Date Detected: 6/2025
Type:Ransomware
Attack Vector: Compromised Legitimate Websites (e.g., WordPress via wp-admin exploits), Domain Shadowing (malicious subdomains on trusted sites), Malicious Software Updates (e.g., browser/Flash Player impersonation), Traffic Distribution Systems (TDS) like Keitaro and Parrot TDS, Malvertising (e.g., Google Ads impersonating Kaiser Permanente HR portal)
Motivation: Financial Gain (MaaS subscriptions, ransomware profits), Cybercrime Enablement (selling access to affiliates), State-Sponsored Activities (via GRU Unit 29155)