Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Tiny Screens, Big Impact: The Forgotten Art Of Developing Web Apps For Feature Phones

      July 16, 2025

      Kong AI Gateway 3.11 introduces new method for reducing token costs

      July 16, 2025

      Native vs hybrid vs cross-platform: Resolving the trilemma

      July 16, 2025

      JetBrains updates Junie, Gemini API adds embedding model, and more – Daily News Digest

      July 16, 2025

      Cyberpunk 2077 Update 2.3 is bringing more vehicle customization, photo mode options, and one amazing new feature — launching this week

      July 16, 2025

      The cheapest place to get my games just got even cheaper — get an extra 10% off while you can

      July 16, 2025

      Destiny 2: The Edge of Fate reviews open ‘Mixed’ on Steam, with a player count only a fraction of The Final Shape’s — I’m surprised it’s this low after a new expansion

      July 16, 2025

      A rare opportunity is here to get an HP gaming laptop for only $500 — NVIDIA RTX graphics and a 144Hz display at a bargain price

      July 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The details of TC39’s last meeting

      July 17, 2025
      Recent

      The details of TC39’s last meeting

      July 17, 2025

      Vector Search Embeddings and RAG

      July 16, 2025

      Python Meets Power Automate: Trigger via URL

      July 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      FOSS Weekly #25.29: End of Ubuntu 24.10, AUR Issue, Terminal Tips, Screenshot Editing and More Linux Stuff

      July 17, 2025
      Recent

      FOSS Weekly #25.29: End of Ubuntu 24.10, AUR Issue, Terminal Tips, Screenshot Editing and More Linux Stuff

      July 17, 2025

      Cyberpunk 2077 Update 2.3 is bringing more vehicle customization, photo mode options, and one amazing new feature — launching this week

      July 16, 2025

      The cheapest place to get my games just got even cheaper — get an extra 10% off while you can

      July 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»FBI Warns about Silent Ransom Group Targeting Law Firms

    FBI Warns about Silent Ransom Group Targeting Law Firms

    May 27, 2025

    Silent Ransom Group targeting law firms, FBI warns

    The FBI is warning that a threat group is using IT-themed social engineering calls and callback phishing emails to gain remote access to systems and steal sensitive data.

    The Silent Ransom Group (SRG), also known as Luna Moth, Chatty Spider, and UNC3753, will then use the stolen data to extort the law firms, the advisory from the FBI’s Cyber Division said.

    Silent Ransom Group Finds a Niche Targeting Law Firms

    While SRG has historically targeted other sectors such as medical and insurance organizations, beginning in Spring 2023, the group has consistently targeted U.S.-based law firms and organizations with “similar naming conventions,” the FBI said, “likely due to the highly sensitive nature of legal industry data.”

    The group has been operating since 2022 and is primarily known for callback phishing emails, aka reverse vishing, where the group pretends to be well-known companies purporting to charge small subscription fees. If the victim wishes to cancel the fake subscription, they must call the threat actor, who emails the victim a link to download remote access software to gain access to their device or system. Once they’ve established access, the threat group will search for sensitive data to exfiltrate and then send a ransom notice to the victim threatening to release the data if the ransom is not paid.

    Beginning in March 2025, the group changed tactics by calling individuals and claiming to be an employee from their organization’s IT department, known as social engineering calls or vishing, short for “voice phishing.” The threat actor then tries to get the employee to join a remote access session. If the employee grants access to their device, “they are told that work needs to be done overnight,” the FBI said.

    “Once in the victim’s device, a typical SRG attack involves minimal privilege escalation and quickly pivots to data exfiltration conducted through ‘WinSCP’ (Windows Secure Copy) or a hidden or renamed version of ‘Rclone,’” the FBI advisory said.

    In the short amount of time SRG has been pursuing the vishing tactic, “it has been highly effective and resulted in multiple compromises,” the FBI said.

    The group will also call victim organizations to pressure them into ransom negotiations. While SRG has a publicly available site to post victim data, “they are inconsistent in their use of the site, and do not always follow through on posting victim data,” the FBI said.

    SRG Vishing Attacks Difficult to Detect

    Because SRG uses legitimate management and remote access tools, attacks are unlikely to be detected by traditional antivirus tools.

    Organizations are advised to monitor for the following potential signs of compromise:

    • New unauthorized downloads of system management or remote access tools such as Zoho Assist, Syncro, AnyDesk, Splashtop, or Atera
    • WinSCP or Rclone connections made to an external IP address
    • Emails from an unnamed group claiming data was stolen
    • Voicemails or phone calls from an unnamed group claiming data was stolen
    • Emails about subscription services that provide a phone number and require a call to remove pending charges
    • Employees receiving unsolicited phone calls from individuals claiming to work in their IT department.

    Recommendations include:

    • Conducting staff training on phishing
    • Developing and communicating policies for authenticating IT staff with employees
    • Implementing two-factor authentication for all employees.

    The FBI is seeking any information from SRG victims that can be legally shared, such as ransom notes, phone numbers used by the threat actor, communications such as voicemails, cryptocurrency wallet information, and more.

     

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleNew Russian Cyber Threat ‘Laundry Bear’ Hits Western Targets
    Next Article Adidas customers’ personal information at risk after data breach

    Related Posts

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-7712 – The Madara WordPress Core Plugin Unvalidated File Deletion Vulnerability

    July 17, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-7735 – UNIMAX Hospital Information System SQL Injection

    July 17, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Altavize is an AI-powered Exce

    Web Development

    NVIDIA AI Introduces Fast-dLLM: A Training-Free Framework That Brings KV Caching and Parallel Decoding to Diffusion LLMs

    Machine Learning

    Wayback entra a far parte dell’ecosistema FreeDesktop.org

    Linux

    CVE-2025-34074 – Lucee Remote Code Execution Vulnerability in Scheduled Task Functionality

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    This compact laptop dock streamlined my workspace – and it’s buy one get one

    July 12, 2025

    Baseus’ Nomo NU1 Air Spacemate is a handy 12-port dock for those of us with…

    CVE-2025-5857 – “Code-projects Patient Record Management System SQL Injection Vulnerability”

    June 9, 2025

    CVE-2025-5477 – Sony XAV-AX8500 Bluetooth L2CAP Protocol Heap-based Buffer Overflow Remote Code Execution Vulnerability

    June 20, 2025

    CVE-2025-50105 – Oracle Universal Work Queue HTTP Unauthorized Access and Data Manipulation

    July 16, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.