Stealer Malware and Stealer Logs Explained
Stealer logs and the infostealers that harvest them form a key part of the threat landscape and cybercriminal…
Stealer Malware and Stealer Logs Explained Read More »
Stealer logs and the infostealers that harvest them form a key part of the threat landscape and cybercriminal…
Stealer Malware and Stealer Logs Explained Read More »
Take Me Down to Funksec Town: Funksec Ransomware DLS Emergence Cyjax has continued to observe the emergence of
Take Me Down to Funksec Town: Funksec Ransomware DLS Emergence Read More »
Following the emergence of data-leak sites (DLSs) for extortion groups Kairos, Chort, and Termite, Cyjax has observed the
Cyjax recently identified a new financially-motivated extortion group going by the name Kairos, which shares data stolen from
Kairos extortion group turns to initial access brokers Read More »
Introduction Initial access brokers (IABs) facilitate access for ransomware groups, data brokers, and advanced persistent threat groups (APTs)
Introduction As the threat landscape continues to develop, ransomware and data brokerage groups constantly emerge, develop, and disband.
Data-leak site emergence continues to increase Read More »
Introduction From late 2023 and into 2024, the ransomware ecosystem has become more diverse than ever, with an
Here, There, Ransomware: The Surge of New Ransomware Groups Read More »
Introduction Cyjax analysts have identified the distribution of STOP ransomware on Google Groups through mass spam attacks on
STOP ransomware spamming in Usenet Read More »
Introduction In 2022 and 2023, there has been a significant increase in threat actors uniting under singular causes.
Factors Contributing to Threat Actor Unification Read More »