Healthcare
MOVEit Transfer Breach Campaign — Mass Data Theft via File Transfer Exploitation
The MOVEit Transfer breach campaign involved exploitation of a critical vulnerability in Progress MOVEit Transfer, enabling large-scale data theft across organizations worldwide. This SECMONS record summarizes the incident, verified public timeline context, impact patterns, and defensive lessons.
LockBit — Ransomware-as-a-Service Ecosystem & Operational Profile
LockBit is a ransomware-as-a-service (RaaS) ecosystem responsible for widespread double-extortion campaigns targeting enterprise, government, and critical infrastructure organizations. This profile provides structured analysis of LockBit’s operational model, techniques, and defensive implications.
Ryuk — Targeted Ransomware Associated with Enterprise Intrusions
Ryuk is a targeted ransomware strain publicly associated with high-impact enterprise intrusions, often deployed following credential theft and lateral movement. This SECMONS profile provides structured analysis of Ryuk’s operational patterns, ecosystem relationships, and defensive implications.
TrickBot — Modular Banking Trojan and Malware Delivery Framework
TrickBot is a modular malware platform initially developed as a banking trojan and later expanded into a flexible intrusion framework used for credential theft, lateral movement, and ransomware staging. This SECMONS profile provides structured technical and operational analysis.
Emotet — Modular Loader & Botnet Malware Profile
Emotet is a modular malware platform that evolved from a banking trojan into a large-scale loader and botnet ecosystem, frequently used to deliver additional payloads including ransomware. This SECMONS profile provides structured analysis of Emotet’s capabilities, targeting patterns, and defensive implications.