Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Researchers Uncover Hidden Connections Between Ransomware Groups and Relationships Between Them

Posted on September 18, 2025September 18, 2025 By CWS

In latest months, cybersecurity researchers have uncovered a tangled internet of hidden alliances amongst main ransomware operations, reshaping how defenders understand these threats.

Traditionally handled as distinct entities—Conti, LockBit, Evil Corp, and others—ransomware teams have developed right into a dynamic market the place code, infrastructure, and human capital circulate freely between operators.

The transformation accelerated after main disruptions such because the Conti takedown in mid-2024, forcing associates to scatter and rebrand below new banners.

The result’s a fractured ecosystem the place attribution based mostly solely on ransomware household names is more and more unreliable.

Domaintools analysts recognized overlapping infrastructure footprints and shared binary artifacts that time to useful resource pooling quite than remoted legal factions.

Passive DNS data, shared SSL certificates, and duplicate command-and-control domains revealed that a number of teams have leveraged the identical bulletproof internet hosting suppliers, suggesting both direct collaboration or frequent affiliations on the affiliate stage.

Analytical map (Supply – Domaintools)

These infrastructure overlaps underscore the need for defenders to trace underlying property and behaviors as a substitute of surface-level model labels.

Past infrastructure, detailed code evaluation has uncovered putting similarities in encryption routines and persistence modules.

A comparative disassembly of the loader levels for each Black Basta and QakBot highlights equivalent opcode sequences within the memory-resident decryptor, indicating code reuse or direct lineage.

In a single occasion, the decryption stub present in Black Basta’s preliminary loader intently mirrors the QakBot routine, differing solely by offset values:-

for (int i = 0; i

This snippet illustrates how affine key indexing allows polymorphic encryption throughout a number of malware households, complicating signature-based detection.

An infection Mechanism: Fileless Deployment and Persistence

Delving deeper into the an infection mechanism reveals a classy fileless strategy designed to evade endpoint defenses.

Attackers first exploit uncovered RDP companies or phishing vectors to deploy a light-weight PowerShell loader in reminiscence.

As soon as executed, this loader makes use of the Home windows API’s VirtualAlloc and WriteProcessMemory capabilities to inject a second-stage payload instantly into the explorer.exe course of.

A pattern persistence tactic entails writing a registry key below HKCU:SoftwareMicrosoftWindowsCurrentVersionRun that executes the loader with base64-encoded parameters at person logon.

Domaintools researchers famous that this in-memory injection not solely bypasses conventional AV scans but in addition leverages official system binaries to mix in with regular operations.

By understanding these hidden alliances and an infection ways, cybersecurity groups can prioritize detection of shared infrastructure and code patterns, enabling extra resilient defenses towards a menace panorama outlined by human-driven modularity and speedy rebranding.

Discover this Story Fascinating! Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates.

Cyber Security News Tags:Connections, Groups, Hidden, Ransomware, Relationships, Researchers, Uncover

Post navigation

Previous Post: SonicWall Prompts Password Resets After Hackers Obtain Firewall Configurations
Next Post: BMW Allegedly Breached by Everest Ransomware Group, Internal Documents Reportedly Stolen

Related Posts

How Threat Intelligence Can Save Money and Resources for Businesses Cyber Security News
Hackers Weaponizing WordPress Websites by Injecting Malicious PHP Codes Silently Cyber Security News
UTG-Q-1000 Group Weaponizing Subsidy Schemes to Exfiltrate Sensitive Data Cyber Security News
Hackers Exploit Legitimate Inno Setup Installer to Use as a Malware Delivery Vehicle Cyber Security News
20 Best Network Monitoring Tools in 2025 Cyber Security News
Critical Citrix 0-Day Vulnerability Exploited Since May, Leaving Global Entities Exposed Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New TruffleNet BEC Campaign Leverages AWS SES Using Stolen Credentials to Compromise 800+ Hosts
  • Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive
  • Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User Data
  • Microsoft Patch for WSUS Flaw has Broken Hotpatching on Windows Server 2025
  • Ukrainian Extradited to US Faces Charges in Jabber Zeus Cybercrime Case

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New TruffleNet BEC Campaign Leverages AWS SES Using Stolen Credentials to Compromise 800+ Hosts
  • Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive
  • Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User Data
  • Microsoft Patch for WSUS Flaw has Broken Hotpatching on Windows Server 2025
  • Ukrainian Extradited to US Faces Charges in Jabber Zeus Cybercrime Case

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News