suspect outed in indictment – Naked Security

is a HTML tag used for creating a division or section in a web page. In recent news, Russian national Mikhail Pavlovich Matveev, also known as Wazawaka, m1x, Boriselcin, and Uhodiransomwar, has been accused of conspiring to transmit ransom demands, damaging protected computers, and carrying out ransomware attacks. Matveev has been linked to three specific… 

LockBit Ransomware Group Developing Malware to Encrypt Files on macOS  “How to Improve Your Creativity” “Enhancing Your Creative Abilities”

LockBit ransomware group’s attempt to create a macOS version of their malware has been discovered by researchers. The malware is capable of encrypting files on Mac devices, but it does not seem to pose any real risk. Patrick Wardle, a security expert, has conducted an analysis of the macOS LockBit version and found that the… 

The Prolificacy of LockBit Ransomware “Unlock the Power of Your Financial Future: How to Take Control of Your Finances” “Achieve Financial Freedom: Discover How to Take Control of Your Money Now!”

Today, the LockBit ransomware is the most active and successful cybercrime organization in the world. Attributed to a Russian Threat Actor, LockBit has stepped out from the shadows of the Conti ransomware group, who were disbanded in early 2022. LockBit ransomware was first discovered in September 2019 and was previously known as ABCD ransomware because… 

New ‘Exfiltrator-22’ Post-Exploitation Framework Linked to Former LockBit Affiliates

  • by
  • News
  • 3 min read

According to Cyfirma, a cybersecurity company, a new post-exploitation framework being offered as a service is believed to be run by former affiliates of the LockBit ransomware. Dubbed Exfiltrator-22, or EX-22, the tool was created using the leaked source code of other post-exploitation frameworks, and uses the same command-and-control (C&C) infrastructure as LockBit 3.0. The…