Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Fortinet 320x100px
UtiliaCS 970x120

Tag: cybercrime

Group-IB contributes to INTERPOL’s Operation Secure, leading to the arrest of 32 suspects linked to information stealer malware in Asia

[Singapore; 11 June, 2025] Group-IB, a leading creator of cybersecurity technologies to investigate, prevent, and fight digital crime, announced today that it has contributed to INTERPOL’s “Operation Secure”, which took down the infrastructure linked to information stealers (infostealers) in Asia that claimed more than 216,000 potential victims. The operation, which was conducted from January to April 2025, resulted in the arrest of 32 suspects, taking down more than 20,000 malicious IP addresses and domains, and the seizure of 41 servers containing over 100GB of data that were linked to the cybercriminal activities. During the course of Operation Secure, Group-IB’s Threat Intelligence team

RHC Interviews NOVA Ransomware – “Expect Dangerous Attacks. No One Is Safe.” | BLACKVIEW Series

On May 10, 2025, the City of Pisa suffered a ransomware attack within their computer systems. The next day Nova claimed the attack and on the 21st of the same month threatened to publish 2TB of data stolen from the municipality’s servers. Nova RaaS appeared the first time in the April 2025 period making itself known for its direct and humiliating public communications to victims. From their DLS there does not appear to be a particular focus on specific sectors or states. Nova revamped predecessor RaLord by even going so far as to create a customized chat system for communications with their

Rivendicato un databreach a Deloitte: credenziali GitHub e codice sorgente finiscono sul dark web

Un attacco informatico ai danni di Deloitte è stato rivendicato dal threat actor “303”, che ha pubblicato su un noto forum underground un post con il titolo inequivocabile: “Deloitte.com Source Code + Internal GitHub Credentials – leaked, download!”. Disclaimer: Questo rapporto include screenshot e/o testo tratti da fonti pubblicamente accessibili. Le informazioni fornite hanno esclusivamente finalità di intelligence sulle minacce e di sensibilizzazione sui rischi di cybersecurity. Red Hot Cyber condanna qualsiasi accesso non autorizzato, diffusione impropria o utilizzo illecito di tali dati. Al momento, non è possibile verificare in modo indipendente l’autenticità delle informazioni riportate, poiché l’organizzazione coinvolta non ha ancora rilasciato un

Apple in the crosshairs: alleged data breach of the Cupertino giant published on XSS

May 14, 2025 – In the early hours of this morning, an alarming post appeared on the Russian underground forum XSS , known to be a leading showcase for the buying and selling of compromised data: the Machine1337 group claimed responsibility for an alleged breach of Apple.com’s internal systems. The post, accompanied by the logo of the famous company and signed “Breached by Machine1337”, indicates that in February 2025 Apple would have been the victim of a data breach that would have led to the exposure of internal tools. According to what was declared by the malicious actor, 3,000 files were stolen, offered in samples with a download link. The entire package is put on

healthcare ransomware attacks Europe Italy

Why Europe’s healthcare sector must build resilience to fight the threat of ransomware

Author: Andrea Nicelli, Head of Italy and Spain at Resilience Italy’s critical infrastructure is highly exposed to cyber threats, ranking fourth in the world and first in Europe for number of cyber-attacks faced in 2024. Despite being a critical hub for digital innovation, companies in the country face significant threats from cybercrime, particularly in healthcare, government and universities. These sectors lack basic IT security infrastructure, and the adoption of cyber insurance is minimal. Ransomware is one of the primary threats for Italian organisations, with institutions including the University of Siena, Bologna FC, and SynLab Italia breached last year. Ransomware remained the leading

The Evil Purr – DarkLab Interview to HellCat Ransomware!

HellCat ransomware appeared in the second half of 2024 with and it has attracted the attentions of analysts thanks to the humor within their public statements. We recall the attack to Schneider Electric in France where the group ended up to request a “baguette payment” in their DLS. HellCat group targets are high profile organizations (like Orange, Telefónica, Zurich Group and Pinger) with prolific TTPs which include Jira ticketing system abuses and exploitation of vulnerable public interfaces. One of their recent victims is Jaguar Land Rover that led to a data breach wich highlighted the risk when relying on legacy credentials. HellCat

VanHelsing RaaS: An Expanding Ransomware-as-a-Service Model

The ransomware threat landscape is constantly evolving, with increasingly structured groups adopting sophisticated strategies to maximize profits. VanHelsing is a new player positioning itself in the Ransomware-as-a-Service (RaaS) market, a model that enables even cybercriminals with limited expertise to conduct advanced attacks using an automated platform. Following the February 23, 2025 announcement on an underground forum regarding the VanHelsing RaaS affiliate program, the ransomware group has officially published its first possible victim on its Data Leak Site (DLS). Less than a month after its launch, the appearance of the first compromised organization confirms that VanHelsing is now actively operating. Although the DLS

Paragon Spyware – Let’s talk about privacy and governments

Politics, information technology, and privacy. A triad continually seeking balance with a history of conflict that originates from the introduction of personal computers at the consumer level. Attempts by the U.S. government in preventing access to “strong enough” cryptography for foreign nationals and states were numerous from 1990 onward. Dubbed as the “Crypto Wars,” such attempts were aimed at maintaining an acceptable level to warrant potential decryption by government agencies for public security reasons. Out of this context came the Pretty Good Privacy (PGP) software that allowed authentication and private communications. The use of PGP was widely adopted by a large segment

Babuk Locker 2.0: The New Ransomware Affiliate Program

Babuk, one of the most notorious ransomware groups in cybercrime, has launched the Babuk Locker 2.0 Affiliate Program 2025, an affiliate program for skilled hackers looking to profit from ransomware attacks. This program, published on their data leak site, introduces new advanced features and a more structured model for those wishing to join their criminal network. How the Program Works Babuk Locker 2.0 accepts affiliates from all over the world, regardless of language or origin, provided they have experience in penetration testing and compromising IT systems. Their goal is clear: maximize profits through targeted attacks and manage ransom payments more efficiently. The

NightSpire: A New Player in the Ransomware Landscape

During our reconnaissance into the underground world and criminal groups conducted by Red Hot Cyber’s threat intelligence laboratory DarkLab, we stumbled upon a Data Leak Site of a cyber gang never monitored before: NightSpire. NightSpire is a new ransomware group that has recently emerged on the cybercrime scene. Although no previous information is available about this actor, an analysis of their data leak site (DLS) and their communication provides some key insights into their strategy and operational methods. The group portrays itself as an unstoppable threat to businesses and promises to exploit every vulnerability to their advantage. Below, we analyze the details