PROBABLYPWNED
Home/Ransomware News

Ransomware News

Track the latest ransomware attacks, malware campaigns, and threat actor activity. Analysis of ransomware gangs, decryption tools, and defense strategies.

190Malware Articles
CPUID Hijacked: CPU-Z, HWMonitor Downloads Served Malware
Malware5 min read

CPUID Hijacked: CPU-Z, HWMonitor Downloads Served Malware

Attackers compromised CPUID's website API for six hours, redirecting CPU-Z and HWMonitor downloads to trojanized installers that steal browser credentials using advanced evasion techniques.

James RiveraApr 10, 2026
Storm-1175 Deploys Medusa Ransomware Within 24 Hours of Access
Threat Intelligence4 min read

Storm-1175 Deploys Medusa Ransomware Within 24 Hours of Access

Microsoft links China-based Storm-1175 to high-velocity Medusa ransomware attacks exploiting zero-day vulnerabilities. Healthcare, education, and finance sectors hit across Australia, UK, and US.

Alex KowalskiApr 7, 2026
36 Fake Strapi Plugins Deploy Redis RCE and Credential Stealers
Malware4 min read

36 Fake Strapi Plugins Deploy Redis RCE and Credential Stealers

Coordinated npm supply chain attack deploys 36 malicious packages masquerading as Strapi CMS plugins. Attackers target cryptocurrency platforms with Redis exploitation, credential harvesting, and persistent backdoors.

James RiveraApr 7, 2026
Casbaneiro Banking Trojan Spreads via Dynamic PDF Phishing
Malware4 min read

Casbaneiro Banking Trojan Spreads via Dynamic PDF Phishing

Brazilian threat actor Augmented Marauder targets Latin America and Europe with Casbaneiro banking trojan, using dynamically generated court summons PDFs and Horabot for worm-like propagation.

James RiveraApr 5, 2026
Sinobi Ransomware Hits 215 Victims in Six Months
Malware3 min read

Sinobi Ransomware Hits 215 Victims in Six Months

Sinobi, a suspected Lynx/INC rebrand, has grown from 40 victims to 215 since September 2025. The RaaS operation targets US midmarket companies with hybrid Curve25519/AES encryption.

James RiveraApr 4, 2026
Storm Infostealer Decrypts Credentials Server-Side
Malware4 min read

Storm Infostealer Decrypts Credentials Server-Side

New Storm infostealer bypasses Chrome's App-Bound Encryption by shipping encrypted credentials to attacker infrastructure for decryption. Endpoint tools can't detect it.

James RiveraApr 3, 2026
Vidar Infostealer Spreads via Hacked WordPress Sites
Malware4 min read

Vidar Infostealer Spreads via Hacked WordPress Sites

Malwarebytes researchers detected a Vidar infostealer campaign using fake CAPTCHA pages on compromised WordPress sites. ClickFix technique tricks users into running malicious PowerShell.

James RiveraMar 28, 2026
TeamPCP Hijacks Checkmarx KICS Using Stolen Trivy Tokens
Malware4 min read

TeamPCP Hijacks Checkmarx KICS Using Stolen Trivy Tokens

Stolen CI credentials from Trivy breach enabled TeamPCP to compromise Checkmarx KICS GitHub Actions, poisoning all 35 version tags with credential-stealing malware in four-hour window.

James RiveraMar 25, 2026
CanisterWorm Adds Iran-Targeting Kubernetes Wiper
Malware4 min read

CanisterWorm Adds Iran-Targeting Kubernetes Wiper

TeamPCP's supply chain attack expands with a Kubernetes wiper that detects Iranian systems via timezone and locale, wiping clusters while backdooring everyone else.

James RiveraMar 23, 2026

Related Data Breaches

Understanding the Ransomware Threat

Ransomware remains one of the most damaging cyber threats facing organizations today. Our coverage tracks active ransomware gangs, new malware variants, attack campaigns, and the evolving tactics used by threat actors.

We analyze ransomware-as-a-service (RaaS) operations, infostealer malware, banking trojans, and nation-state malware campaigns. Each article includes indicators of compromise (IOCs), MITRE ATT&CK mappings, and practical defense recommendations.

New to ransomware? Read our comprehensive guide: What is Ransomware? For broader malware education, see What is Malware?

Notable Ransomware Groups We Track

LockBitActive
ALPHV/BlackCatDisrupted
AkiraActive
PlayActive
Cl0pActive
Black BastaActive
RoyalRebranded
Scattered SpiderActive

All Hacking News

Browse all cybersecurity news including breaches, vulnerabilities, and threat intel.

What is Ransomware?

Complete guide to understanding ransomware attacks and how to prevent them.

Threat Intelligence

APT tracking, nation-state campaigns, and threat actor analysis.