Ghost Ransomware Breaching Organizations in Over 70+ Countries

The ransom note demands payment for both decryption keys and to prevent the public release of stolen information, with attackers maintaining communication through anonymous email channels to apply psychological pressure for payment. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. Once inside a network, Ghost operates with remarkable speed, often completing its attack cycle from breach to encryption in under 24 hours – significantly faster than other notorious groups like Conti or LockBit that typically operate over weeks. Ghost Ransomware, also known as Cring, has emerged as a formidable cyber threat targeting organizations across more than 70 countries. After obtaining administrator privileges through additional exploits or credential harvesting, Ghost operators create new user accounts and systematically disable security software. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news. The attackers deliberately target organizations struggling with “patch fatigue” – overwhelmed IT teams unable to keep pace with vulnerability updates. Its double-extortion model—threatening both permanent encryption and public release of stolen data—creates extraordinary pressure on victims to pay ransoms, typically demanded in cryptocurrency. The attackers meticulously identify and target sensitive information, prioritizing databases containing intellectual property, customer data, and financial records. Since its first appearance in 2021, this malware variant has rapidly evolved into one of the most dangerous ransomware strains, combining sophisticated encryption with aggressive extortion tactics. Unlike state-sponsored threat actors pursuing espionage objectives, Ghost appears exclusively focused on financial gain through ransom payments. Tushar is a Cyber security content editor with a passion for creating captivating and informative content. This rapid exploitation leaves security teams with minimal time to detect and respond to intrusions before critical damage occurs. Its global reach, technical sophistication, and rapid attack methodology present extraordinary challenges for organizations worldwide. This opportunistic approach has proven effective against even well-resourced organizations that neglect timely security patches. Ghost’s technical sophistication has raised significant concerns among security professionals. This comprehensive approach allows unrestricted lateral movement throughout the network, exfiltrating valuable data before the final encryption phase. This tactic has become increasingly common among ransomware operators seeking to maximize leverage against victims who might otherwise rely on backups. BlackFog researchers have identified technical indicators suggesting the malware originates from a financially motivated cybercriminal gang operating from China. In the final stage, executables named Ghost.exe or Cring.exe encrypt files while simultaneously destroying backups. The Ghost Ransomware campaign represents one of the most significant cybersecurity threats currently active. After identifying vulnerable targets, attackers deploy web shells and Cobalt Strike beacons as backdoors, establishing persistent access.

This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 17 Apr 2025 12:45:05 +0000


Cyber News related to Ghost Ransomware Breaching Organizations in Over 70+ Countries

10 Best Ransomware Protection Tools - 2025 - It protects devices from ransomware and other cyber threats using advanced threat intelligence, behavioral analysis, and cloud-based technology. It monitors and prevents ransomware assaults on personal files and automatically restores encrypted ...
1 month ago Cybersecuritynews.com
10 Best Ransomware File Decryptor Tools in 2025 - Kaspersky Rakhni Decryptor contains different decryption tools based on various versions of Rakhni ransomware and helps you decrypt encrypted files on your system. PyLocky Ransomware Decryption Tool is a free and open source developed and released by ...
1 week ago Cybersecuritynews.com
Ghost Ransomware Breaching Organizations in Over 70+ Countries - The ransom note demands payment for both decryption keys and to prevent the public release of stolen information, with attackers maintaining communication through anonymous email channels to apply psychological pressure for payment. Cyber Security ...
1 day ago Cybersecuritynews.com LockBit
White House hosts Counter Ransomware Initiative summit, with a focus on not paying hackers - The third annual White House-led counter ransomware summit convening 48 countries, the European Union and Interpol launches in Washington today, featuring several new elements including a pledge from most member states not to pay ransoms and a ...
1 year ago Therecord.media
Hive Ransomware: A Detailed Analysis - This past week, on January 26th, to be exact, the FBI successfully shut down the Hive ransomware group and saved victims over a hundred million dollars in ransom payments and remediation costs. As ransomware continues to be a national security threat ...
2 years ago Heimdalsecurity.com LockBit
CISA and FBI: Ghost ransomware breached orgs in 70 countries - Right after Amigo_A and Swisscom's CSIRT team first spotted Ghost ransomware in early 2021, their operators were dropping custom Mimikatz samples, followed by CobaltStrike beacons, and deploying ransomware payloads using the legitimate Windows ...
1 month ago Bleepingcomputer.com CVE-2018-13379
The Week in Ransomware - An international law enforcement operation claims to have dismantled a ransomware affiliate operation in Ukraine, which was responsible for attacks on organizations in 71 countries. The threat actors are said to be affiliates of numerous ransomware ...
1 year ago Bleepingcomputer.com Qilin Cactus Black Basta
Best Ransomware Protection Practices for Midsize Organizations - Ransomware Protection has emerged as a crucial step in cybersecurity since ransomware attacks have become a major threat to businesses of all sizes, including midsize organizations. Ransomware attacks can be delivered via email attachments or links, ...
1 year ago Securityboulevard.com
The Top 10 Ransomware Groups of 2023 - This article takes an in-depth look at the rise in ransomware attacks over the past year and the criminal groups driving the surge in cyber extortion. LockBit has established itself as one of the most notorious ransomware operations since emerging on ...
1 year ago Securityboulevard.com TA505 8base LockBit BianLian Medusa Noescape Black Basta
Ransomware Roundup - The Ransomware Roundup report aims to provide readers with brief insights into the evolving ransomware landscape and the Fortinet solutions that protect against those variants. This edition of the Ransomware Roundup covers the 8base ransomware. 8base ...
1 year ago Feeds.fortinet.com 8base
Medusa Ransomware Turning Your Files into Stone - Unit 42 Threat Intelligence analysts have noticed an escalation in Medusa ransomware activities and a shift in tactics toward extortion, characterized by the introduction in early 2023 of their dedicated leak site called the Medusa Blog. The Unit 42 ...
1 year ago Unit42.paloaltonetworks.com Medusa
Dozens of countries will pledge to stop paying ransomware gangs - An alliance of 40 countries will sign a pledge during the third annual International Counter-Ransomware Initiative summit in Washington, D.C., to stop paying ransoms demanded by cybercriminal groups. Addressing reporters on Monday, Anne Neuberger, ...
1 year ago Bleepingcomputer.com
Ransomware in 2023 recap: 5 key takeaways - This provides the best overall picture of ransomware activity, but the true number of attacks is far higher. While some ransomware trends hardly changed over the last year, such as LockBit's continued dominance, ransomware criminals also challenged ...
1 year ago Malwarebytes.com Scattered Spider LockBit
Ransomware trends and recovery strategies companies should know - Ransomware attacks can have severe consequences, causing financial losses, reputational damage, and operational disruptions. The methods used to deliver ransomware vary, including phishing emails, malicious websites, and exploiting vulnerabilities in ...
1 year ago Helpnetsecurity.com
The Week in Ransomware - Earlier this month, the BlackCat/ALPHV ransomware operation suffered a five-day disruption to their Tor data leak and negotiation sites, rumored to be caused by a law enforcement action. The FBI revealed this week that they hacked the BlackCat/ALPHV ...
1 year ago Bleepingcomputer.com LockBit Akira Noescape
Ransomware Roundup - On a bi-weekly basis, FortiGuard Labs gathers data on ransomware variants of interest that have been gaining traction within our datasets and the OSINT community. The Ransomware Roundup report aims to provide readers with brief insights into the ...
1 year ago Feeds.fortinet.com
The year of Mega Ransomware attacks with unprecedented impact on global organizations - A Staggering 1 in every 10 organizations worldwide hit by attempted Ransomware attacks in 2023, surging 33% from previous year, when 1 in every 13 organisations received ransomware attacks Throughout 2023, organizations around the world have each ...
1 year ago Blog.checkpoint.com
12 Cybercriminals Arrested Following Takedown of Ghost Communication Platform - The criminals were identified through digital evidence obtained during last year’s international takedown of the Ghost encrypted communication platform, which served as a crucial tool for organized crime groups worldwide. “Today, we have ...
3 weeks ago Cybersecuritynews.com
Ransomware Roundup - On a bi-weekly basis, FortiGuard Labs gathers data on ransomware variants of interest that have been gaining traction within our datasets and the OSINT community. The Ransomware Roundup report aims to provide readers with brief insights into the ...
1 year ago Feeds.fortinet.com
The Week in Ransomware - This week was pretty quiet on the ransomware front, with most of the attention on the seizure of the BreachForums data theft forum. That does not mean there was nothing of interest released this week about ransomware. A report by CISA said that the ...
11 months ago Bleepingcomputer.com LockBit Inc ransom Black Basta
WordPress security plugin WP Ghost vulnerable to remote code execution bug - Popular WordPress security plugin WP Ghost is vulnerable to a critical severity flaw that could allow unauthenticated attackers to remotely execute code and hijack servers. However, as revealed by Patchstack, the security tool itself is vulnerable to ...
4 weeks ago Bleepingcomputer.com CVE-2025-26909
Ransomware's Impact May Include Heart Attacks, Strokes & PTSD - First-order harms: Direct targets of ransomware attacks. The increasing convergence of IT and OT leave physical infrastructures more vulnerable to ransomware, even though most ransomware operators lack the capability to directly compromise OT or ...
1 year ago Techrepublic.com
How ransomware gangs are engaging - As ransomware gangs continue to market themselves as legitimate businesses complete with customer service representatives, new research from Sophos showed that threat actors are expanding public relations efforts to further pressure victims into ...
1 year ago Techtarget.com LockBit Snatch
Declining Ransomware Payments: Shift in Hacker Tactics? - Several cybersecurity advisories and agencies recommend not caving into ransomware gangs' demands and paying their ransoms. It seems the tide is turning, with a decline in ransomware payments; this article explores the trend and what it might mean ...
1 year ago Securityboulevard.com
Anti-Ransomware Coalition Bound to Fail Without Key Adjustments - COMMENTARY. Ransomware is a pervasive issue affecting businesses of all sizes and industries, and the best way to respond remains hotly debated. While much fanfare coincided with the announcement of a US-led, 40-country coalition to collectively ...
1 year ago Darkreading.com

Latest Cyber News


Cyber Trends (last 7 days)