RedCurl’s Ransom Ruckus: Russian Hackers Shift Tactics with QWCrypt, Leaving Cyber Sleuths Baffled

RedCurl, a Russian-speaking threat actor, is now using QWCrypt ransomware to target hypervisors, a strategic shift from their typical corporate espionage. Bitdefender speculates RedCurl might be a ‘gun-for-hire’, using ransomware as a diversion or a backup plan when contracts aren’t paid. Their revenue model and true motives remain mysterious.

Pro Dashboard

Hot Take:

Just when you thought cybercriminals couldn’t get any sneakier, RedCurl turns up with ransomware that targets hypervisors! They’re the ninjas of the digital underworld, quietly backflipping through your virtual environments while wearing a cloak of mystery. The real question is, are they the Robin Hoods of ransomware or just another cyber mercenary squad pulling off a heist without leaving a trace?

Key Points:

  • RedCurl, also known as Earth Kapre or Red Wolf, has been active since 2018.
  • The group recently shifted tactics, deploying a new ransomware called QWCrypt.
  • They mainly target organizations in the US, but victims have also been spotted in Germany, Spain, and Mexico.
  • RedCurl focuses on encrypting hypervisors, leaving network gateways operational.
  • Their true motivations and business model remain a mystery, leading to speculation about their ‘gun-for-hire’ status.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?