Close Menu
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview PrepLuminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
  • Home
  • Technology
    • Docker
    • Kubernetes
    • AI
    • Cybersecurity
    • Blockchain
    • Linux
    • Python
    • Tech Update
    • Interview Preparation
    • Internet
  • Entertainment
    • Movies
    • TV Shows
    • Anime
    • Cricket
What's Hot

West Indies players’ safety in IPL and PSL being monitored by CWI

May 14, 2025

Jojo’s Bizarre Adventure Inspires Model Alton Mason’s Outfit to Met Gala – Interest

May 13, 2025

Penguin Random House’s New Disney Licenses to Include Manga – News

May 13, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
  • Home
  • Technology
    • Docker
    • Kubernetes
    • AI
    • Cybersecurity
    • Blockchain
    • Linux
    • Python
    • Tech Update
    • Interview Preparation
    • Internet
  • Entertainment
    • Movies
    • TV Shows
    • Anime
    • Cricket
Luminari | Learn Docker, Kubernetes, AI, Tech & Interview PrepLuminari | Learn Docker, Kubernetes, AI, Tech & Interview Prep
Home » RansomHub Went Dark April 1; Affiliates Fled to Qilin, DragonForce Claimed Control
Cybersecurity

RansomHub Went Dark April 1; Affiliates Fled to Qilin, DragonForce Claimed Control

HarishBy HarishApril 30, 2025No Comments7 Mins Read
Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Email
Share
Facebook Twitter Pinterest Reddit WhatsApp Email


RansomHub Went Dark

Cybersecurity researchers have revealed that RansomHub’s online infrastructure has “inexplicably” gone offline as of April 1, 2025, prompting concerns among affiliates of the ransomware-as-a-service (RaaS) operation.

Singaporean cybersecurity company Group-IB said that this may have caused affiliates to migrate to Qilin, given that “disclosures on its DLS [data leak site] have doubled since February.”

RansomHub, which first emerged in February 2024, is estimated to have stolen data from over 200 victims. It replaced two high-profile RaaS groups, LockBit and BlackCat, to become a frontrunner, courting their affiliates, including Scattered Spider and Evil Corp, with lucrative payment splits.

“Following a possible acquisition of the web application and ransomware source code of Knight (formerly Cyclops), RansomHub quickly rose in the ransomware scene, thanks to the dynamic features of its multi-platform encryptor and an aggressive, affiliate-friendly model offering substantial financial incentives,” Group-IB said in a report.

RansomHub’s ransomware is designed to work on Windows, Linux, FreeBSD, and ESXi as well as on x86, x64, and ARM architectures, while avoiding attacking companies located in the Commonwealth of Independent States (CIS), Cuba, North Korea, and China. It can also encrypt local and remote file systems via SMB and SFTP.

The affiliate panel, which is used to configure the ransomware via a web interface, features a dedicated “Members” section where members of the affiliate group are given the option to create their own accounts on the device.

Cybersecurity

Affiliates have also been provided with a “Killer” module as of at least June 2024 to terminate and bypass security software using known vulnerable drivers (BYOVD). However, the tool has since been discontinued owing to high detection rates.

Per eSentire and Trend Micro, cyber-attacks have also been observed leveraging a JavaScript malware known as SocGholish (aka FakeUpdates) via compromised WordPress sites to deploy a Python-based backdoor connected to RansomHub affiliates.

“On November 25, the group’s operators released a new note on their affiliate panel announcing that any attack against any government institution is strictly forbidden,” the company said. “All affiliates were therefore invited to refrain from such acts because of the high risk and unprofitable ‘return of investment.'”

The chain of events in the aftermath of the downtime of RansomHub infrastructure, per GuidePoint Security, has led to an “affiliate unrest,” with rival RaaS group DragonForce claiming on the RAMP forum that RansomHub “decided to move to our infrastructure” under a new “DragonForce Ransomware Cartel.”

It’s worth noting that another RaaS actor called BlackLock is also assessed to have started collaborating with DragonForce after the latter defaced its data leak site in late March 2025.

“These discussions on the RAMP forums highlight the uncertain environment that RansomHub affiliates appear to be in at the moment, seemingly unaware of the group’s status and their own status amidst a potential ‘Takeover,'” GuidePoint Security said.

“It remains to be seen whether this instability will spell the beginning of the end for RansomHub, though we cannot help but note that the group that rose to prominence by promising stability and security for affiliates may now have failed or betrayed affiliates on both counts.”

Secureworks Counter Threat Unit (CTU), which has also tracked DragonForce’s rebrand as a “cartel,” said the effort is part of a new business model designed to attract affiliates and increase profits by allowing affiliates to create their own “brands.”

This is different from a traditional RaaS scheme where the core developers set up the dark web infrastructure and recruit affiliates from the cybercrime underground, who then conduct the attacks after procuring access to target networks from an initial access broker (IAB) in exchange for 70% of the ransom payment.

“In this model, DragonForce provides its infrastructure and tools but doesn’t require affiliates to deploy its ransomware,” the Sophos-owned company said. “Advertised features include administration and client panels, encryption and ransom negotiation tools, a file storage system, a TOR-based leak site and .onion domain, and support services.”

Another ransomware group to embrace novel tactics is Anubis, which sprang forth in February 2025 and uses a “data ransom” extortion-only option to exert pressure on victims by threatening to publish an “investigative article” containing an analysis of the stolen data and inform regulatory or compliance authorities of the incident.

“As the ransomware ecosystem continues to flex and adapt we are seeing wider experimentation with different operating models,” Rafe Pilling, Director of Threat Intelligence at Secureworks CTU said. “LockBit had mastered the affiliate scheme but in the wake of the enforcement action against them it’s not surprising to see new schemes and methods being tried and tested.”

The development coincides with the emergence of a new ransomware family called ELENOR-corp, a variant of the Mimic ransomware, that’s actively targeting healthcare organizations after harvesting credentials using a Python executable capable of stealing clipboard content.

“The ELENOR-corp variant of Mimic ransomware exhibits enhancements compared to earlier versions, employing sophisticated anti-forensic measures, process tampering, and encryption strategies,” Morphisec researcher Michael Gorelik said.

“This analysis highlights the evolving sophistication of ransomware attacks, emphasizing the need for proactive defenses, swift incident response, and robust recovery strategies in high-risk industries like healthcare.”

Cybersecurity

Anubis and ELENOR-corp are among a fresh crop of ransomware actors that have energized the landscape, even as the persistent threat is showing signs of splintering into smaller groups and frequently rebranding themselves to evade scrutiny and maintain operational continuity, reflecting a “broader shift toward stealth and flexibility” –

CrazyHunter, which has targeted Taiwanese healthcare, education, and industrial sectors and uses BYOVD techniques to circumvent security measures via an open-source tool named ZammoCide
Elysium, a new variant of the Ghost (aka Cring) ransomware family that terminates a hard-coded list of services, disables system backups, deletes shadow copies, and modifies the boot status policy to make system recovery harder
FOG, which has abused the name of the U.S. Department of Government Efficiency (DOGE), and individuals connected to the government initiative in email and phishing attacks to distribute malware-laced ZIP files that deliver the ransomware
Hellcat, which has exploited zero-day vulnerabilities, such as those in Atlassian Jira, to obtain initial access
Hunters International, which has rebranded and launched an extortion-only operation known as World Leaks by making use of a bespoke data exfiltration program
Interlock, which has leveraged the infamous ClickFix strategy to initiate a multi-stage attack chain that deploys the ransomware payload, alongside a backdoor called Interlock RAT and stealers such as Lumma and BerserkStealer
Qilin, which has employed a phishing email masquerading as ScreenConnect authentication alerts to breach a Managed Service Provider (MSP) using an AitM phishing kit and launch ransomware attacks on its customers (attributed to an affiliate named STAC4365)

These campaigns serve to highlight the ever-evolving nature of ransomware and demonstrate the threat actors’ ability to innovate in the face of law enforcement disruptions and leaks.

Indeed, a new analysis of the 200,000 internal Black Basta chat messages by the Forum of Incident Response and Security Teams (FIRST) has revealed how the ransomware group conducts its operations, focusing on advanced social engineering techniques and exploiting VPN vulnerabilities.

“A member known as ‘Nur’ is tasked with identifying key targets within organizations they aim to attack,” FIRST said. “Once they locate a person of influence (such as a manager or HR personnel), they initiate contact via phone call.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



Source link

Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Email
Previous ArticleBitcoin volatility lowest in 563 days, Hayes predicts $1M BTC by 2028
Next Article Nebulous Mantis Targets NATO-Linked Entities with Multi-Stage Malware Attacks
Harish
  • Website
  • X (Twitter)

Related Posts

China-Linked APTs Exploit SAP CVE-2025-31324 to Breach 581 Critical Systems Worldwide

May 13, 2025

Malicious PyPI Package Posing as Solana Tool Stole Source Code in 761 Downloads

May 13, 2025

Deepfake Defense in the Age of AI

May 13, 2025

North Korean Konni APT Targets Ukraine with Malware to track Russian Invasion Progress

May 13, 2025

Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency

May 13, 2025

Türkiye Hackers Exploited Output Messenger Zero-Day to Drop Golang Backdoors on Kurdish Servers

May 13, 2025
Add A Comment
Leave A Reply Cancel Reply

Our Picks

West Indies players’ safety in IPL and PSL being monitored by CWI

May 14, 2025

Jojo’s Bizarre Adventure Inspires Model Alton Mason’s Outfit to Met Gala – Interest

May 13, 2025

Penguin Random House’s New Disney Licenses to Include Manga – News

May 13, 2025

CureIS Healthcare sues Epic Systems, alleging ‘scheme to destroy’

May 13, 2025
Don't Miss
Blockchain

How to Use tsUSDe on TON for Passive Dollar Yield in 2025

May 13, 20254 Mins Read

Looking for a way to earn passive income on your crypto without riding the rollercoaster…

$1B Bitcoin exits Coinbase in a day as analysts warn of supply shock

May 13, 2025

Brave adds Cardano support

May 13, 2025

Building a zero-knowledge trust layer for AI and Web3 — Interview with Polyhedra

May 13, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to Luminari, your go-to hub for mastering modern tech and staying ahead in the digital world.

At Luminari, we’re passionate about breaking down complex technologies and delivering insights that matter. Whether you’re a developer, tech enthusiast, job seeker, or lifelong learner, our mission is to equip you with the tools and knowledge you need to thrive in today’s fast-moving tech landscape.

Our Picks

AWS enters into ‘strategic partnership’ with Saudi Arabia-backed Humain

May 13, 2025

Tencent hires WizardLM team, a Microsoft AI group with an odd history

May 13, 2025

TikTok launches TikTok AI Alive, a new image-to-video tool

May 13, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 luminari. Designed by luminari.

Type above and press Enter to search. Press Esc to cancel.