Red Hot Cyber. The Cybersecurity Blog

Babuk Locker 2.0: The New Ransomware Affiliate Program
Babuk, one of the most notorious ransomware groups in cybercrime, has launched the Babuk Locker 2.0 Affiliate Program 2025, an affiliate program for skilled hackers looking to profit from ransomware attacks. This program, published on their data leak site, introduces

NightSpire: A New Player in the Ransomware Landscape
During our reconnaissance into the underground world and criminal groups conducted by Red Hot Cyber’s threat intelligence laboratory DarkLab, we stumbled upon a Data Leak Site of a cyber gang never monitored before: NightSpire. NightSpire is a new ransomware group

Crazyhunter: The Ransomware with the Three-Dimensional Data Annihilation System That Redefines Data Destruction
In the reconnaissance of the world of the underground and criminal groups carried out by Red Hot Cyber’s DarkLab threat intelligence lab, we came across a Data Leak Site of a cyber gang that had never been monitored before: Crazyhunter.

Interviewing ChatGPT: the AI that feels human, to its Asperger’s users.
Have you ever experienced that ChatGPT recognizes who it is talking to? I share my ChatGPT account with my spouse, and when he uses it, he gets the generic, prepackaged answers that most users receive. However, I get a more

Akira Ransomware: The New Threat Using Webcams as Entry Points
Akira represents one of the most recent ransomware threats capable of bypassing traditional organizational defense mechanisms. A recent case analyzed by the S-RM team highlighted how this group leveraged an unprotected webcam to deploy its payload, evading the defenses of

Possible breach at Ukraine’s Ministry of Foreign Affairs: the Qilin Ransomware group claims responsibility for the attack
The Qilin Ransomware group claims to have compromised the systems of Ukraine’s Ministry of Foreign Affairs, stealing private correspondence, personal information, and official decrees. According to the attackers, some of this data has already been sold to third parties. At

22,000 Sites At Risk: New Motors WordPress Vulnerability Allows Total Hacking
Redazione RHC - June 25th, 2025
Attackers are actively exploiting a critical privilege escalation vulnerability in the WordPress Motors theme, allowing them to hijack administrator accounts and take complete control of the target site. The malicious activity was...

Qilin & Associates Law Firm: Ransomware Hires Lawyers, Launches “Intimidation Package”
Redazione RHC - June 25th, 2025
The developers of the Qilin ransomware (recently interviewed by us) offered their partners the help and advice of a team of lawyers, so that they could put pressure on the...

US-Iran Cyberwar: DHS Raises Alarm, American Networks Under Attack
Redazione RHC - June 24th, 2025
The United States has warned of possible cyber attacks by pro-Iranian groups following a series of airstrikes against Iranian nuclear facilities, as part of the armed conflict between Iran and...

“Jailbreak as a Service” is Coming: 60 Euros a Month to Purchase Cybercrime-Ready AI Systems
Redazione RHC - June 24th, 2025
According to a report by Cato Networks, cybercriminals continue to actively use LLM patterns in their attacks. Specifically, we are talking about versions of theGrok and Mixtral patterns that have been deliberately modified to bypass...
Sign up for the newsletter