<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Ransomware &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/ransomware/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Tue, 10 Feb 2026 03:24:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>Ransomware &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Using Windows Minifilters to Identify Ransomware Activity</title>
		<link>https://firsthackersnews.com/windows-minifilter-ransomware-detection/</link>
					<comments>https://firsthackersnews.com/windows-minifilter-ransomware-detection/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 09 Feb 2026 10:32:47 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[#BlueTeam]]></category>
		<category><![CDATA[#CyberDefense]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DetectionEngineering]]></category>
		<category><![CDATA[#DFIR]]></category>
		<category><![CDATA[#EDR]]></category>
		<category><![CDATA[#EndpointSecurity]]></category>
		<category><![CDATA[#IncidentResponse]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#KernelSecurity]]></category>
		<category><![CDATA[#MalwareAnalysis]]></category>
		<category><![CDATA[#MalwareDetection]]></category>
		<category><![CDATA[#ransomware]]></category>
		<category><![CDATA[#SecurityOperations]]></category>
		<category><![CDATA[#SecurityResearch]]></category>
		<category><![CDATA[#SOC]]></category>
		<category><![CDATA[#ThreatDetection]]></category>
		<category><![CDATA[#ThreatHunting]]></category>
		<category><![CDATA[#WindowsSecurity]]></category>
		<category><![CDATA[#ZeroTrust]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11133</guid>

					<description><![CDATA[<p>A security researcher has published a proof-of-concept tool on GitHub aimed at stopping ransomware from inside the operating</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/windows-minifilter-ransomware-detection/">Using Windows Minifilters to Identify Ransomware Activity</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A security researcher has published a proof-of-concept tool on <strong>GitHub</strong> aimed at stopping ransomware from inside the operating system itself.</p>



<p>The project is part of a wider Endpoint Detection and Response effort called <strong>Sanctum</strong>. It shows how defenders can use <strong>Windows Minifilters</strong> to spot and interrupt malicious file encryption before user data is damaged.</p>



<h3 class="wp-block-heading">How the Detection Method Works</h3>



<p>At the center of this approach is a Windows feature known as a <strong>file system filter driver</strong>. This driver operates between user applications and the storage system, meaning every file operation — creating, modifying, or renaming files — passes through it.</p>



<p>Researcher <strong>0xflux</strong> describes this layer as a control point. Because all file activity flows through it, the system can monitor behavior in real time and step in when something suspicious happens.</p>



<p>Although the developer initially planned to build the driver in Rust, the lack of proper filter driver support led to the project being written in C instead.</p>



<h3 class="wp-block-heading">What Signals Indicate Ransomware</h3>



<p>The Sanctum driver registers system callbacks so it gets notified when certain file actions occur. The proof-of-concept focuses on two important Windows file events.</p>



<p>One event tracks when programs request access to files with write or delete permissions. A process rapidly opening many files with these permissions can signal the start of mass encryption.</p>



<p>The second event is more central to this PoC. It triggers when file information changes, such as when a file is renamed. Ransomware often renames files after encryption, adding a new extension to mark them as locked.</p>



<p>In this demo, the driver watches for a specific extension tied to a known <strong>LockBit</strong> variant.</p>



<h3 class="wp-block-heading">How the System Identifies the Attacker</h3>



<p>When a rename event occurs, the driver uses Windows APIs to read the full file name and compare the new extension with known ransomware patterns.</p>



<p>If a match appears, the system does more than log the event. It also determines which process made the change. Using internal functions, it retrieves the process ID and the program name responsible. This gives defenders precise visibility into which application is behaving maliciously.</p>



<p>Right now, the tool mainly records suspicious activity, acting as a detailed monitoring system. However, future versions could go further.</p>



<p>The researcher suggests adding real-time entropy analysis to detect encryption as it happens. Another potential feature is freezing or terminating the threads of a malicious process immediately after detection.</p>



<p>This project shows how moving defenses deeper into the Windows kernel can provide faster response and greater visibility than traditional antivirus solutions that operate at higher system levels.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/windows-minifilter-ransomware-detection/">Using Windows Minifilters to Identify Ransomware Activity</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/windows-minifilter-ransomware-detection/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New Osiris Ransomware Campaign Exploits Living-off-the-Land Tools</title>
		<link>https://firsthackersnews.com/osiris/</link>
					<comments>https://firsthackersnews.com/osiris/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 23 Jan 2026 10:50:59 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[Osiris Ransomware]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11040</guid>

					<description><![CDATA[<p>A recently identified ransomware strain named Osiris was linked to an intrusion at a large food services organization</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/osiris/">New Osiris Ransomware Campaign Exploits Living-off-the-Land Tools</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A recently identified ransomware strain named <strong>Osiris</strong> was linked to an intrusion at a large food services organization in Southeast Asia in November 2025. Analysts confirmed that this malware is a new development and is not related to the ransomware that used the same name nearly a decade ago.</p>



<p>The appearance of Osiris highlights how ransomware operations continue to evolve. The attack shows careful planning and execution, reflecting the methods typically used by well-established cybercrime groups rather than opportunistic attackers.</p>



<p>Instead of relying only on obvious malware, the attackers combined trusted Windows features with specialized tools to move through the network. This blend allowed them to maintain access, gather credentials, and prepare systems for encryption while staying largely unnoticed.</p>



<p>Investigators traced the activity after noticing similarities with earlier Inc ransomware operations. These included shared tooling patterns and familiar data theft techniques.</p>



<p>Sensitive information was taken before encryption using cloud-based transfer utilities, confirming a double-extortion strategy.</p>



<h3 class="wp-block-heading">Driver-Level Attacks and Security Disabling</h3>



<p>A key element of the intrusion was the use of a rogue driver known as <strong>Poortry</strong>, also referred to as Abyssworker. Disguised as legitimate security software, the driver was introduced to undermine system protections.</p>



<p>Through a bring-your-own-vulnerable-driver (BYOVD) method, the attackers gained deep system access and shut down security tools without drawing immediate attention. This technique has become increasingly common because it allows ransomware operators to bypass endpoint defenses effectively.</p>



<p>What sets this case apart is that the driver appears to be custom-built rather than reused from public sources, suggesting strong technical skills within the group. Additional utilities were deployed to scan the environment and keep remote control of compromised systems.</p>



<p>Once their position was secured, the attackers launched the ransomware, encrypting files with strong cryptography and blocking recovery by stopping critical services and removing backup snapshots. The overall operation points to a highly capable and experienced ransomware group behind Osiris.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/osiris/">New Osiris Ransomware Campaign Exploits Living-off-the-Land Tools</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/osiris/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>DragonForce Ransomware Targets ESXi and Windows Systems</title>
		<link>https://firsthackersnews.com/dragonforce-ransomware/</link>
					<comments>https://firsthackersnews.com/dragonforce-ransomware/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 15 Jan 2026 13:30:00 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[DragonForce Ransomware]]></category>
		<category><![CDATA[ESXi]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10985</guid>

					<description><![CDATA[<p>Security researchers have released a detailed technical analysis of the DragonForce ransomware, along with confirmation that working decryptors</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/dragonforce-ransomware/">DragonForce Ransomware Targets ESXi and Windows Systems</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Security researchers have released a detailed technical analysis of the DragonForce ransomware, along with confirmation that working decryptors exist for certain Windows and ESXi victims. By the time DragonForce’s Data Leak Site (DLS) was discovered, at least 17 organizations had already been listed as victims.</p>



<p>First observed in December 2023, DragonForce quickly positioned itself as a serious Ransomware-as-a-Service (RaaS) operation. The group publicly promotes itself as a cartel and runs a service called “Ransombay,” allowing affiliates to request customized payloads and configurations.</p>



<h2 class="wp-block-heading"><strong>DragonForce Ransomware</strong></h2>



<p>DragonForce operates under a structured RaaS model that was openly promoted in mid-2024 on underground forums. The group actively recruits a wide range of partners, including initial access brokers and independent penetration testers, offering affiliates up to 80% of ransom payments.</p>



<p>The operation does not exist in isolation. Code analysis shows that DragonForce is heavily derived from leaked LockBit 3.0 (Black) and Conti source code. Some samples demonstrate over 90% similarity with LockBit, strongly indicating reuse of the leaked LockBit builder combined with Conti-style logic.</p>



<p>Infrastructure overlaps and code reuse have also linked DragonForce to other ransomware groups such as BlackLock and RansomHub. In one incident, DragonForce operators even compromised BlackLock’s own leak site through a misconfiguration, exposing internal data.</p>



<h2 class="wp-block-heading"><strong>Technical Design and Encryption Behavior</strong></h2>



<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="720" height="381" src="https://firsthackersnews.com/wp-content/uploads/2026/01/image-5.png" alt="" class="wp-image-10986" srcset="https://firsthackersnews.com/wp-content/uploads/2026/01/image-5-200x106.png 200w, https://firsthackersnews.com/wp-content/uploads/2026/01/image-5-300x159.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/01/image-5-400x212.png 400w, https://firsthackersnews.com/wp-content/uploads/2026/01/image-5-600x318.png 600w, https://firsthackersnews.com/wp-content/uploads/2026/01/image-5.png 720w" sizes="(max-width: 720px) 100vw, 720px" /></figure>



<p>Internally, DragonForce uses <strong>custom string obfuscation</strong>, decrypting strings only at runtime. File encryption is based on the <strong>ChaCha8 stream cipher</strong>, with a <strong>unique session key generated per file</strong>.</p>



<p>Before encryption completes, DragonForce appends a metadata block to each file. This metadata contains the encrypted session key, encryption mode, file size, and additional flags required for recovery. Depending on file type and size, the ransomware applies <strong>full, partial, or header-only encryption</strong>, prioritizing performance while still disrupting critical systems such as databases and virtual machine images.</p>



<p>Network-based encryption capabilities allow DragonForce to scan private IP ranges, connect over SMB, and selectively target network shares while skipping administrative paths like <code>ADMIN$</code>. Optional features also allow the malware to rename files, change file icons, and replace the desktop wallpaper with ransom-themed imagery.</p>



<h2 class="wp-block-heading"><strong>Decryptors for Windows and ESXi Victims</strong></h2>



<p>A significant development came when the S2W Threat Research and Intelligence Center (TALON) obtained DragonForce decryptors during threat-hunting operations. These tools are victim-specific and are not universal decryptors.</p>



<h3 class="wp-block-heading">Decryptor Capabilities (Summary List)</h3>



<ul class="wp-block-list">
<li>Separate decryptors for <strong>Windows</strong> and <strong>ESXi</strong></li>



<li>Uses embedded <strong>RSA-4096 private keys</strong> to recover ChaCha8 session keys</li>



<li>Supports both <strong>local and network share decryption</strong></li>



<li>ESXi decryptors validate files using a <strong>per-victim build key</strong></li>



<li>Fully restores original files by removing appended metadata</li>
</ul>



<p>Because DragonForce embeds the encryption keys within file metadata (protected by RSA), possession of the correct private key enables full data recovery for affected victims.</p>



<h2 class="wp-block-heading"><strong>Recommendations</strong></h2>



<p>Organizations should treat DragonForce as a mature and evolving ransomware threat with strong ties to established ransomware families.</p>



<p>Recommended actions include:</p>



<ul class="wp-block-list">
<li>Monitor for <strong>LockBit and Conti-style indicators</strong>, including file structure similarities</li>



<li>Harden <strong>initial access vectors</strong>, especially exposed services and stolen credentials</li>



<li>Restrict SMB access and apply <strong>network segmentation</strong></li>



<li>Maintain <strong>offline, immutable backups</strong> for Windows and ESXi environments</li>



<li>Engage incident response teams early if DragonForce activity is suspected</li>
</ul>



<p>While the available decryptors offer hope for some victims, they are limited in scope. Prevention, early detection, and strong recovery planning remain the most reliable defenses against DragonForce attacks.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/dragonforce-ransomware/">DragonForce Ransomware Targets ESXi and Windows Systems</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/dragonforce-ransomware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hackers Expose 34 Zero-Day Flaws at Pwn2Own Ireland 2025 — Over $522,000 Awarded on Day One</title>
		<link>https://firsthackersnews.com/pwn2own-ireland-2025-zero-day-vulnerabilities/</link>
					<comments>https://firsthackersnews.com/pwn2own-ireland-2025-zero-day-vulnerabilities/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 22 Oct 2025 08:37:30 +0000</pubDate>
				<category><![CDATA[hackers]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Zero Day Attack]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#EthicalHacking]]></category>
		<category><![CDATA[#Hackers]]></category>
		<category><![CDATA[#Pwn2Own]]></category>
		<category><![CDATA[#Pwn2Own2025]]></category>
		<category><![CDATA[#SmartHomeSecurity]]></category>
		<category><![CDATA[#ZeroDay]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10539</guid>

					<description><![CDATA[<p>Record-Breaking Day for Security Researchers Day One of Pwn2Own Ireland 2025 concluded with an extraordinary showcase of cybersecurity</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/pwn2own-ireland-2025-zero-day-vulnerabilities/">Hackers Expose 34 Zero-Day Flaws at Pwn2Own Ireland 2025 — Over $522,000 Awarded on Day One</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading"><strong>Record-Breaking Day for Security Researchers</strong></h2>



<p>Day One of Pwn2Own Ireland 2025 concluded with an extraordinary showcase of cybersecurity talent, as researchers demonstrated 34 unique zero-day vulnerabilities across a wide range of consumer devices.<br>The exploits earned participants a combined payout of $522,500, marking one of the most successful opening days in the competition’s history.</p>



<p>Hosted by Trend Micro’s <strong>Zero Day Initiative (ZDI)</strong>, Pwn2Own is renowned for uncovering security flaws in real-world products. This year’s event stood out for its <strong>100% success rate</strong>, with every single exploit attempt succeeding on the first day — a rare achievement in competitive hacking.</p>



<h2 class="wp-block-heading"><strong>Teams Dominate Smart Home and NAS Devices</strong></h2>



<p>The first day featured 17 exploitation attempts targeting various connected devices including printers, routers, smart home systems, and NAS (Network-Attached Storage) units from major global manufacturers.</p>



<p>Team DDOS, made up of Bongeun Koo and Evangelos Daravigkas, took an early lead by chaining together eight vulnerabilities to compromise both a QNAP Qhora-322 router and a QNAP TS-453E NAS device.<br>Their impressive “SOHO Smashup” demonstration earned them $100,000 in prize money and 10 Master of Pwn points, placing them among the top contenders early in the event.</p>



<h2 class="wp-block-heading"><strong>Smart Home Devices Fall to Expert Exploits</strong></h2>



<p>Several popular smart home products were also successfully compromised, including the Philips Hue Bridge, Synology ActiveProtect DP320, and Home Assistant Green.</p>



<p>Sina Kheirkhah from the Summoning Team stood out for participating in multiple successful exploits, including a powerful attack against the Synology ActiveProtect Appliance DP320 that earned an additional $50,000 in rewards.</p>



<p>In one of the most notable demonstrations, researcher DMDung of STAR Labs exploited a single out-of-bounds access vulnerability to take control of the Sonos Era 300 smart speaker — achieving the highest single-device payout of $50,000 and securing five Master of Pwn points.</p>



<p>Consumer printers were not spared from the day’s onslaught of exploits. Both Canon and HP devices were successfully hacked, highlighting ongoing concerns about the security of office and home printers.</p>



<p>The Canon imageCLASS MF654Cdw was a particularly popular target, with four different teams exploiting it using combinations of heap-based and stack-based buffer overflow vulnerabilities.<br>Meanwhile, Team Neodyme executed a stack-based buffer overflow on the HP DeskJet 2855e, earning $20,000 for their exploit.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/pwn2own-ireland-2025-zero-day-vulnerabilities/">Hackers Expose 34 Zero-Day Flaws at Pwn2Own Ireland 2025 — Over $522,000 Awarded on Day One</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/pwn2own-ireland-2025-zero-day-vulnerabilities/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Critical Oracle EBS Vulnerability CVE-2025-61882 Actively Exploited by Cl0p Ransomware Group</title>
		<link>https://firsthackersnews.com/clop-exploits-oracle-ebs-cve-2025-61882-remote-code-execution/</link>
					<comments>https://firsthackersnews.com/clop-exploits-oracle-ebs-cve-2025-61882-remote-code-execution/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 07 Oct 2025 09:33:42 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Zero Day Attack]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10523</guid>

					<description><![CDATA[<p>A critical security flaw in Oracle E-Business Suite (EBS) is being actively exploited by the Cl0p ransomware group,</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/clop-exploits-oracle-ebs-cve-2025-61882-remote-code-execution/">Critical Oracle EBS Vulnerability CVE-2025-61882 Actively Exploited by Cl0p Ransomware Group</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A critical security flaw in <strong>Oracle E-Business Suite (EBS)</strong> is being actively exploited by the <strong>Cl0p ransomware group</strong>, also known as <strong>Graceful Spider</strong>, according to a new advisory from <strong>CrowdStrike</strong>. The first known exploitation was detected on <strong>August 9, 2025</strong>.</p>



<ul class="wp-block-list">
<li><strong>SSRF</strong> (Server-Side Request Forgery) to coerce backend servers into making arbitrary requests.</li>



<li><strong>CRLF injection</strong> to insert custom headers into requests.</li>



<li><strong>Request smuggling</strong> to access internal endpoints and upload malicious templates.</li>
</ul>



<p>This attack abuses the ability of JSP files to load untrusted stylesheets, allowing arbitrary code execution. Persistent HTTP connections are used to chain multiple requests, increasing reliability and reducing detection.</p>



<p>The <strong>Cybersecurity and Infrastructure Security Agency (CISA)</strong> has added CVE-2025-61882 to its <strong>Known Exploited Vulnerabilities (KEV)</strong> catalog. The agency has warned that the vulnerability has already been used in <strong>ransomware campaigns</strong>. All federal agencies have been ordered to apply security patches by <strong>October 27, 2025</strong>.</p>



<p>Security experts have raised alarms that <strong>mass exploitation</strong> is expected within days. Cl0p has already targeted multiple organizations since August, stealing sensitive data and issuing <strong>extortion emails</strong>.</p>



<p>Organizations using Oracle EBS are being strongly advised to <strong>patch immediately</strong>, <strong>conduct threat hunts</strong>, and <strong>strengthen access controls</strong>. Delays in remediation could lead to significant <strong>data breaches</strong>, <strong>financial loss</strong>, and <strong>operational disruption</strong>.</p>



<p><strong>SEO Keywords included</strong>: Oracle E-Business Suite, CVE-2025-61882, Cl0p ransomware, remote code execution, SSRF, CRLF injection, WatchTowr Labs, CrowdStrike, CISA KEV, cybersecurity vulnerability, patch advisory.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/clop-exploits-oracle-ebs-cve-2025-61882-remote-code-execution/">Critical Oracle EBS Vulnerability CVE-2025-61882 Actively Exploited by Cl0p Ransomware Group</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/clop-exploits-oracle-ebs-cve-2025-61882-remote-code-execution/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Akira Ransomware Now Breaches MFA‑Protected SonicWall VPNs, Researchers Warn</title>
		<link>https://firsthackersnews.com/akira-ransomware-bypass-sonicwall-vpn-mfa/</link>
					<comments>https://firsthackersnews.com/akira-ransomware-bypass-sonicwall-vpn-mfa/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 29 Sep 2025 06:26:56 +0000</pubDate>
				<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[#AkiraRansomware]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#DataBreach]]></category>
		<category><![CDATA[#MFABypass]]></category>
		<category><![CDATA[#RansomwareAttack]]></category>
		<category><![CDATA[#ThreatIntel]]></category>
		<category><![CDATA[#VPNSecurity]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10519</guid>

					<description><![CDATA[<p>The Akira ransomware gang is now reportedly bypassing multi-factor authentication (MFA) protections on SonicWall VPN devices, according to</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/akira-ransomware-bypass-sonicwall-vpn-mfa/">Akira Ransomware Now Breaches MFA‑Protected SonicWall VPNs, Researchers Warn</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The Akira ransomware gang is now reportedly bypassing multi-factor authentication (MFA) protections on SonicWall VPN devices, according to a new report from cybersecurity firm Arctic Wolf. This development represents a serious escalation in the group’s tactics, as the criminals appear to be using <strong>stolen one-time password (OTP) seeds</strong> to successfully log in—even when MFA is fully enabled.</p>



<p>Arctic Wolf observed multiple incidents where SonicWall Secure Mobile Access (SMA) appliances were accessed despite OTP-based MFA being active. In each case, multiple OTP challenges were issued, but attackers still authenticated successfully, suggesting they had access to the correct OTP codes.</p>



<h2 class="wp-block-heading"><strong>Background: Zero-Day Vulnerability and CVE-2024-40766</strong></h2>



<p>These incidents follow a wave of Akira ransomware attacks earlier this year that exploited an unknown vulnerability in SonicWall&#8217;s SMA VPN appliances. At the time, the method of initial access was unclear. However, SonicWall later confirmed the attackers were exploiting a <strong>zero-day vulnerability</strong>, now tracked as <strong>CVE-2024-40766</strong>, involving <strong>improper access control</strong> in the web management interface.</p>



<p>A patch was released in <strong>August 2024</strong>, and SonicWall urged customers to upgrade to the latest versions of <strong>SonicOS 7.1.1-7040 / 7.0.1-5146</strong> and <strong>SMA 100 firmware</strong> to mitigate the issue. They also advised administrators to <strong>reset all user credentials</strong> for impacted VPN portals, particularly those not integrated with Active Directory.</p>



<p>However, Arctic Wolf’s new findings indicate that the threat actors may have <strong>already harvested OTP seed data</strong> during prior compromises—making even patched devices vulnerable if credentials were not rotated.</p>



<h2 class="wp-block-heading"><strong>OTP MFA Bypass: What Researchers Observed</strong></h2>



<p>According to Arctic Wolf’s investigation:</p>



<ul class="wp-block-list">
<li>In multiple breach incidents, <strong>VPN user logins occurred with OTP MFA enabled</strong>.</li>



<li><strong>Multiple OTP prompts were issued</strong>, yet the login was ultimately successful.</li>



<li>This behavior suggests that the attackers possessed <strong>valid OTP secrets or were able to generate valid tokens</strong> at will.</li>



<li>The exploitation was <strong>not due to a new vulnerability</strong>, but likely stemmed from previously compromised credentials and OTP seeds.</li>
</ul>



<p>This theory is supported by a <strong>June 2024 report</strong> from Google’s Threat Analysis Group (TAG) and Mandiant, which detailed how another threat group, <strong>UNC6148</strong>, used stolen OTP seeds to bypass MFA on SonicWall SMA 100 series devices—<strong>even when those systems were fully patched</strong>.</p>



<h2 class="wp-block-heading"><strong>Post-Breach Activity: Fast and Aggressive Lateral Movement</strong></h2>



<p>Once initial access was achieved, Akira operators wasted no time escalating privileges and moving laterally within victim networks. Arctic Wolf reports that:</p>



<ul class="wp-block-list">
<li><strong>Internal network scanning</strong> typically began <strong>within 5 minutes</strong> of VPN login.</li>



<li>Attackers used tools like <strong>Impacket</strong>, <strong>RDP</strong>, and <strong>Active Directory enumeration</strong> utilities including:</li>
</ul>



<ul class="wp-block-list">
<li><code>dsquery</code></li>



<li><code>SharpShares</code></li>



<li><code>BloodHound</code></li>
</ul>



<ul class="wp-block-list">
<li>A high-priority target was the <strong>Veeam Backup &amp; Replication server</strong>, a critical system used for managing backup infrastructure.The threat actors deployed <strong>custom PowerShell scripts</strong> to:</li>



<li><strong>Extract and decrypt credentials</strong> from Veeam, MSSQL, and PostgreSQL databases.</li>



<li>Retrieve <strong>Data Protection API (DPAPI) secrets</strong> to further compromise systems.</li>
</ul>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/akira-ransomware-bypass-sonicwall-vpn-mfa/">Akira Ransomware Now Breaches MFA‑Protected SonicWall VPNs, Researchers Warn</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/akira-ransomware-bypass-sonicwall-vpn-mfa/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Gentlemen Ransomware: Exploiting Drivers and Policies in Sophisticated Cyber Attacks</title>
		<link>https://firsthackersnews.com/gentlemen-ransomware-attack/</link>
					<comments>https://firsthackersnews.com/gentlemen-ransomware-attack/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 10 Sep 2025 06:57:38 +0000</pubDate>
				<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[#CriticalInfrastructure]]></category>
		<category><![CDATA[#CyberAttack]]></category>
		<category><![CDATA[#DataBreach]]></category>
		<category><![CDATA[#GentlemenRansomware]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#NetworkSecurity]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10496</guid>

					<description><![CDATA[<p>A newly identified ransomware group known as The Gentlemen has been targeting enterprises across 17 countries since August</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/gentlemen-ransomware-attack/">Gentlemen Ransomware: Exploiting Drivers and Policies in Sophisticated Cyber Attacks</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A newly identified ransomware group known as The Gentlemen has been targeting enterprises across 17 countries since August 2025. Advanced evasion techniques are employed by the group to breach manufacturing, construction, healthcare, and insurance sectors. Critical infrastructure risks are heightened, particularly in healthcare, where public safety could be compromised by these ransomware attacks.</p>



<p>Initial access is gained through vulnerabilities in exposed FortiGate servers. Network reconnaissance is conducted using tools like Advanced IP Scanner. Legitimate signed drivers, such as ThrottleBlood.sys, are abused in conjunction with custom executables like All.exe to terminate protected security processes. Customized variants, including Allpatch2.exe, are deployed based on victim environment scans for enhanced defense evasion.</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" width="1024" height="407" src="https://firsthackersnews.com/wp-content/uploads/2025/09/image-99-1536x611-1-1024x407.png" alt="" class="wp-image-10497" style="width:840px;height:auto" srcset="https://firsthackersnews.com/wp-content/uploads/2025/09/image-99-1536x611-1-200x80.png 200w, https://firsthackersnews.com/wp-content/uploads/2025/09/image-99-1536x611-1-300x119.png 300w, https://firsthackersnews.com/wp-content/uploads/2025/09/image-99-1536x611-1-400x159.png 400w, https://firsthackersnews.com/wp-content/uploads/2025/09/image-99-1536x611-1-600x239.png 600w, https://firsthackersnews.com/wp-content/uploads/2025/09/image-99-1536x611-1-768x306.png 768w, https://firsthackersnews.com/wp-content/uploads/2025/09/image-99-1536x611-1-800x318.png 800w, https://firsthackersnews.com/wp-content/uploads/2025/09/image-99-1536x611-1-1024x407.png 1024w, https://firsthackersnews.com/wp-content/uploads/2025/09/image-99-1536x611-1-1200x477.png 1200w, https://firsthackersnews.com/wp-content/uploads/2025/09/image-99-1536x611-1.png 1536w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>Group Policy Objects (GPO) are manipulated via management console tools and encoded PowerShell scripts to identify domain controllers. Privilege escalation is achieved with PowerRun.exe, while registries are modified to disable authentication controls. Lateral movement is facilitated by PsExec and persistent access is maintained through AnyDesk for command-and-control operations.</p>



<p>Data exfiltration is performed over encrypted channels using WinSCP, with Nmap employed for comprehensive network scanning. Ransomware payloads are deployed via the NETLOGON share, requiring specific password parameters. Backup services, databases, and security processes are aggressively terminated, while forensic artifacts like shadow copies and event logs are deleted to hinder recovery efforts.</p>



<p>The cybersecurity threat posed by The Gentlemen underscores the urgency for robust protections against ransomware exploitation. Internet-facing services must be fortified, and adaptive tactics in enterprise security are essential to mitigate breaches in critical sectors.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/gentlemen-ransomware-attack/">Gentlemen Ransomware: Exploiting Drivers and Policies in Sophisticated Cyber Attacks</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/gentlemen-ransomware-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CrowdStrike Services has observed SCATTERED SPIDER escalating its attacks across multiple industries</title>
		<link>https://firsthackersnews.com/scattered-spider-attack-techniques-crowdstrike-response-guidance/</link>
					<comments>https://firsthackersnews.com/scattered-spider-attack-techniques-crowdstrike-response-guidance/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 04 Jul 2025 05:57:51 +0000</pubDate>
				<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[#crowdstrike]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#FalconPlatform]]></category>
		<category><![CDATA[#IncidentResponse]]></category>
		<category><![CDATA[#ransomware]]></category>
		<category><![CDATA[#ScatteredSpider]]></category>
		<category><![CDATA[#SIEM]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10356</guid>

					<description><![CDATA[<p>CrowdStrike Services outlines the techniques used by SCATTERED SPIDER in attacks targeting the aviation, insurance, and retail sectors,</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/scattered-spider-attack-techniques-crowdstrike-response-guidance/">CrowdStrike Services has observed SCATTERED SPIDER escalating its attacks across multiple industries</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>CrowdStrike Services outlines the techniques used by SCATTERED SPIDER in attacks targeting the aviation, insurance, and retail sectors, and provides guidance to help organizations defend against this threat.</strong></p>



<p>SCATTERED SPIDER, an eCrime adversary, has recently expanded its targeting to include the aviation sector, alongside its established focus on the insurance and retail industries, according to observations by CrowdStrike Services.</p>



<p>During Q2 2025, SCATTERED SPIDER primarily targeted U.S.-based insurance and retail companies, as well as U.K.-based retail entities. However, incidents in late June 2025 involving U.S.-based airlines revealed tactics, techniques, and procedures (TTPs) consistent with the group’s known operations.</p>



<h2 class="wp-block-heading"><strong>Overview of SCATTERED SPIDER TTPs</strong></h2>



<p>In nearly all observed incidents in 2025, the adversary employed help desk voice-based phishing to compromise Microsoft Entra ID, single sign-on (SSO), and virtual desktop infrastructure (VDI) accounts. SCATTERED SPIDER operators consistently succeeded in impersonating legitimate employees by accurately answering help desk verification questions during calls made to request password or multifactor authentication (MFA) resets.</p>



<p>After gaining access to Entra ID, SSO, and VDI accounts, SCATTERED SPIDER typically pivots to integrated software-as-a-service (SaaS) applications. They leverage access to these platforms to locate data that can facilitate lateral movement &#8211; such as network architecture diagrams, VPN instructions, or files containing credentials- as well as to support extortion or other monetization efforts.</p>



<p>The adversary used help desk voice-based phishing in almost all observed 2025 incidents to compromise Microsoft Entra ID, single sign-on (SSO), and virtual desktop infrastructure (VDI) accounts. SCATTERED SPIDER operators routinely accurately respond to help desk verification questions when impersonating legitimate employees in calls made to request password and/or multifactor authentication (MFA) resets.</p>



<p><a href="https://www.crowdstrike.com/adversaries/scattered-spider/" target="_blank" rel="noreferrer noopener">SCATTERED SPIDER</a>&nbsp;typically pivots from compromised Entra ID, SSO, and VDI accounts to integrated software-as-a-service (SaaS) applications. They use access to these platforms to search for data that may enable lateral movement (such as network architecture diagrams, VPN instructions, or text files containing credentials), extortion, or other monetization activity.</p>



<p>Recent SCATTERED SPIDER activity has revealed several additional tactics, techniques, and procedures (TTPs), including:</p>



<ul class="wp-block-list">
<li><strong>Active Directory (AD) Reconnaissance</strong>: The adversary conducted reconnaissance on on-premises systems using tools such as <strong>ADExplorer</strong>, <strong>ADRecon.ps1</strong>, and the <strong>Get-ADUser</strong> PowerShell cmdlet to gather domain information.</li>



<li><strong>VMware vCenter Exploitation</strong>: SCATTERED SPIDER leveraged access to VMware vCenter to create <strong>unmanaged virtual machines (VMs)</strong>. They frequently attached <strong>domain controller virtual machine disks</strong> to these VMs to extract the <strong>ntds.dit</strong> Active Directory database for credential theft.</li>



<li><strong>Use of Legitimate Tunneling and Proxy Tools</strong>: The group installed various <strong>protocol-tunneling and proxy tools</strong> on VMware vCenter and their own VMs, including:
<ul class="wp-block-list">
<li><strong>Chisel</strong> (configured to communicate with <code>trycloudflare[.]com</code> subdomains)</li>



<li><strong>MobaXterm</strong></li>



<li><strong>ngrok</strong></li>



<li><strong>Pinggy</strong></li>



<li><strong>Rsocx</strong></li>



<li><strong>Teleport</strong></li>
</ul>
</li>



<li><strong>Email Manipulation for Stealth</strong>: SCATTERED SPIDER manually deleted emails (using <strong>HardDelete</strong>, <strong>SoftDelete</strong>, and <strong>MoveToDeletedItems</strong> operations) and created <strong>mail transport rules</strong> (via <strong>Set-TransportRule</strong>) to delete or redirect alerts about suspicious account activity. In one instance, the adversary redirected such notifications to an attacker-controlled <strong>googlemail[.]com</strong> address.</li>



<li><strong>AWS Data Exfiltration</strong>: They used <strong>S3 Browser</strong> to enumerate and access victims’ <strong>AWS S3 buckets</strong>, as evidenced by AWS CloudTrail events like <strong>ListBuckets</strong> and <strong>ListObjects</strong>, and exfiltrated data to <strong>remote attacker-controlled S3 buckets</strong>.</li>
</ul>



<h2 class="wp-block-heading"><strong>SCATTERED SPIDER Assessment</strong></h2>



<p>SCATTERED SPIDER&#8217;s primary objective is to deploy ransomware within a victim’s <strong>VMware ESXi infrastructure</strong>. If the attack is contained before ransomware execution, the adversary often resorts to <strong>threatening to leak stolen data</strong> publicly and issues a ransom demand as part of a double extortion strategy.</p>



<p>This threat actor frequently targets <strong>multiple organizations within the same industry</strong> in a short period. However, their targeting is not strictly industry-specific. For example, CrowdStrike Services responded to a SCATTERED SPIDER incident involving a <strong>retail organization</strong> during a period when the group was primarily focusing on <strong>insurance sector entities</strong>.</p>



<h2 class="wp-block-heading"><strong>Common Attack Methods</strong></h2>



<ul class="wp-block-list">
<li><strong>Social Engineering</strong>: Engaging IT help desks and privileged users through <strong>sophisticated phone-based impersonation</strong> tactics.</li>



<li><strong>SIM Swapping &amp; Credential Theft</strong>: Compromising victims’ mobile phone accounts to <strong>bypass SMS-based multifactor authentication (MFA)</strong>.</li>



<li><strong>Abuse of Legitimate Remote Access Tools</strong>: Utilizing tools such as <strong>TeamViewer</strong>, <strong>AnyDesk</strong>, and others for <strong>persistent remote access</strong>.</li>



<li><strong>VMware Infrastructure Compromise</strong>: Gaining access to <strong>vCenter and ESXi environments</strong> to enable <strong>ransomware deployment</strong>.</li>



<li><strong>Cloud Lateral Movement</strong>: Exploiting cloud identity providers to <strong>move laterally across cloud environments</strong>.</li>



<li><strong>Data Exfiltration</strong>: Extracting sensitive data prior to ransomware deployment to enable <strong>double extortion tactics</strong>.</li>
</ul>



<h3 class="wp-block-heading"><strong>Common Targets:</strong></h3>



<ul class="wp-block-list">
<li><strong>VMware vCenter and ESXi</strong> virtualization environments</li>



<li><strong>Cloud identity providers</strong> such as <strong>Azure AD/Entra ID</strong>, <strong>AWS IAM</strong>, <strong>Google Cloud Identity</strong>, and <strong>Okta</strong></li>



<li><strong>Privileged access management systems</strong> and <strong>administrator accounts</strong></li>



<li><strong>VPNs and remote access solutions</strong></li>



<li><strong>Backup and recovery systems</strong></li>



<li><strong>Help desk and IT support personnel</strong></li>
</ul>



<p>SCATTERED SPIDER’s advanced social engineering, rapid pivoting between environments, and multi-layered extortion techniques make it a persistent and formidable threat across industries.</p>



<h2 class="wp-block-heading"><strong>CrowdStrike Customers: Enable Falcon Platform Features</strong></h2>



<p>CrowdStrike customers can strengthen their security posture by <strong>deploying priority log sources</strong>, <strong>activating correlation rules</strong>, and <strong>integrating cloud security</strong>. These actions help <strong>maximize detection capabilities</strong>, <strong>enhance visibility</strong>, and <strong>improve response times</strong> &#8211; all within the unified <strong>CrowdStrike Falcon® platform</strong>.</p>



<h2 class="wp-block-heading"><strong>Falcon Next-Gen SIEM: Critical Log Source Integration</strong></h2>



<p><strong>Endpoint customers must enable log ingestion connectors and the appropriate parser</strong> to ensure critical logs are properly ingested into <strong>CrowdStrike Falcon® Next-Gen SIEM</strong> for effective detection of compromise.</p>



<h3 class="wp-block-heading"><strong>Highest Priority Logs to Ingest for Detecting SCATTERED SPIDER Activity:</strong></h3>



<ul class="wp-block-list">
<li><strong>Microsoft Entra ID (Azure AD)</strong>: For monitoring identity-based attacks, including suspicious logins and MFA changes.</li>



<li><strong>Virtual Desktop Infrastructure (VDI) Logs</strong>: To detect unauthorized access and abuse of virtual environments.</li>



<li><strong>VPN and Remote Access Logs</strong>: To identify unusual access patterns and potential lateral movement.</li>



<li><strong>VMware vCenter and ESXi Logs</strong>: For visibility into infrastructure compromise and unauthorized VM creation.</li>



<li><strong>Cloud Provider Logs (AWS, Azure, GCP)</strong>: To detect exfiltration, IAM abuse, and cloud lateral movement.</li>



<li><strong>Email Gateway and Microsoft 365 Logs</strong>: To catch phishing, transport rule changes, and mailbox manipulation.</li>



<li><strong>Help Desk and Ticketing System Logs</strong>: To detect social engineering attempts and password reset requests.</li>
</ul>



<h2 class="wp-block-heading"><strong>Infrastructure Monitoring – Highest Priority Log Sources</strong></h2>



<p>To effectively detect SCATTERED SPIDER activity and other advanced threats, CrowdStrike recommends prioritizing the ingestion of the following <strong>infrastructure log sources</strong> into <strong>Falcon® Next-Gen SIEM</strong>:</p>



<ul class="wp-block-list">
<li><strong>VMware vCenter and ESXi Logs</strong><br>Essential for detecting manipulation of virtual infrastructure, such as the creation of unauthorized virtual machines, access to domain controller disks, and other signs of compromise.</li>



<li><strong>Firewall Logs</strong><br>Critical for identifying network-based attack patterns, lateral movement, unauthorized connections, and data exfiltration routes.</li>



<li><strong>DNS Logs</strong><br>Vital for spotting suspicious domain queries related to command-and-control (C2) infrastructure, tunneling, and potential data exfiltration attempts.</li>



<li><strong>Web Proxy Logs</strong><br>Used to monitor unusual or unauthorized web traffic that may indicate exfiltration, access to phishing sites, or other malicious behavior.</li>
</ul>



<p>Enabling ingestion of these log sources and ensuring proper parsing and correlation in <strong>Falcon Next-Gen SIEM</strong> significantly enhances your ability to detect and respond to SCATTERED SPIDER and other threat actor behaviors.</p>



<h2 class="wp-block-heading"><strong>Identity and Access Monitoring – Critical Log Sources</strong></h2>



<p>To enhance detection of identity-based attacks &#8211; especially those used by adversaries like SCATTERED SPIDER—CrowdStrike recommends ingesting the following log sources into <strong>Falcon® Next-Gen SIEM</strong>:</p>



<ul class="wp-block-list">
<li><strong>SSO Platform Logs</strong><br>Track authentication anomalies, such as unusual login patterns, geolocation mismatches, or login attempts from new devices—key indicators of credential compromise or session hijacking.</li>



<li><strong>Entra ID (Azure AD) Sign-on and Audit Logs</strong><br>Monitor for identity-focused attack techniques, including MFA fatigue, suspicious password resets, privilege escalation, and unusual administrative activity.</li>



<li><strong>Privileged Access Management (PAM) Application Logs</strong><br>Detect unauthorized use of privileged accounts, credential misuse, and abnormal access to high-value systems.</li>
</ul>



<p>Ingesting and correlating these identity-related logs within <strong>Falcon Next-Gen SIEM</strong> provides deep visibility into attacker behaviors and supports early detection of compromise through identity misuse.</p>



<h2 class="wp-block-heading"><strong>Cloud and SaaS Applications – Essential Log Sources</strong></h2>



<p>To detect and respond to adversary activity in cloud environments and software-as-a-service (SaaS) platforms, CrowdStrike recommends ingesting the following logs into <strong>Falcon® Next-Gen SIEM</strong>:</p>



<ul class="wp-block-list">
<li><strong>AWS CloudTrail, Google Cloud Logs, and Azure Activity Logs</strong><br>Monitor for cloud resource manipulation, unauthorized access, IAM policy changes, and suspicious configuration modifications that may indicate lateral movement or initial compromise.</li>



<li><strong>Critical SaaS Application Logs</strong><br>Enable logging for business-critical SaaS platforms (e.g., Microsoft 365, Salesforce, ServiceNow, Workday) to detect application-level threats, such as unauthorized data access, unusual login patterns, transport rule modifications, or data exfiltration attempts.</li>
</ul>



<p>Integrating these cloud and SaaS logs with <strong>Falcon Next-Gen SIEM</strong> enhances visibility into attacker actions across hybrid environments and strengthens your ability to detect SCATTERED SPIDER’s common cloud-focused tactics.</p>



<h2 class="wp-block-heading"><strong>Deploy Critical Correlation Rule Templates in Falcon® Next-Gen SIEM</strong></h2>



<p>To strengthen your monitoring and detection posture against advanced threats like <strong>SCATTERED SPIDER</strong>, deploying <strong>Correlation Rule Templates (CRTs)</strong> is essential. After enabling log ingestion, the following CRTs should be prioritized.</p>



<h3 class="wp-block-heading"><strong>VMware Infrastructure Protection</strong></h3>



<p>Essential for detecting unauthorized virtual environment activity:</p>



<ul class="wp-block-list">
<li><strong>VMware &#8211; vCenter</strong>
<ul class="wp-block-list">
<li>Virtual Machine Created with Recently Uploaded ISO</li>



<li>Sensitive Resource Search</li>
</ul>
</li>



<li><strong>VMware &#8211; ESXi</strong>
<ul class="wp-block-list">
<li>Successful Login to the ESXi Host Client Web Admin Interface</li>



<li>New IP for SSH Login Detected</li>



<li>SFTP Server Enabled</li>
</ul>
</li>
</ul>



<h3 class="wp-block-heading"><strong>Entra ID Identity Protection</strong></h3>



<p>Crucial rules for detecting identity-related threats:</p>



<ul class="wp-block-list">
<li>Microsoft &#8211; Entra ID &#8211; Risky Sign-in</li>



<li>Admin Deleted MFA Authentication Method</li>



<li>Bulk Download User List</li>



<li>Temporary Access Pass Added to User Account</li>



<li>Global Administrator Role Assigned</li>
</ul>



<h2 class="wp-block-heading"><strong>Falcon Shield: Priority Integration Deployment</strong></h2>



<p><strong>Falcon Shield</strong>, CrowdStrike’s cloud application security module, delivers real-time threat detection across SaaS and cloud platforms with preconfigured <strong>High and Medium severity alerts</strong>. To maximize its effectiveness:</p>



<h3 class="wp-block-heading"><strong>Prioritize Integration With:</strong></h3>



<h4 class="wp-block-heading"><strong>Core SaaS Applications</strong></h4>



<ul class="wp-block-list">
<li><strong>Microsoft 365 Suite</strong>: Exchange, SharePoint, OneDrive, Teams</li>



<li><strong>Microsoft Defender</strong>: For security event correlation</li>



<li><strong>Google Workspace</strong>: Visibility into Google Cloud activity</li>
</ul>



<h4 class="wp-block-heading"><strong>Security Platform Integrations</strong></h4>



<ul class="wp-block-list">
<li><strong>Enhanced Falcon Integration</strong>: For maximum native detection</li>



<li><strong>Zscaler Cloud Security</strong>: Secure web gateway &amp; CASB visibility</li>



<li><strong>CyberArk PAM</strong>: Monitor privileged access and anomalies</li>
</ul>



<h4 class="wp-block-heading"><strong>Business-Critical Applications</strong></h4>



<ul class="wp-block-list">
<li><strong>Snowflake</strong>: Detect unauthorized data access or exfiltration</li>



<li><strong>Workday</strong>: Monitor HR-related data access and changes</li>



<li><strong>GitHub</strong>: Track repository access and IP theft risks</li>



<li><strong>Confluence</strong>: Detect suspicious queries and content searches</li>



<li><strong>Salesforce</strong>: Monitor CRM activity and access patterns</li>
</ul>



<h2 class="wp-block-heading"><strong>Falcon Cloud Security: Comprehensive Cloud Visibility</strong></h2>



<p>Registering tenants and deploying asset collectors provides visibility into cloud-based threats and rogue asset creation.</p>



<h3 class="wp-block-heading"><strong>Cloud Tenant Registration</strong></h3>



<ul class="wp-block-list">
<li>Register <strong>AWS</strong>, <strong>Azure</strong>, and <strong>Google Cloud</strong> tenants</li>



<li>Enable <strong>automated alerting</strong> for suspicious resource creation</li>



<li>Enforce <strong>continuous compliance monitoring</strong></li>
</ul>



<h3 class="wp-block-heading"><strong>VMware Asset Inventory Collector</strong></h3>



<ul class="wp-block-list">
<li>Deploy to <strong>all vCenter devices</strong></li>



<li>Detect <strong>unmanaged or rogue VMs</strong></li>



<li>Track infrastructure changes and ensure <strong>automated asset classification</strong></li>
</ul>



<h2 class="wp-block-heading"><strong>Proactive Hardening and Monitoring Recommendations</strong></h2>



<h3 class="wp-block-heading"><strong>Identity Protection</strong></h3>



<ul class="wp-block-list">
<li>Enforce <strong>phishing-resistant MFA</strong> (avoid SMS-based MFA)</li>



<li>Isolate <strong>privileged accounts</strong></li>



<li>Restrict <strong>help desk-initiated MFA enrollments</strong></li>



<li>Strengthen <strong>password reset procedures</strong></li>
</ul>



<h3 class="wp-block-heading"><strong>Detection and Monitoring</strong></h3>



<ul class="wp-block-list">
<li>Continuously track:
<ul class="wp-block-list">
<li>Authentication anomalies</li>



<li>Admin actions</li>



<li>Network traffic to critical systems</li>
</ul>
</li>



<li>Enable <strong>behavioral analytics</strong> and <strong>application usage monitoring</strong></li>



<li>Monitor for <strong>suspicious search terms</strong> and <strong>unusual data access</strong></li>
</ul>



<h3 class="wp-block-heading"><strong>Infrastructure Security</strong></h3>



<ul class="wp-block-list">
<li>Secure and segment <strong>VMware environments</strong></li>



<li>Block <strong>unauthorized remote access tools</strong></li>



<li>Apply <strong>least privilege</strong> in cloud setups</li>



<li>Disable <strong>legacy authentication protocols</strong></li>
</ul>



<h3 class="wp-block-heading"><strong>Incident Readiness</strong></h3>



<ul class="wp-block-list">
<li>Maintain <strong>isolated, immutable backups</strong></li>



<li>Develop and test <strong>incident response playbooks</strong></li>



<li>Conduct <strong>regular threat simulations and assessments</strong></li>



<li>Train <strong>IT/help desk staff</strong> to identify and respond to <strong>social engineering attacks</strong></li>
</ul>



<h2 class="wp-block-heading"><strong>Conclusion</strong></h2>



<p>A layered defense strategy using the <strong>CrowdStrike Falcon® platform</strong>, combined with foundational security hardening practices, significantly enhances protection against SCATTERED SPIDER and similar advanced adversaries. By enabling critical integrations, deploying priority rules, and proactively securing your identity, infrastructure, and cloud environments, organizations can reduce their exposure and respond more effectively to sophisticated threats.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/scattered-spider-attack-techniques-crowdstrike-response-guidance/">CrowdStrike Services has observed SCATTERED SPIDER escalating its attacks across multiple industries</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/scattered-spider-attack-techniques-crowdstrike-response-guidance/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Scattered Spider Hackers Shift Focus to U.S. Insurance Firms: Expert Analysis</title>
		<link>https://firsthackersnews.com/scattered-spider-hackers-shift-focus-to-u-s-insurance-firms/</link>
					<comments>https://firsthackersnews.com/scattered-spider-hackers-shift-focus-to-u-s-insurance-firms/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 17 Jun 2025 07:22:17 +0000</pubDate>
				<category><![CDATA[Tips]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[#CyberRisk]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreat]]></category>
		<category><![CDATA[#InsuranceCybersecurity]]></category>
		<category><![CDATA[#InsurTech]]></category>
		<category><![CDATA[#ScatteredSpider]]></category>
		<category><![CDATA[#SIMSwapping]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10305</guid>

					<description><![CDATA[<p>Scattered Spider Threat Looms Over Insurance Industry Google’s Threat Intelligence Group has identified multiple cybersecurity breaches in American</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/scattered-spider-hackers-shift-focus-to-u-s-insurance-firms/">Scattered Spider Hackers Shift Focus to U.S. Insurance Firms: Expert Analysis</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2 class="wp-block-heading"><strong>Scattered Spider Threat Looms Over Insurance Industry</strong></h2>



<p>Google’s Threat Intelligence Group has identified multiple cybersecurity breaches in American insurance companies, all consistent with Scattered Spider’s signature tactics. Previously targeting UK and U.S. retailers—including prominent names like Marks &amp; Spencer, Harrods, and Co-op—this hacker collective is now pivoting to a new vertical insurance.</p>



<h2 class="wp-block-heading"><strong>What Is Scattered Spider?</strong></h2>



<p>Scattered Spider—also known by aliases like UNC3944, 0ktapus, Scatter Swine, Starfraud, and Muddled Libra—is a decentralized hacking coalition specializing in <strong>ransomware</strong>, <strong>social engineering</strong>, and <strong>SIM-swapping</strong> attacks. Their campaigns often begin with deceptive communications—calls, SMS or email—targeted at help desks or call centers to bypass multi-factor authentication and gain unauthorized access.</p>



<h2 class="wp-block-heading"><strong>Recent Intrusions Impacting Major Insurers</strong></h2>



<p>Several high-profile U.S. insurance organizations, including <strong>Erie Insurance</strong> and <strong>Philadelphia Insurance Companies</strong>, have reported network outages and suspicious activity dating from early to mid-June. Both incidents involved emergency shutdowns of internal systems, telephony infrastructure, and customer portals. </p>



<ul class="wp-block-list">
<li><strong>Erie Insurance</strong> detected abnormal network behavior on June 7, disrupting services and initiating a forensic investigation in partnership with law enforcement.</li>



<li><strong>Philadelphia Insurance Companies (PHLY)</strong> reported unauthorized access around June 9, isolating systems to contain the breach while working with external cybersecurity experts.</li>
</ul>



<h2 class="wp-block-heading"><strong>Attack Methods: A Sophisticated Social Engineering Campaign</strong></h2>



<p>Scattered Spider employs a highly coordinated and deceptive set of cyberattack strategies, primarily centered around advanced social engineering. One of their most common tactics is <strong>help-desk impersonation</strong>, where attackers fabricate convincing stories to manipulate support staff into resetting login credentials, granting unauthorized access. They also exploit <strong>MFA fatigue</strong>—also known as MFA bombing—by continuously sending multi-factor authentication requests until users inadvertently approve access out of frustration or confusion. In addition, <strong>SIM swapping and phishing</strong> are used to hijack mobile numbers or steal login credentials, enabling intrusions into cloud platforms and endpoint devices. Once deep access is achieved, the group often proceeds to deploy powerful <strong>ransomware strains</strong> like <em>DragonForce</em>, <em>RansomHub</em>, and <em>Qilin</em>, encrypting critical data and demanding ransom for its release. These methods highlight Scattered Spider’s expertise in blending psychological manipulation with technical precision.</p>



<h2 class="wp-block-heading"><strong>Why the Insurance Sector Is at Risk</strong></h2>



<ul class="wp-block-list">
<li><strong>Sector-by-Sector Strategy</strong>: Scattered Spider typically targets one industry intensely before moving on.</li>



<li><strong>Human Vulnerabilities</strong>: Insurance firms rely heavily on call centers and legacy identity systems—prime targets for social engineering .</li>



<li><strong>Rich Data &amp; Customer Trust</strong>: Access to sensitive financial and personal data makes insurers lucrative for cybercriminals.</li>
</ul>



<h2 class="wp-block-heading"><strong>Proactive Defense Strategies</strong></h2>



<p>To strengthen cyber resilience, Google and Mandiant recommend that insurance firms should:</p>



<ul class="wp-block-list">
<li><strong>Implement Zero‑Trust Identity Controls</strong>: Segregate user identities, enforce strong password policies, and integrate phishing-resistant MFA.</li>



<li><strong>Enhance Helpdesk Authentication</strong>: Use challenge-response scripts, photo verification, or voice recognition before resetting passwords.</li>



<li><strong>Train Staff in Social Engineering Awareness</strong>: Educate on tactics like MFA bombing and pretexted calls.</li>



<li><strong>Monitor for Anomalous Access</strong>: Flag logins from unusual locations or residential IPs—especially post-reset.</li>



<li><strong>Conduct Regular Forensic Readiness</strong>: Maintain log review, incident playbooks, and partnerships with third-party cybersecurity firms.</li>
</ul>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/scattered-spider-hackers-shift-focus-to-u-s-insurance-firms/">Scattered Spider Hackers Shift Focus to U.S. Insurance Firms: Expert Analysis</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/scattered-spider-hackers-shift-focus-to-u-s-insurance-firms/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Agenda Ransomware Adds SmokeLoader &#038; NETXLOADER</title>
		<link>https://firsthackersnews.com/agenda-ransomware-2/</link>
					<comments>https://firsthackersnews.com/agenda-ransomware-2/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 08 May 2025 17:22:37 +0000</pubDate>
				<category><![CDATA[Tips]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[Security Update]]></category>
		<category><![CDATA[Agenda Ransomware]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[NETXLOADER]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[smokeloader]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10153</guid>

					<description><![CDATA[<p>The Agenda ransomware group (Qilin) ramped up attacks in early 2025, hitting key sectors worldwide with tools like</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/agenda-ransomware-2/">Agenda Ransomware Adds SmokeLoader &amp; NETXLOADER</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The Agenda ransomware group (Qilin) ramped up attacks in early 2025, hitting key sectors worldwide with tools like NETXLOADER and SmokeLoader, Trend Micro reports.</p>



<h2 class="wp-block-heading"><strong>Agenda Ransomware</strong></h2>



<p>The Agenda ransomware group, also known as Qilin, has intensified its activity since late 2024 by deploying a stealthy new tool called NETXLOADER. Protected by .NET Reactor 6, this loader uses heavy obfuscation, making it difficult to analyze and detect.</p>



<p>NETXLOADER delivers malware like Agenda ransomware and SmokeLoader directly into memory, bypassing traditional security tools using dynamic API calls and memory manipulation. It leverages deceptive domains such as <code>bloglake7[.]cfd</code> to distribute disguised payloads and uses randomized file names to appear legitimate.</p>



<p>The code is packed with confusing method names and hidden instructions, hooking into system libraries at runtime to execute its payload. Researchers who managed to deobfuscate it found AES-based decryption routines and memory execution using functions like VirtualAlloc and CreateThread.</p>



<p>SmokeLoader adds to the evasion, using anti-analysis tricks to detect virtual environments and debugging tools. It targets Windows Vista or newer systems and injects itself into explorer.exe for persistence and privilege escalation.</p>



<p>This combination of tools shows a strategic shift by Agenda, focusing on stealth, cross-platform compatibility through Rust, and custom packing methods to increase their chances of success across a wide range of targets.</p>



<p>Trend Micro’s Vision One platform has played a key role in detecting and stopping these threats, giving businesses vital threat intelligence and tools to stay ahead.</p>



<p>As Agenda evolves, organizations need strong security layers, strict access controls, and continuous monitoring to defend against these advanced attacks.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/agenda-ransomware-2/">Agenda Ransomware Adds SmokeLoader &amp; NETXLOADER</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/agenda-ransomware-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
