Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Category: Ransomware

Vice Society: Profiling a Persistent Threat to the Education SectorImage showing illustrative example of ransomware like Vice Society with a hand offering money to a second hand holding a key with a computer screen showing a virus image on it
55,528
people reacted

Vice Society: Profiling a Persistent Threat to the Education Sector

  • By JR Gumarin
  • December 6, 2022 at 3:00 AM

10

13 min. read

Ransom Cartel Ransomware: A Possible Connection With REvilRansomware conceptual image, covering threat actors such as Ransom Cartel
66,531
people reacted

Ransom Cartel Ransomware: A Possible Connection With REvil

  • By Amer Elsad and Daniel Bunce
  • October 14, 2022 at 6:00 AM

21

17 min. read

Trending

  • Machine Learning Versus Memory Resident Evil by Esmid Idrizovic
Threat Assessment: Black Basta Ransomware
72,232
people reacted

Threat Assessment: Black Basta Ransomware

  • By Amer Elsad
  • August 25, 2022 at 12:00 PM

53

12 min. read

BlueSky Ransomware: Fast Encryption via MultithreadingRansomware conceptual image, covering groups including BlueSky Ransomware
80,158
people reacted

BlueSky Ransomware: Fast Encryption via Multithreading

  • By Muhammad Umer Khan, Lee Wei, Yang Ji and Wenjun Hu
  • August 10, 2022 at 12:00 PM

1140

7 min. read

Novel News on Cuba Ransomware: Greetings From Tropical ScorpiusRansomware conceptual image, covering groups such as Cuba Ransomware aka Tropical Scorpius
81,902
people reacted

Novel News on Cuba Ransomware: Greetings From Tropical Scorpius

  • By Anthony Galiette, Daniel Bunce, Doel Santos and Shawn Westfall
  • August 9, 2022 at 9:00 AM

79

20 min. read

Exposing HelloXD Ransomware and x4kA conceptual image representing ransomware, including HelloXD.
51,208
people reacted

Exposing HelloXD Ransomware and x4k

  • By Daniel Bunce and Doel Santos
  • June 10, 2022 at 6:00 PM

20

15 min. read

LockBit 2.0: How This RaaS Operates and How to Protect Against ItA conceptual image representing ransomware, such as LockBit 2.0, discussed here.
60,030
people reacted

LockBit 2.0: How This RaaS Operates and How to Protect Against It

  • By Amer Elsad, JR Gumarin and Abigail Barr
  • June 9, 2022 at 6:00 AM

43

16 min. read

Understanding REvil: REvil Threat Actors May Have Returned (Updated)A conceptual image representing the REvil threat actors discussed in the post.
108,713
people reacted

Understanding REvil: REvil Threat Actors May Have Returned (Updated)

  • By Doel Santos and John Martineau
  • June 3, 2022 at 1:00 PM

76

12 min. read

A Look Into Public Clouds From the Ransomware Actor's PerspectiveA conceptual image representing cloud service providers. So far, ransomware in public clouds is rare, partly due to the attention cloud service providers pay to securing their infrastructure.
37,009
people reacted

A Look Into Public Clouds From the Ransomware Actor's Perspective

  • By Jay Chen
  • May 16, 2022 at 6:00 AM

27

14 min. read

Threat Assessment: BlackByte RansomwareA conceptual image representing ransomware, including the BlackByte ransomware discussed here.
42,118
people reacted

Threat Assessment: BlackByte Ransomware

  • By Amer Elsad
  • April 21, 2022 at 12:00 PM

25

10 min. read

2022 Unit 42 Ransomware Threat Report Highlights: Ransomware Remains a Headliner2022 Unit 42 Ransomware Threat Report cover art
48,590
people reacted

2022 Unit 42 Ransomware Threat Report Highlights: Ransomware Remains a Headliner

  • By Unit 42
  • March 24, 2022 at 3:00 AM

38

5 min. read

Threat Assessment: BlackCat RansomwareA conceptual image representing ransomware, such as the BlackCat ransomware discussed here.
76,861
people reacted

Threat Assessment: BlackCat Ransomware

  • By Amanda Tanner, Alex Hinchliffe and Doel Santos
  • January 27, 2022 at 6:00 AM

60

10 min. read

Detecting Patient Zero Web Threats in Real Time With Advanced URL FilteringA conceptual image representing problems on the web, such as the patient zero web threats discussed here.
40,690
people reacted

Detecting Patient Zero Web Threats in Real Time With Advanced URL Filtering

  • By Peng Peng, Fang Liu, Ben Zhang, Stefan Springer and Oleksii Starov
  • December 9, 2021 at 6:00 AM

50

13 min. read

Credential Harvesting at Scale Without MalwareA conceptual image representing malicious email, such as that used for credential harvesting as part of scams such as business email compromise.
47,224
people reacted

Credential Harvesting at Scale Without Malware

  • By Brady Stout
  • September 30, 2021 at 3:00 PM

67

8 min. read

Phishing Eager TravelersA conceptual image representing the COVID-19 pandemic and cybercrime – this blog discusses how threat actors are poised to take advantage of one of the aspects of the slowing spread of the virus: attacking a renewed travel industry with travel-themed phishing campaigns.
47,725
people reacted

Phishing Eager Travelers

  • By Anna Chung and Swetha Balla
  • September 15, 2021 at 6:00 AM

31

9 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.