The FBI and CISA collaborated on a joint security advisory to outline the tactics and methods utilized by threat actors in distributing the Phobos ransomware strain across targeted networks. This advisory, constituting part of an ongoing initiative to counter ransomware threats, furnishes indicators of compromise aimed at facilitating rapid identification of potential Phobos infections by security and IT personnel. Phobos ransomware, emerging in 2019, has gained notoriety for its ransomware-as-a-service distribution model, making it one of the more prevalent ransomware strains. Notably, a variant named 8Base ranked among the top 10 active ransomware threats in 2023. Victims span across various sectors, including government, healthcare, education, and critical infrastructure. The advisory highlights various tactics used by Phobos threat actors to gain initial network access, including phishing emails and the use of droppers like SmokeLoader in email attachments. Additionally, threat actors exploit exposed RDP ports through brute-force password-guessing tools. Once inside a network, Phobos actors escalate privileges using executables and bypass access controls to establish persistence. Before encrypting systems, threat actors exfiltrate data and leverage it as leverage for ransom payment. Financial records, legal documents, and network-related information are common targets. Actors also target and delete data backups to prevent recovery without payment. Security measures recommended include vigilance against phishing emails, securing RDP ports, and regularly updating passwords. Additionally, maintaining offline backups and implementing robust security measures can mitigate the impact of Phobos ransomware attacks.
Western Digital (WD) has recently patched a critical vulnerability in its My Cloud NAS devices, which could allow remote attackers to take full control of affected systems. This vu...
The cybercriminal ecosystem is shifting with the emergence of Acreed, a new infostealer gaining rapid traction in Russian-speaking forums. Researchers at Intrinsec report that Acre...
Broadcom has released critical security updates addressing three newly disclosed vulnerabilities affecting VMware vCenter Server and VMware NSX. These flaws, identified as CVE-2025...