by bhartzer on 3/11/25, 2:09 AM with 5 comments
by bhartzer on 3/11/25, 2:14 AM
This suggests the attackers used a double extortion strategy: not only locking files with encryption but also stealing sensitive data to pressure victims into paying a ransom.
by heukenj on 3/16/25, 7:02 PM
Way to expose them.