The Ragnar Locker ransomware gang is adopting a new technique where they are forcing the victim to pay the ransom, where the operators are threatening to leak the stolen data.
After this, the group has come up with a solution where they have introduced a new strategy where they will request help from the data recovery expert and the professional negotiators.
As per the report, In this profession, they are getting many numbers of professional negotiators where it is not becoming an easier process and safe.
These types of negotiators are mainly working for the company’s recovery where they are working directly with Police, investigation agencies, or the FBI. They are not interested in commercial success; they want their client’s safety and private data.
They also warn their clients that whenever they hire the recovery company for the negotiation, they will send the request to the FBI or investigators office. That time only this application they will consider and stat working on that but sometimes without any request, they will also work because they recognize the lie and they do work on emergency.
They want to convey to all of their clients that the client can take their help to resolve things smoothly. This type of ransomware operator is very professional, and they are not interested in any commercial success.
In the past, the Ragnar Locker gang has hit high-profile organizations like Dassault Falcon, Japanese gaming form Capcom, chipmaker ADATA, etc.
In November April 2020, they issued a flash alert to warn the private industry partner that they have increased the Ragnar Locker ransomware activity.
As per the report, here are the technical details of the ransomware that mitigate the threat:
Follow us on Linkedin, Twitter, Facebook for daily Cybersecurity News & Updates
A sophisticated hacking campaign has been unveiled recently by Elastic Security Labs, dubbed "REF7707," which…
A sophisticated phishing campaign, identified by Microsoft Threat Intelligence, has been exploiting a technique known…
Researchers observed a sophisticated cyber-espionage campaign led by the Chinese state-sponsored group known as "Salt…
A high-severity security vulnerability, identified as CVE-2024-21966, has been discovered in the AMD Ryzen™ Master…
Researchers have uncovered a high-severity SQL injection vulnerability, CVE-2025-1094, affecting PostgreSQL’s interactive terminal tool, psql. …
A newly disclosed high-severity vulnerability in WinZip, tracked as CVE-2025-1240, enables remote attackers to execute…