
CrazyHunter Ransomware
CrazyHunter is a ransomware campaign targeting healthcare that weakens endpoint defenses and escalates privileges before encrypting systems at scale.

[Image: The phisherman episode 1]
Bex Nitert is an incident response and forensics professional in Australia. She describes herself as a digital firefighter who helps organizations after they’ve been hacked. She often investigates phishing, the term for stealing login credentials with the aim of taking over accounts and systems. And there’s a threat actor who performs this credential theft on an industrial scale. Bex found him operating in the open.
Many of the frauds, scams and data breaches that are common these days start with the takeover of say, someone’s personal or corporate email account or other type of account. Everything from stealing money from online bank accounts to business email compromise to even file-encrypting ransomware often starts with stolen login credentials. It’s a critical part of the cybercrime-as-as-service economy. Cybercrime-as-a-service is the term for products and services for sale that help other people commit crime on the internet.
There are lots of people who sell these credentials. But this person – the Phisherman – is exceptional. Bex’s investigation uncovered a pattern of malicious phishing activity that went back to at least 2015. These days, the Phisherman’s operation is growing in scale. And Bex found a sign that the Phisherman may be looking for new ways to generate revenue and that his operation may take a darker turn.
Participants:
Bex Nitert, Incident Response and Forensics Professional
Jeremy Kirk, Executive Editor, Cyber Threat Intelligence, Intel 471

CrazyHunter is a ransomware campaign targeting healthcare that weakens endpoint defenses and escalates privileges before encrypting systems at scale.

DevMan Ransomware is a newly emerging ransomware operation observed in 2025 that has been assessed as a derivative of the DragonForce ransomware family.

Gootloader resurfaced with enhanced capabilities, building on the multi-stage loader malware first seen in 2020.
Stay informed with our weekly executive update, sending you the latest news and timely data on the threats, risks, and regulations affecting your organization.