Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Researchers Uncover Hidden Connections Between Ransomware Groups and Relationships Between Them

Researchers Uncover Hidden Connections Between Ransomware Groups and Relationships Between Them

Posted on September 18, 2025September 18, 2025 By CWS

In latest months, cybersecurity researchers have uncovered a tangled internet of hidden alliances amongst main ransomware operations, reshaping how defenders understand these threats.

Traditionally handled as distinct entities—Conti, LockBit, Evil Corp, and others—ransomware teams have developed right into a dynamic market the place code, infrastructure, and human capital circulate freely between operators.

The transformation accelerated after main disruptions such because the Conti takedown in mid-2024, forcing associates to scatter and rebrand below new banners.

The result’s a fractured ecosystem the place attribution based mostly solely on ransomware household names is more and more unreliable.

Domaintools analysts recognized overlapping infrastructure footprints and shared binary artifacts that time to useful resource pooling quite than remoted legal factions.

Passive DNS data, shared SSL certificates, and duplicate command-and-control domains revealed that a number of teams have leveraged the identical bulletproof internet hosting suppliers, suggesting both direct collaboration or frequent affiliations on the affiliate stage.

Analytical map (Supply – Domaintools)

These infrastructure overlaps underscore the need for defenders to trace underlying property and behaviors as a substitute of surface-level model labels.

Past infrastructure, detailed code evaluation has uncovered putting similarities in encryption routines and persistence modules.

A comparative disassembly of the loader levels for each Black Basta and QakBot highlights equivalent opcode sequences within the memory-resident decryptor, indicating code reuse or direct lineage.

In a single occasion, the decryption stub present in Black Basta’s preliminary loader intently mirrors the QakBot routine, differing solely by offset values:-

for (int i = 0; i

This snippet illustrates how affine key indexing allows polymorphic encryption throughout a number of malware households, complicating signature-based detection.

An infection Mechanism: Fileless Deployment and Persistence

Delving deeper into the an infection mechanism reveals a classy fileless strategy designed to evade endpoint defenses.

Attackers first exploit uncovered RDP companies or phishing vectors to deploy a light-weight PowerShell loader in reminiscence.

As soon as executed, this loader makes use of the Home windows API’s VirtualAlloc and WriteProcessMemory capabilities to inject a second-stage payload instantly into the explorer.exe course of.

A pattern persistence tactic entails writing a registry key below HKCU:SoftwareMicrosoftWindowsCurrentVersionRun that executes the loader with base64-encoded parameters at person logon.

Domaintools researchers famous that this in-memory injection not solely bypasses conventional AV scans but in addition leverages official system binaries to mix in with regular operations.

By understanding these hidden alliances and an infection ways, cybersecurity groups can prioritize detection of shared infrastructure and code patterns, enabling extra resilient defenses towards a menace panorama outlined by human-driven modularity and speedy rebranding.

Discover this Story Fascinating! Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates.

Cyber Security News Tags:Connections, Groups, Hidden, Ransomware, Relationships, Researchers, Uncover

Post navigation

Previous Post: SonicWall Prompts Password Resets After Hackers Obtain Firewall Configurations
Next Post: BMW Allegedly Breached by Everest Ransomware Group, Internal Documents Reportedly Stolen

Related Posts

Critical Grafana Vulnerability Let Attackers Escalate Privilege Critical Grafana Vulnerability Let Attackers Escalate Privilege Cyber Security News
Microsoft Confirms Windows 11 24H2 Update Broken Multiple Core Features Microsoft Confirms Windows 11 24H2 Update Broken Multiple Core Features Cyber Security News
Smart Bus Systems Vulnerability Let Hackers Remotely Track and Control Vehicles Smart Bus Systems Vulnerability Let Hackers Remotely Track and Control Vehicles Cyber Security News
Hackers Breaking Internet with 7.3 Tbps and 4.8 Billion Packets Per Second DDoS Attack Hackers Breaking Internet with 7.3 Tbps and 4.8 Billion Packets Per Second DDoS Attack Cyber Security News
PoC Exploit Released for Use-After-Free Vulnerability in Linux Kernel’s POSIX CPU Timers Implementation PoC Exploit Released for Use-After-Free Vulnerability in Linux Kernel’s POSIX CPU Timers Implementation Cyber Security News
Chinese Hackers Exploiting WSUS Remote Code Execution Vulnerability to Deploy ShadowPad Malware Chinese Hackers Exploiting WSUS Remote Code Execution Vulnerability to Deploy ShadowPad Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark