Aside from making the cryptocurrency transaction within the month of the intrusion, Kadokawa also had its executives’ email communications with BlackSuit regarding the receipt of the ransom shared by an anonymous source to Kyodo News.
Related Posts
ValleyRAT malware spread via bogus software installers
Attackers have used a malicious Google ad with Homebrew’s proper “brew.sh” URL to redirect to the typosquatted “brewe[.]sh” site, which…
RansomHub takes responsibility for Texas city, Minneapolis agency breaches
Both Texas’ City of Coppell and the Minneapolis Park and Recreation Board were admitted to have been compromised by the…
NPM package poses as legit Ethereum smart contract, injects Quasar RAT
A malicious npm package has been posing as a tool for detecting bugs in Ethereum smart contracts, but instead deploys…