mastodon.ie is one of the many independent Mastodon servers you can use to participate in the fediverse.
Irish Mastodon - run from Ireland, we welcome all who respect the community rules and members.

Administered by:

Server stats:

1.6K
active users

#raas

0 posts0 participants0 posts today

Unmasking the new Chaos RaaS group attacks

Cisco Talos Incident Response has observed attacks by Chaos, a new ransomware-as-a-service group conducting big-game hunting and double extortion attacks. The group uses spam flooding, voice-based social engineering, RMM tool abuse, and legitimate file-sharing software for data exfiltration. Their ransomware employs multi-threaded rapid selective encryption and anti-analysis techniques, targeting both local and network resources. Chaos is likely formed by former BlackSuit (Royal) gang members, based on similarities in encryption methodology, ransom note structure, and toolset. The group has impacted various business verticals, predominantly in the U.S., UK, New Zealand, and India. They use the '.chaos' file extension and demand ransoms around $300K, threatening data disclosure and DDoS attacks if not paid.

Pulse ID: 68b1c325bd3b4a24b371dd29
Pulse Link: otx.alienvault.com/pulse/68b1c
Pulse Author: AlienVault
Created: 2025-08-29 15:11:33

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

BQTLOCK Ransomware-as-a-Service Emerges as a Sophisticated Cybercrime Tool

BQTLock is a newly emerged Ransomware-as-a-Service (RaaS), tied to ZerodayX of the pro-Palestinian group Liwaa Mohammed.

Pulse ID: 68a90698ae03099dfa5b86cf
Pulse Link: otx.alienvault.com/pulse/68a90
Pulse Author: cryptocti
Created: 2025-08-23 00:08:56

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

Tracking GLOBAL GROUP Ransomware from Mamona to Market Scale

A new ransomware actor, GLOBAL GROUP, emerged on the Ramp4u cybercrime forum in June 2025, claiming to offer a fresh Ransomware-as-a-Service (RaaS) platform. However, forensic evidence reveals that GLOBAL is a rebranded continuation of the Mamona RIP and Black Lock ransomware families. The ransomware, built in Golang, supports cross-platform execution and uses ChaCha20-Poly1305 encryption. It features a dual-portal model for leak site viewing and negotiations, with an AI-powered chatbot for automated communication. The group's infrastructure mistakes exposed backend SSH credentials and real IP addresses. GLOBAL relies on Initial Access Brokers for network infiltration and offers a full-featured affiliate portal for custom payload generation.

Pulse ID: 68a7465dffe0f0d5bcc3161b
Pulse Link: otx.alienvault.com/pulse/68a74
Pulse Author: AlienVault
Created: 2025-08-21 16:16:29

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

@amvinfe got Qilin on the record with a response to accusations by "hastalamuerte" and "Nova." And when Qilin didn't like his reporting and conclusions, they gave him yet another statement.

suspectfile.com/qilin-responds

I especially admired their description of themself, "This is an honest name!" (is there an emoji for smothering laughter?)

I'm just surprised they didn't challenge Marco's statement about their "Call Lawyer" feature.

❓Got questions about Ransomware-as-a-Service (#RaaS)? Perhaps you're wondering how the RaaS model works? Or, what the different extortion categories are? Or, maybe you'd like to see some real-life examples of RaaS groups?

If so, we've got the perfect resource for you! 🫵 Take a look at the "Beginner’s Guide to Ransomware-as-a-Service" and learn how Ransomware-as-a-Service works, as well as some best practices for mitigating #ransomware risks. 👍

With insight into how Ransomware-as-a-Service works, #security teams can implement additional controls to mitigate risk. 🙌

graylog.org/post/a-beginners-g #cybersecurity #cybercrime

DragonForce has been claiming that it's creating this whole cartel and they're getting a lot of responses/inquiries about it. But does anyone else think it's odd that RansomHub and BianLian just disappeared without any announcement of closing or merger?

And I see Everest Team is back, but with a different leak site and without all of their previous data.

Are things really like DragonForce claims or is there a less friendly explanation?

#ESETresearch discovered previously unknown links between the #RansomHub, #Medusa, #BianLian, and #Play ransomware gangs, and leveraged #EDRKillShifter to learn more about RansomHub’s affiliates. @SCrow357 welivesecurity.com/en/eset-res
RansomHub emerged in February 2024 and in just three months reached the top of the ransomware ladder, recruiting affiliates from disrupted #LockBit and #BlackCat. Since then, it dominated the ransomware world, showing similar growth as LockBit once did.
Previously linked to North Korea-aligned group #Andariel, Play strictly denies operating as #RaaS. We found its members utilized RansomHub’s EDR killer EDRKillShifter, multiple times during their intrusions, meaning some members likely became RansomHub affiliates.
BianLian focuses on extortion-only attacks and does not publicly recruit new affiliates. Its access to EDRKillShifter suggests a similar approach as Play – having trusted members, who are not limited to working only with them.
Medusa, same as RansomHub, is a typical RaaS gang, actively recruiting new affiliates. Since it is common knowledge that affiliates of such RaaS groups often work for multiple operators, this connection is to be expected.
Our blogpost also emphasizes the growing threat of EDR killers. We observed an increase in the number of such tools, while the set of abused drivers remains quite small. Gangs such as RansomHub and #Embargo offer their killers as part of the affiliate program.
IoCs available on our GitHub: github.com/eset/malware-ioc/tr