HellCat Strikes Again: How Ignored Jira Credentials Are Fueling a Ransomware Rampage!
HellCat ransomware group is cat-burglaring its way into companies using stolen Jira credentials, extracted by infostealer malware. With a history of cracking major firms, HellCat’s new targets include Asseco Poland and HighWire Press. Time for organizations to stop treating Jira accounts like their cat’s Instagram password!

Hot Take:
**_HellCat’s latest heist is like a plot twist in a soap opera where the villain doesn’t even need to break a sweat to wreak havoc. They’re basically the cyber equivalent of finding a spare key under the doormat. Maybe it’s time companies stop treating Jira credentials like a ‘forgotten password’ to their high school email account._**
Key Points:
- HellCat ransomware group has breached four companies in the US and Europe using stolen Jira credentials.
- Victims include Asseco Poland, HighWire Press, Racami, and LeoVegas Group.
- Infostealer malware like StealC, Raccoon, Redline, and Lumma Stealer are the culprits behind stealing the credentials.
- Jira, a high-value target, is often less secure than other systems, making it an easy entry point for attackers.
- Companies are urged to implement multi-factor authentication and monitor for infostealer infections to prevent such breaches.
Already a member? Log in here