Ransom & Dark Web Issues Week 2, January 2026

Ransom & Dark Web Issues Week 2, January 2026

ASEC Blog publishes Ransom & Dark Web Issues Week 1, January 2026           Qilin ransomware attack against a Korean automotive smart factory automation equipment manufacturer Customer data of a Korean cloud and hosting service provider shared on DarkForums Everest ransomware attack against a major Japanese automobile

December 2025 Threat Trend Report on Ransomware

December 2025 Threat Trend Report on Ransomware

This report provides the number of affected systems confirmed during December 2025, DLS-based ransomware-related statistics, and notable ransomware issues in Korea and abroad. Below is a summary of some information.   The statistics on the number of ransomware samples and affected systems are based on the diagnostic names assigned by

Ransom & Dark Web Issues Week 1, January 2026

Ransom & Dark Web Issues Week 1, January 2026

ASEC Blog publishes Ransom & Dark Web Issues Week 1, January 2026         South Korean University Website Data Shared on DarkForums Saudi Arabian Employment Platform Data Sold on BreachForums and DarkForums Recent Security Activity Involving the Ransomware Group Vect

In-Depth Analysis Report on LockBit 5.0: Operation and Countermeasures

In-Depth Analysis Report on LockBit 5.0: Operation and Countermeasures

Since its first appearance in September 2019, LockBit has been known as one of the most notorious and active Ransomware-as-a-Service (RaaS) groups worldwide. LockBit operates on the RaaS model and is characterized by sophisticated encryption technology and automated propagation capabilities. Initial access is typically gained through vulnerability exploits, brute force

Ransom & Dark Web Issues Week 4, December 2025

Ransom & Dark Web Issues Week 4, December 2025

ASEC Blog publishes Ransom & Dark Web Issues Week 4, December 2025           Denmark points to Russia-linked actors as behind destructive attacks on water facilities and large-scale pre- and post-election DDoS campaigns Customer data of a Japanese automaker leaked following a breach at a U.S. software

Ransom & Dark Web  Issues Week 3, December 2025

Ransom & Dark Web Issues Week 3, December 2025

ASEC Blog publishes Ransom & Dark Web Issues Week 3, December 2025           Qilin targets a South Korean semiconductor back-end firm and a South Korean private equity firm [1], [2] Data from a South Korean online ticketing and reservation platform, sold on DarkForums French interior ministry

November 2025 Threat Trend Report on Ransomware

November 2025 Threat Trend Report on Ransomware

This report provides the number of affected systems confirmed during November 2025, DLS-based ransomware-related statistics, and notable ransomware issues in Korea and abroad. Below is a summary of some information.   The statistics on the number of ransomware samples and affected systems are based on the diagnostic names assigned by

November 2025 Security Issues in Korean and Global Financial Sector

November 2025 Security Issues in Korean and Global Financial Sector

This report comprehensively covers real-world cyber threats and security issues that have occurred in the financial industry in Korea and worldwide. It includes an analysis of malware and phishing cases targeting the financial industry, a list of the top 10 malware strains targeting the industry, and statistics on the sectors

Ransom & Dark Web Issues Week 2, December 2025

Ransom & Dark Web Issues Week 2, December 2025

ASEC Blog publishes Ransom & Dark Web Issues Weeks 2, December 2025.           Source code from a South Korean camping reservation platform sold on DarkForums LockBit 5.0 targets 25 companies worldwide with ransomware attack Agencies from USA and Europe escalate pressure on pro-Russian hacktivists

Threats Behind the Mask of Gentlemen Ransomware

Threats Behind the Mask of Gentlemen Ransomware

Gentlemen is a new ransomware group first identified around August 2025. The group operates a double extortion model that involves breaching corporate networks, exfiltrating data, encrypting the data, and then using the encrypted data to extort victims. During the breach, the group employs typical tactics seen in advanced ransomware groups,