Vanilla Tempest, a financially driven ransomware group actively targeting US healthcare establishments since June 2021, is employing a strain of ransomware called “INC” for its attacks. Microsoft’s cybersecurity researchers warned that the group’s multistage attacks involved malware like Storm-0494 and Gootloader for initial breaches, using another group’s techniques to infiltrate systems, and leveraging tools like the Supper Backdoor and AnyDesk, among others. The group also employs ransomware like BlackCat, Quantum Locker, Zeppelin and Rhysida.
Ever wonder how crooks get the credentials to unlock stolen phones?
A coalition of law enforcement agencies led by Europol’s European Cybercrime Center shut down iServer, a phishing-as-a-service platform operating from Argentina since 2018. The Argentina-based