Mikael Thalen reports: Individuals with connections to SiegedSec, the now-defunct group of “gay furry hackers” who leaked data relating to the think tank behind Project 2025, believe their former leader may have been arrested in a raid by law enforcement. In remarks to X on Wednesday, @mewmrrpmeow, a former member of the group, stated that “vio,” who once…
Canadian citizen allegedly involved in Snowflake attacks consents to extradition to US
Matt Kapko reports that a Canadian national has consented to be extradited to the United States to face federal charges that could send him away for a long, long time: A Canadian citizen is one step closer to standing trial in the United States for his alleged involvement in a series of attacks targeting as…
Four months after learning of a vendor’s breach, Concord Orthopaedics notifies almost 68,000 patients (1)
In November 2024, Everest Team added Concord Orthopaedics (“COPA”) to its dark web leak site (DLS) with screenshots offered as proof of claims. At the time, Everest claimed to have acquired “medical records and personal data of all patients from 2018. More than 30,000 identity documents.” On March 25, 2025, COPA mailed notifications to those…
Blacklock Ransomware: A Late Holiday Gift with Intrusion into the Threat Actor’s Infrastructure
As seen on Resecurity’s blog, and where they are entitled to take a victory lap: Dubbed “BlackLock” (aka “El Dorado” or “Eldorado“), the ransomware-as-a-service (RaaS) outfit has existed since March 2024. In Q4 of last year, it increased its number of data leak posts by a staggering 1,425% quarter-on-quarter. According to independent reporting, a relatively new group has rapidly accelerated…
Oracle customers confirm data stolen in alleged cloud breach is valid
Oracle continues to deny it had any breach, but customers and researchers are claiming otherwise. Lawrence Abrams reports: Despite Oracle denying a breach of its Oracle Cloud federated SSO login servers and the theft of account data for 6 million people, BleepingComputer has confirmed with multiple companies that associated data samples shared by the threat actor…
Shifting the sands of RansomHub’s EDRKillShifter
Jakub Souček and Jan Holman report: The RansomHub ransomware-as-a-service (RaaS) operation affiliates were linked to established gangs Medusa, BianLian, and Play, which share the use of RansomHub’s custom-developed EDRKillShifter. ESET researchers take a look back at the significant changes in the ransomware ecosystem in 2024 and focus on the newly emerged and currently dominating ransomware-as-a-service…