Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

Cartoonist Paul Pope is more worried about killer robots than AI plagiarism

Spiders scattered behind M&S and cooperative cyberattacks, with up to $592 million in damages

Top Startups and High-Tech Funding News for the Weekly Ends June 20, 2025

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Toymaker uses Lagtoy to sell access to Cactus ransomware gangs for double horror
Identity

Toymaker uses Lagtoy to sell access to Cactus ransomware gangs for double horror

userBy userApril 26, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 26, 2025Ravi LakshmananMalware/Vulnerabilities

Cactus ransomware

Cybersecurity researchers detail the activities of early access brokers (IABs) called Toymakers, who have observed handing over access to terr ransomware gangs like cactus.

The IAB is evaluated with moderate confidence to become a financially motivated threat actor, scans vulnerable systems and deploys custom malware called Lagtoy (aka Holerun).

“The lag toy can be used to create reverse shells and execute commands on infected endpoints,” said Ciskotaros researchers Joey Chen, Asheer Malhotra, Ashley Shen, Vuitton Ventura and Brandon White.

Cybersecurity

The malware was first documented by Google-owned Mandiant in late March 2023, and its use stems from threat actors tracked as UNC961. Activity clusters are also known by other names such as Gold Melodies and the Prophet Spider.

Threat actors have been observed to gain initial access by leveraging a massive arsenal of known security flaws in applications aimed at the Internet, and then underwent reconnaissance, qualification harvesting and lag toy deployment within a week.

The attacker also opens an SSH connection to a remote host and downloads a forensic tool called Magnet RAM capture to get a memory dump of a machine that may attempt to collect the victim’s qualifications.

Lagtoy is designed to contact a hardcoded command and control (C2) server to retrieve commands for subsequent executions at the endpoint. This can be used for each Mandiant to create processes and run commands under the specified user with corresponding privileges.

The malware is equipped to handle three commands from the C2 server.

“After about three weeks of activity lull, we observed that the Cactus Ransomware Group would use credentials stolen by toymers to enter the victims’ companies,” Talos said.

Cybersecurity

“Based on the relatively short residence times, lack of data theft and subsequent handover to cactus, it is unlikely that Toymaker had any spy motivating ambitions or goals.”

In the incident analyzed by TALOS, Cactus Ransomware affiliates are said to have carried out their own reconnaissance and sustained activities prior to data delamination and encryption. We also observe several ways to configure long-term access using OpenSSH, AnyDesk, and Ehorus agents.

“Toymaker is a financially motivated early access broker (IAB) that gains access to high-value organizations and forwards access to secondary threat actors who monetize normal access through dual tor and ransomware deployments,” the company says.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleFour deaths have been injured over 500 people as “massive” explosion hit Iran’s Bandar Abbas | News
Next Article Have scientists discovered a new colour called “Oro”? | Science and Technology News
user
  • Website

Related Posts

Spiders scattered behind M&S and cooperative cyberattacks, with up to $592 million in damages

June 21, 2025

Qilin ransomware adds “Cole Lawyer” feature that puts pressure on victims for larger ransoms

June 20, 2025

Television in Iranian states hijacked mid-distance broadcasts amid geopolitical tensions. $90 million stolen from Crypto Heist

June 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Cartoonist Paul Pope is more worried about killer robots than AI plagiarism

Spiders scattered behind M&S and cooperative cyberattacks, with up to $592 million in damages

Top Startups and High-Tech Funding News for the Weekly Ends June 20, 2025

Harvard International Students: What the Judge’s Judgment Means

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Top Startups and High-Tech Funding News for the Weekly Ends June 20, 2025

Apple is talking to you to win AI startup confusion

Mira Murati’s AI Startup Thinking Machine Lab emerges from stealth at $20 billion seed and $1 billion valuation

Elon Musk’s AI startup Xai will increase bond yields to 12.5% ​​with a $5 billion debt hike due to weak investor demand

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.