Key Detail | Information |
---|---|
Threat Actors | KillSec (Eastern Europe-Russia Region) |
Campaign Overview | Active since October 2023, involved in ransomware attacks, data breaches, and offering RaaS services. |
Target Regions (Or Victims) | India (29.55%), USA (9.09%), Bangladesh (6.82%), various other nations (54.55%) |
Methodology | Ransomware-as-a-Service (RaaS), Penetration testing, OSINT services. |
Product targeted | Various industries including healthcare, finance, and government. |
Malware Reference | Ransomware, “advanced locker” written in C++, stealer, DDoS tools. |
Tools Used | Penetration testing tools, OSINT techniques, RaaS platform with customizable malware deployment. |
Vulnerabilities Exploited | Weaknesses in targeted organizations’ systems, network access, and data security. |
TTPs | Penetration testing, OSINT for doxxing and corporate espionage, ransomware deployment. |
Attribution | Likely affiliated with Eastern European/Russian groups. |
Recommendations | Strengthen cybersecurity defenses, use monitoring tools, conduct regular penetration testing. |
Source | SOCRadar |
Read full article: https://socradar.io/dark-web-profile-killsec/
Disclaimer: The above summary has been generated by an AI language model.
Leave a Reply