Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

This week’s science news: World’s oldest rock art, giant freshwater reservoir discovered off East Coast, and biggest solar radiation storm in decades

Multi-stage phishing campaign targeting Russia with Amnesia RAT and ransomware

New DynoWiper malware used in attempted sandworm attack on Poland’s power sector

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Toymaker uses Lagtoy to sell access to Cactus ransomware gangs for double horror
Identity

Toymaker uses Lagtoy to sell access to Cactus ransomware gangs for double horror

userBy userApril 26, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 26, 2025Ravi LakshmananMalware/Vulnerabilities

Cactus ransomware

Cybersecurity researchers detail the activities of early access brokers (IABs) called Toymakers, who have observed handing over access to terr ransomware gangs like cactus.

The IAB is evaluated with moderate confidence to become a financially motivated threat actor, scans vulnerable systems and deploys custom malware called Lagtoy (aka Holerun).

“The lag toy can be used to create reverse shells and execute commands on infected endpoints,” said Ciskotaros researchers Joey Chen, Asheer Malhotra, Ashley Shen, Vuitton Ventura and Brandon White.

Cybersecurity

The malware was first documented by Google-owned Mandiant in late March 2023, and its use stems from threat actors tracked as UNC961. Activity clusters are also known by other names such as Gold Melodies and the Prophet Spider.

Threat actors have been observed to gain initial access by leveraging a massive arsenal of known security flaws in applications aimed at the Internet, and then underwent reconnaissance, qualification harvesting and lag toy deployment within a week.

The attacker also opens an SSH connection to a remote host and downloads a forensic tool called Magnet RAM capture to get a memory dump of a machine that may attempt to collect the victim’s qualifications.

Lagtoy is designed to contact a hardcoded command and control (C2) server to retrieve commands for subsequent executions at the endpoint. This can be used for each Mandiant to create processes and run commands under the specified user with corresponding privileges.

The malware is equipped to handle three commands from the C2 server.

“After about three weeks of activity lull, we observed that the Cactus Ransomware Group would use credentials stolen by toymers to enter the victims’ companies,” Talos said.

Cybersecurity

“Based on the relatively short residence times, lack of data theft and subsequent handover to cactus, it is unlikely that Toymaker had any spy motivating ambitions or goals.”

In the incident analyzed by TALOS, Cactus Ransomware affiliates are said to have carried out their own reconnaissance and sustained activities prior to data delamination and encryption. We also observe several ways to configure long-term access using OpenSSH, AnyDesk, and Ehorus agents.

“Toymaker is a financially motivated early access broker (IAB) that gains access to high-value organizations and forwards access to secondary threat actors who monetize normal access through dual tor and ransomware deployments,” the company says.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleFour deaths have been injured over 500 people as “massive” explosion hit Iran’s Bandar Abbas | News
Next Article Have scientists discovered a new colour called “Oro”? | Science and Technology News
user
  • Website

Related Posts

Multi-stage phishing campaign targeting Russia with Amnesia RAT and ransomware

January 24, 2026

New DynoWiper malware used in attempted sandworm attack on Poland’s power sector

January 24, 2026

Who authorized this agent? Rethinking access, accountability, and risk in the age of AI agents

January 24, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

This week’s science news: World’s oldest rock art, giant freshwater reservoir discovered off East Coast, and biggest solar radiation storm in decades

Multi-stage phishing campaign targeting Russia with Amnesia RAT and ransomware

New DynoWiper malware used in attempted sandworm attack on Poland’s power sector

Who authorized this agent? Rethinking access, accountability, and risk in the age of AI agents

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.