Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 27, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 27, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 27, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 27, 2025

      Don’t make this costly thermostat mistake – and the best place to put it

      May 27, 2025

      68% of tech vendor customer support to be handled by AI by 2028, says Cisco report

      May 27, 2025

      These $130 Anker earbuds have no business sounding this good for the price

      May 27, 2025

      Pocket is shutting down – here’s how to retrieve what little data you still can

      May 27, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Last Call: Early Access for NativePHP Ends This Week

      May 27, 2025
      Recent

      Last Call: Early Access for NativePHP Ends This Week

      May 27, 2025

      Setup Social Auth Redirects with Laravel Herd

      May 27, 2025

      Community News: Latest PECL Releases (05.27.2025)

      May 27, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft wants to make GamePad gaming faster on Chrome for Windows 11

      May 27, 2025
      Recent

      Microsoft wants to make GamePad gaming faster on Chrome for Windows 11

      May 27, 2025

      Windows 11 KB5058502 restores Win + C, direct download links for version 23H2

      May 27, 2025

      Leak hints at Windows 11’s new feature that optimizes performance, tied to Copilot branding (?)

      May 27, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Five Families Back? Ransomware Group Claims Attacks on UAE Entities

    Five Families Back? Ransomware Group Claims Attacks on UAE Entities

    May 3, 2024

    A threat actor group Stormous Ransomware, affiliated with the Five Families alliance, has claimed responsibility for alleged cyberattacks targeting several prominent UAE entities.

    The list allegedly includes Bayanat, the sovereign wealth fund’s analytics and geospatial intelligence arm; Kids.ae, the government’s digital platform for children; the Telecommunications and Digital Regulatory Authority (TDRA); the Federal Authority for Nuclear Regulation (FANR); and the Sharik citizen portal.

    Source: X

    While Stormous hasn’t disclosed details about the nature of the attacks, the data types or size potentially compromised, they’ve left a message with a link to their blog on the Tor network, urging targets to “stay informed” and offering “more information.

    These alleged cyberattacks on UAE entities have heightened anxieties as they suggest potential data leaks if ransom demands aren’t met.

    Source: X

    Five Families Cyberattack Claims

    This incident comes on the heels of a much larger cyberattack claim by the Five Families earlier, where they targeted a vast number of UAE entities across various sectors. Governmental and private entities like the Roads and Transport Authority (RTA), the Ministry of Cabinet Affairs, and several ministries were reportedly compromised.

    In that alleged cyberattack claim, the group demanded a 150 BTC ransom (approximately $6.7 million USD at today’s exchange rate) threatening to leak stolen data if the demands weren’t met.

    Source: X

    Uncertainties and Potential Implications

    The true motives behind these cyberattacks remain unclear. It’s possible they’re aiming for a significant financial payout, or they may seek to disrupt UAE government operations or damage the country’s reputation for digital security. The targeted entities haven’t yet released any official statements, leaving the situation shrouded in uncertainty.

    If the claims of compromised data are true, this could be the biggest data breach ever witnessed in the UAE and potentially the entire Middle East. The leak of sensitive government or citizen data could have severe consequences, ranging from financial losses to identity theft and national security risks.

    Heightened Cybersecurity Measures a Must

    This incident highlights the critical need for enhanced cybersecurity measures across all UAE entities, both public and private. Investing in advanced security solutions, implementing stricter data protection protocols, and regularly educating employees on cyber threats are all essential steps to prevent future attacks.

    Cybercrime transcends borders. International cooperation between governments and law enforcement agencies is vital to track down these cybercriminals and hold them accountable. Collaborative efforts are crucial for developing effective strategies to combat cyber threats and protect critical infrastructure across the globe.

    The coming days will be crucial in understanding the true extent of these alleged cyberattacks on UAE claims and the UAE government’s response. While the situation is concerning, a prompt and coordinated effort can help mitigate the damage and enhance the country’s digital defenses.

    Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleGoogle Announces Passkeys Adopted by Over 400 Million Accounts
    Next Article How to Use WordPress Embed Iframe Plugin to Embed Videos, PDF, and Other Types of Content in WordPress Posts

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 28, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2022-24067 – Apache Struts Deserialization Vulnerability

    May 28, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    50 Best Websites for Web Design Inspiration and Ideas

    Development

    Universal Design for Visual Disabilities in Healthcare – Addressing Partial Vision Loss – 7

    Development

    CVE-2025-37821 – Linux Kernel Sched Eevdf Crash

    Common Vulnerabilities and Exposures (CVEs)

    Kingdom Come: Deliverance 2 is the perfect RPG sequel — bigger, better, and bolder than ever

    News & Updates
    Hostinger

    Highlights

    Positioning Text Around Elements With CSS Offset

    January 24, 2025

    When it comes to positioning elements on a page, including text, there are many ways…

    Transfer Learning for Structured Pruning under Limited Task Data

    July 10, 2024

    Versa Patches 3 Concerto SD-WAN Vulnerabilities, Including a Perfect 10.0

    May 23, 2025

    Lernstick – secure and mobile learning and working environment

    December 3, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.