Aisuru Shifts from DDoS-for-Hire to Proxy Services
Aisuru botnet operators abandon DDoS attack model for residential proxy business, monetizing compromised IoT infrastructure by selling IP rotation services and anonymization to cybercriminals
Expert analysis from Ricnology
Aisuru botnet operators abandon DDoS attack model for residential proxy business, monetizing compromised IoT infrastructure by selling IP rotation services and anonymization to cybercriminals
Qilin ransomware operators breach South Korean managed service provider to deploy encryption across financial institution clients, exploiting trusted network access for supply chain ransomware attack
Shai-Hulud v2 campaign deploys malicious packages across NPM and Maven repositories, harvesting credentials and API keys from JavaScript and Java development environments through dependency poisoning
Aisuru cybercriminals transition from DDoS-for-hire to residential proxy business model, commercializing compromised IoT devices by selling IP rotation and anonymization services to threat actors
Unraveling the Qilin Ransomware Attack: Impacts on South Korea's Financial Sector
Shai-Hulud v2: A Cross-Ecosystem Threat from npm to Maven
Aisuru cybercriminals abandon denial-of-service attacks to commercialize IoT botnet as residential proxy infrastructure, renting IP anonymization and geographic distribution to threat actors
Qilin ransomware operators compromise South Korean managed service provider infrastructure to deploy encryption payloads across multiple financial institutions through trusted supply chain access
Shai-Hulud supply chain campaign extends beyond NPM to target Maven Central repositories, poisoning Java dependencies to steal credentials and secrets from enterprise development environments
Aisuru cybercriminals shift from distributed denial-of-service to residential proxy commercialization, monetizing compromised IoT infrastructure by selling anonymization services to other threat actors
Shai-Hulud v2 campaign expands from NPM to Maven repositories, deploying malicious packages that harvest thousands of API keys, credentials, and secrets from compromised development environments
Aisuru operators abandon DDoS operations for residential proxy subscription model, renting compromised IoT device access to cybercriminals requiring IP rotation and geographic anonymization capabilities