#1 Trending Cybersecurity News & Magazine

We are Hiring!
Thursday, January 2, 2025
The Cyber Express
No Result
View All Result
Free Newsletter
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    LinkedIn Account Hacking

    Lessons for Everyone to Learn from My Personal LinkedIn Account Takeover Experience

    Cybersecurity for Businesses

    Cybersecurity for Businesses in 2025: What to Expect

    PAN-OS Versions

    Critical PAN-OS Vulnerability Added to CISA’s Exploited List: What You Need to Know

    Biggest Global Data Breaches of 2024, Data Breaches of 2024, Data Breaches in 2024, Data Leak, 2024 Data Breaches, 2024 Biggest Global Data Breaches, Ransomware

    The Biggest Global Data Breaches of 2024: Lessons Learned

    KEV Catalog

    Microsoft, Ivanti, and More: 2024 KEV Catalog Highlights Vendor Vulnerabilities

    CVE-2024-43441

    Critical Apache Vulnerabilities: Update Now to Avoid Major Risks

    dumbest things in cybersecurity 2024

    The 5 Dumbest Things in Cybersecurity This Year

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Fake Emails

    Cybercriminals Send Fake Legal Notices to Scam Indians: Here’s What to Know

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Generated AI

    Voice Cloning, Fake Videos & More: AI Is Making Scams Unstoppable

    Holiday season

    Tis the Season for Scammers: How to Stay Cyber Safe This Holiday

    AI red teaming

    AI Red Teaming in Focus: Why CISA Advocates a Secure by Design Approach

    Operation Serengiti Arrests

    Major Cybercrime Operation Nets Over 1,000 Arrests Across Africa

    phishing

    USDA’s FIDO Rollout: A Case Study in Phishing-Resistant MFA

    ANOM Sentencing

    Distributor of ANOM Encrypted Devices Sentenced to Over 5 Years in Prison

    Phobos Ransomware, Phobos, DOJ, Department of Justice, Ransomware, Cybercriminal, Indictment, Evgenii Ptitsyn

    U.S. Extradites and Charges Alleged Phobos Ransomware Admin

    Abandon X, Elon Musk, Hate Speech, Platform X, FC St. Pauli, The Guardian

    European Club and Media Giant Abandon X Amid Growing Hate Speech Concerns

    HHS, GAO, Cybersecurity, Cybersecurity Gaps, Cybersecurity Gaps in Healthcare, Healthcare, Government Accountability Office

    GAO Finds Persistent Gaps in HHS Cybersecurity Efforts in U.S. Healthcare

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

    Third-Party Risk Management in Healthcare

    Why Healthcare CISOs Must Prioritize Third-Party Risk Management

    Streaming Platforms

    Protect Your Streaming Accounts Now Before It’s Too Late

    KnowBe4

    KnowBe4 Uncovers Fake Employee: How a North Korean Hacker Was Hired into the Team

    CTO Strategies for Dark Web Threats

    Protecting Telecom Networks: CTO Strategies for Dark Web Threats

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Cyble

    Cyble Strengthens Regional Cyber Resilience with Infratech Partnership at Black Hat MEA 2024

    Cyber warfare

    Can AI Save the UK from a Cyber Catastrophe? The Fight Against Russian Hackers

    AI in cybersecurity

    AI in Cybersecurity Market Set for Explosive Growth, Projected to Reach $154.8 Billion by 2032

    EYI acquisition

    EY Identity Acquires J Group Consulting to Strengthen Privileged Access Management

    Chinese Threat Actor

    North Korea’s Cyber Evolution and China’s Storm-2077 Unveiled by Microsoft Analysts

    Google Chrome

    DOJ Orders Google to Sell Chrome to End Search Monopoly: A Possible Game-Changer for Competition

    IGT Cyberattack

    Major Cyberattack Targets Gambling Giant IGT, Systems Taken Offline

    Zoom Vulnerabilities

    CERT-In Flags Critical Vulnerabilities in Zoom: Update Your Apps Now

    PopeyeTools Website

    DOJ Takes Down Global Cybercrime Hub PopeyeTools, Seizes Cryptocurrency

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    LinkedIn Account Hacking

    Lessons for Everyone to Learn from My Personal LinkedIn Account Takeover Experience

    Cybersecurity for Businesses

    Cybersecurity for Businesses in 2025: What to Expect

    PAN-OS Versions

    Critical PAN-OS Vulnerability Added to CISA’s Exploited List: What You Need to Know

    Biggest Global Data Breaches of 2024, Data Breaches of 2024, Data Breaches in 2024, Data Leak, 2024 Data Breaches, 2024 Biggest Global Data Breaches, Ransomware

    The Biggest Global Data Breaches of 2024: Lessons Learned

    KEV Catalog

    Microsoft, Ivanti, and More: 2024 KEV Catalog Highlights Vendor Vulnerabilities

    CVE-2024-43441

    Critical Apache Vulnerabilities: Update Now to Avoid Major Risks

    dumbest things in cybersecurity 2024

    The 5 Dumbest Things in Cybersecurity This Year

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Fake Emails

    Cybercriminals Send Fake Legal Notices to Scam Indians: Here’s What to Know

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Generated AI

    Voice Cloning, Fake Videos & More: AI Is Making Scams Unstoppable

    Holiday season

    Tis the Season for Scammers: How to Stay Cyber Safe This Holiday

    AI red teaming

    AI Red Teaming in Focus: Why CISA Advocates a Secure by Design Approach

    Operation Serengiti Arrests

    Major Cybercrime Operation Nets Over 1,000 Arrests Across Africa

    phishing

    USDA’s FIDO Rollout: A Case Study in Phishing-Resistant MFA

    ANOM Sentencing

    Distributor of ANOM Encrypted Devices Sentenced to Over 5 Years in Prison

    Phobos Ransomware, Phobos, DOJ, Department of Justice, Ransomware, Cybercriminal, Indictment, Evgenii Ptitsyn

    U.S. Extradites and Charges Alleged Phobos Ransomware Admin

    Abandon X, Elon Musk, Hate Speech, Platform X, FC St. Pauli, The Guardian

    European Club and Media Giant Abandon X Amid Growing Hate Speech Concerns

    HHS, GAO, Cybersecurity, Cybersecurity Gaps, Cybersecurity Gaps in Healthcare, Healthcare, Government Accountability Office

    GAO Finds Persistent Gaps in HHS Cybersecurity Efforts in U.S. Healthcare

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

    Third-Party Risk Management in Healthcare

    Why Healthcare CISOs Must Prioritize Third-Party Risk Management

    Streaming Platforms

    Protect Your Streaming Accounts Now Before It’s Too Late

    KnowBe4

    KnowBe4 Uncovers Fake Employee: How a North Korean Hacker Was Hired into the Team

    CTO Strategies for Dark Web Threats

    Protecting Telecom Networks: CTO Strategies for Dark Web Threats

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Cyble

    Cyble Strengthens Regional Cyber Resilience with Infratech Partnership at Black Hat MEA 2024

    Cyber warfare

    Can AI Save the UK from a Cyber Catastrophe? The Fight Against Russian Hackers

    AI in cybersecurity

    AI in Cybersecurity Market Set for Explosive Growth, Projected to Reach $154.8 Billion by 2032

    EYI acquisition

    EY Identity Acquires J Group Consulting to Strengthen Privileged Access Management

    Chinese Threat Actor

    North Korea’s Cyber Evolution and China’s Storm-2077 Unveiled by Microsoft Analysts

    Google Chrome

    DOJ Orders Google to Sell Chrome to End Search Monopoly: A Possible Game-Changer for Competition

    IGT Cyberattack

    Major Cyberattack Targets Gambling Giant IGT, Systems Taken Offline

    Zoom Vulnerabilities

    CERT-In Flags Critical Vulnerabilities in Zoom: Update Your Apps Now

    PopeyeTools Website

    DOJ Takes Down Global Cybercrime Hub PopeyeTools, Seizes Cryptocurrency

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
The Cyber Express by Cyble
No Result
View All Result
TRENDING
TARGETED INDUSTRIES -> IT & ITES | Technology | Government & LEA | Healthcare | BFSITARGETED COUNTRIES -> United States | Russian Federation | China | United Kingdom | GermanyTARGETED REGIONS -> North America (NA) | Europe & UK | Asia & Pacific (APAC) | Middle East & Africa (MEA) | Australia and New Zealand (ANZ)IOCs -> a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91 | 7bdbd180c081fa63ca94f9c22c457376 | c67b03c0a91eaefffd2f2c79b5c26a2648b8d3c19a22cadf35453455ff08ead0 | 8c69830a50fb85d8a794fa46643493b2 | bbcf7a68f4164a9f5f5cb2d9f30d9790CVEs -> CVE-2024-21887 | CVE-2023-46805 | CVE-2017-11882 | CVE-2024-21893 | CVE-2021-44228TECHNIQUES -> T1082 | T1140 | T1486 | T1083 | T1105TACTICS -> TA505 | TA0011 | TA0002 | TA0001 | TA453TAGS -> security | the-cyber-express | firewall-daily | the-cyber-express-news | malwareTHREAT ACTORS -> Lockbit | Blackcat | Lazarus | VoltTyphoon | KimsukyMALWARE -> CobaltStrike | Qakbot | Xmrig | Lockbit | IcedidSOURCES -> Darkreading | The Cyber Express | Bleepingcomputer | The Hacker News | Infosecurity Magazine

New Wolphv Ransomware Group on the Dark Web Found Trying to Make a Name

A new team on the dark web named Wolphv ransomware group was found claiming that their leader is a student of uofm.

by Vishwa Pandagle
September 28, 2023
Reading Time: 5 mins read
Wolphv ransomware group
Share on LinkedInShare on Twitter

A new cybercriminal group calling themselves Wolphv Ransomware Group has been reported by researchers. Wolphv claimed that their ransomware has defenses against decryption leaving data locked. In another blatant statement, they mentioned that their leader is a student of the University of Michigan (Uofm).

Wolphv Ransomware Group

The Twitter account of the Wolphv ransomware group (wolphvgroup) was created this month and had some tweets about not being taken seriously. “Why does nobody take us seriously,” read a tweet made by the new ransomware group.

Wolphv ransomware group
Dark web portal of Wolphv ransomware (Photo: Falcon Feeds/ Twitter)

Another tweet read, “guys doubledelete (uofm student) is the leader of wolphv but u didn’t hear that from me.”

They posted an introduction on their dark web portal that said that they have been curating ransomware since 2023. “The other so-called ransomware groups? Forget about them! (they don’t know the first thing about ransomware),” the introduction continued.

The messages and the tone of the statements point towards the naivety of the hackers.

Wolphv Ransomware Capabilities

Wolphv ransomware group
Wolphv ransomware details (Photo: Falcon Feeds/ Twitter)

The members of the Wolphv ransomware group boasted of having a brilliant encryption algorithm and that they breached rot13. ROT13 is an encryption algorithm that replaces the existing letter with the one in the 13th position from it.

Your browser does not support the video tag.

Besides pwning (compromising a computer), the Wolphv ransomware can encrypt data. While asking people to choose their ransomware, they said that they do not like Wolvsec. WolvSec is a security club at the University of Michigan comprising of students, alumni, staff, and other professionals.

Based on the statements made, it looks like members of the Wolphv group want to defame the University of Michigan.

Race of Cybercriminals on the Dark Web

The dark web is getting more and more traction with each passing day with teenagers and other users wanting to make a name and reputation. A user on a hacker forum recently claimed that it was them who had the original Sony data leaks and not the group RansomedVC.

Wolphv ransomware group
Sample data posted by hackers (Photo: VX-Underground/ Twitter)

All this while organizations have been coming forward to thwart the claims as seen in the TransUnion incident. The credit monitoring and reporting agency TransUnion confirmed to The Cyber Express denying that the samples released on the dark web did not match theirs.

Twitter/ X recently witnessed another major cyber attack on Donald Trump Junior’s profile which came to light when strange tweets got posted one after another. The hackers shocked the media and followers of the Trump family when they read the tweet, “I’m sad to announce, my father Donald Trump has passed away. I will be running for president in 2024.”

The account was restored immediately and tweets were taken care of within hours.

While some hackers breach social media for malicious purposes, others sell tools for cyber attacks. These tools are worked upon by paid criminals who are tasked with creating malware that evades detection and the impact of which can’t be easily reversed.

This was seen in a research conducted by Sophos, the cybersecurity solutions firm in collaboration with its internal team called Sophos X-Ops. They found that offensive research contests and competitions were conducted on Exploit and XSS boards among other underground forums.

One of the dark web competitions asked users to explain in writing with graphics how to exploit zero-days in Windows and Linux, privilege escalation, and malware creation with codes to modify it.

All this while victim organizations especially healthcare struggle to keep services ongoing. After suffering a cyber attack this year, Prospect Medical facilities are urging the state to fasten the sale of their facilities to Yale New Haven Health.

The healthcare officials were discussing facing a dire financial crisis after the ransomware attack. Seeing the state of hackers who are young and restless, it will come as no surprise if hackers from the Wolphv ransomware group, in their desperation to make a name, randomly start deploying ransomware and demanding a ransom.

 

Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • More
  • Click to email a link to a friend (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)

Related

Vishwa Pandagle

Vishwa Pandagle

Next Post
Blacktech APT

BlackTech APT Group Exploits Router Weaknesses to Penetrate Corporate Networks

Your browser does not support the video tag.


Follow Us On Google News

Latest Issue is Out. Subscribe Now

Cybersecurity Magazine

Latest Cyber News

LinkedIn Account Hacking
Firewall Daily

Lessons for Everyone to Learn from My Personal LinkedIn Account Takeover Experience

January 2, 2025
Cybersecurity for Businesses
Features

Cybersecurity for Businesses in 2025: What to Expect

January 2, 2025
WPForms
Cyber News

CERT-In Alerts WordPress Users to Critical WPForms Plugin Vulnerability

January 2, 2025
PAN-OS Versions
Cyber News

Critical PAN-OS Vulnerability Added to CISA’s Exploited List: What You Need to Know

January 2, 2025

Categories

Web Stories

Do This on Telegram, Your Bank Account Will Become Zero
Do This on Telegram, Your Bank Account Will Become Zero
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
Cricket World Cup Ticketing Systems Under Cybersecurity
Cricket World Cup Ticketing Systems Under Cybersecurity
Cyber Threats and Online Ticket Scams During the NBA Finals
Cyber Threats and Online Ticket Scams During the NBA Finals
Biometric Data Security: Protecting Sensitive Information
Biometric Data Security: Protecting Sensitive Information
 

Subscribe to Daily News

Stay ahead of the curve with The Cyber Express’s Daily News! Our newsletter delivers the latest cybersecurity headlines, expert insights, and critical updates straight to your inbox every morning. From breaking news and in-depth analysis to emerging threats and industry trends, our curated content ensures you’re always informed and prepared.

Facebook Twitter LinkedIn

About

The Cyber Express

#1 Trending Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

 

Quick Links

  • About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
10080 North Wolfe Road, Suite SW3-200, Cupertino, CA, US 95014

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

© 2022 - 2024 The Cyber Express by Cyble. All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board

© 2022 - 2024 The Cyber Express by Cyble. All Rights Reserved

Hacker News by The Cyber Express
Sithembile (Nkosi) Songo

Sithembile (Nkosi) Songo
CISO
ESKOM

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
Do This on Telegram, Your Bank Account Will Become Zero If You Install the iOS 18 Beta, Your iPhone Could Be Hacked Cricket World Cup Ticketing Systems Under Cybersecurity Cyber Threats and Online Ticket Scams During the NBA Finals Biometric Data Security: Protecting Sensitive Information