Source |
Cyble |
Identifiant |
8662999 |
Date de publication |
2025-04-15 08:22:39 (vue: 2025-04-15 09:07:09) |
Titre |
Les hacktivistes ciblent l'infrastructure critique, passez à des ransomwares Hacktivists Target Critical Infrastructure, Move Into Ransomware |
Texte |
Présentation
Selon un nouveau rapport Cyble, les hacktivistes vont de plus en plus au-delà des activités traditionnelles telles que les attaques DDOS et les défaillances de sites Web en infrastructure critique plus sophistiquée et attaques de ransomwares.
Dans un rapport pour les clients, Cyble a déclaré que le hacktivisme s'est «transformé en un instrument complexe de guerre hybride» avec la montée en puissance des groupes qui ont adopté des techniques d'attaque plus sophistiquées plus généralement associées aux acteurs de l'État-nation et aux groupes de menaces motivés financièrement.
Hacktivism "ne se limite plus aux explosions idéologiques marginales", selon le rapport. «Il s'agit maintenant d'un appareil de cyber-insurrection décentralisé, capable de façonner les récits géopolitiques, de déstabiliser les systèmes critiques et de s'engager directement dans des conflits mondiaux à travers le domaine numérique.»
Le rapport CYBLE a examiné les groupes hacktiviste les plus actifs au premier trimestre de 2025, les nations et les secteurs les plus ciblés, les techniques d'attaque émergentes, et plus encore.
Les groupes hacktiviste les plus actifs ciblent l'infrastructure critique
Les hacktivistes pro-russes étaient les plus actifs au premier trimestre, dirigés par NONAME057 (16), Hacktivist Sandworm |
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
$50 000 1722 2024 2025 250tb 300tb 300x150 550tb access according accounting actions active activities activity actors administration adopted against align aligned aligning allegedly allies also among announced annual anon anti apparatus approximately are asia assets associated attack attackers attacks backup backups banking based become been below best between beyond bitcoin blogs broader brute bypass campaigns can capable caption= carried channels chart claim claimed clients cloud coalition code com/wp combined common company complex comprehensive compromised conclusion conducted confined conflict conflicts consistent content/uploads/2025/04/cyble continued control coordinated corporate correlated countries country credential credentials critical culminating cyber cyberattacks cybercriminal cybersecurity cyble data database databases ddos decentralized defacements defacer defense defenses delivery deployment destabilizing destroyed development developments digital directly disclosed discover disrupt disruption disruption” distribution documentation documents domain dominant dorking dragons dragonsware drift driven during early east eastern economic eight elections emerging employee encrypted endpoint energy enforcement engaged engaging environments establishment europe events evolution exfiltrated experienced exploited exploiting exposed exposures faced facing file= financial financially firm first fixes focus forcing france fringe from gain gap gaza geopolitical global government group groups growing guard hacktivism hacktivist hacktivists hactivists hamza has have help highest hostilities hosts https://cyble hybrid ics ics/ot ideological illicit image impact implement import incident incidents included including increase increasing increasingly india indohaxsec industrial infrastructure injection instigate instrument insurgency intended internal internet intoransomware israel italy its january jpg just kampung keymous+ known large largely law layer leaked leaks least led levels like likely linked linux longer look looked major management manufacturer march meanwhile medium members methodology middle military ministry mint misconfigured monitoring month months more moroccan most motivated motivation move moving multi multiple named narratives narrowing nation national nations nato network new noname057 notable notably noticeable now number observed often operation operational orchestrate organizations other out outbursts over overflame overlap overview owasp palestinian panels paranoidhax partially payment pentest persistent platforms political practices predicted primarily prioritizing pro procurement program promoting proprietary protecting quarter ransom ransomware records reduced reflects region regional regions remained report reported reprisals resilience resistant responding rise risk risks rivalries russia russian said sandworm scanning sector sectors segmentation servers service services several shaping shared sharp should shows signs single solutions sophisticated sophistication source spain specifications spike sql state statement states steal strategic strikes subsequent such support supporters surface surged sustained system systems target targeted targeting targets tariffs team technical techniques technology telecom telegram terabytes these though threat through tied title= tomsk tool traditional trend trump trust typically ukraine ukrainian united unrest utilities vector visibility vulnerabilities vulnerability warfare” warning water web website were: wider windows workstations yellow yemen zero “continued “embracing “highlights “is “it “pro “reflecting “transformed |
Tags |
Ransomware
Tool
Vulnerability
Threat
Legislation
Industrial
Prediction
Cloud
Technical
|
Stories |
APT 44
|
Move |
|