
Recent cybersecurity research has unveiled significant developments in ransomware operations. The Cicada3301 ransomware-as-a-service (RaaS) group had its affiliate program infiltrated by Group-IB researchers, who disclosed new insights into the gang's affiliate panel and various ransomware strains. Meanwhile, the Bumblebee malware has been identified in an infection chain for the first time since the May 2024 Europol operation known as Operation Endgame. Additionally, the Akira RaaS gang appears to be reverting to older tactics after a year of experimenting with pure extortion methods and a new encryptor. New variants of the Qilin ransomware-as-a-service, which originally emerged in July 2022 after rebranding from a previous variant named Agenda, have been reported. The latest variant, Qilin.B, boasts enhanced AES-256-CTR and RSA-4096 encryption, posing significant recovery challenges without the attackers' decryption keys. This evolution in ransomware tactics underscores the persistent threat posed by cybercriminals in the digital landscape.
A new advanced Qilin #ransomware variant, Qilin.B, features enhanced AES-256-CTR and RSA-4096 encryption, making recovery nearly impossible without the attackers' keys. Read → https://t.co/ljA8lZfTRG #malware #infosec
New Qilin ransomware encryptor features stronger encryption, evasion https://t.co/vhA8wejtbp
The Qilin ransomware operation first emerged in July 2022 after rebranding a previous variant known as Agenda and rewriting the malware in Rust. https://t.co/x3mfkd0ju9 https://t.co/M3aRCDSVVT