Donation-Based Ransomware Groups

An insights article comparing donation-model ransomware operators such as MalasLocker, exploring the ethics, tactics, and implications of threat actors who demand charitable giving instead of cryptocurrency payments.
Emerging Ransomware Threats and Securing Open-Source Email Infrastructure

An insights article highlighting the rise of unconventional ransomware groups targeting open-source email platforms like Zimbra, including a technical bulletin with actionable guidance for UK organisations.
DarkVault

A threat profile of DarkVault, a stealthy ransomware group using double extortion, custom tooling, and targeted campaigns against data-rich organisations in Europe and the UK.
RansomHouse

A threat profile of RansomHouse, a data-focused extortion group known for avoiding encryption and instead exfiltrating and leaking sensitive data to pressure victims into ransom payments.
Cl0p

A comprehensive threat profile of Cl0p, a data-extortion ransomware group known for exploiting zero-day vulnerabilities and orchestrating large-scale attacks on enterprise file transfer systems.
Silent Ransom (Silk Typhoon) – Threat Actor Profile
A threat profile of Silent Ransom (Silk Typhoon), a Chinese threat group using stealthy techniques to conduct intrusions, espionage, and extortion without deploying traditional ransomware payloads.
Dunghill Leak
A threat profile of Dunghill Leak, a data extortion group known for targeting critical infrastructure and educational institutions, operating with unclear motives and inconsistent messaging.
MalasLocker
A threat profile of MalasLocker, a ransomware and data extortion group known for exploiting Zimbra vulnerabilities, targeting email servers, and demanding charitable donations instead of ransom payments.