1. Introduction
This report provides a detailed overview of significant cybersecurity incidents reported within the last 24 hours. The analysis presented herein is based exclusively on the structured incident data feed received on April 10, 2025. The purpose of this document is to offer timely situational awareness regarding the evolving cyber threat landscape, specifically tailored for security professionals, IT management, risk analysts, and compliance officers.
The scope of this report is strictly limited to the incidents and associated data contained within the aforementioned data feed. No external data sources or supplementary research have been incorporated unless explicitly noted (such as in the Threat Actor Profiles section). The findings and analyses presented reflect the information available within the reporting period, maintaining a formal and objective tone throughout.
2. Executive Summary / Daily Incident Overview Table
The following table provides a high-level summary of the cybersecurity incidents reported in the last 24 hours, as detailed in the received data feed. This overview facilitates a rapid assessment of the current threat environment and helps prioritize attention towards the most relevant events.
Incident Title | Target Organization/Entity | Sector/Industry | Incident Type | Reported Date/Time | Key Impact Summary |
Electronic Army Special Forces targets the website of Ho Chi Minh City | ho chi minh city | Government & Public Sector | DDoS Attack | 2025-04-10T11:30:19Z | Website downtime confirmed. |
Algas Engineering Pte falls victim to Qilin Ransomware | algas engineering pte | Mechanical or Industrial Engineering | Ransomware | 2025-04-10T11:14:18Z | Claimed theft of financial statements, passports, tax invoices, project details, contact info. |
CASH NETWORK C2 targets the website of CapCut | capcut | Writing & Editing | Defacement | 2025-04-10T11:14:07Z | Website defacement claimed, mirror provided. |
Alleged data leak of DLH.net | dlh.net enterprises ug (ltd.) | Online Publishing | Data Breach | 2025-04-10T11:08:08Z | Alleged leak of 4.2M user records including IDs, emails, names, passwords, logs. |
NoName targets the website of City of Kotka | city of kotka | Government & Public Sector | DDoS Attack | 2025-04-10T11:03:48Z | Website downtime confirmed. |
NoName targets the website of City of Porvoo | city of porvoo | Government & Public Sector | DDoS Attack | 2025-04-10T10:59:41Z | Website downtime confirmed. |
NoName targets the website of Väestöliitto | väestöliitto | Non-profit & Social Organizations | DDoS Attack | 2025-04-10T10:54:24Z | Website downtime confirmed. |
Alleged data sale of Origin PC | origin pc | Computer Hardware | Data Breach | 2025-04-10T10:42:59Z | Alleged sale of customer data including order details, shipping info, contact info, employee data. |
Alleged sale database of The Bangalore Water Supply and Sewerage Board(BWSSB) | bangalore water supply and sewerage board | Energy & Utilities | Data Breach | 2025-04-10T10:13:56Z | Alleged sale of root access and database containing customer/contact details, vehicle info, account details. |
Alleged leak of Facebook | Social Media & Online Social Networking | Data Leak | 2025-04-10T09:58:45Z | Claimed leak of 210 million rows of data including emails, phone numbers, personal info. | |
Nippon Ceramic Co. falls victim to NightSpire Ransomware | nippon ceramic co. | Manufacturing & Industrial Products | Ransomware | 2025-04-10T09:55:32Z | Claimed theft of 45 GB of data, threatened publication. |
Alleged database sale of Mitsubishi Motors Vietnam | mitsubishi motors corporation | Automotive | Data Breach | 2025-04-10T09:27:23Z | Alleged sale of customer database including names, contact info, vehicle details, maintenance history. |
Alleged data breach of Circle | circle | E-Learning | Data Breach | 2025-04-10T09:04:10Z | Alleged leak of database containing user IDs, names, emails, IPs, educational background, account statuses. |
NoName targets the website of City of Helsinki | city of helsinki | Government & Public Sector | DDoS Attack | 2025-04-10T08:42:10Z | Website downtime confirmed. |
NoName targets the website of Helsinki Region Transport | helsinki region transport | Transportation & Logistics | DDoS Attack | 2025-04-10T08:38:03Z | Website downtime confirmed. |
Alleged data breach of Russian Standard Bank | russian standard bank | Financial Services | Data Breach | 2025-04-10T08:29:31Z | Alleged leak of database with customer DOB, names, account balance, contact info, address. |
3P Corporation Ltd falls victim to Space Bears Ransomware | 3p corporation ltd | Financial Services | Ransomware | 2025-04-10T08:26:38Z | Claimed theft of database including financial documents, employee/client personal info, threatened publication. |
Alleged data breach of Abdul Rahman Fakieh Schools | abdul rahman fakieh schools | Education | Data Breach | 2025-04-10T08:15:33Z | Alleged leak of database including staff/admin IDs, usernames, emails, roles, names, passwords. |
Red wolf ceyber targets the website of Central Bank of the Republic of Azerbaijan | central bank of the republic of azerbaijan | Banking & Mortgage | DDoS Attack | 2025-04-10T06:27:46Z | Website downtime confirmed. |
Alleged sale of loader.c | Malware | 2025-04-10T06:06:09Z | Alleged sale of FUD Windows resident loader with Tor-hosted panel. | ||
Alleged Sale of Gmail Prompt Automation Tool Source Code | Malware | 2025-04-10T05:43:25Z | Alleged sale of Gmail prompting tool source code with Telegram bot notification. | ||
Alleged leak of ISRAEL DATABASES | Data Leak | 2025-04-10T05:14:11Z | Claimed leak of over 2GB of Israeli databases. | ||
Electronic Army Special Forces targets the website of Bến Tre Power Company | bến tre power company | Electrical & Electronic Manufacturing | DDoS Attack | 2025-04-10T04:47:41Z | Website downtime confirmed. |
Alleged data breach of Bolivarian National Police | bolivarian national police | Government Administration | Data Breach | 2025-04-10T04:35:34Z | Alleged leak of national police database (99k+ officers) including IDs, names, contact info, rank, address; attacker claims ongoing system access. |
Electronic Army Special Forces targets the website of VNPT | vnpt | Network & Telecommunications | DDoS Attack | 2025-04-10T04:20:21Z | Website downtime confirmed. |
Alleged Sale of Data from Kirkendall Dwyer LLP | kirkendall dwyer llp | Law Practice & Law Firms | Data Breach | 2025-04-10T03:51:57Z | Alleged sale of data on 700k+ customers and 900k leads including names, contact details, SSNs, legal/medical metadata. |
Alleged Sale of Data from Wolters Kluwer | wolters kluwer | Information Services | Data Breach | 2025-04-10T03:40:15Z | Alleged sale of database with 2M+ user records including names, contact info, job titles, addresses, account metadata. |
Al Ahad targets the website of ZIV Medical Center | ziv medical center | Hospital & Health Care | DDoS Attack | 2025-04-10T03:00:59Z | Website downtime confirmed. |
Al Ahad targets the website of Laniado Hospital | laniado hospital | Medical Practice | DDoS Attack | 2025-04-10T02:50:37Z | Website downtime confirmed. |
Al Ahad targets the website of meir.org.il | meir.org.il | DDoS Attack | 2025-04-10T02:48:20Z | Website downtime confirmed. | |
Al Ahad targets the website of Barzilai Medical Center | barzilai medical center | Hospital & Health Care | DDoS Attack | 2025-04-10T02:30:16Z | Website downtime confirmed. |
Al Ahad targets the website of Assuta Medical Centers | assuta medical centers | Hospital & Health Care | DDoS Attack | 2025-04-10T02:30:13Z | Website downtime confirmed. |
Al Ahad targets the website of Shamir Medical Center (Assaf Harofeh) | shamir medical center (assaf harofeh) | Medical Practice | DDoS Attack | 2025-04-10T02:13:08Z | Website downtime confirmed. |
Al Ahad targets the website of Herzliya Medical Center | herzliya medical center | Medical Practice | DDoS Attack | 2025-04-10T02:04:44Z | Website downtime confirmed. |
Al Ahad targets the website of Assuta Medical Centers | assuta medical centers | Medical Practice | DDoS Attack | 2025-04-10T01:52:14Z | Website downtime confirmed. |
Alleged Domain admin access sale to an unidentified organization in Italy | Initial Access | 2025-04-10T00:53:55Z | Alleged sale of Domain Admin access, AnyDesk access, credentials for Italian paper company ($10M revenue). | ||
Miller & Caggiano falls victim to DragonForce Ransomware | miller & caggiano | Law Practice & Law Firms | Ransomware | 2025-04-10T00:49:53Z | Claimed theft of 102.63 GB of data, threatened publication. |
Finetech falls victim to INC RANSOM Ransomware | finetech | Manufacturing | Ransomware | 2025-04-10T00:43:10Z | Claimed data theft, sample screenshots provided on leak site. |
Alleged data sale of BuyAntiVirusKey.com | buyantiviruskey.com | E-commerce & Online Stores | Data Breach | 2025-04-10T00:42:56Z | Alleged sale of database (360k+ records) and 500k+ license keys including emails, hashed passwords, customer names. |
Service Trade S.p.A. falls victim to DragonForce Ransomware | service trade s.p.a. | Electrical & Electronic Manufacturing | Ransomware | 2025-04-10T00:41:15Z | Claimed theft of 89.87 GB of data, threatened publication. |
Alleged data breach of CITROSOL | citrosol | Chemical Manufacturing | Data Breach | 2025-04-10T00:37:11Z | Alleged leak of users.json (768 records) including alarms, contacts, lab records, admin account details. |
Alleged data breach of MGPTT (Algeria’s Post & Telecom) + Ministry of Labor ALGERIA | ministry of post and telecommunications | Government Administration | Data Breach | 2025-04-10T00:36:04Z | Alleged leak of 13GB+ internal data including personal data, confidential documents, databases. |
Chesterfield Township falls victim to INC RANSOM ransomware | chesterfield township | Government Administration | Ransomware | 2025-04-10T00:23:51Z | Claimed data theft, sample screenshots provided on leak site. |
Silocaf USA LLC falls victim to INC RANSOM Ransomware | silocaf usa llc | Food & Beverages | Ransomware | 2025-04-10T00:14:54Z | Claimed theft of 178 GB of data. |
3. Detailed Incident Analysis
This section provides in-depth analysis for each cybersecurity incident identified in the reporting period’s data feed.
Incident Title: Electronic Army Special Forces targets the website of Ho Chi Minh City
- Category: DDoS Attack
- Date: 2025-04-10T11:30:19Z
- Victim Organization: ho chi minh city
- Victim Industry: Government & Public Sector
- Victim Country: Vietnam
- Victim Site: tphcm.gov.vn
- Network: telegram
- Threat Actors: Electronic Army Special Forces
- Description: Proof of downtime: https://check-host.net/check-report/24d590ebkeb0
- Published URL: https://t.me/Anonymous_VNLBN/261
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/b7b079f0-1f28-497c-b542-3e2dd88b4e09.png
Incident Title: Algas Engineering Pte falls victim to Qilin Ransomware
- Category: Ransomware
- Date: 2025-04-10T11:14:18Z
- Victim Organization: algas engineering pte
- Victim Industry: Mechanical or Industrial Engineering
- Victim Country: Singapore
- Victim Site: algas.com.sg
- Network: tor
- Threat Actors: Qilin
- Description: The group claims to have obtained data including financial statements, passports, tax invoices, project details, addresses, email addresses, and phone numbers
- Published URL: http://kbsqoivihgdmwczmxkbovk7ss2dcynitwhhfu5yw725dboqo5kthfaad.onion/site/view?uuid=9a33f43e-27a4-3af8-a04c-216d00726da2
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/f7747cd1-1870-4132-86b5-1b91fd2091a9.png
Incident Title: CASH NETWORK C2 targets the website of CapCut
- Category: Defacement
- Date: 2025-04-10T11:14:07Z
- Victim Organization: capcut
- Victim Industry: Writing & Editing
- Victim Country: China
- Victim Site: capcut.com
- Network: telegram
- Threat Actors: CASH NETWORK C2
- Description: The group claims to have defaced the website of CapCut. Mirror : https://check-host.net/check-report/24d5e22bkf98
- Published URL: https://t.me/cashnetworkc2/93
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/757e6467-2237-4aca-8138-ebcfe6d84616.png
Incident Title: Alleged data leak of DLH.net
- Category: Data Breach
- Date: 2025-04-10T11:08:08Z
- Victim Organization: dlh.net enterprises ug (ltd.)
- Victim Industry: Online Publishing
- Victim Country: Germany
- Victim Site: dlh.net
- Network: openweb
- Threat Actors: Seacoat
- Description: A threat actor claims to have leaked 4.2M users data from DLH.net. The compromised data includes details such as IDs, email, names, usernames, passwords, join dates, logs and membership groups etc.
- Published URL: https://breachforums.st/Thread-DATABASE-DLH-net-2025-4-2m
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/b91bddf9-4f7f-494f-878e-c28f8b6b5306.png
Incident Title: NoName targets the website of City of Kotka
- Category: DDoS Attack
- Date: 2025-04-10T11:03:48Z
- Victim Organization: city of kotka
- Victim Industry: Government & Public Sector
- Victim Country: Finland
- Victim Site: kotka.fi
- Network: telegram
- Threat Actors: NoName057(16)
- Description: Proof of downtime: https://check-host.net/check-report/24d5a977kc22
- Published URL: https://t.me/nnm05716rus/489
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/fdd09dff-76ec-4331-be82-6e7844ce02af.png
Incident Title: NoName targets the website of City of Porvoo
- Category: DDoS Attack
- Date: 2025-04-10T10:59:41Z
- Victim Organization: city of porvoo
- Victim Industry: Government & Public Sector
- Victim Country: Finland
- Victim Site: porvoo.fi
- Network: telegram
- Threat Actors: NoName057(16)
- Description: Proof of downtime: https://check-host.net/check-report/24d5a792k1ae
- Published URL: https://t.me/nnm05716rus/489
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/b7c498d4-cdc5-4369-8ed2-c2c71fe1aeef.png
Incident Title: NoName targets the website of Väestöliitto
- Category: DDoS Attack
- Date: 2025-04-10T10:54:24Z
- Victim Organization: väestöliitto
- Victim Industry: Non-profit & Social Organizations
- Victim Country: Finland
- Victim Site: vaestoliitto.fi
- Network: telegram
- Threat Actors: NoName057(16)
- Description: Proof of downtime: https://check-host.net/check-report/24d5a65fkf99
- Published URL: https://t.me/nnm05716rus/489
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/31247f2f-b219-4eef-b108-de334c080502.png
Incident Title: Alleged data sale of Origin PC
- Category: Data Breach
- Date: 2025-04-10T10:42:59Z
- Victim Organization: origin pc
- Victim Industry: Computer Hardware
- Victim Country: USA
- Victim Site: originpc.com
- Network: openweb
- Threat Actors: watchdogs
- Description: The threat actor claims to be selling data from Origin PC. The compromised data includes information such as Order ID, Tracking Number, Email, Shipping Name, Shipping Address, Phone Number, Full Names and Employee Data etc. File type: TXT and XLSX
- Published URL: https://breachforums.st/Thread-SELLING-OriginPC-2025-401-222-Users
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/f12b35b7-2f88-472a-8ade-f162e67e20c6.png
Incident Title: Alleged sale database of The Bangalore Water Supply and Sewerage Board(BWSSB)
- Category: Data Breach
- Date: 2025-04-10T10:13:56Z
- Victim Organization: bangalore water supply and sewerage board
- Victim Industry: Energy & Utilities
- Victim Country: India
- Victim Site: owc.bwssb.gov.in
- Network: openweb
- Threat Actors: pirates_gold
- Description: A threat actor claims to be selling the root acces and database of Bangalore Water Supply and Sewerage Board. The compromised data contains information such as name, phone number, address, email, vehicle information, contact information, status, files, location, account details, next contact date, and approval or sanctioning details.
- Published URL: https://breachforums.st/Thread-SELLING-owc-bwssb-gov-in-The-Bangalore-Water-Supply-and-Sewerage-Board-BWSSB
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/fa677b60-0937-42aa-9752-86cdc0ca2e7a.png
Incident Title: Alleged leak of Facebook
- Category: Data Leak
- Date: 2025-04-10T09:58:45Z
- Victim Organization: facebook
- Victim Industry: Social Media & Online Social Networking
- Victim Country: USA
- Victim Site: facebook.com
- Network: openweb
- Threat Actors: Dbhandler
- Description: The group claims to have leaked 210 million rows of data, including email addresses, phone numbers, and other personal information.
- Published URL: https://leakbase.io/threads/facebook-210m-latest-leak-2025.37011/
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/6f1afc88-e682-4a77-bcc5-7ad237c0e547.png
Incident Title: Nippon Ceramic Co. falls victim to NightSpire Ransomware
- Category: Ransomware
- Date: 2025-04-10T09:55:32Z
- Victim Organization: nippon ceramic co.
- Victim Industry: Manufacturing & Industrial Products
- Victim Country: Japan
- Victim Site: nicera.co.jp
- Network: tor
- Threat Actors: NightSpire
- Description: The group claims to have obtained 45 GB of organization’s data and intends to publish it within 7-8 days.
- Published URL: http://nspireyzmvapgiwgtuoznlafqvlyz7ey6himtgn5bdvdcowfyto3yryd.onion/datas.php
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/7a14011f-5e46-40a5-9e1c-f77870544576.png
Incident Title: Alleged database sale of Mitsubishi Motors Vietnam
- Category: Data Breach
- Date: 2025-04-10T09:27:23Z
- Victim Organization: mitsubishi motors corporation
- Victim Industry: Automotive
- Victim Country: Vietnam
- Victim Site: mitsubishi-motors.com.vn
- Network: openweb
- Threat Actors: mr_jack311
- Description: A threat actor claims to have leaked the database from Mitsubishi Motors Corporation in Vietnam. The compromised data includes names, phone numbers, residential addresses, vehicle license plates, VIN numbers, vehicle models, mileage, and maintenance-related contact history and more.
- Published URL: https://breachforums.st/Thread-SELLING-mitsubishi-motors-com-vn-customer-database-breached
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/f5a478dd-f45c-41fb-b28b-e41bf9b157b7.png
Incident Title: Alleged data breach of Circle
- Category: Data Breach
- Date: 2025-04-10T09:04:10Z
- Victim Organization: circle
- Victim Industry: E-Learning
- Victim Country: India
- Victim Site: circle.ind.in
- Network: openweb
- Threat Actors: 0giv
- Description: The threat actor claims to have leaked the database of Circle. The compromised data contains details such as ID, Names, Emails, Profile pictures, IP addresses, Educational background, Institutions and account statuses etc. File format: Zip
- Published URL: http://breachforums.st/Thread-Circle-ind-in-DATABASE-LEAK
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/ce60e3d5-0a0c-42e7-9479-b4bfde80dadb.png
Incident Title: NoName targets the website of City of Helsinki
- Category: DDoS Attack
- Date: 2025-04-10T08:42:10Z
- Victim Organization: city of helsinki
- Victim Industry: Government & Public Sector
- Victim Country: Finland
- Victim Site: hel.fi
- Network: telegram
- Threat Actors: NoName057(16)
- Description: Proof of downtime: https://check-host.net/check-report/24d4ebaek693
- Published URL: https://t.me/nnm05716rus/477
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/dd4dce8c-ffd2-410d-988e-e6b1c80b4f96.png
Incident Title: NoName targets the website of Helsinki Region Transport
- Category: DDoS Attack
- Date: 2025-04-10T08:38:03Z
- Victim Organization: helsinki region transport
- Victim Industry: Transportation & Logistics
- Victim Country: Finland
- Victim Site: hsl.fi
- Network: telegram
- Threat Actors: NoName057(16)
- Description: Proof of downtime: https://check-host.net/check-report/24d4e8afk5d5
- Published URL: https://t.me/nnm05716rus/477
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/413208a1-5174-4a57-a610-c91c06e0aba6.png
Incident Title: Alleged data breach of Russian Standard Bank
- Category: Data Breach
- Date: 2025-04-10T08:29:31Z
- Victim Organization: russian standard bank
- Victim Industry: Financial Services
- Victim Country: Russia
- Victim Site: rsb.ru
- Network: openweb
- Threat Actors: 247
- Description: A threat actor claims to have leaked the database from Russian Standard Bank. The compromised data includes date of birth, full name, account balance, mobile phone number, and registered address of individuals, potentially exposing sensitive financial and personal information.
- Published URL: https://breachforums.st/Thread-DATABASE-rsb-ru-full-csv-info-134k
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/d133e0f6-83f8-4efd-8bb3-629e6f6f9366.png
Incident Title: 3P Corporation Ltd falls victim to Space Bears Ransomware
- Category: Ransomware
- Date: 2025-04-10T08:26:38Z
- Victim Organization: 3p corporation ltd
- Victim Industry: Financial Services
- Victim Country: Australia
- Victim Site: 3pcorp.com.au
- Network: tor
- Threat Actors: Space Bears
- Description: The group claims to have obtained the organization’s database, including financial documents and personal information of employees and clients, and plans to publish it within 7–8 days.
- Published URL: http://5butbkrljkaorg5maepuca25oma7eiwo6a2rlhvkblb4v6mf3ki2ovid.onion/
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/81b3620b-af42-4955-8433-b5db02e4afef.png
Incident Title: Alleged data breach of Abdul Rahman Fakieh Schools
- Category: Data Breach
- Date: 2025-04-10T08:15:33Z
- Victim Organization: abdul rahman fakieh schools
- Victim Industry: Education
- Victim Country: Saudi Arabia
- Victim Site: afsch.edu.sa
- Network: openweb
- Threat Actors: 247
- Description: A threat actor claims to have leaked the database from Abdul Rahman Fakieh Schools. The compromised data includes id, username, email, role_id, full_name, user_type, created, updated, password of staff and admin etc.
- Published URL: https://breachforums.st/Thread-DATABASE-afsch-edu-sa-full-sql
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/fa92ab5d-df89-4a14-9219-6ac650123038.png
Incident Title: Red wolf ceyber targets the website of Central Bank of the Republic of Azerbaijan
- Category: DDoS Attack
- Date: 2025-04-10T06:27:46Z
- Victim Organization: central bank of the republic of azerbaijan
- Victim Industry: Banking & Mortgage
- Victim Country: Azerbaijan
- Victim Site: cbar.az
- Network: telegram
- Threat Actors: Red wolf ceyber
- Description: Proof of Downtime: https://check-host.net/check-report/24d46989k818
- Published URL: https://t.me/c/2404982305/691
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/de3672f1-5acf-4021-ab63-a77d6e87bb4b.png
Incident Title: Alleged sale of loader.c
- Category: Malware
- Date: 2025-04-10T06:06:09Z
- Victim Organization:
- Victim Industry:
- Victim Country:
- Victim Site:
- Network: openweb
- Threat Actors: mentalpositive
- Description: The threat actor claims to be selling loader.c, a fully undetectable (FUD) Windows resident loader that generates unique, device-specific builds to evade antivirus detection (0/60+ on VirusTotal). Written in C (~80KB), it supports Windows 7+ and Server OS, delivering payloads via binary/DLL execution or URL redirection, with a Tor-hosted PHP panel for management.
- Published URL: https://xss.is/threads/135945/
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/c5d5c06a-ec31-44d2-9090-fff596fafd2f.png
Incident Title: Alleged Sale of Gmail Prompt Automation Tool Source Code
- Category: Malware
- Date: 2025-04-10T05:43:25Z
- Victim Organization:
- Victim Industry:
- Victim Country:
- Victim Site:
- Network: openweb
- Threat Actors: shadowscript
- Description: Threat actor is advertising the sale of a Gmail prompting tool along with its full source code. The software is designed to send up to three Gmail prompts per email address and notify via a Telegram bot if any prompt is rejected. It processes inputs in the format “Email | phone1 | phone2 | etc” and uses partial digit matching for validation.
- Published URL: https://forum.exploit.in/topic/257132/
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/71acb1fb-413c-42ea-8a2c-8cf8d72f29a9.png
Incident Title: Alleged leak of ISRAEL DATABASES
- Category: Data Leak
- Date: 2025-04-10T05:14:11Z
- Victim Organization:
- Victim Industry:
- Victim Country: Israel
- Victim Site:
- Network: openweb
- Threat Actors: BanyuwangiXploit
- Description: The threat actor claims to have leaked over 2GB of Israeli databases.
- Published URL: https://breachforums.st/Thread-DATABASE-MORE-THAN-2-GB-ISRAEL-LEAKED-DATABASES
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/aa395520-f016-4bd8-a7a7-9c27ff406de8.png
Incident Title: Electronic Army Special Forces targets the website of Bến Tre Power Company
- Category: DDoS Attack
- Date: 2025-04-10T04:47:41Z
- Victim Organization: bến tre power company
- Victim Industry: Electrical & Electronic Manufacturing
- Victim Country: Vietnam
- Victim Site: pcbentre.evnspc.vn
- Network: telegram
- Threat Actors: Electronic Army Special Forces
- Description: Proof of downtime: https://check-host.net/check-report/24d32776k823
- Published URL: https://t.me/Anonymous_VNLBN/254
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/f02986ab-01fa-4c00-a914-fec5e969abb0.png
Incident Title: Alleged data breach of Bolivarian National Police
- Category: Data Breach
- Date: 2025-04-10T04:35:34Z
- Victim Organization: bolivarian national police
- Victim Industry: Government Administration
- Victim Country: Venezuela
- Victim Site: cpnbve.com
- Network: openweb
- Threat Actors: rootkik
- Description: A threat actor has leaked the Bolivarian Police of Venezuela’s national police database, containing records of 99,666 officers. The exposed data includes ID numbers, full names, gender, rank, phone numbers, email addresses, state, unit, service, status, and home addresses.The attacker also claims to have ongoing access to the police system, allowing them to modify, add, or delete officer records, downgrade ranks, and issue disciplinary faults
- Published URL: https://breachforums.st/Thread-DATABASE-POLICIA-BOLIVARIANA-DE-VENEZUELA-PNB-DATABASE
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/2e7db62f-c354-4c2b-be7d-075b083cd295.png
Incident Title: Electronic Army Special Forces targets the website of VNPT
- Category: DDoS Attack
- Date: 2025-04-10T04:20:21Z
- Victim Organization: vnpt
- Victim Industry: Network & Telecommunications
- Victim Country: Vietnam
- Victim Site: bentre.vnptioffice.vn
- Network: telegram
- Threat Actors: Electronic Army Special Forces
- Description: proof of downtime : https://check-host.net/check-report/24d220a7ke19
- Published URL: https://t.me/Anonymous_VNLBN/254
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/f4477b36-6929-4df1-850f-08d0d3ca8ad8.png
Incident Title: Alleged Sale of Data from Kirkendall Dwyer LLP
- Category: Data Breach
- Date: 2025-04-10T03:51:57Z
- Victim Organization: kirkendall dwyer llp
- Victim Industry: Law Practice & Law Firms
- Victim Country: USA
- Victim Site: kirkendalldwyer.com
- Network: openweb
- Threat Actors: betway
- Description: The threat actor claims to have breached Kirkendall Dwyer LLP in April 2025, exfiltrating data on over 700,000 customers and 900,000 leads. The compromised data includes names, contact details, Social Security Numbers (SSNs), addresses, phone numbers, birthdates, legal and medical metadata, internal account notes, and more, indicating a severe data exposure.
- Published URL: https://forum.exploit.in/topic/257131/
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/b4c15c00-1657-4302-8899-6f61ba19cd45.png
Incident Title: Alleged Sale of Data from Wolters Kluwer
- Category: Data Breach
- Date: 2025-04-10T03:40:15Z
- Victim Organization: wolters kluwer
- Victim Industry: Information Services
- Victim Country: Netherlands
- Victim Site: wolterskluwer.com
- Network: openweb
- Threat Actors: betway
- Description: The threat actor claims to be selling a database allegedly stolen from Wolters Kluwer in April 2025, containing over 2 million user records.The leaked dataset includes comprehensive personal and professional details such as full names, contact information, birthdates, job titles, addresses, account metadata, GDPR request logs, and marketing interaction data.
- Published URL: https://forum.exploit.in/topic/257130/
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/42522c3d-69b6-4cd8-ae3d-10c03aa76046.png
Incident Title: Al Ahad targets the website of ZIV Medical Center
- Category: DDoS Attack
- Date: 2025-04-10T03:00:59Z
- Victim Organization: ziv medical center
- Victim Industry: Hospital & Health Care
- Victim Country: Israel
- Victim Site: ziv.health.gov.il
- Network: telegram
- Threat Actors: Al Ahad
- Description: Proof of downtime: https://check-host.net/check-report/24d2c217k416
- Published URL: https://t.me/qayzerowns/25
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/906cb777-7e16-42bf-b6c7-3280829ed341.png
- https://d34iuop8pidsy8.cloudfront.net/36452ce5-59f5-4a08-9057-d83f0d3f3e9a.png
Incident Title: Al Ahad targets the website of Laniado Hospital
- Category: DDoS Attack
- Date: 2025-04-10T02:50:37Z
- Victim Organization: laniado hospital
- Victim Industry: Medical Practice
- Victim Country: Israel
- Victim Site: laniado.org.il
- Network: telegram
- Threat Actors: Al Ahad
- Description: proof of downtime : https://check-host.net/check-report/24d2c428kab
- Published URL: https://t.me/qayzerowns/25
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/e48fe15a-204f-4575-a4d3-0375a5cd1224.png
Incident Title: Al Ahad targets the website of meir.org.il
- Category: DDoS Attack
- Date: 2025-04-10T02:48:20Z
- Victim Organization: meir.org.il
- Victim Industry:
- Victim Country: Israel
- Victim Site: meir.org.il
- Network: telegram
- Threat Actors: Al Ahad
- Description: Proof of downtime: https://check-host.net/check-report/24d2be5ck723
- Published URL: https://t.me/qayzerowns/25
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/fa1d1cff-9dc8-43c7-8582-8aaec36fa220.png
- https://d34iuop8pidsy8.cloudfront.net/c2115284-ec23-4658-ad18-d6c629b921e1.png
Incident Title: Al Ahad targets the website of Barzilai Medical Center
- Category: DDoS Attack
- Date: 2025-04-10T02:30:16Z
- Victim Organization: barzilai medical center
- Victim Industry: Hospital & Health Care
- Victim Country: Israel
- Victim Site: assuta.co.il
- Network: telegram
- Threat Actors: Al Ahad
- Description: Proof of downtime: https://check-host.net/check-report/24d2c0aekfb8
- Published URL: https://t.me/qayzerowns/25
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/a82dbb06-5625-43cc-8a3e-59d1704a4bb6.png
- https://d34iuop8pidsy8.cloudfront.net/b4b2e291-6f00-42cc-84ea-133df2a879f2.png
Incident Title: Al Ahad targets the website of Assuta Medical Centers
- Category: DDoS Attack
- Date: 2025-04-10T02:30:13Z
- Victim Organization: assuta medical centers
- Victim Industry: Hospital & Health Care
- Victim Country: Israel
- Victim Site: assuta.co.il
- Network: telegram
- Threat Actors: Al Ahad
- Description: Proof of downtime: https://check-host.net/check-report/24d2bfd3k59c
- Published URL: https://t.me/qayzerowns/25
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/f967ae4f-a283-4161-bc81-4ea050cc83c1.png
- https://d34iuop8pidsy8.cloudfront.net/c528f073-a6c9-4053-bd98-c0d552e2f42e.png
Incident Title: Al Ahad targets the website of Shamir Medical Center (Assaf Harofeh)
- Category: DDoS Attack
- Date: 2025-04-10T02:13:08Z
- Victim Organization: shamir medical center (assaf harofeh)
- Victim Industry: Medical Practice
- Victim Country: Israel
- Victim Site: assafh.org.il
- Network: telegram
- Threat Actors: Al Ahad
- Description: proof of downtime : https://check-host.net/check-report/24d2bd3ek43e
- Published URL: https://t.me/qayzerowns/25
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/b3e777c2-8fb8-44cc-a80b-421b5b2e8cff.png
Incident Title: Al Ahad targets the website of Herzliya Medical Center
- Category: DDoS Attack
- Date: 2025-04-10T02:04:44Z
- Victim Organization: herzliya medical center
- Victim Industry: Medical Practice
- Victim Country: Israel
- Victim Site: herzliya-medical.co.il
- Network: telegram
- Threat Actors: Al Ahad
- Description: proof of downtime : https://check-host.net/check-report/24d2ad78keca
- Published URL: https://t.me/qayzerowns/25
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/f4b3e122-61ea-470f-a5ae-5e48f900ed81.png
Incident Title: Al Ahad targets the website of Assuta Medical Centers
- Category: DDoS Attack
- Date: 2025-04-10T01:52:14Z
- Victim Organization: assuta medical centers
- Victim Industry: Medical Practice
- Victim Country: Israel
- Victim Site: en.assuta.co.il
- Network: telegram
- Threat Actors: Al Ahad
- Description: proof of downtime : https://check-host.net/check-report/24d2ac58k8e1
- Published URL: https://t.me/qayzerowns/25
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/bbc38fdc-f3c7-44c8-8db1-c9eee916b812.png
Incident Title: Alleged Domain admin access sale to an unidentified organization in Italy
- Category: Initial Access
- Date: 2025-04-10T00:53:55Z
- Victim Organization:
- Victim Industry:
- Victim Country: Italy
- Victim Site:
- Network: openweb
- Threat Actors: redblueapple2
- Description: A threat actor is selling initial access to an Italian paper production company with approximately $10 million in revenue. The access includes a Domain Admin account, AnyDesk access, and additional credentials. The network spans several /24 subnets, with at least 700GB of company data and multiple databases. Trend Micro AV is present but not on all systems.
- Published URL: https://xss.is/threads/135943/
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/1919aa4e-fb7d-48de-b6cf-0f523f97999d.png
Incident Title: Miller & Caggiano falls victim to DragonForce Ransomware
- Category: Ransomware
- Date: 2025-04-10T00:49:53Z
- Victim Organization: miller & caggiano
- Victim Industry: Law Practice & Law Firms
- Victim Country: USA
- Victim Site: millercaggiano.com
- Network: tor
- Threat Actors: DragonForce
- Description: The group claims to have obtained the organization’s 102.63 GB data and intends to publish it within 3-4 days.
- Published URL: http://z3wqggtxft7id3ibr7srivv5gjof5fwg76slewnzwwakjuf3nlhukdid.onion/blog
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/cce2ab62-6bcd-40f1-88ce-57076ba3cefe.png
Incident Title: Finetech falls victim to INC RANSOM Ransomware
- Category: Ransomware
- Date: 2025-04-10T00:43:10Z
- Victim Organization: finetech
- Victim Industry: Manufacturing
- Victim Country: Germany
- Victim Site: finetech.de
- Network: tor
- Threat Actors: INC RANSOM
- Description: The group claims to have obtained the organization’s data. Sample screenshots are provided on their dark web portal
- Published URL: http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/blog/disclosures/67f7038c516e69ca6178b3ed
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/f64ba5f6-00df-4a01-a30d-d507ad6b3413.jpg
Incident Title: Alleged data sale of BuyAntiVirusKey.com
- Category: Data Breach
- Date: 2025-04-10T00:42:56Z
- Victim Organization: buyantiviruskey.com
- Victim Industry: E-commerce & Online Stores
- Victim Country: India
- Victim Site: buyantiviruskey.com
- Network: openweb
- Threat Actors: T0r
- Description: The threat actor claims to be selling a database from BuyAntiVirusKey.com (breached in 2025), containing 360,000+ records and 500,000+ unused/used license keys for antivirus software. The leaked data includes emails, MD5-hashed passwords, full license keys, registration dates, and customer names, enabling software piracy, credential-stuffing attacks, and fraud.
- Published URL: https://breachforums.st/Thread-SELLING-BuyAntiVirusKey-com-Database-360k-Records-500K-License-keys-MD5-PW
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/9b322382-984d-4a5f-baf2-9a72459d0981.png
Incident Title: Service Trade S.p.A. falls victim to DragonForce Ransomware
- Category: Ransomware
- Date: 2025-04-10T00:41:15Z
- Victim Organization: service trade s.p.a.
- Victim Industry: Electrical & Electronic Manufacturing
- Victim Country: Italy
- Victim Site: stitaly.it
- Network: tor
- Threat Actors: DragonForce
- Description: The group claims to have obtained 89.87 GB of organization’s data and intends to publish it within 5-6 days.
- Published URL: http://z3wqggtxft7id3ibr7srivv5gjof5fwg76slewnzwwakjuf3nlhukdid.onion/blog
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/81225480-3240-4602-a5cf-13fd60a2fd3e.png
Incident Title: Alleged data breach of CITROSOL
- Category: Data Breach
- Date: 2025-04-10T00:37:11Z
- Victim Organization: citrosol
- Victim Industry: Chemical Manufacturing
- Victim Country: Spain
- Victim Site: citrosol.com
- Network: openweb
- Threat Actors: M4ster
- Description: The threat actor claims to have leaked data from Citrosol.com, including a users.json file with 768 user records. The exposed data contains alarms, campaigns, contacts, laboratory records, pathogen samples, pollution samples, and treatment details. The leak also includes an admin account with hashed credentials.
- Published URL: https://breachforums.st/Thread-DATABASE-citrosol-com-Leak-Download
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/c8029621-37b3-4e63-a2e7-7eade65d0cc4.png
Incident Title: Alleged data breach of MGPTT (Algeria’s Post & Telecom) + Ministry of Labor ALGERIA
- Category: Data Breach
- Date: 2025-04-10T00:36:04Z
- Victim Organization: ministry of post and telecommunications
- Victim Industry: Government Administration
- Victim Country: Algeria
- Victim Site: mpt.gov.dz
- Network: openweb
- Threat Actors: PhantomAtlas
- Description: The threat actor claims to have breached Algeria’s Post & Telecom (MGPTT) and the Ministry of Labor, leaking over 13GB of internal data. The exposed information includes personal data, confidential documents, and databases. The actor suggests the breach is a retaliatory move following the CNSS breach, warning of larger consequences.
- Published URL: https://breachforums.st/Thread-DOCUMENTS-ALGERIA-MGPTT-Ministry-of-Labor-Breach-%E2%80%93-Full-Data-Dump
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/3168ce2f-ae96-4fd9-9bcf-cedc13dfe675.png
Incident Title: Chesterfield Township falls victim to INC RANSOM ransomware
- Category: Ransomware
- Date: 2025-04-10T00:23:51Z
- Victim Organization: chesterfield township
- Victim Industry: Government Administration
- Victim Country: USA
- Victim Site: chesterfieldtwp.org
- Network: tor
- Threat Actors: INC RANSOM
- Description: The group claims to have obtained the organization’s data. Sample screenshots are provided on their dark web portal.
- Published URL: http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/blog/disclosures/67f7012d516e69ca6178931b
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/4820d8c6-5196-454b-ae9c-df353982b61b.png
Incident Title: Silocaf USA LLC falls victim to INC RANSOM Ransomware
- Category: Ransomware
- Date: 2025-04-10T00:14:54Z
- Victim Organization: silocaf usa llc
- Victim Industry: Food & Beverages
- Victim Country: USA
- Victim Site: silocaf.com
- Network: tor
- Threat Actors: INC RANSOM
- Description: The group claims to have obtained 178 GB of organization’s data.
- Published URL: http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/blog/disclosures/67f6ff88516e69ca61787f0e
- Screenshots:
- https://d34iuop8pidsy8.cloudfront.net/6ec2d85c-8d41-41b6-b5b4-a493b875db7b.png
4. Potential Cross-Incident Insights & Emerging Trends
Analysis of the incidents reported within this 24-hour period may reveal potential patterns or emerging trends in the threat landscape. This section synthesizes observations across the reported events to highlight noteworthy concentrations or recurring elements.
A. Sector Targeting Trends
- Analysis: Based on the targets identified in incidents like those affecting Ho Chi Minh City, City of Kotka, City of Porvoo, City of Helsinki, Russian Standard Bank, 3P Corporation Ltd, Central Bank of Azerbaijan, Bolivarian National Police, Kirkendall Dwyer LLP, Wolters Kluwer, ZIV Medical Center, Laniado Hospital, Barzilai Medical Center, Assuta Medical Centers, Shamir Medical Center, Herzliya Medical Center, Miller & Caggiano, Chesterfield Township, and the Algerian Ministries, there is a discernible pattern related to specific industries. Multiple incidents targeted organizations within the Government & Public Sector, Financial Services/Banking, Healthcare/Medical Practice, and Law Practice sectors.
- Implications: A concentration of attacks against these particular sectors implies that organizations operating within them should exercise increased vigilance. This could stem from various underlying factors: coordinated campaigns focusing on these sectors (e.g., hacktivist DDoS against government/healthcare, ransomware against finance/legal), the exploitation of technology or vulnerabilities common to these industries, or a perception of these sectors as being particularly lucrative (ransomware) or politically significant (hacktivism). Defensive postures should be reviewed, particularly concerning the attack types observed (e.g., enhanced DDoS protection for government/healthcare, robust data security and ransomware defenses for finance/legal).
B. Common Attack Vectors/TTPs
- Analysis: A review of the methodologies employed across incidents reveals the recurrence of specific TTPs. DDoS attacks were frequently used, particularly by groups like Electronic Army Special Forces, NoName057(16), Red wolf ceyber, and Al Ahad, often targeting government, critical infrastructure, and healthcare websites, with proof of downtime provided via check-host links. Ransomware attacks by groups like Qilin, NightSpire, Space Bears, DragonForce, and INC RANSOM involved data exfiltration followed by encryption, with threats to publish data on Tor-based leak sites. Data Breaches/Leaks involved threat actors claiming to sell or leak large databases containing sensitive user information (PII, credentials, financial data, contact details) on forums like BreachForums or other platforms. Initial access vectors mentioned include exploiting vulnerabilities (implied in ransomware/breach cases) and potentially compromised credentials (e.g., alleged Domain Admin access sale).
- Implications: The successful and repeated use of DDoS against public-facing services highlights the ongoing threat of disruption from hacktivist groups. The prevalence of ransomware involving double extortion underscores the critical need for both data encryption prevention and data exfiltration detection/prevention. The frequent appearance of large-scale data breaches/leaks on specific forums indicates active markets for stolen data and compromised access. Organizations should prioritize DDoS mitigation, robust ransomware defenses (including backups and EDR), data loss prevention (DLP) strategies, credential security (MFA, PAM), and monitoring of relevant underground forums.
C. Geographic Focus (If discernible)
- Analysis: The incident data indicates significant activity targeting organizations in Finland (multiple DDoS attacks by NoName057(16)), Vietnam (DDoS by Electronic Army Special Forces, data breach), Israel (multiple DDoS attacks by Al Ahad, data leak), USA (data breaches, ransomware, initial access sale), and Italy (ransomware, initial access sale). Other targeted countries include Singapore, China, Germany, India, Japan, Russia, Australia, Saudi Arabia, Azerbaijan, Venezuela, Netherlands, and Spain.
- Implications: The geographic clustering suggests specific regional focuses. The attacks on Finland align with NoName057(16)’s known targeting of NATO/Ukraine supporters. Attacks on Israel align with Al Ahad’s pro-Palestinian stance. The high volume of incidents involving US entities reflects its status as a major target for various cyber threats. Organizations with operations or interests in these specific regions should be particularly vigilant and tailor their threat monitoring.
D. Notable Threat Actor Activity
- Analysis: Several threat actors were highly active within this 24-hour period. NoName057(16) conducted multiple DDoS attacks against Finnish entities. Al Ahad launched a coordinated DDoS campaign against Israeli medical facilities. Electronic Army Special Forces targeted multiple Vietnamese organizations with DDoS attacks. Ransomware groups INC RANSOM and DragonForce each claimed multiple victims. Actors betway and 247 were each linked to two separate alleged data breach/sale incidents.
- Implications: The concentrated activity from NoName057(16) and Al Ahad indicates ongoing hacktivist campaigns driven by geopolitical motives. The multiple victims claimed by INC RANSOM and DragonForce highlight the continuous operation of these RaaS groups. The repeated appearance of actors like betway and 247 on breach forums suggests they are actively involved in data theft and monetization. Organizations should prioritize defenses against the specific TTPs associated with these active groups, particularly DDoS mitigation, ransomware prevention/detection, and data breach monitoring/response.
5. Threat Actor Profiles
This section provides detailed profiles for each unique threat actor identified across the analyzed incidents, based on external research from publicly available sources.
Profile: Qilin (aka Agenda)
- Overview: Qilin, also known as Agenda, is a Ransomware-as-a-Service (RaaS) operation active since July 2022.1 Initially named Agenda, it rebranded to Qilin by September 2022.1 The group is believed to have Russian origins or Russian-speaking members, evidenced by recruitment posts excluding CIS countries from targeting.1 Qilin gained significant attention following high-profile attacks, including one on the UK healthcare service provider Synnovis in June 2024.3 They employ a double extortion model, stealing data before encryption and threatening to leak it on their Tor-based Dedicated Leak Site (DLS) if the ransom is not paid.1 The group actively recruits affiliates, offering attractive commission structures (e.g., 80-85% of ransom payments).2 Ransom demands in 2023 typically ranged from $50,000 to $800,000.1
- TTPs:
- Initial Access: Qilin affiliates utilize various methods, including spear-phishing emails 1, exploiting vulnerabilities in exposed applications like Citrix and RDP 1, compromising VPN credentials, particularly where MFA is lacking 3, and potentially using Initial Access Brokers (IABs).3
- Execution & Persistence: Payloads are executed using stolen credentials.3 Persistence can be achieved through methods like modifying Group Policy Objects (GPOs) to run scripts at logon 3 or using scheduled tasks to execute payloads.3 A malicious DLL (pwndll.dll) injected into svchost.exe has also been observed for persistence.3
- Defense Evasion: Qilin employs code obfuscation techniques like renaming functions and encrypting strings.1 Payloads terminate security-related processes and services 2 and clear event logs.3 The Qilin.B variant, written in Rust, includes self-deletion capabilities.2 Vulnerable SYS drivers are also used for defense evasion.1
- Credential Access: A notable technique involves using GPOs to deploy PowerShell scripts (e.g., “IPScanner.ps1”) that harvest credentials stored in Chrome browsers across the network.3 Stolen credentials are used for lateral movement.3
- Discovery & Lateral Movement: After initial access, attackers may remain dormant (e.g., 18 days observed) before moving laterally.3 Lateral movement occurs via RDP, SMB, and DCE-RPC, sometimes using default credentials.4 WMI requests and SMB share enumeration are used for discovery.4 Network scanning is also employed.7
- Command & Control (C2): C2 communication has been observed over HTTP and SSL, sometimes using user agents or JA3 fingerprints associated with Cobalt Strike.4 Connections to rare external hosts, including.ru domains and IPs linked to SystemBC, have also been noted.4
- Exfiltration: Data exfiltration occurs before encryption. Methods include using cloud storage solutions like MEGA (e.g., 30 GB via SSL) 4 and unencrypted FTP (e.g., 102 GB and 783 GB observed to the same IP).4 Exfiltrated data volumes can range from hundreds of gigabytes to over a terabyte.4 WebDAV has also been observed.4
- Impact (Encryption): Qilin ransomware exists in Golang and Rust variants, targeting Windows and Linux (including VMware ESXi).1 It uses strong encryption (e.g., AES-256 for files, RSA-2048/RSA-4096 for keys, ChaCha20 also mentioned).1 Encrypted files are renamed with custom extensions, and ransom notes (e.g., README-RECOVER-<extension>.txt) are dropped.3 It supports multiple encryption modes and customization.1
- Targeting: Qilin targets various industries globally, including Manufacturing, Legal/Professional Services, Financial Services, Healthcare, Education, Construction, Technology, and Governments.1 Healthcare represented over 7% of DLS victims as of June 2024.1 Geographic targets include the US, UK, Canada, Australia, and others.1 Attacks appear opportunistic.1 Notable incidents include the Synnovis attack impacting London hospitals 1 and attacks on Lee Enterprises and the Houston Symphony.9
- Relationships: Microsoft observed the North Korean group Moonstone Sleet deploying Qilin ransomware, a rare instance of this state actor using RaaS malware.8 Potential links to Scattered Spider have also been suggested.2
- Sources: 1
Profile: NoName057(16)
- Overview: NoName057(16) is a pro-Russian hacktivist collective active since March 2022 10, shortly after Russia’s invasion of Ukraine.12 Their actions are ideologically and politically driven, focusing on supporting Russia and countering perceived anti-Russian sentiment, particularly from NATO countries supporting Ukraine.10 They operate primarily through Distributed Denial of Service (DDoS) attacks.10 The group uses Telegram extensively to announce targets, claim responsibility, justify attacks based on geopolitical events, and recruit participants.10 They have conducted over 1,500 DDoS attacks since March 2022.16
- TTPs:
- Primary Method (DDoS): NoName057(16) specializes in Layer 7 (HTTP/HTTPS) DDoS attacks designed to overwhelm web servers and consume resources.12 They conduct pre-attack reconnaissance to identify high-impact backend pages (like search forms) to target, crafting URLs that mimic legitimate traffic to bypass defenses.12 Attacks often involve flooding targets with concurrent junk HTTPS requests.16 While most attacks are short bursts (around 10 minutes), prolonged attacks lasting a day have been observed.16 Attack volumes are typically in the hundreds of thousands of requests per second (RPS) but are effective due to precise targeting.12
- Tools & Infrastructure: The group developed and utilizes a custom DDoS tool called “DDoSia,” initially written in Python and later Golang.10 They leverage crowdsourcing through “Project DDoSia,” gamifying participation by offering cryptocurrency payments to volunteers who run the tool and generate attack traffic.13 The DDoSia botnet grew significantly, utilizing free or low-cost public cloud services and CDNs (often associated with nuisance activities) as launchpads.16 They have also been observed using the Bobik botnet.14
- Operational Characteristics: Attacks often occur in waves, escalating during periods of heightened geopolitical tension or specific events, such as official visits (e.g., Zelensky’s visit to Italy 14) or statements perceived as anti-Russian.15 They strategically time attacks during holidays or weekends when organizations may have reduced staff.14
- Targeting: Targets are primarily high-profile organizations within NATO member states and other countries supporting Ukraine.10 Key sectors include government entities, financial institutions (banks), transport hubs (airports, ports), critical infrastructure, and media outlets.10 Countries frequently targeted include Italy 14, Poland, Spain, Czech Republic 16, Lithuania 10, Latvia 10, Denmark 11, Canada 11, and the US.11 They have also targeted India during specific operations like #OpIndia.11
- Relationships: NoName057(16) collaborates with other pro-Russian hacktivist groups like Killnet and XakNet.10 They are also associated with the “Holy League” hacktivist alliance.18
- Sources: 10
Profile: INC RANSOM (aka GOLD IONIC, Water Anito)
- Overview: INC Ransom (also tracked as GOLD IONIC or Water Anito) is a ransomware and data extortion group active since at least July 2023.20 They employ a double extortion model, threatening to leak stolen data on their Tor-based blog if ransom demands aren’t met.20 They operate two leak sites: one private for victim communication and one public for data leaks.20 INC positions its extortion as a service to “save the victim’s reputation”.20
- TTPs:
- Initial Access: INC gains initial access through various methods, including spear-phishing emails 20, exploiting public-facing application vulnerabilities like CVE-2023-3519 in Citrix NetScaler (Citrix ADC/Gateway) 20, and potentially exploiting other vulnerabilities like CVE-2023-48788 (SQL injection).25 They also use valid credentials purchased from Initial Access Brokers.20
- Execution & Persistence: Payloads can be executed via compromised accounts. Persistence is maintained using valid accounts and potentially disabling security features like Windows Defender via tools like SystemSettingsAdminFlows.exe.22
- Defense Evasion: INC uses tools like HackTool.ProcTerminator and ProcessHacker.20 They have been observed specifically terminating Trend Micro-related processes.20 The ransomware attempts to delete Volume Shadow Copies (VSS) to inhibit recovery.21 They utilize legitimate tools (LOLBINs and COTS software) like net.exe, wevtutil, PowerShell, AnyDesk, netscan.exe, and esentutl.exe to blend in with normal network activity.21 Booting into safe mode has also been observed.20
- Credential Access: The group compromises legitimate accounts, including service accounts (e.g., for SQL backups), potentially via exploited firewalls.24 They use tools like Impacket’s secretsdump.py to gather credentials and employ pass-the-hash techniques for lateral movement.24
- Discovery & Lateral Movement: After access, they perform network reconnaissance using tools like netscan.exe, Advanced IP Scanner, and standard commands (e.g., dir).21 Lateral movement is achieved using compromised credentials, RDP, and pass-the-hash.23 They may install file encryption executables across multiple endpoints via rapid copy commands.22
- Collection & Exfiltration: Data is staged on compromised hosts.22 Legitimate tools like 7-Zip or WinRAR are used for archiving.22 Exfiltration occurs using tools like Rclone, Tor, and cloud services like MEGAsync.21
- Impact (Encryption): INC ransomware uses the AES algorithm.20 It employs partial encryption (fast and medium modes) and multi-threading to speed up the process.20 It encrypts local drives (including hidden/recovery volumes, potentially making systems unbootable) and network shares.21 Ransom notes (.txt and.html) are dropped in folders and sent to network printers.20 Encrypted files typically have a .inc extension.20 A Linux variant exists.20 The group also performs internal defacement by changing desktop wallpapers.20
- Targeting: INC targets a wide range of industries globally with little discrimination, including healthcare, education, government, technology/IT, manufacturing, professional services, aerospace, automotive, energy, pharmaceuticals, telecommunications, and more.20 Targeted countries span North America, Europe, Asia, and South America, with the US being the most frequent target (approx. 58%).22 A notable victim was Yamaha Motor’s Philippines subsidiary.20
- Relationships: Trend Micro suggests Lynx Ransomware may be a successor to INC Ransomware.20
- Sources: 20
Profile: DragonForce
- Overview: DragonForce ransomware emerged around November/December 2023.28 While its exact origins are unverified, the name links it to the Malaysian hacktivist group DragonForceMalaysia, though this connection is unproven and could be misdirection.30 The group operates a RaaS model, recruiting affiliates via the RAMP underground forum and offering high commission rates (up to 80%).28 They employ double extortion tactics, encrypting data and threatening to leak stolen information on their “DragonLeaks” DLS if demands aren’t met.28 Their DLS features advanced CAPTCHA mechanisms to hinder tracking.28 DragonForce exhibits a high degree of operational professionalism, running like a business.30
- TTPs:
- Initial Access: Known methods include phishing attacks and exploiting vulnerabilities in RDP and VPN services.28 They are known to use specific CVEs like CVE-2021-44228, CVE-2023-46805, CVE-2024-21412, CVE-2024-21887, and CVE-2024-21893.29
- Encryption & Tools: DragonForce ransomware reportedly utilizes the leaked builder code from the LockBit 3.0 ransomware, allowing for customized variant creation.30 While the original DragonForce strain was written in Visual C++, related strains like BlackLock use Go.33 They provide affiliates with a flexible ransomware builder and support services like NTLM/Kerberos hash decryption and ‘call services’ for victim intimidation.28
- Exfiltration: Significant data exfiltration occurs before encryption as part of their double extortion strategy. Volumes can be substantial, with claims of over 6TB stolen in one KSA incident 28 and 600GB from the Ohio Lottery.30 Data can be uploaded to DragonForce servers via WebDAV or an affiliate’s server.29
- Communication & Extortion: Victims are assigned an ID and a dedicated TOR-based URL for communication, often using TOX IM.28 The group has been known to release audio recordings of ransom negotiations and even make phone calls to pressure victims.28 Deadlines are set, sometimes strategically timed (e.g., before Ramadan 29).
- Targeting: DragonForce targets organizations globally, including prominent attacks in Saudi Arabia (KSA) 28, the United States (Ohio Lottery 30), Australia (Yakult Australia 30), New Zealand (Elite Fitness 30), Ireland (Malone & Co 30), and Singapore (Coca-Cola 31). They have also hit government entities, such as Palau (though LockBit notes were also present).32 Targeted industries include real estate, construction, government/lottery, food & beverage, fitness, and accounting.28 The targeting of the Middle East, particularly KSA, may be driven by factors like large attack surfaces in major projects, valuable data, perceived cybersecurity gaps, and geopolitical tensions.28
- Relationships: DragonForce utilizes the leaked LockBit 3.0 builder.30 They have also been linked to the defacement of the BlackLock ransomware DLS, potentially indicating cooperation or a takeover.33
- Sources: 28
Profile: NightSpire
- Overview: NightSpire is a relatively new extortion group, active since early March 2025.6 Individuals associated with the group (‘xdragon128’, ‘cuteliyuan’) appear inexperienced and potentially new to extortion, exhibiting low operational security.6 The group initially focused on data extortion but has evolved to include data encryption, adopting a double extortion model.6 Whether they operate a RaaS model is unclear, though recent forum activity suggests recruitment efforts.6
- TTPs:
- Initial Access: Known initial access involves exploiting vulnerable external services like firewalls and VPNs. Specifically, exploitation of CVE-2024-55591 (a FortiOS vulnerability allowing unauthorized admin access) has been observed.6
- Defense Evasion: NightSpire uses legitimate tools (“living off the land binaries” – LOLBins) like network scanners and FTP clients to evade detection.6
- Data Exfiltration: Legitimate file transfer tools such as WinSCP and MEGACmd are used for data exfiltration.6
- Impact (Encryption & Extortion): After exfiltrating data, the group now also encrypts victim systems.6 They employ aggressive extortion tactics, posting victim data quickly on their leak site and offering it for sale. Ransom deadlines can be very short (e.g., two days).6 They use pressure tactics like publishing negotiation excerpts and emailing employees, maintaining a ‘name and shame’ page.6
- Targeting: NightSpire appears to be financially motivated and targets opportunistically across sectors.6 While the manufacturing sector has seen the most attacks (36% of ~11 victims as of March 2025), the majority of victims (73%) are small to medium-sized businesses (SMBs) with fewer than 1,000 employees.6
- Relationships: The affiliated usernames ‘xdragon128’ and ‘cuteliyuan’ were previously associated with promoting Rbfs ransomware.6
- Sources: 6
Profile: Space Bears
- Overview: Space Bears is a ransomware group that emerged in early 2024 (first seen around April 2024).40 It is reportedly aligned with the Phobos RaaS group.41 Space Bears gained notoriety for its distinctive, corporate-style presentation on its data leak site, using stock images and language mimicking legitimate security services, offering “guarantees” upon ransom payment.41 They employ double extortion tactics.41 The group is believed to operate from Moscow, Russia.41
- TTPs:
- Initial Access: Exploiting RDP vulnerabilities and using phishing emails are suspected initial access vectors.40
- Impact (Encryption & Extortion): The group encrypts victim systems and exfiltrates data, demanding ransom in cryptocurrency to provide decryption tools and prevent data publication on their leak site.40 They have also reportedly used DDoS attacks against non-compliant victims.40
- Targeting: Space Bears primarily targets large enterprises and critical infrastructure.40 Known victims span various sectors including healthcare (CORTEX Chiropractic), telecommunications (Hytera US), finance, government, agriculture, food & beverage, manufacturing, construction, and IT.40 Targets are located globally, including the US, Ecuador, Singapore, Morocco, Norway, Germany, South Africa, Canada (Haylem, JRT Automatisation), and India (Aptus).42 They made claims against Atos Group, which Atos denied, stating the compromised data mentioning Atos was on external third-party infrastructure.43
- Relationships: Aligned with the Phobos RaaS operation.41
- Sources: 40
Profile: Red wolf ceyber (aka Red Wolf Cyber)
- Overview: Red Wolf Cyber (later rebranded as Red Wolf Ceyber) is a hacktivist group observed launching DDoS attacks in March 2025.18
- TTPs: The group primarily conducts DDoS attacks.18 Their Telegram channel was shut down after an attack on March 7, but they re-emerged under the new name “Red Wolf Ceyber” on March 12 via a new channel.18
- Targeting: The group initially targeted South Korea without a specified reason.18 After rebranding, their focus shifted primarily to Ukraine, but they later resumed attacks against South Korean targets, specifically hitting an English legal information domain.18
- Relationships: No specific relationships mentioned in the provided materials.
- Sources: 18
Profile: Al Ahad
- Overview: Al Ahad is identified as a pro-Palestinian hacktivist group active in 2024.19
- TTPs: The group participates in DDoS attack campaigns, often coordinated through alliances and announced/claimed via Telegram.19
- Targeting: Al Ahad primarily targets Israel, driven by political and ideological motivations related to the Israeli-Palestinian conflict.19
- Relationships: Al Ahad is listed as a member of the “Holy League” hacktivist alliance, which unites pro-Russian and pro-Palestinian groups targeting Western nations, NATO, India, and Israel.49
- Sources: 19
Profile: watchdogs
- Overview: The term “watchdogs” appears in multiple contexts within the provided materials, often referring to cybersecurity professionals 54, monitoring tools, or legitimate software components, rather than a specific malicious threat actor group. For example, it’s used metaphorically for cybersecurity professionals 54, to describe persistence mechanisms in malware 56, in relation to employee monitoring for productivity 57, and as part of a legitimate executable name (watchdogs.exe) for a video game flagged by AV software.58 One instance mentions a PowerShell script watchdogs.ps1 used to download Cobalt Strike in an attack on ColdFusion servers by an actor self-identifying as “BlackDogs 2023”.59 Another refers to agencies acting as “watchdogs” against cyber threats.60
- Conclusion: Based on the provided information, “watchdogs” does not consistently refer to a single, identifiable malicious threat actor group responsible for data breaches or specific campaigns in the same way as groups like Qilin or INC Ransom. Its use appears varied and context-dependent. The specific incident associating “watchdogs” with the Origin PC data sale likely refers to the actor’s chosen moniker in that specific context, possibly inspired by the video game or the general term, but it doesn’t map to a widely tracked group with this name based on the available external research.
- Sources: 54
Profile: 247
- Overview: The term “247” appears primarily as a numerical reference or part of other identifiers within the provided materials (e.g., report numbers 76, case numbers 78, vendor names like Smarttech247 46, operational times like 24/7 SOCs 46). There is no specific description linking “247” to a distinct threat actor group, its TTPs, motivations, or origins in the context of cyberattacks like the Russian Standard Bank or Abdul Rahman Fakieh Schools incidents mentioned in the source data.
- Conclusion: Based on the provided information, “247” does not appear to represent a known, profiled threat actor group. Its association with specific incidents likely stems from the actor’s chosen moniker on platforms like BreachForums for those specific posts, rather than representing an established group identity tracked in external threat intelligence.
- Sources: 46
Profile: Electronic Army Special Forces
- Overview: No specific information regarding the activities, TTPs, motivations, or origins of Electronic Army Special Forces was found within the provided research materials.1 Any details regarding this actor’s involvement in specific incidents (DDoS attacks on Ho Chi Minh City, Bến Tre Power Company, VNPT) are solely based on the associated incident report derived from the source data.
- Sources: None applicable from provided materials.
Profile: CASH NETWORK C2
- Overview: No specific information regarding the activities, TTPs, motivations, or origins of CASH NETWORK C2 was found within the provided research materials.1 Any details regarding this actor’s involvement in specific incidents (Defacement of CapCut) are solely based on the associated incident report derived from the source data.
- Sources: None applicable from provided materials.
Profile: Seacoat
- Overview: No specific information regarding the activities, TTPs, motivations, or origins of Seacoat was found within the provided research materials.1 Any details regarding this actor’s involvement in specific incidents (Alleged data leak of DLH.net) are solely based on the associated incident report derived from the source data.
- Sources: None applicable from provided materials.
Profile: pirates_gold
- Overview: No specific information regarding the activities, TTPs, motivations, or origins of pirates_gold was found within the provided research materials.1 Any details regarding this actor’s involvement in specific incidents (Alleged sale database of BWSSB) are solely based on the associated incident report derived from the source data.
- Sources: None applicable from provided materials.
Profile: Dbhandler
- Overview: No specific information regarding the activities, TTPs, motivations, or origins of Dbhandler was found within the provided research materials.1 Any details regarding this actor’s involvement in specific incidents (Alleged leak of Facebook) are solely based on the associated incident report derived from the source data.
- Sources: None applicable from provided materials.
Profile: mr_jack311
- Overview: No specific information regarding the activities, TTPs, motivations, or origins of mr_jack311 was found within the provided research materials.1 Any details regarding this actor’s involvement in specific incidents (Alleged database sale of Mitsubishi Motors Vietnam) are solely based on the associated incident report derived from the source data.
- Sources: None applicable from provided materials.
Profile: 0giv
- Overview: No specific information regarding the activities, TTPs, motivations, or origins of 0giv was found within the provided research materials.1 Any details regarding this actor’s involvement in specific incidents (Alleged data breach of Circle) are solely based on the associated incident report derived from the source data.
- Sources: None applicable from provided materials.
Profile: mentalpositive
- Overview: No specific information regarding the activities, TTPs, motivations, or origins of mentalpositive was found within the provided research materials.1 Any details regarding this actor’s involvement in specific incidents (Alleged sale of loader.c) are solely based on the associated incident report derived from the source data.
- Sources: None applicable from provided materials.
Profile: shadowscript
- Overview: No specific information regarding the activities, TTPs, motivations, or origins of shadowscript was found within the provided research materials.1 Any details regarding this actor’s involvement in specific incidents (Alleged Sale of Gmail Prompt Automation Tool Source Code) are solely based on the associated incident report derived from the source data.
- Sources: None applicable from provided materials.
Profile: BanyuwangiXploit
- Overview: No specific information regarding the activities, TTPs, motivations, or origins of BanyuwangiXploit was found within the provided research materials.1 Any details regarding this actor’s involvement in specific incidents (Alleged leak of ISRAEL DATABASES) are solely based on the associated incident report derived from the source data.
- Sources: None applicable from provided materials.
Profile: rootkik
- Overview: No specific information regarding the activities, TTPs, motivations, or origins of rootkik was found within the provided research materials.1 Any details regarding this actor’s involvement in specific incidents (Alleged data breach of Bolivarian National Police) are solely based on the associated incident report derived from the source data.
- Sources: None applicable from provided materials.
Profile: betway
- Overview: No specific information regarding the activities, TTPs, motivations, or origins of betway was found within the provided research materials.1 Any details regarding this actor’s involvement in specific incidents (Alleged Sale of Data from Kirkendall Dwyer LLP, Alleged Sale of Data from Wolters Kluwer) are solely based on the associated incident report derived from the source data.
- Sources: None applicable from provided materials.
Profile: redblueapple2
- Overview: No specific information regarding the activities, TTPs, motivations, or origins of redblueapple2 was found within the provided research materials.1 Any details regarding this actor’s involvement in specific incidents (Alleged Domain admin access sale to an unidentified organization in Italy) are solely based on the associated incident report derived from the source data.
- Sources: None applicable from provided materials.
Profile: T0r
- Overview: No specific information regarding the activities, TTPs, motivations, or origins of T0r was found within the provided research materials.1 Any details regarding this actor’s involvement in specific incidents (Alleged data sale of BuyAntiVirusKey.com) are solely based on the associated incident report derived from the source data.
- Sources: None applicable from provided materials.
Profile: M4ster
- Overview: No specific information regarding the activities, TTPs, motivations, or origins of M4ster was found within the provided research materials.1 Any details regarding this actor’s involvement in specific incidents (Alleged data breach of CITROSOL) are solely based on the associated incident report derived from the source data.
- Sources: None applicable from provided materials.
Profile: PhantomAtlas
- Overview: No specific information regarding the activities, TTPs, motivations, or origins of PhantomAtlas was found within the provided research materials.1 Any details regarding this actor’s involvement in specific incidents (Alleged data breach of MGPTT + Ministry of Labor ALGERIA) are solely based on the associated incident report derived from the source data.
- Sources: None applicable from provided materials.
Profile: Night Sky
- Overview: Night Sky is identified as a China-based ransomware actor that emerged in late 2021 (first seen December 2021).85 They target corporate networks and practice multi-extortion, demanding payment for decryption and non-release of stolen data.85 A blog lists non-paying victims and leaked data.85
- TTPs:
- Initial Access: Typically spread via malicious emails (attachments, links, JavaScript) or malicious websites.85 Affiliates handle delivery, so methods can vary.85
- Encryption: Uses a combination of AES-128 (CBC) and RSA-2048 for encryption.85 Files are appended
Works cited
- qilin-threat-profile-tlpclear.pdf – HHS.gov, accessed April 10, 2025, https://www.hhs.gov/sites/default/files/qilin-threat-profile-tlpclear.pdf
- Qilin Ransomware – Blackpoint Cyber, accessed April 10, 2025, https://blackpointcyber.com/wp-content/uploads/2025/01/Qilin-3.pdf
- Qilin Ransomware | Loginsoft Blog, accessed April 10, 2025, https://www.loginsoft.com/post/qilin-ransomware
- Qilin Ransomware: Detection and Analysis – Darktrace, accessed April 10, 2025, https://darktrace.com/blog/a-busy-agenda-darktraces-detection-of-qilin-ransomware-as-a-service-operator
- Qilin group observed using custom tool for widespread credentials theft | SC Media, accessed April 10, 2025, https://www.scworld.com/brief/qilin-group-observed-using-custom-tool-for-widespread-credentials-theft
- Ransomware in focus: Meet NightSpire – S-RM, accessed April 10, 2025, https://www.s-rminform.com/latest-thinking/ransomware-in-focus-meet-nightspire
- Advisories – Qilin Ransomware – MyCERT, accessed April 10, 2025, https://www.mycert.org.my/portal/advisory?id=MA-1300.032025
- 2025 Ransomware: Business as Usual, Business is Booming | Rapid7 Blog, accessed April 10, 2025, https://www.rapid7.com/blog/post/2025/04/08/2025-ransomware-business-as-usual-business-is-booming/
- CISA reaffirms to safeguard US critical infrastructure against escalating threats from Qilin ransomware group – Industrial Cyber, accessed April 10, 2025, https://industrialcyber.co/cisa/cisa-reaffirms-to-safeguard-us-critical-infrastructure-against-escalating-threats-from-qilin-ransomware-group/
- Analysis of the Russian-Speaking Threat Actor NoName 057(16 …, accessed April 10, 2025, https://labs.yarix.com/2022/10/analysis-of-the-russian-speaking-threat-actor-noname-05716/
- NoName057(16): Pro-Russian Hacktivist Group – Radware, accessed April 10, 2025, https://www.radware.com/cyberpedia/ddos-attacks/noname057(16)/
- Pro-Russian Hacktivists Targeting Canadian Organizations – Radware, accessed April 10, 2025, https://www.radware.com/security/threat-advisories-and-attack-reports/pro-russian-hacktivists-targeting-canadian-organizations/
- www.quorumcyber.com, accessed April 10, 2025, https://www.quorumcyber.com/wp-content/uploads/2024/04/TI-NoName057-Threat-Actor-Profile-1.pdf
- NoName057 targets Italy again after Zelensky’s visit to the country – Security Affairs, accessed April 10, 2025, https://securityaffairs.com/172982/hacktivism/noname057-targets-italy.html
- Pro-Russia collective NoName057(16) launched a new wave of DDoS attacks on Italian sites – Security Affairs, accessed April 10, 2025, https://securityaffairs.com/174294/hacktivism/noname05716-launched-ddos-attacks-on-italian-sites.html
- NoName057(16) – NetScout Systems, accessed April 10, 2025, https://www.netscout.com/blog/asert/noname057-16
- Cybersecurity threats: NoName057 targets Italy’s financial sector | White Blue Ocean, accessed April 10, 2025, https://www.whiteblueocean.com/newsroom/ddos-attacks-rock-the-italian-financial-sector/
- Quick Overview of Recent DDoS Attacks Targeting South Korea – S2W, accessed April 10, 2025, https://www.s2w.inc/en/resource/detail/798
- Israel ranks second in list of countries targeted by cyberattacks in 2024 — report, accessed April 10, 2025, https://www.timesofisrael.com/israel-ranks-second-in-list-of-countries-targeted-by-cyberattacks-in-2024-report/
- Ransomware Spotlight: INC | Trend Micro (US), accessed April 10, 2025, https://www.trendmicro.com/vinfo/us/security/news/ransomware-spotlight/ransomware-spotlight-inc
- Inc. Ransom | SentinelOne, accessed April 10, 2025, https://www.sentinelone.com/anthology/inc-ransom/
- INC Ransom: A Sophisticated Ransomware & Data Extortion Group – Cyble, accessed April 10, 2025, https://cyble.com/threat-actor-profiles/inc-ransom/
- Dark Web Profile: INC Ransom – SOCRadar® Cyber Intelligence Inc., accessed April 10, 2025, https://socradar.io/dark-web-profile-inc-ransom/
- Inc Ransom Attack Analysis: Extortion Methodologies – ReliaQuest, accessed April 10, 2025, https://www.reliaquest.com/blog/inc-ransom-attack-analysis-extortion-methodologies/
- Inc Ransom Attack Analysis – ReliaQuest, accessed April 10, 2025, https://www.reliaquest.com/blog/inc-ransom-attack-analysis/
- What Is a Ransomware Attack? – CrowdStrike.com, accessed April 10, 2025, https://www.crowdstrike.com/en-us/cybersecurity-101/ransomware/
- Ransomware Defense Assessment – CrowdStrike, accessed April 10, 2025, https://www.crowdstrike.com/wp-content/uploads/2023/10/23-SRV-052-Ransomware-Defense-Assessment-DataSheet.pdf
- DragonForce Ransomware Hits Saudi Firm, 6TB Data Stolen – Infosecurity Magazine, accessed April 10, 2025, https://www.infosecurity-magazine.com/news/6tb-data-stolen-saudi-cyber-attack/
- DragonForce Ransomware Group is Targeting Saudi … – Resecurity, accessed April 10, 2025, https://www.resecurity.com/blog/article/dragonforce-ransomware-group-is-targeting-saudi-arabia
- Threat Report: DragonForce Ransomware’s Professional Approach …, accessed April 10, 2025, https://www.armscyber.com/insights/dragonforce-ransomware-a-professional-approach-to-chaos/
- DragonForce Ransomware Recovery – Solace Cyber, accessed April 10, 2025, https://solacecyber.co.uk/dragonforce-ransomware/
- DragonForce Ransomware – What You Need To Know – Tripwire, accessed April 10, 2025, https://www.tripwire.com/state-of-security/dragonforce-ransomware-what-you-need-know
- BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability, accessed April 10, 2025, https://thehackernews.com/2025/03/blacklock-ransomware-exposed-after.html
- Resecurity turns the table on BlackLock ransomware – The Register, accessed April 10, 2025, https://www.theregister.com/2025/03/27/security_shop_pwns_ransomware_gang/
- THN Weekly Recap: GitHub Supply Chain Attack, AI Malware, BYOVD Tactics, and More, accessed April 10, 2025, https://thehackernews.com/2025/03/thn-weekly-recap-github-supply-chain.html
- Ransomware Protection: Calculating Risk & Savings – Zscaler, accessed April 10, 2025, https://www.zscaler.com/resources/ransomware-roi
- Technical Analysis of Industrial Spy Ransomware – Zscaler, accessed April 10, 2025, https://www.zscaler.com/blogs/security-research/technical-analysis-industrial-spy-ransomware
- Analyzing BlackByte Ransomware’s Go-Based Variants | Zscaler, accessed April 10, 2025, https://www.zscaler.com/blogs/security-research/analysis-blackbyte-ransomware-s-go-based-variants
- CryptNet Ransomware | ThreatLabz – Zscaler, accessed April 10, 2025, https://www.zscaler.com/blogs/security-research/technical-analysis-cryptnet-ransomware
- Space Bears Ransomware Recovery – Solace Cyber, accessed April 10, 2025, https://solacecyber.co.uk/space-bears-ransomware/
- Space Bears Ransomware: What You Need To Know – Tripwire, accessed April 10, 2025, https://www.tripwire.com/state-of-security/space-bears-ransomware-what-you-need-know
- Space Bears Ransomware | WatchGuard Technologies, accessed April 10, 2025, https://www.watchguard.com/wgrd-security-hub/ransomware-tracker/space-bears
- Ransomware attack exposes database of one of France’s biggest IT companies with over … – Times of India, accessed April 10, 2025, https://timesofindia.indiatimes.com/technology/tech-news/ransomware-attack-exposes-database-of-one-of-frances-biggest-it-companies-with-over-100000-employees/articleshow/116806359.cms
- BlackBerry Quarterly Global Threat Report — September 2024, accessed April 10, 2025, https://www.blackberry.com/us/en/solutions/threat-intelligence/2024/threat-report-september
- Atos Group Denies Space Bears’ Ransomware Attack Claims – Infosecurity Magazine, accessed April 10, 2025, https://www.infosecurity-magazine.com/news/atos-denies-space-bears-ransomware/
- Atos confirms not being compromised by the ransomware group Space Bears, accessed April 10, 2025, https://live.euronext.com/en/products/equities/company-news/2025-01-03-atos-confirms-not-being-compromised-ransomware-group
- The New Face of Ransomware: Key Players and Emerging Tactics of 2024 – Trustwave, accessed April 10, 2025, https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/the-new-face-of-ransomware-key-players-and-emerging-tactics-of-2024/
- Ransomware Report: Latest Attacks And News – Cybercrime Magazine, accessed April 10, 2025, https://cybersecurityventures.com/ransomware-report/
- December 16, 2024 Holy League: A Unified Threat Against Western Nations, NATO, India and Israel – Radware, accessed April 10, 2025, https://www.radware.com/getattachment/2a2da1ff-d41e-468a-a263-3b48851ca629/Advisory-Holy-League-Dec-2024.pdf.aspx
- Holy League: A Unified Threat Against Western Nations, NATO, India and Israel – Radware, accessed April 10, 2025, https://www.radware.com/security/threat-advisories-and-attack-reports/holy-league-a-unified-threat-against-western-nations/
- Ben Kapon – content writer at kelacyber, accessed April 10, 2025, https://www.kelacyber.com/academy/editorial/team/ben-kapon-3568003/
- CYBERDEFENSE REPORT Hacking the Cosmos: Cyber operations against the space sector A case study from the war in Ukraine – ETH Zürich, accessed April 10, 2025, https://ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/pdfs/cyber-reports-2024-10-hacking-the-cosmos.pdf
- Risky Bulletin: The growing influencer problem to national security – Risky Business Media, accessed April 10, 2025, https://risky.biz/risky-bulletin-the-growing-influencer-problem-to-national-security/
- Game of Threats: Winning Strategies for Proactive Cyber Defense | HackerNoon, accessed April 10, 2025, https://hackernoon.com/game-of-threats-winning-strategies-for-proactive-cyber-defense
- Beware Of The Latest Online Scams – Cybercrime Magazine, accessed April 10, 2025, https://cybersecurityventures.com/security-awareness-training-blog/
- McAfee Labs Threats Report – SCADAhacker, accessed April 10, 2025, https://scadahacker.com/library/Documents/Threat_Intelligence/McAfee%20-%20Threat%20Report%202015-3Q.pdf
- Emerging Technology Trends and Cyber Security Related Issues – AITP-LA, accessed April 10, 2025, https://aitp-la.org/wp-content/uploads/2014/07/Big-ITMTG0612-Cyber-Information-Energy-BYOD-Trends-vcl.pdf
- Avast marked watchdogs.exe as a malware. : r/watch_dogs – Reddit, accessed April 10, 2025, https://www.reddit.com/r/watch_dogs/comments/26pn78/avast_marked_watchdogsexe_as_a_malware/
- Ransomware actor exploits unsupported ColdFusion servers—but comes away empty-handed – Sophos News, accessed April 10, 2025, https://news.sophos.com/en-us/2023/10/19/ransomware-actor-exploits-coldfusion-servers-but-comes-away-empty-handed/
- Hackers and Hostilities: The Role of Cyber Espionage in Global Conflicts – Indic, accessed April 10, 2025, https://indicrf.org/article/cyber-security-ai-and-defense/hackers-and-hostilities-the-role-of-cyber-espionage-in-global-conflicts
- Watchdogs or guard dogs: Do anti-corruption agencies need strong teeth? | Policy and Society | Oxford Academic, accessed April 10, 2025, https://academic.oup.com/policyandsociety/article/34/2/125/6401367
- Cyber Security Report 2021, accessed April 10, 2025, https://securitydelta.nl/media/com_hsd/report/426/document/cyber-security-report-2021.pdf
- Cyber-physical systems security: Limitations, issues and future trends – PMC, accessed April 10, 2025, https://pmc.ncbi.nlm.nih.gov/articles/PMC7340599/
- 3 New Risks That CISOs Will Face in 2024 Steps To Implement Cyber Controls and Processes Closing the Gap: Safeguarding Critical – Cyber Defense Magazine, accessed April 10, 2025, https://www.cyberdefensemagazine.com/newsletters/january-2024/files/downloads/CDM-CYBER-DEFENSE-eMAGAZINE-January-2024.pdf
- Overcoming inevitable risks of electronic communication – CCDCOE, accessed April 10, 2025, https://ccdcoe.org/uploads/2018/10/I-accidentally-malware.pdf
- Official statement by CD Project RED on the cyberbreach of its internal network and ransomware : r/Games – Reddit, accessed April 10, 2025, https://www.reddit.com/r/Games/comments/lfxosp/official_statement_by_cd_project_red_on_the/
- Watch Dogs is “dead and buried” : r/GamingLeaksAndRumours – Reddit, accessed April 10, 2025, https://www.reddit.com/r/GamingLeaksAndRumours/comments/1callme/watch_dogs_is_dead_and_buried/
- Weekly Intelligence Report – 07 June 2024 – CYFIRMA, accessed April 10, 2025, https://www.cyfirma.com/news/weekly-intelligence-report-07-june-2024/
- Egregor: The New Ransomware Variant to Watch – ReliaQuest, accessed April 10, 2025, https://www.reliaquest.com/blog/egregor-the-new-ransomware-variant-to-watch/
- Rocke Evolves Its Arsenal With a New Malware Family Written in Golang | Anomali Labs, accessed April 10, 2025, https://www.anomali.com/blog/rocke-evolves-its-arsenal-with-a-new-malware-family-written-in-golang
- Cyber Attacks on Data Center Organizations – Resecurity, accessed April 10, 2025, https://www.resecurity.com/blog/article/cyber-attacks-on-data-center-organizations
- Nation State Actors and Cyber Attacks in the Emerging 5G Ecosystem – Betacom, accessed April 10, 2025, https://www.betacom.com/news/nation-state-actors-and-cyber-attacks-in-the-emerging-5g-ecosystem/
- CySecurity News – Latest Information Security and Hacking Incidents, accessed April 10, 2025, https://www.cysecurity.news/
- Healthcare Cybersecurity: Taking a Proactive Route – CySecurity News – Latest Information Security and Hacking Incidents, accessed April 10, 2025, https://www.hcinnovationgroup.com/55236264
- Fourth Timeline: current events – SurveillanceCapitalism, accessed April 10, 2025, https://www.surveillancecapitalism.com/?page_id=1128
- 2024 National Money Laundering Risk Assessment (NMLRA) – Treasury Department, accessed April 10, 2025, https://home.treasury.gov/system/files/136/2024-National-Money-Laundering-Risk-Assessment.pdf
- 2024 National Money Laundering Risk Assessment – Bubble, accessed April 10, 2025, https://002fc127267a1d4437a42f4110ac7dbb.cdn.bubble.io/f1709410611348x346997688226772500/1707373818460.pdf
- Case 3:24-md-03098-EMC Document 78 Filed 06/26/24 Page 1 of 186, accessed April 10, 2025, https://files.lbr.cloud/public/2024-09/complaint.pdf?VersionId=SCf2vj1TPKDDTNzq3Oo_WtxUmkx4m4k4
- Weekly Security Articles 31-January-2024 – IFATCA, accessed April 10, 2025, https://www.ifatca.org/wp-content/uploads/weekly-security-items-31-january-2024.pdf
- Weekly Security Articles 29-December-2022 – ATC GUILD INDIA, accessed April 10, 2025, https://www.atcguild.in/iwen/iwen0223/General/weekly%20security%20items%2029-December-2022.pdf
- Cybersecurity Week in Review (20/10/2023) – Smarttech247, accessed April 10, 2025, https://www.smarttech247.com/news/cybersecurity-week-in-review-20-10-2023/
- ENISA THREAT LANDSCAPE 2023, accessed April 10, 2025, https://www.enisa.europa.eu/sites/default/files/publications/ENISA%20Threat%20Landscape%202023.pdf
- Cyber Threat Intelligence: Cybercrime in the Clear, accessed April 10, 2025, https://projekter.aau.dk/projekter/files/532661531/Master_Thesis_Main.pdf
- List of data breaches – Wikipedia, accessed April 10, 2025, https://en.wikipedia.org/wiki/List_of_data_breaches
- Night Sky – SentinelOne, accessed April 10, 2025, https://www.sentinelone.com/anthology/night-sky/
SentinelOne Vs. Night Sky Ransomware – Quarantine and Kill, accessed April 10, 2025, https://www.sentinelone.com/resources/sentinelone-vs-night-sky-ransomware-quarantine-and-kill/