• by bhartzer on 3/11/2025, 2:14:00 AM

    This suggests the attackers used a double extortion strategy: not only locking files with encryption but also stealing sensitive data to pressure victims into paying a ransom.

  • by heukenj on 3/16/2025, 7:02:33 PM

    Way to expose them.