Blogs

Ransomware: To Pay or Not to Pay? That is the Question – Counter -Point

Ransomware: To Pay or Not to Pay? That is the Question – Counter -Point

Contrary to ‘popular opinion,’ in which most of the security community feels that companies should never ever pay a ransomware ransom, my perspective on ransomware is that sometimes it is the only option and companies should pay up. Ransomware attacks exponentially increased throughout 2020, largely because of a rise in cybercrime due to the global pandemic. Ransomware operators have been…

Read more

Indonesian Cyber Jawa: An Emerging Group Vying for Legitimacy

Indonesian Cyber Jawa: An Emerging Group Vying for Legitimacy

The rapid and recent rise of cyber threat actor group Indonesian Cyber Jawa represents a pivot within the Indonesian cyber underground towards a more sophisticated attack toolkit from a relatively underrepresented underground criminal faction. The group is concentrating its defacement efforts on online retailers while simultaneously attempting to defraud targets in the same business vertical. 

Read more

Smaug Ransomware-as-a-Service (RaaS)

Smaug Ransomware-as-a-Service (RaaS)

Vigilante wishes to highlight a threat actor or threat actor group on an exclusive Russian-language Dark Web forum that is currently advertising the Ransomware-as-a-Service (RaaS) known as “Smaug”. Although this type service is not entirely new, the Smaug RaaS platform is a particularly attractive option for lower-tier or unskilled cyber criminals to enter the Ransomware threat space, increasing the proliferation…

Read more

More Groups Following Maze Team Ransomware Model

More Groups Following Maze Team Ransomware Model

Vigilante wishes to highlight two more ransomware groups that have adopted the Maze Team model of extorting their victims to pay: NetWalker and Ako. Under the Maze model, once the group has the victim’s data in its possession, it demands two separate ransoms; the first ransom amount is for providing a decryption key and the second is to delete all the data they copied and exfiltrated before locking up the victims’ files.

Read more