DragonForce ransomware abuses SimpleHelp in MSP supply chain attack

The DragonForce ransomware group has gained notoriety for targeting UK retailers like Marks & Spencer and Co-op, stealing customer data and deploying encryptors. The attack on a managed service provider exploited vulnerabilities in the SimpleHelp RMM platform, highlighting the risks faced by MSPs and their customers. #DragonForce #SimpleHelp #REvil #Kaseya #MSPattacks #retailcyberattack

Read More
DragonForce Ransomware Hackers Exploiting SimpleHelp Vulnerabilities

A managed service provider (MSP) and its clients were compromised through the exploitation of vulnerabilities in SimpleHelp remote management software, leading to a DragonForce ransomware attack. The threat actors used chained bugs to gain full system access, exfiltrate data, and deploy ransomware, affecting multiple organizations. #DragonForce #SimpleHelpVulnerabilities…

Read More
Emulating the Blazing DragonForce Ransomware

DragonForce is a ransomware strain that evolved from a pro-Palestine hacktivist group into a financially motivated Ransomware-as-a-Service (RaaS) operation using custom payloads based on Conti V3. It utilizes a double extortion approach, advanced post-exploitation tools, and Bring Your Own Vulnerable Driver (BYOVD) techniques, with AttackIQ providing detailed emulations to help organizations…

Read More
LockBit Leak Reveals Details About Ransom Payments, Vulnerabilities and RaaS Operations

A recent leak of the LockBit ransomware group’s internal database has exposed detailed information about their operations, affiliates, targets, and payment methods. This breach could significantly impact the group’s future activities and law enforcement efforts. Affected: LockBit ransomware group, victim organizations, cybersecurity and law enforcement agencies…

Read More
Scattered Spider Hits UK Retail

Scattered Spider is a financially motivated threat actor specializing in cloud-focused social engineering and access brokering, likely enabling DragonForce ransomware attacks against UK retail organizations. Their evolving collaboration model with ransomware groups illustrates increasing compartmentalization within cybercrime ecosystems, impacting #UKRetail #DragonForce #ScatteredSpider.

Read More
Andrei Tarasov: Inside the Journey of a Russian Hacker on the FBI’s Most Wanted List

Andrei Tarasov, a Russian-born cybercriminal, has a complex history involving exploit kits, malware development, and international law enforcement actions. Despite recent arrests and extradition issues, he remains active in the cybercrime community, operating under aliases and reflecting on his time in detention.Affected: Cybercriminal networks, law enforcement agencies, victims of malware and…

Read More
Suspected DoppelPaymer Ransomware Group Member Arrested

Moldovan authorities, with support from Dutch law enforcement, arrested a suspect linked to DoppelPaymer ransomware attacks targeting organizations in the Netherlands, including a major scientific institution. The operation involved searches, seizure of electronic devices, and the suspect remains in custody awaiting extradition. Affected: Dutch Research Council (NWO), organizations in the Netherlands…

Read More