PROBABLYPWNED
Home/Ransomware News

Ransomware News

Track the latest ransomware attacks, malware campaigns, and threat actor activity. Analysis of ransomware gangs, decryption tools, and defense strategies.

108Malware Articles
MuddyWater Deploys GhostFetch and Telegram-Based Backdoors
Threat Intelligence3 min read

MuddyWater Deploys GhostFetch and Telegram-Based Backdoors

Iranian APT MuddyWater launches Operation Olalampo against MENA organizations, deploying four new malware families including GhostFetch and CHAR, a Rust backdoor controlled via Telegram.

Alex KowalskiFeb 23, 2026
Massiv Android Trojan Spreads via Fake IPTV Apps
Malware4 min read

Massiv Android Trojan Spreads via Fake IPTV Apps

Banking trojan disguised as IPTV streaming apps targets users in Portugal and Greece, enabling device takeover and credential theft through overlay attacks.

James RiveraFeb 22, 2026
PromptSpy: First Android Malware Using Gemini AI at Runtime
Malware4 min read

PromptSpy: First Android Malware Using Gemini AI at Runtime

ESET discovers PromptSpy, the first Android malware weaponizing Google's Gemini AI to maintain persistence by analyzing UI and generating real-time tap instructions to stay pinned in recent apps.

James RiveraFeb 21, 2026
Microsoft: macOS Infostealers Surge With ClickFix and Python
Malware4 min read

Microsoft: macOS Infostealers Surge With ClickFix and Python

Microsoft Defender Experts track expanding infostealer campaigns hitting macOS via ClickFix prompts, malicious DMG installers, and Python-based stealers. DigitStealer, MacSync, and AMOS lead the wave.

James RiveraFeb 18, 2026
SANS Analyst Tracks Malware Using Recycled PNG Payload
Malware4 min read

SANS Analyst Tracks Malware Using Recycled PNG Payload

Xavier Mertens discovers 846 images reusing the same Base64 steganography technique to deliver .NET malware via Equation Editor exploits. Here's how defenders can hunt for copycats.

James RiveraFeb 18, 2026
State Hackers Weaponize Gemini AI Across Attack Lifecycle
Threat Intelligence5 min read

State Hackers Weaponize Gemini AI Across Attack Lifecycle

Google's threat intelligence reveals APT groups from China, Iran, North Korea, and Russia using Gemini for recon, malware development, and phishing. Two AI-powered malware families discovered.

Alex KowalskiFeb 12, 2026
North Korea Uses Deepfake Zoom Calls in Crypto Heists
Threat Intelligence4 min read

North Korea Uses Deepfake Zoom Calls in Crypto Heists

Google Mandiant exposes UNC1069's use of AI-generated deepfake video, compromised executive accounts, and ClickFix attacks to deploy macOS malware against cryptocurrency firms.

Alex KowalskiFeb 12, 2026
SSHStalker Botnet Compromises 7,000 Linux Servers via SSH
Malware4 min read

SSHStalker Botnet Compromises 7,000 Linux Servers via SSH

New Linux botnet SSHStalker infected 7,000 cloud servers using brute-force SSH attacks and 2009-era kernel exploits. Uses IRC for command-and-control while apparently staging for future operations.

James RiveraFeb 12, 2026
Rapid7 Links Notepad++ Breach to Lotus Blossom APT
Malware5 min read

Rapid7 Links Notepad++ Breach to Lotus Blossom APT

Rapid7 attributes the six-month Notepad++ supply chain compromise to Chinese APT Lotus Blossom, revealing a custom Chrysalis backdoor and three distinct infection chains.

James RiveraFeb 6, 2026
SmarterMail Flaw Exploited in Ransomware Attacks
Vulnerabilities3 min read

SmarterMail Flaw Exploited in Ransomware Attacks

CVE-2026-24423 lets unauthenticated attackers execute OS commands on SmarterMail servers. CISA confirms active ransomware exploitation and sets a February 26 patch deadline.

Marcus ChenFeb 6, 2026
Google Dismantles IPIDEA Proxy Network Used by 550+ APTs
Threat Intelligence4 min read

Google Dismantles IPIDEA Proxy Network Used by 550+ APTs

Google Threat Intelligence Group disrupts one of the world's largest residential proxy networks, cutting off infrastructure used by nation-state actors from China, Russia, Iran, and North Korea.

Alex KowalskiJan 31, 2026

Related Data Breaches

Understanding the Ransomware Threat

Ransomware remains one of the most damaging cyber threats facing organizations today. Our coverage tracks active ransomware gangs, new malware variants, attack campaigns, and the evolving tactics used by threat actors.

We analyze ransomware-as-a-service (RaaS) operations, infostealer malware, banking trojans, and nation-state malware campaigns. Each article includes indicators of compromise (IOCs), MITRE ATT&CK mappings, and practical defense recommendations.

New to ransomware? Read our comprehensive guide: What is Ransomware? For broader malware education, see What is Malware?

Notable Ransomware Groups We Track

LockBitActive
ALPHV/BlackCatDisrupted
AkiraActive
PlayActive
Cl0pActive
Black BastaActive
RoyalRebranded
Scattered SpiderActive

All Hacking News

Browse all cybersecurity news including breaches, vulnerabilities, and threat intel.

What is Ransomware?

Complete guide to understanding ransomware attacks and how to prevent them.

Threat Intelligence

APT tracking, nation-state campaigns, and threat actor analysis.