Skip to content
  Thursday 19 June 2025
Trending
October 5, 2024Information Security Cybersecurity Sr October 11, 2024<h3>Defense Contractors Alert: DOD Rolls Out Final CMMC Rule!</h3> May 6, 2025<h3>Enhancing Cybersecurity: Trust and Transparency with AI Agents</h3> November 23, 2023TechRepublic’s Checklist for Managing Cloud Storage September 11, 2024Director Of Cybersecurity August 21, 2023Guide on Investigating Suspicious Activity or Excessive Scopes in an OAuth Grant February 24, 2025<h3>Bybit Reclaims Astonishing $1.4 Billion in Stolen Ether!</h3> August 8, 2023Fortinet Releases Security Update for FortiOS December 13, 2024Senior Cybersecurity Architect January 2, 2022How to Install Arch Linux in 2022 {Easy Step-by-Step Guide}
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Industry News  Zero-Day Ransomware Attack hits U.S. Organization via Windows CVE-2025-29824
Industry News

Zero-Day Ransomware Attack hits U.S. Organization via Windows CVE-2025-29824

SecuredyouadmSecuredyouadm—May 7, 20250
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail
More stories

Airbus Makes Fresh Offer to Acquire French Atos’ Cybersecurity Division

January 3, 2024

Revolutionizing Threats: AI Social Engineering in Action

February 7, 2025

FTX’s Gary Wang Escapes Prison Sentence!

November 21, 2024

US Cyber Force Amplifies Global Ops to Counter Escalating Threats

November 23, 2024



A recent cyber attack targeting an organization in the United States involved threat actors associated with the Play ransomware family exploiting a zero-day vulnerability in Microsoft Windows. The attack utilized CVE-2025-29824, a privilege escalation flaw in the Common Log File System (CLFS) driver that was patched by Microsoft last month. Play ransomware, also known as Balloonfly and PlayCrypt, is notorious for its double extortion tactics, where sensitive data is stolen and then encrypted for ransom.

Symantec’s Threat Hunter Team observed that the attackers likely gained access through a public-facing Cisco Adaptive Security Appliance (ASA) and then moved to another Windows machine on the target network using an undisclosed method. The attack involved the use of Grixba, a custom information stealer attributed to Play, and an exploit for CVE-2025-29824 disguised as Palo Alto Networks software.

During the attack, the threat actors collected information on all available machines in the victims’ Active Directory and saved the results to a CSV file. Although no ransomware payload was deployed in this intrusion, it highlights the use of zero-day exploits by ransomware actors to infiltrate targets. This trend was also seen with the Black Basta group exploiting a privilege escalation vulnerability as a zero-day in the past.

In another incident, threat actors utilized a local bypass technique called Bring Your Own Installer to disable endpoint security software and deploy the Babuk ransomware. This technique targeted SentinelOne’s EDR system by exploiting a flaw in the upgrade/downgrade process of the SentinelOne agent. The attackers gained local administrative access on a publicly-accessible server to carry out the attack.

Ransomware attacks have evolved with new trends such as targeting domain controllers to breach organizations and gain access to privileged accounts for mass encryption. Additionally, Ransomware-as-a-Service (RaaS) platforms like PlayBoy Locker have emerged, offering cybercriminals tools and support for launching ransomware attacks. The rise of ransomware cartels like DragonForce indicates a shift towards organized cybercrime in the ransomware landscape.



Source link

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

As technology advances, the way we communicate is constantly evolving. The rise of social media platforms has revolutionized the way we interact with one another, allowing us to connect with people from all over the world in an instant. However, with this increased connectivity comes the risk of misinformation spreading like wildfire. In today’s digital age, it is more important than ever to critically evaluate the information we consume and share online.

One of the biggest challenges we face in the age of social media is the prevalence of fake news. Misleading headlines and doctored images can easily go viral, leading to widespread confusion and misinformation. It is crucial for individuals to fact-check information before sharing it, and to be wary of sources that are not credible. By being vigilant and discerning consumers of information, we can help combat the spread of fake news.

Another issue that arises from the constant connectivity of social media is the potential for cyberbullying. The anonymity provided by the internet can embolden individuals to engage in harmful behavior towards others. It is important for social media platforms to have strict policies in place to prevent cyberbullying and to provide support for those who are targeted. By fostering a positive and respectful online community, we can create a safer environment for all users.

Despite the challenges that come with social media, it also provides many opportunities for positive communication and collaboration. Platforms like Twitter and Instagram allow individuals to share their thoughts and ideas with a global audience, fostering creativity and connection. By using social media responsibly and ethically, we can harness its power for good and make a positive impact on the world.

In conclusion, the age of social media has brought both benefits and challenges to the way we communicate. It is up to us as individuals to navigate this digital landscape with care and consideration, being mindful of the information we consume and share. By staying informed, critical, and empathetic, we can harness the power of social media for positive change and create a more connected and inclusive online community.
Senior Manager of Cybersecurity Detection Engineering
Related posts
  • Related posts
  • More from author
Industry News

World Leaks Uncovers Massive Data Breach at State Contractor!

June 19, 20250
Industry News

Iran Cuts Internet Amid Rising Tensions

June 18, 20250
Industry News

Bitdefender Acquires Mesh to Enhance Email Security and Expand MDR Reach

June 18, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Industry News

World Leaks Uncovers Massive Data Breach at State Contractor!

June 19, 20250
Industry News

Iran Cuts Internet Amid Rising Tensions

June 18, 20250
Industry News

Bitdefender Acquires Mesh to Enhance Email Security and Expand MDR Reach

June 18, 20250
Industry News

WormGPT Clones Hijack Popular AI Models to Thrive

June 18, 20250
Industry News

MiniMax M1 Challenges AI Titans with Unbeatable Cost and Performance

June 18, 20250
Industry News

23andMe Hit with £2.31 Million Fine by ICO

June 18, 20250
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • World Leaks Uncovers Massive Data Breach at State Contractor!

  • Iran Cuts Internet Amid Rising Tensions

  • Bitdefender Acquires Mesh to Enhance Email Security and Expand MDR Reach

  • WormGPT Clones Hijack Popular AI Models to Thrive

  • MiniMax M1 Challenges AI Titans with Unbeatable Cost and Performance

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures