The ups and downs of ransomware software development

ransomware

Threat actors are always changing their malware and tactics to evade the technical solutions the anti-virus and other security solution vendors distribute. So it is no surprise that malware gets patches and updates as well: Colonial Pipeline hackers add startling new capabilities to ransomware operation – The Record by Recorded …

If there is way for threat actors to abuse legitimate tools, of course they do it!

Google’s Tag Manager (GTM) is a system for managing HTML and Javascript analytic tags on website, especially ecommerce sites. A report by The Recorded Future has found that threat actors have been installing malicious e-skimmers scripts that can steal customer card data and other personally identifiable information exploiting GTM. Google …