As predicted, it only took a few days into the new year for a new ransomware group to emerge. First identified by MalwareHunterTeam, Night Sky ransomware has already published the information of two victims. BleepingComputer reportedly observed a sample of the Night Sky ransomware and said it is customized to contain a personalized ransom note and hardcoded login credentials to access the victim’s negotiation page. Instead of using a Tor site to communicate with victims, Night Sky uses email addresses and a clear web website running Rocket.Chat. Much like other ransomware groups, Night Sky uses the double-extortion technique, threatening to leak stolen data if a ransom is not paid.
Using Microsoft Sentinel to Detect Confluence CVE-2022-26134 Exploitation
By Akshay Rohatgi and Randy Pargman About this Student Research Project Binary Defense’s mission is