HellCat Strikes Again: How Ignored Jira Credentials Are Fueling a Ransomware Rampage!

HellCat ransomware group is cat-burglaring its way into companies using stolen Jira credentials, extracted by infostealer malware. With a history of cracking major firms, HellCat’s new targets include Asseco Poland and HighWire Press. Time for organizations to stop treating Jira accounts like their cat’s Instagram password!

Pro Dashboard

Hot Take:

**_HellCat’s latest heist is like a plot twist in a soap opera where the villain doesn’t even need to break a sweat to wreak havoc. They’re basically the cyber equivalent of finding a spare key under the doormat. Maybe it’s time companies stop treating Jira credentials like a ‘forgotten password’ to their high school email account._**

Key Points:

  • HellCat ransomware group has breached four companies in the US and Europe using stolen Jira credentials.
  • Victims include Asseco Poland, HighWire Press, Racami, and LeoVegas Group.
  • Infostealer malware like StealC, Raccoon, Redline, and Lumma Stealer are the culprits behind stealing the credentials.
  • Jira, a high-value target, is often less secure than other systems, making it an easy entry point for attackers.
  • Companies are urged to implement multi-factor authentication and monitor for infostealer infections to prevent such breaches.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?