A closer look at the Medusa ransomware groupโ€™s latest operations, including their evolving tactics and high-profile targets. Understand the current threat landscape and what defenders need to watch for.

#SecurityLand #BreachBreakdown #Ransomware #Medusa #RansomwareGroup #Cybercrime #Cybersecurity

Read More: https://www.security.land/inside-medusa-ransomware-tactics-targets-and-trends-in-recent-operations/

Inside Medusa Ransomware: Tactics, Targets, and Trends in Recent Operations

Inโ€‘depth analysis of recent Medusa ransomware group operations, victim data and extortion schemes.

Security Land | Decoding the Cyber Threat Landscape
US cybersecurity experts indicted for BlackCat ransomware attacks

Three former employees of cybersecurity incident response companies DigitalMint and Sygnia have been indicted for allegedly hacking the networks of five U.S. companies in BlackCat (ALPHV) ransomware attacks between May 2023 and November 2023.

BleepingComputer

๐Ÿšจ#Lazarus escalated activities in 2025 with companies already suffering billions in losses.

This #APTโ€™s attacks are evolving and getting harder to detect.

Read actionable report on its current campaigns to be ready for the next attack
#ransomwaregroup #Ransomware https://any.run/cybersecurity-blog/lazarus-group-attacks-2025/?utm_source=x_thehackernews&utm_medium=post&utm_campaign=lazarus&utm_content=blog&utm_term=160925

Lazarus Group Attacks in 2025: Overview for SOC Teams

Discover the current campaigns and malware of Lazarus Group and learn to detect its attacks in your SOC.

ANY.RUN's Cybersecurity Blog
#LockBit ransomware gang has suffered a data breach after its dark web affiliate panels were defaced and replaced with a message linking to a MySQL database dump. #ransomwaregroup #dataleaking https://www.bleepingcomputer.com/news/security/lockbit-ransomware-gang-hacked-victim-negotiations-exposed/
LockBit ransomware gang hacked, victim negotiations exposed

The LockBit ransomware gang has suffered a data breach after its dark web affiliate panels were defaced and replaced with a message linking to a MySQL database dump.

BleepingComputer
#Akira ransomware gang was spotted using an unsecured webcam to launch encryption attacks on a victim's network, effectively circumventing Endpoint Detection and Response (EDR), which was blocking the encryptor in Windows. #ransomwaregroup #CyberSecurity https://www.bleepingcomputer.com/news/security/ransomware-gang-encrypted-network-from-a-webcam-to-bypass-edr/
Ransomware gang encrypted network from a webcam to bypass EDR

The Akira ransomware gang was spotted using an unsecured webcam to launch encryption attacks on a victim's network, effectively circumventing Endpoint Detection and Response (EDR), which was blocking the encryptor in Windows.

BleepingComputer
New research has uncovered further links between the #BlackBasta and #Cactus ransomware gangs, with members of both groups utilizing the same social engineering attacks and the #BackConnect proxy malware for post-exploitation access to corporate networks. #ransomwaregroup https://www.bleepingcomputer.com/news/security/microsoft-teams-tactics-malware-connect-black-basta-cactus-ransomware/
Microsoft Teams tactics, malware connect Black Basta, Cactus ransomware

New research has uncovered further links between the Black Basta and Cactus ransomware gangs, with members of both groups utilizing the same social engineering attacks and the BackConnect proxy malware for post-exploitation access to corporate networks.

BleepingComputer
An unknown leaker has released what they claim to be an archive of internal Matrix chat logs belonging to the Black Basta ransomware operation.
#BlackBasta #RansomwareGroup
#Cybersecurity
https://www.bleepingcomputer.com/news/security/black-basta-ransomware-gang-s-internal-chat-logs-leak-online/
Black Basta ransomware gang's internal chat logs leak online

An unknown leaker has released what they claim to be an archive of internal Matrix chat logs belonging to the Black Basta ransomware operation.

BleepingComputer
The United States, Australia, and the United Kingdom have sanctioned Zservers, a Russia-based bulletproof hosting (BPH) services provider, for supplying essential attack infrastructure for the LockBit ransomware gang. #LockBit #ransomwaregroup https://www.bleepingcomputer.com/news/security/us-sanctions-lockbit-ransomwares-bulletproof-hosting-provider/
US sanctions LockBit ransomwareโ€™s bulletproof hosting provider

โ€‹The United States, Australia, and the United Kingdom have sanctioned Zservers, a Russia-based bulletproof hosting (BPH) services provider, for supplying essential attack infrastructure for the LockBit ransomware gang.

BleepingComputer
The U.S. Justice Department announced the names of two Phobos ransomware affiliates arrested yesterday in Thailand, charging them on 11 counts due to their involvement in more than a thousand cyberattacks. #ransomwaregroup https://www.bleepingcomputer.com/news/security/us-indicts-8base-ransomware-operators-for-phobos-encryption-attacks/
US indicts 8Base ransomware operators for Phobos encryption attacks

The U.S. Justice Department announced the names of two Phobos ransomware affiliates arrested yesterday in Thailand, charging them on 11 counts due to their involvement in more than a thousand cyberattacks.

BleepingComputer
A global law enforcement operation targeting the Phobos ransomware gang has led to the arrest of four suspected hackers in Phuket, Thailand, and the seizure of 8Baseโ€™s dark web sites. The suspects are accused of conducting cyberattacks on over 1,000 victims worldwide. #ransomwaregroup https://www.bleepingcomputer.com/news/legal/police-arrests-4-phobos-ransomware-suspects-seizes-8base-sites/
Police arrests 4 Phobos ransomware suspects, seizes 8Base sites

A global law enforcement operation targeting the Phobos ransomware gang has led to the arrest of four suspected hackers in Phuket, Thailand, and the seizure of 8Base's dark web sites. The suspects are accused of conducting cyberattacks on over 1,000 victims worldwide.

BleepingComputer