• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
TechTrendFeed
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT
No Result
View All Result
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT
No Result
View All Result
TechTrendFeed
No Result
View All Result

HellCat Ransomware Hits 4 Companies utilizing Infostealer-Stolen Jira Credentials

Admin by Admin
April 8, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Cybersecurity researchers at Hudson Rock have recognized a brand new wave of cyber assaults by the HellCat ransomware group, this time concentrating on 4 firms throughout america and Europe. The widespread thread? Stolen Jira credentials, extracted by infostealer malware lengthy earlier than the precise breaches passed off.

Who Obtained Hit

On April 5, 2025, HellCat posted proof of the breaches to their leak web site, full with countdown timers and their signature “Jiraware < < 3!!” tagline. In response to their posts, they’ve stolen inside recordsdata, emails, and monetary information, they usually’re threatening to leak or promote the info if the businesses don’t meet their calls for.

The brand new victims embody:

  • Asseco Poland (Poland) – a serious IT options supplier
  • HighWire Press (USA) – a platform serving scholarly publishers
  • Racami (USA) – a agency centered on buyer communications tech
  • LeoVegas Group (Sweden) – a web-based gaming and betting firm

How They Obtained In

In response to Hudson Rock’s report shared with Hackread.com, the corporate traced each considered one of these breaches again to the identical root trigger: Jira credentials stolen by infostealer malware. These malware variants, StealC, Raccoon, Redline, and Lumma Stealer, harvested login information from contaminated worker machines months (generally years) earlier than the precise assaults.

As soon as HellCat obtained their palms on these credentials, they logged into every firm’s Atlassian Jira setting. From there, they moved by means of inside methods, grabbed delicate information, and kicked off their typical ransomware course of.

This isn’t a brand new tactic for them. HellCat has beforehand used the identical technique to breach Jaguar Land Rover, Telefonica, Schneider Electrical, and Orange, amongst others. It’s a sample: discover credentials in infostealer logs, entry Jira, exfiltrate information, and demand ransom.

HellCat Ransomware Hits 4 Firms using Infostealer-Stolen Jira Credentials
Compromised infrastructure of US-based agency Racami (Screenshot: Hudson Rock)

It’s additionally value stating {that a} latest report from Hudson Rock additionally revealed how infostealers, some offered for as little as $10, have compromised important infrastructure worldwide. Much more regarding, the affected methods embody worker machines on the FBI, Lockheed Martin, Honeywell, and branches of the US army.

Why Jira?

Jira is greater than only a undertaking administration software. In lots of firms, it’s the principle system linked to growth workflows, buyer information, inside documentation, and system entry controls. If attackers can get into Jira, they’ll usually get into nearly all the things else.

That’s precisely what makes it such a high-value goal for ransomware teams like HellCat. And since many organizations don’t deal with Jira accounts with the identical stage of safety as, say, e-mail or VPN entry, it turns into a straightforward win for attackers.

The Larger Downside: Infostealers

Researchers consider that HellCat’s modus operandi solely works as a result of infostealer malware infect person gadgets and steal saved logins, cookies, session tokens, and extra. The info is both offered on darkish net markets or used immediately by teams like HellCat.

Hudson Rock’s personal information, primarily based on over 30 million contaminated methods, reveals that hundreds of firms have Jira-related credentials saved in infostealer logs. In these newest instances, the stolen credentials have been simply sitting there, unmonitored and unchanged, giving HellCat on a regular basis it wanted to organize the breach.

What Corporations Ought to Be Doing

There are some steps firms can take to scale back the danger of assaults like these. First, it’s essential to observe for infostealer infections utilizing instruments that may flag stolen credentials earlier than they’re used. If any indicators of malware present up, compromised logins must be reset instantly, entry reviewed, and suspicious exercise tracked intently.

Jira, specifically, must be locked down with multi-factor authentication, restricted entry, and correct community segmentation to restrict how far an attacker can get in the event that they break in. And since many of those infections begin with phishing or dangerous downloads, common worker coaching goes a great distance in stopping them within the first place.

Nonetheless, HellCat isn’t doing something out of the field as a result of they don’t should. So long as organizations depart stolen credentials unchecked and hold utilizing single-layer authentication for instruments like Jira, teams like HellCat will hold taking up.



Tags: credentialsFirmsHellCatHitsInfostealerStolenJiraRansomware
Admin

Admin

Next Post
The Obtain: A “dire wolf” revival, and safeguarding AI companions

The Obtain: A "dire wolf" revival, and safeguarding AI companions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Trending.

Discover Vibrant Spring 2025 Kitchen Decor Colours and Equipment – Chefio

Discover Vibrant Spring 2025 Kitchen Decor Colours and Equipment – Chefio

May 17, 2025
Reconeyez Launches New Web site | SDM Journal

Reconeyez Launches New Web site | SDM Journal

May 15, 2025
Safety Amplified: Audio’s Affect Speaks Volumes About Preventive Safety

Safety Amplified: Audio’s Affect Speaks Volumes About Preventive Safety

May 18, 2025
Flip Your Toilet Right into a Good Oasis

Flip Your Toilet Right into a Good Oasis

May 15, 2025
Apollo joins the Works With House Assistant Program

Apollo joins the Works With House Assistant Program

May 17, 2025

TechTrendFeed

Welcome to TechTrendFeed, your go-to source for the latest news and insights from the world of technology. Our mission is to bring you the most relevant and up-to-date information on everything tech-related, from machine learning and artificial intelligence to cybersecurity, gaming, and the exciting world of smart home technology and IoT.

Categories

  • Cybersecurity
  • Gaming
  • Machine Learning
  • Smart Home & IoT
  • Software
  • Tech News

Recent News

Report: AI coding productiveness positive aspects cancelled out by different friction factors that sluggish builders down

Report: AI coding productiveness positive aspects cancelled out by different friction factors that sluggish builders down

July 10, 2025
How authorities cyber cuts will have an effect on you and your enterprise

How authorities cyber cuts will have an effect on you and your enterprise

July 9, 2025
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://techtrendfeed.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT

© 2025 https://techtrendfeed.com/ - All Rights Reserved