The Week in Ransomware – January 14th 2022 – Russia finally takes action

Today, the Russian government announced that they arrested fourteen members of the REvil ransomware terrorist group on behalf of US officials.

Although ransomware terrorists have been accused of “trafficking means,” the arrests are the first way in which Russia has banned the activities of ransomware terrorists operating in the country.

In addition, Russia claims to have done so on behalf of the US police, who have historically been reluctant to assist in the investigation of cybercrime.

However, some activists believe that this is the only Russia that is trying to please the USA and that future legal agreements will not be common.

Ukrainian police too built members of the ransomware function who hid at least 50 companies in the USA and Europe. However, the name of the ransomware hacker was not disclosed.

Some stories this week I find a Linux encryptor for AvosLocker ransomware application which looks VMware ESXi, a function of Night Sky ransomware using the Log4j attack, TellYouThePass returns such as the multi-ethnic threat to Golang, and this Magniber ransomware using signed APPX files infecting the victims.

Sponsors who have submitted new ransomware updates and articles this week include: @fwosar, @BleepinComputer, @DanielGallagher, @PolarToffee, @malwrhunterteam, @ demonslay335, @Billtoulas, @jorntvdw, @serghei, @VK_Intel, @malwareform, @struppigel, @LawrenceAbrams, @FourOctets, @Ionut_Ilascu, @Seifreed, @ahnlab, @CrowdStrike, @MsftSecIntel, @ChristiaanBeek, @ fbgwls245, @Bwenzi_A_,@JakubKroustek, and @pcrisk.

January 8, 2022

New Wasp Ransomware

dnwls0719 found a new Wasp Ransomware that adds .0.closed in addition to the saved files.

Wasp Ransomware

January 10, 2022

AvosLocker ransomware Linux version monitors VMware ESXi servers

AvosLocker is the latest redemption team that has added Linux encryption support to its latest version of malware, specifically targeted at VMware ESXi.

FinalSite: No school information has been stolen in the ransomware attack behind the pages

FinalSite today announced the results of a six-day investigation into the ransomware attack last week, saying no evidence of schools had been found or stolen by the attackers.

New version of STOP Ransomware

Jakub Kroustek found a new version of STOP ransomware that adds up .nqhd in addition.

January 11, 2022

Night Sky ransomware uses Log4j error to hack VMware Horizon servers

The Night Sky ransomware team has begun to take advantage of the CVE-2021-44228 vulnerability in the Log4j logging library, also known as Log4Shell, to acquire the VMware Horizon machine.

January 12, 2022

Magniber ransomware using signed APPX files to corrupt systems

Magniber ransomware has been detected using Windows package files (.APPX) signed and licensed downloadable malware that claims to be Chrome and Edge updates.

TellYouThePass ransomware returns as Golang threat

TellYouThePass ransomware has also come out as a Golang-based malware program, which makes it easy to track operating systems, macOS and Linux, in particular.

School has emerged as cyberattack forces APS to ban classes

The cyberattack attack against Albuquerque Public School prompted a major government crackdown on all classes in the state on Thursday and possibly Friday.

New version of STOP ransomware

PCrisk found a new version of STOP ransomware that adds up .zaqi in addition to the saved files.

January 13, 2022

Ukrainian police have arrested ransomware terrorists who hit more than 50 companies

Ukrainian police have arrested a ransomware-linked gang that attacks at least 50 companies in the US and Europe.

January 14, 2022

Russia is cracking down on REvil ransomware terrorists, seizing $ 6.6 million

The Federal Security Service (FSB) of the Russian Federation is set to close the REvil ransomware after US officials released reports of the leader.

That’s for this week! I hope everyone has a great week!

Original Article reposted fromSource link

Disclaimer: The website autopost contents from credible news sources and we are not the original creators. If we Have added some content that belongs to you or your organization by mistake, We are sorry for that. We apologize for that and assure you that this won’t be repeated in future. If you are the rightful owner of the content used in our Website, please mail us with your Name, Organization Name, Contact Details, Copyright infringing URL and Copyright Proof (URL or Legal Document) aT spacksdigital @

I assure you that, I will remove the infringing content Within 48 Hours.

Leave a Reply

Your email address will not be published. Required fields are marked *


How to Cross-Reference in Microsoft Word

To help your readers quickly move on to your content, you can use the Cross-Reference section in Microsoft Word. This allows your audience to simply click and navigate to the content of this document. In contrast Insert Link section in Word which gives you the opportunity to link to other places in your writing, the […]

Read More

How Technology Has Added Different Ways of Winning at Online

Online slots have enjoyed great popularity in recent years, as the technology used on casino sites has allowed developers to incorporate a wide range of content. Here are some suggestions on how to look or get an appointment for antique items. Find a List of Similar Symbols Since the days of the very first input […]

Read More

Airline CEOs Freak Out Over 5G Despite Limited Evidence Of Real World Harm

from everyone-take-it-easy dept We already know that the FAA exists push to set limits on 5G transmission in some cases for security reasons. The problem: The FCC, an organization with expertise in disrupting spectrums, has repeatedly stated that the concerns are baseless based on the FCC’s own investigation. The whole controversy has been heated, the […]

Read More