
TeamPCP Supply Chain Attacks
TeamPCP is exploiting trusted npm and PyPI packages to compromise developer environments, steal credentials, and extend attacks across software supply chains.

Ryuk is a prolific and dangerous ransomware strain that was first observed in mid-August 2018. Ryuk is known to be a derivative of the commercially available HERMES ransomware.
The ransomware uses the WindowsCrypto API for encryption, and encrypts files with AES256 encryption algorithm.
The ransomware avoids encrypting files with the following file extensions:
.dll, .lnk, .hrmlog, .ini, *.exe.
The ransomware will also attempt to encrypt any attached Network Shares.
Ryuk operations are suspected to be carried out by an actor that Crowdstrike refers to as WIZARD SPIDER. The actor is known for employing a tactic referred to as "Big Game Hunting" or the routine targeting of very large enterprise organizations.
Ryuk has been observed being delivered using the following methods:
The Ryuk dropper has been observed performing a validation against the operating system's MajorVersion.
If the Operating System matches Windows 2000, Windows XP, or Windows Server 2003, then the ransomware drops the payload into C:\Documents and Settings\Default User.
If the operating system matches anything other than the above, it drops the executable in C:\Users\Public.
The file will be named using 5 random characters.
Once the dropper has successfully downloaded the dropper will use the command line to delete itself after it successfully executes the ransomware payload.
Ryuk has been observed achieving persistence using HKCU CurrentVersion\Run
*HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\
The value for the key is set to the executable file dropped and detailed in the Installation section.
Get the Free Hunt Packages!
Check Out Other Emerging Threats >

TeamPCP is exploiting trusted npm and PyPI packages to compromise developer environments, steal credentials, and extend attacks across software supply chains.

An Iranian aligned threat group conducting destructive and espionage focused cyber operations against organizations in Israel and Western countries.

CrazyHunter is a ransomware campaign targeting healthcare that weakens endpoint defenses and escalates privileges before encrypting systems at scale.
Stay informed with our weekly executive update, sending you the latest news and timely data on the threats, risks, and regulations affecting your organization.