CyberSecurity news

FlagThis - #ransomware-as-a-service

@x.com //
Reports indicate a surge in sophisticated ransomware attacks throughout 2025, with groups like Qilin leading the charge. Qilin has solidified its position as a top ransomware group, demonstrating significant success in recruiting affiliates and providing advanced tools. Cybercriminal forums play a crucial role in simplifying ransomware crime development, allowing new threat actors to launch attacks without extensive technical skills. This rise in activity makes it easier than ever for malicious actors to execute ransomware operations through Ransomware-as-a-Service (RaaS) models, employing readily available tools and malware.

Qilin ransomware group topped June 2025 with a staggering 86 victims, surpassing rivals and indicating a shifting threat landscape. One notable victim was newspaper giant Lee Enterprises, where a Qilin attack exposed nearly 40,000 Social Security numbers. This attack not only disrupted publishing operations nationwide but also incurred significant financial damage, with recovery costs reaching $2 million alongside substantial revenue losses. The impact extends beyond financial losses, causing significant operational disruptions and underscoring the widespread threat to businesses of all sizes.

The consequences of these attacks are far-reaching. Major organizations have been hit by ransomware and data breaches, emphasizing the urgent need for robust cyber resilience and incident response plans. Cyber incidents have led to unauthorized access to internal systems, disruptions in operations, and the compromise of millions of customer and employee accounts. Experts emphasize that preparedness against cybercrime and building cyber resilience is a critical priority, urging businesses to invest in comprehensive Cyber Incident Response Plans and regular cyber tabletop exercises to simulate real-world attack scenarios and stress-test response capabilities.

Share: bluesky twitterx--v2 facebook--v1 threads


References :
Classification:
Rescana@Rescana //
A new and dangerous version of the Anubis ransomware has emerged, now equipped with a data wiping module that significantly increases the stakes for victims. The Anubis Ransomware-as-a-Service (RaaS) has been active since December 2024 and now presents a dual-threat by not only encrypting files, but also permanently deleting them. This means that even if victims pay the ransom, data recovery is impossible because of the '/WIPEMODE' parameter which renders file contents to 0 KB, despite preserving the file names and extensions.

The ransomware is being deployed via phishing emails with malicious attachments or deceptive links which bypass endpoint defenses. Once inside a network, it uses lateral movement techniques, such as privilege escalation, to gain deeper access. The primary targets are organizations within the healthcare, hospitality, and construction sectors, impacting entities across Australia, Canada, Peru, and the United States. This dual-threat capability represents an evolution from traditional ransomware, exerting even more pressure on victims to comply with ransom demands.

Cybersecurity experts are urging organizations to implement robust backup and recovery procedures to mitigate the impact of Anubis attacks. Trend Micro researchers and others describe Anubis as a "rare dual-threat" that encrypts and permanently erases files. Anubis also operates a flexible affiliate program with negotiable revenue splits, offering additional monetization paths like data extortion and access sales. The discovery of this destructive behavior highlights the increasing sophistication of ransomware operations and the importance of proactive cybersecurity measures.

Share: bluesky twitterx--v2 facebook--v1 threads


References :
  • The Hacker News: Anubis Ransomware Encrypts and Wipes Files, Making Recovery Impossible Even After Payment
  • Davey Winder: This New Ransomware Can Irrevocably Destroy Your Files — Backup Now
  • Rescana: Anubis Ransomware Incident Analysis: Dual-Threat Cyber Attack with Irreversible File Wiping in Healthcare, Hospitality, and Construction Systems
  • securityaffairs.com: New Anubis RaaS includes a wiper module
  • DataBreaches.Net: Anubis: A Closer Look at an Emerging Ransomware with Built-in Wiper
  • Security Risk Advisors: 🚩 Anubis Ransomware Emerges with Dual Encryption and File Destruction Capabilities
  • www.trendmicro.com: Trend Micro article Anubis Ransomware Emerges with Dual Encryption and File Destruction Capabilities
Classification:
  • HashTags: #Ransomware #DataWiper #Anubis
  • Company: Trend Micro
  • Target: Healthcare, Hospitality, and Construction Systems
  • Attacker: Anubis
  • Product: Ransomware-as-a-Service
  • Feature: data wiper
  • Malware: Anubis
  • Type: Ransomware
  • Severity: Disaster