The FBI and CISA collaborated on a joint security advisory to outline the tactics and methods utilized by threat actors in distributing the Phobos ransomware strain across targeted networks. This advisory, constituting part of an ongoing initiative to counter ransomware threats, furnishes indicators of compromise aimed at facilitating rapid identification of potential Phobos infections by security and IT personnel. Phobos ransomware, emerging in 2019, has gained notoriety for its ransomware-as-a-service distribution model, making it one of the more prevalent ransomware strains. Notably, a variant named 8Base ranked among the top 10 active ransomware threats in 2023. Victims span across various sectors, including government, healthcare, education, and critical infrastructure. The advisory highlights various tactics used by Phobos threat actors to gain initial network access, including phishing emails and the use of droppers like SmokeLoader in email attachments. Additionally, threat actors exploit exposed RDP ports through brute-force password-guessing tools. Once inside a network, Phobos actors escalate privileges using executables and bypass access controls to establish persistence. Before encrypting systems, threat actors exfiltrate data and leverage it as leverage for ransom payment. Financial records, legal documents, and network-related information are common targets. Actors also target and delete data backups to prevent recovery without payment. Security measures recommended include vigilance against phishing emails, securing RDP ports, and regularly updating passwords. Additionally, maintaining offline backups and implementing robust security measures can mitigate the impact of Phobos ransomware attacks.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...