Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Why do I still get my news and alert from the 25 -year -old tool

    June 8, 2025

    iPhone 17 can support 50W wireless charging with new QI2.2 Magsafe Chargers: Report

    June 8, 2025

    Pokémon Developer Games Animals for rebirth for Freak PS5, Xbox and PC

    June 8, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»FBI warned of Luna Moth Extortion attacks targeting law firms
    Security

    FBI warned of Luna Moth Extortion attacks targeting law firms

    PineapplesUpdateBy PineapplesUpdateMay 23, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    FBI warned of Luna Moth Extortion attacks targeting law firms
    Share
    Facebook Twitter LinkedIn Pinterest Email

    FBI warned of Luna Moth Extortion attacks targeting law firms

    The FBI warned that a forced recovery gang, known as Silent Ransum Group, is targeting US law firms in Callback Fishing and Social Engineering attacks in the last two years.

    Also known as Luna Moth, Chat Spider, and UnC3753, the danger is active since Group 2022 and was also behind the Bazarcall expeditions, which provided early access to the corporate network for Ryuk and Conti Ransomware attacks.

    In March 2022, after the shutdown of Conti, the danger actors separated from the cybercrime syndicate and created their own operation called Silent Rances Group (SRG).

    In recent attacks, SRG motivates the IT support of the target to achieve access to the network of goals using social engineering strategy in fake sites and phone calls.

    This forced recovery group does not encrypse the systems of the victims and is known for ransom demanding not to leak sensitive information stolen from online compromised equipment.

    “SRG will then direct the employee to join a remote access session, either through the email sent to them, or to navigate on a web page. Once the employee reaches his device, they are told that the work should be done overnight,” FBI. Said In a private industry notification on Friday.

    “Once the victim’s device, a specific SRG attack includes minimal privilege increase in a specific SRG attack and quickly pivotes for data exfoliation made through a hidden or nominal version of ‘WinSCP’ (Windows Secure Copy) or ‘RCLONE’.

    After stealing the figures of the victims, they take them out via ransom email, threaten to sell or publish information, and they will also call the employees of violated organizations to pressurize the ransom talks. While they have a dedicated website where they are leaking the data of their victims, the FBI says the forced recovery gang does not always follow their data leak hazards.

    SRG is targeted in the last one year
    SRG target in the last one year (EclecticIQ)

    To defend against their attacks, the FBI recommends using strong passwords, enables two-factor authentication to all employees, creates regular data backups, and the staff conducts training on detection of fishing efforts.

    The FBI warning follows a recent Economic Report, expanding the SRG attacks that target legal and financial institutions in the United States, in which the attackers are seen to register the domain “to support the portal for” helping or supporting the portal for major American law firms and financial services, using Jodi Typosquated Pattern. “

    The victims are being sent malicious emails with fake helpdesk numbers, urging them to make calls to solve various non-existent problems. However, Luna Moth Operator will attempt to cheat employees of targeted companies in establishing distance monitoring and management (RMM) software from fake IT help desk sites to the employees of targeted companies applying IT employees at the other end.

    Once the RMM tool is installed and launched, the actor of the danger receives keyboard access, which allows them to look for valuable documents on compromised equipment and shared drivers that will later be exhaled using RCLone (Cloud Sinking) or Vinnakpi (via SFTP).

    According to the EclecticIQ, the demand for Rancem is sent by the Silent Ranesam Group Range between one and eight million USD, depending on the size of the company.


    Red Report 2025

    Based on the analysis of 14M malicious tasks, search for the top 10 MITERAT & CK techniques behind the 93% attacks and how to defend them against them.

    attacks extortion FBI firms law Luna moth targeting warned
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleThe price of bitcoin falls 4% because Trump EU Tariff Talk over $ 300 meter fluid
    Next Article Artemis Ciford and Ion Stoika covered the moral crisis in sessions: AI
    PineapplesUpdate
    • Website

    Related Posts

    How-To

    These are the risk of using dark web – even if you are not breaking the law

    June 8, 2025
    Security

    New Mirai Botnet infected TBK DVR device through command injection flour

    June 8, 2025
    Web3

    How is crypto law moving forward

    June 8, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025619 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025557 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025488 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Sigma BF Hands-on: A mistake minimum

    May 17, 20250 Views

    This Github trick lets the chat dissecting your code within minutes – how is here

    May 17, 20250 Views

    3 piping hot pizza de facts for bitcoin connoisseur

    May 17, 20250 Views
    Our Picks

    Why do I still get my news and alert from the 25 -year -old tool

    June 8, 2025

    iPhone 17 can support 50W wireless charging with new QI2.2 Magsafe Chargers: Report

    June 8, 2025

    Pokémon Developer Games Animals for rebirth for Freak PS5, Xbox and PC

    June 8, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.