Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Researchers Uncover Hidden Connections Between Ransomware Groups and Relationships Between Them

Posted on September 18, 2025September 18, 2025 By CWS

In latest months, cybersecurity researchers have uncovered a tangled internet of hidden alliances amongst main ransomware operations, reshaping how defenders understand these threats.

Traditionally handled as distinct entities—Conti, LockBit, Evil Corp, and others—ransomware teams have developed right into a dynamic market the place code, infrastructure, and human capital circulate freely between operators.

The transformation accelerated after main disruptions such because the Conti takedown in mid-2024, forcing associates to scatter and rebrand below new banners.

The result’s a fractured ecosystem the place attribution based mostly solely on ransomware household names is more and more unreliable.

Domaintools analysts recognized overlapping infrastructure footprints and shared binary artifacts that time to useful resource pooling quite than remoted legal factions.

Passive DNS data, shared SSL certificates, and duplicate command-and-control domains revealed that a number of teams have leveraged the identical bulletproof internet hosting suppliers, suggesting both direct collaboration or frequent affiliations on the affiliate stage.

Analytical map (Supply – Domaintools)

These infrastructure overlaps underscore the need for defenders to trace underlying property and behaviors as a substitute of surface-level model labels.

Past infrastructure, detailed code evaluation has uncovered putting similarities in encryption routines and persistence modules.

A comparative disassembly of the loader levels for each Black Basta and QakBot highlights equivalent opcode sequences within the memory-resident decryptor, indicating code reuse or direct lineage.

In a single occasion, the decryption stub present in Black Basta’s preliminary loader intently mirrors the QakBot routine, differing solely by offset values:-

for (int i = 0; i

This snippet illustrates how affine key indexing allows polymorphic encryption throughout a number of malware households, complicating signature-based detection.

An infection Mechanism: Fileless Deployment and Persistence

Delving deeper into the an infection mechanism reveals a classy fileless strategy designed to evade endpoint defenses.

Attackers first exploit uncovered RDP companies or phishing vectors to deploy a light-weight PowerShell loader in reminiscence.

As soon as executed, this loader makes use of the Home windows API’s VirtualAlloc and WriteProcessMemory capabilities to inject a second-stage payload instantly into the explorer.exe course of.

A pattern persistence tactic entails writing a registry key below HKCU:SoftwareMicrosoftWindowsCurrentVersionRun that executes the loader with base64-encoded parameters at person logon.

Domaintools researchers famous that this in-memory injection not solely bypasses conventional AV scans but in addition leverages official system binaries to mix in with regular operations.

By understanding these hidden alliances and an infection ways, cybersecurity groups can prioritize detection of shared infrastructure and code patterns, enabling extra resilient defenses towards a menace panorama outlined by human-driven modularity and speedy rebranding.

Discover this Story Fascinating! Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates.

Cyber Security News Tags:Connections, Groups, Hidden, Ransomware, Relationships, Researchers, Uncover

Post navigation

Previous Post: SonicWall Prompts Password Resets After Hackers Obtain Firewall Configurations
Next Post: BMW Allegedly Breached by Everest Ransomware Group, Internal Documents Reportedly Stolen

Related Posts

Hackers Exploit AI Tools Misconfiguration To Run Malicious AI-generated Payloads Cyber Security News
CastleLoader Malware Infected Over 400+ Devices Using Cloudflare-Themed ClickFix Phishing Attack Cyber Security News
Dell Data Breach – Test Lab Platform Hacked by World Leaks Group Cyber Security News
Hackers Could Gain Full Control of Your Rooted Android Devices by Exploiting One Vulnerability Cyber Security News
Chrome 140 Released With Fix For Six Vulnerabilities that Enable Remote Code Execution Attacks Cyber Security News
Microsoft Confirms Recent Windows 11 24H2 Security Update Not Causing SSD/HDD Failures Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Warns of Two Malware Strains Exploiting Ivanti EPMM CVE-2025-4427 and CVE-2025-4428
  • SolarWinds Releases Advisory on Salesloft Drift Security Incident
  • GOLD SALEM Compromise Networks and Bypass Security Solutions to Deploy Warlock Ransomware
  • Russian Fake-News Network CopyCop Added 200+ New Websites to Targets US, Canada and France
  • How to Radically Cut Response Time for Each Security Incident 

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Warns of Two Malware Strains Exploiting Ivanti EPMM CVE-2025-4427 and CVE-2025-4428
  • SolarWinds Releases Advisory on Salesloft Drift Security Incident
  • GOLD SALEM Compromise Networks and Bypass Security Solutions to Deploy Warlock Ransomware
  • Russian Fake-News Network CopyCop Added 200+ New Websites to Targets US, Canada and France
  • How to Radically Cut Response Time for Each Security Incident 

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News