Cybersecurity & AI Insights

Expert analysis from Ricnology

Qilin Ransomware Breaches Korean Financial MSP Networks
cybersecurity tech news security

Qilin Ransomware Breaches Korean Financial MSP Networks

Qilin operators compromise South Korean managed service provider infrastructure to deploy ransomware across financial institutions, exploiting trusted MSP access for coordinated encryption campaign

December 3, 2025 3 min read
Shai-Hulud v2 Infects Maven and NPM with Credential Theft
cybersecurity tech news security

Shai-Hulud v2 Infects Maven and NPM with Credential Theft

Shai-Hulud v2 deploys typosquatting packages across Maven and NPM repositories, embedding credential harvesters that exfiltrate developer API keys, tokens, and authentication secrets from build environments

December 3, 2025 3 min read
Aisuru Pivots from DDoS Attacks to Proxy Monetization
cybersecurity tech news security

Aisuru Pivots from DDoS Attacks to Proxy Monetization

Aisuru botnet operators transition from DDoS-for-hire services to residential proxy business model, commercializing compromised IoT devices by selling IP rotation and web scraping infrastructure to threat actors

December 3, 2025 3 min read
Qilin Ransomware Targets Korean Financial MSP Networks
cybersecurity tech news security

Qilin Ransomware Targets Korean Financial MSP Networks

Qilin operators compromise South Korean MSP to deploy ransomware across financial institutions, exploiting managed service provider trust relationships for supply chain encryption attacks

December 2, 2025 3 min read
Shai-Hulud v2 Deploys Malware via NPM and Maven Repos
cybersecurity tech news security

Shai-Hulud v2 Deploys Malware via NPM and Maven Repos

Shai-Hulud v2 campaign distributes credential-harvesting malware through poisoned NPM and Maven packages, targeting JavaScript and Java development environments to exfiltrate API keys and authentication tokens

December 2, 2025 3 min read
Aisuru Shifts from DDoS-for-Hire to Proxy Services
cybersecurity tech news security

Aisuru Shifts from DDoS-for-Hire to Proxy Services

Aisuru botnet operators abandon DDoS attack model for residential proxy business, monetizing compromised IoT infrastructure by selling IP rotation services and anonymization to cybercriminals

December 2, 2025 3 min read
Qilin Ransomware Compromises Korean MSP Infrastructure
cybersecurity tech news security

Qilin Ransomware Compromises Korean MSP Infrastructure

Qilin ransomware operators breach South Korean managed service provider to deploy encryption across financial institution clients, exploiting trusted network access for supply chain ransomware attack

December 1, 2025 3 min read
Shai-Hulud v2 Poisons NPM and Maven Package Ecosystems
cybersecurity tech news security

Shai-Hulud v2 Poisons NPM and Maven Package Ecosystems

Shai-Hulud v2 campaign deploys malicious packages across NPM and Maven repositories, harvesting credentials and API keys from JavaScript and Java development environments through dependency poisoning

December 1, 2025 3 min read
Aisuru Operators Sell Compromised IoT as Proxy Access
cybersecurity tech news security

Aisuru Operators Sell Compromised IoT as Proxy Access

Aisuru cybercriminals transition from DDoS-for-hire to residential proxy business model, commercializing compromised IoT devices by selling IP rotation and anonymization services to threat actors

December 1, 2025 3 min read
Aisuru Botnet Adopts Residential Proxy Revenue Model
cybersecurity tech news security

Aisuru Botnet Adopts Residential Proxy Revenue Model

Aisuru cybercriminals abandon denial-of-service attacks to commercialize IoT botnet as residential proxy infrastructure, renting IP anonymization and geographic distribution to threat actors

November 30, 2025 3 min read