<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Ransomware Group Uses Harassment Tactics to Secure Payments in Threats</title>
    <link>https://community.isc2.org/t5/Threats/Ransomware-Group-Uses-Harassment-Tactics-to-Secure-Payments/m-p/72184#M1264</link>
    <description>&lt;P&gt;Thanks for sharing&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 19 Jul 2024 08:35:05 GMT</pubDate>
    <dc:creator>Kyaw_Myo_Oo</dc:creator>
    <dc:date>2024-07-19T08:35:05Z</dc:date>
    <item>
      <title>Ransomware Group Uses Harassment Tactics to Secure Payments</title>
      <link>https://community.isc2.org/t5/Threats/Ransomware-Group-Uses-Harassment-Tactics-to-Secure-Payments/m-p/71988#M1251</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A newly identified ransomware group named Volcano Demon is using aggressive tactics to compel victims to pay ransoms. Halycon, an anti-ransomware firm, recently reported that this group has targeted several organisations in the past weeks with a new encryption tool called LukaLocker.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Attack Strategy&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Volcano Demon’s attack method is both simple and effective. Initially, the hackers infiltrate the target’s network, mapping it out and stealing as many sensitive files as they can. Following this, they deploy LukaLocker to encrypt files and entire systems. The victims are then instructed to pay a ransom in cryptocurrency to receive the decryption key and prevent the stolen data from being leaked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cysecurity.news/2024/07/ransomware-group-uses-harassment.html" target="_blank"&gt;https://www.cysecurity.news/2024/07/ransomware-group-uses-harassment.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 14 Jul 2024 20:59:01 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Ransomware-Group-Uses-Harassment-Tactics-to-Secure-Payments/m-p/71988#M1251</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-07-14T20:59:01Z</dc:date>
    </item>
    <item>
      <title>Re: Ransomware Group Uses Harassment Tactics to Secure Payments</title>
      <link>https://community.isc2.org/t5/Threats/Ransomware-Group-Uses-Harassment-Tactics-to-Secure-Payments/m-p/72184#M1264</link>
      <description>&lt;P&gt;Thanks for sharing&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jul 2024 08:35:05 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Ransomware-Group-Uses-Harassment-Tactics-to-Secure-Payments/m-p/72184#M1264</guid>
      <dc:creator>Kyaw_Myo_Oo</dc:creator>
      <dc:date>2024-07-19T08:35:05Z</dc:date>
    </item>
  </channel>
</rss>

