Who is the Kimwolf Botmaster “Dort”?

This article investigates the identity of "Dort," the individual believed to be the botmaster behind Kimwolf, a massive botnet responsible for significant disruptive attacks. Following the disclosure of a vulnerability that enabled the creation of Kimwolf, Dort has orchestrated retaliatory DDoS, doxing, and harassment campaigns against those involved in exposing the botnet.

APT37 hackers use new malware to breach air-gapped networks

The North Korean APT37 hacking group is using new malware, delivered via removable drives, to bridge air-gapped networks and conduct covert surveillance. This new toolset allows them to move data between connected and isolated systems.

Ransomware payments cratered in 2025, but attacks surged to record highs

Ransomware payments significantly decreased in 2025, despite a surge in the number of ransomware attacks reaching record levels. This suggests that while attacks are becoming more frequent, victims are less willing or able to pay the ransom demands, possibly due to improved defenses or a shift in attacker tactics.

CISA warns that RESURGE malware can be dormant on Ivanti devices

CISA has released information regarding RESURGE malware, used in conjunction with the CVE-2024-1709 exploit, targeting Ivanti Connect Secure devices. RESURGE is a malicious implant that can remain dormant on compromised systems.

Malicious Go Crypto Module Steals Passwords, Deploys Rekoobe Backdoor

A malicious Go module, disguised as a legitimate crypto library, steals passwords entered in the terminal and deploys the Rekoobe backdoor on Linux systems. The module, github[.]com/xinfeisoft/crypto, mimics the 'golang.org/x/crypto' codebase but contains malicious code for data exfiltration and backdoor deployment.

900 Sangoma FreePBX Instances Infected With Web Shells

Approximately 900 Sangoma FreePBX instances have been infected with web shells. The attacks leveraged a post-authentication command injection vulnerability present in the endpoint manager interface.

Fake Fedex Email Delivers Donuts!, (Fri, Feb 27th)

A fake FedEx email is being used to deliver malware instead of just redirecting users to phishing sites. The email claims to be a delivery notification but contains a malicious payload.

Phishing Attacks Against People Seeking Programming Jobs

North Korean hackers are posing as recruiters to target job seekers in the programming field. They lure candidates into running malicious code during coding challenges, which installs malware on their systems.

Ransomware groups switch to stealthy attacks and long-term access

Ransomware groups are shifting tactics towards stealthy infiltration and long-term access, focusing on data exfiltration and the threat of public exposure as their main extortion mechanism. They are using defense evasion and persistence techniques, routing command-and-control traffic through trusted enterprise services to blend in with normal business traffic, and chaining vulnerabilities for greater impact.

UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor

Cisco Talos is tracking a new threat activity cluster, UAT-10027, which has been targeting the U.S. education and healthcare sectors since at least December 2025. The group deploys a novel backdoor called Dohdoor that leverages DNS-over-HTTPS (DoH) for command and control.

Ransomware payment rate drops to record low as attacks surge

The ransomware payment rate has dropped to a record low of 28% in the past year, even as the number of claimed ransomware attacks has risen significantly. This indicates that organizations are becoming more resilient to ransomware demands, potentially due to improved backup strategies, incident response plans, and a greater willingness to restore from backups rather than pay the ransom.

Steaelite RAT combines data theft and ransomware management capability in one tool

A new remote access trojan (RAT) called Steaelite has emerged, combining data theft and ransomware capabilities into a single tool, available on underground cybercrime sites since November. It allows attackers to perform reconnaissance, credential harvesting, data exfiltration, and soon, ransomware deployment, all from a single dashboard, potentially lowering the barrier to sophisticated double extortion attacks.

Fake Next.js job interview tests backdoor developer's devices

Microsoft Defender has uncovered a campaign where threat actors are backdooring developer's machines through malicious repositories disguised as Next.js projects and coding tests. The malicious code installs an information-stealing backdoor, enabling unauthorized access and data exfiltration.

RAMP Forum Seizure Fractures Ransomware Ecosystem

The seizure of the RAMP forum has disrupted the ransomware ecosystem, causing groups to fracture and potentially reform. Researchers advise defenders to monitor these shifts and use the intelligence to inform their security strategies.

Marquis sues SonicWall over backup breach that led to ransomware attack

Marquis Software Solutions is suing SonicWall, alleging negligence and misrepresentation related to a backup breach that resulted in a ransomware attack affecting 74 U.S. banks. The lawsuit claims SonicWall failed to adequately protect its systems, leading to the breach and subsequent ransomware incident.

Malicious NuGet Packages Stole ASP.NET Data; npm Package Dropped Malware

Researchers have discovered four malicious NuGet packages that steal ASP.NET Identity data from web application developers. The packages also manipulate authorization rules to establish backdoors in compromised applications, highlighting risks associated with supply chain attacks targeting developers.

Microsoft warns of job‑themed repo lures targeting developers with multi‑stage backdoors

Microsoft is warning of a coordinated campaign targeting software developers through malicious repositories disguised as legitimate Next.js projects and technical assessments. The campaign uses various methods to execute malicious code, including exploiting trust in shared code and developer workflows, to gain persistence within developer systems and access sensitive data.

Phishing campaign targets freight and logistics orgs in the US, Europe

A phishing campaign is targeting freight and logistics organizations in the U.S. and Europe, with the financially motivated threat group 'Diesel Vortex' using 52 domains to steal credentials. The attackers are focusing on the freight and logistics sector to potentially gain access to financial resources or sensitive shipment data.

What are the types of ransomware attacks?

The article discusses various types of ransomware attacks, including crypto ransomware, double extortion ransomware, encryptionless ransomware, locker ransomware, scareware, and Ransomware-as-a-Service (RaaS). It highlights that cybercriminals are constantly seeking vulnerabilities and adapting their tactics to maximize profits, with crypto ransomware being the most common type.

Lazarus Group Picks a New Poison: Medusa Ransomware

The Lazarus Group, a North Korean threat actor, has added Medusa ransomware to its arsenal. They also used Comebacker backdoor, Blindingcan RAT, and Infohook info stealer in recent attacks, indicating a diverse toolkit for targeting victims.

North Korea's Lazarus Group targets healthcare orgs with Medusa ransomware

The Lazarus Group, a North Korean threat actor, is now using Medusa ransomware to target healthcare organizations and other victims. At least one US healthcare organization and an entity in the Middle East have been targeted, according to researchers at Symantec and Carbon Black.

New ‘Sandworm_Mode’ Supply Chain Attack Hits NPM

A new supply chain attack dubbed 'Sandworm_Mode' has been discovered targeting the NPM package repository. The malicious code spreads like a worm, poisons AI assistants, exfiltrates secrets, and includes a destructive kill switch.

Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks

The Lazarus Group, a North Korean threat actor, has been observed using Medusa ransomware in attacks targeting entities in the Middle East and U.S. healthcare. The attacks, reported by Symantec and Broadcom, highlight the group's evolving tactics and continued focus on financially motivated cybercrime.

Shai-Hulud-style NPM worm hits CI pipelines and AI coding tools

A supply chain attack dubbed SANDWORM_MODE is targeting developers through typosquatted npm packages. The worm steals credentials from local environments and CI systems and uses them to modify other repositories, potentially wiping the home directory upon detection.

North Korean Lazarus group linked to Medusa ransomware attacks

The North Korean Lazarus group is linked to Medusa ransomware attacks targeting U.S. healthcare organizations. These attacks are extortion-based and highlight the group's continued evolution and targeting of critical infrastructure sectors.

Iran's MuddyWater Targets Orgs With Fresh Malware as Tensions Mount

Iranian threat group MuddyWater has launched new attacks against organizations in the Middle East and Africa, deploying fresh malware strains and payloads. The group, known for its persistent activity, is exploiting heightened tensions in the region to target vulnerable organizations.

APT28 Targeted European Entities Using Webhook-Based Macro Malware

APT28, a Russian state-sponsored threat actor, conducted a campaign targeting Western and Central European entities between September 2025 and January 2026. Dubbed Operation MacroMaze, the campaign utilized webhook-based macro malware and exploited legitimate services.

Another day, another malicious JPEG, (Mon, Feb 23rd)

The article discusses a malware campaign using malicious JPEG files with embedded payloads, similar to campaigns previously discussed on the SANS Internet Storm Center. The author found a new campaign using this technique while reviewing malware samples caught by a customer's email proxy.

New Arkanix stealer blends rapid Python harvesting with stealthier C++ payloads

Kaspersky researchers have discovered a new infostealer called "Arkanix" that is being marketed as Malware-as-a-Service (MaaS). Arkanix is written in both Python and C++, allowing its subscribers to target a wider range of environments, and is suspected to have been developed with the aid of a large language model.

Recent RoundCube Webmail Vulnerability Exploited in Attacks

A recently patched vulnerability in RoundCube Webmail is being actively exploited. The flaw, patched in December 2025 (likely a typo and meant to be 2023 or 2024 given the current date), allows for cross-site scripting (XSS) attacks through the use of animate tags within SVG documents.

Attackers exploit Ivanti EPMM zero-days to seize control of MDM servers

Attackers are actively exploiting two critical zero-day vulnerabilities, CVE-2026-1281 and CVE-2026-1340, in Ivanti's Endpoint Manager Mobile (EPMM) to remotely execute arbitrary code and gain unauthenticated control of enterprise mobile device management infrastructure. These vulnerabilities allow attackers to install backdoors that persist even after patches are applied, impacting mobile fleets and corporate networks.