Skip to the main content.
Partner Programs
Technology Partners
Featured Report

gartner-hype-cycle-for-security-operations-report-2024

 

Rakesh Krishnan

Rakesh Krishnan is a Senior Threat Analyst at Netenrich. Passionate in Cyber Security and conducts OSINT Investigations on Cyber Incidents.

Rakesh's top published blogs:

ALPHA Ransomware launched DLS: https://medium.com/coinmonks/alpha-ransomware-launched-dls-9812b502e6a2

Discovering ADHUBLLKA Ransomware Family: https://medium.com/coinmonks/discovering-adhubllka-ransomware-family-tracing-roots-of-lolkek-bit-obz-u2k-tzw-variants-ce77d2461ac7

FRAUDGPT: THE VILLAIN AVATAR of CHATGPT: https://medium.com/coinmonks/fraudgpt-the-villain-avatar-of-chatgpt-f5c9c9f70f2a

SBI YONO PHISHING SCAM: Criminals Collecting User Information: https://medium.com/coinmonks/sbi-yono-phishing-scam-criminals-collecting-user-information-4e479a17b6e1

CHASING CHAOS RANSOMWARE — Unveiling 2017 Instagram Hack Incident!: https://medium.com/coinmonks/chasing-chaos-ransomware-unveiling-2017-belarus-hack-incident-82cf90547c10

Red CryptoApp: A New Threat Group in the Ransomware World

Red CryptoApp: A New Threat Group in the Ransomware World

This is a preliminary report based only on the data leak site (DLS), listed victims, and other observed patterns. A detailed investigation will...

Keep reading
Identity Behind Hunters International Ransomware Group’s Dedicated Leak Site Exposed

Identity Behind Hunters International Ransomware Group’s Dedicated Leak Site Exposed

This article focuses on my research to uncoverthe identity of Hunters International ransomware group’s (Surface Web) Dedicated Leak Site (DLS). It...

Keep reading
Exposing Alpha Ransomware: A Deep Dive into Its Operations

Exposing Alpha Ransomware: A Deep Dive into Its Operations

Alpha ransomware, a distinct group not to be confused with ALPHV ransomware, has recently emerged with the launch of its Dedicated/Data Leak Site...

Keep reading
Discovering the ADHUBLLKA Ransomware Family: Tracing the Roots of LOLKEK, BIT, OBZ, U2K, TZW Variants

Discovering the ADHUBLLKA Ransomware Family: Tracing the Roots of LOLKEK, BIT, OBZ, U2K, TZW Variants

This article is not an in-depth reverse-engineering analysis of a ransomware variant. Rather, it discusses the methods and different techniques...

Keep reading
FraudGPT: The Villain Avatar of ChatGPT

FraudGPT: The Villain Avatar of ChatGPT

With the rise of generative AI models, the threat landscape has changed drastically. Now, recent activities on the Dark Web Forum show evidence of...

Keep reading

As seen on

Google-Cloud-logo Dice logo security-magazine-logo security-week-logo security-boulevard-logo New-SC-Media-Logo dark-reading-logo theCyberWire-logo the-hacker-news-logo mssp-alert-logo channel-futures-logo threatpost-logo PCMag-logo informationweek-logo wired-logo the-record-logo-svg marketwatch-logo ema-logo VentureBeat_logo-1 vmblog.com-logo channel-insider-logo LinuxInsider_logo