The Rising Threat: PaperCut Ransomware Attacks Unveiling Cl0p and LockBit Connections

Microsoft has confirmed that the active exploitation of PaperCut servers is linked to attacks designed to deliver Cl0p and LockBit ransomware families. The tech giant’s threat intelligence team has attributed a subset of the intrusions to a financially motivated actor it tracks under the name Lace Tempest, highlighting the evolving threat landscape that businesses and organizations face as bad actors continue to adapt and innovate.

Active exploitation of PaperCut servers linked to Cl0p and LockBit ransomware families

Over the last few months, a series of cyber-attacks involving ransomware has hit numerous organizations around the world. These attacks leverage a range of techniques, including exploiting vulnerabilities in commonly used software and social engineering tactics.

Microsoft has confirmed that the active exploitation of PaperCut servers has been linked to a range of attacks designed to deliver Cl0p and LockBit ransomware families. In April 2023, the threat actors incorporated PaperCut flaws (2023-27350 and CVE-2023-27351) into their attack toolkit, which allowed them to gain access to vulnerable systems and deploy the ransomware.

According to Microsoft, a separate cluster of activity has also been detected weaponizing the same flaws, including the ones that lead to LockBit ransomware infections. This highlights the ongoing threat posed by ransomware and emphasizes the importance of keeping software up-to-date and patched.

Raspberry Robin/QNAP Worm believed to be Access-as-a-Service malware

Another example of the evolving threat landscape is Raspberry Robin, also called QNAP worm. Microsoft has stated that it is believed to be an “access-as-a-service” malware that is used as a delivery vehicle for next-stage payloads, such as IcedID, Cl0p, and LockBit. The malware infects vulnerable devices, such as enterprise storage systems, which can then be used to launch further attacks against a target organization.

Attribution of a subset of intrusions to financially motivated actor “Lace Tempest”

Microsoft’s threat intelligence team has attributed a subset of the intrusions involving PaperCut servers and ransomware to a financially motivated actor it tracks under the name Lace Tempest. The group is known for its use of various tactics, including prolific phishing campaigns that target both individuals and businesses.

The group has used a range of tactics to evade detection, including using legitimate cloud services to host their malware. Microsoft’s attribution of the attacks to Lace Tempest highlights the importance of strong cybersecurity measures and the need to remain vigilant against such threats.

FIN7 Cybercrime Group is linked to attacks that exploit unpatched Veeam backup software instances

The FIN7 cybercrime group has been linked to attacks that exploit unpatched Veeam backup software instances. WithSecure detected the activity on March 28, 2023, and it likely involved the abuse of CVE-2023-27532. The group is notorious for its attacks on financial institutions and retailers, and frequently uses tactics such as spear-phishing and social engineering.

Utilization of Custom PowerShell Scripts in FIN7 Attacks

The FIN7 group also utilized custom PowerShell scripts to retrieve stored credentials from the backup servers, gather system information, and establish an active foothold in the compromised host by executing DICELOADER. This highlights the need for comprehensive security measures, including strong passwords, multi-factor authentication, and monitoring for anomalous activity.

Mirai botnet authors have updated the malware to exploit a high-severity flaw in TP-Link Archer AX21 routers

In another example of the evolving threat landscape, the authors of the Mirai botnet have updated their malware to include CVE-2023-1389, a high-severity flaw in TP-Link Archer AX21 routers that could allow an unauthenticated adversary to execute arbitrary code on affected installations. The first signs of in-the-wild exploitation emerged on April 11, 2023, highlighting the need for prompt patching and vulnerability management.

The threat landscape facing businesses and organizations today is constantly evolving, and bad actors are continually innovating and adapting their tactics to evade detection and cause harm. The recent attacks involving ransomware and access-as-a-service malware, as well as the Mirai botnet’s exploitation of a high-severity flaw in routers, serve as stark reminders of the importance of strong cybersecurity measures, comprehensive vulnerability management, and ongoing vigilance against emerging threats. It is essential that organizations remain up-to-date with the latest security patches and advisories, as well as maintain strong defenses against phishing and other social engineering tactics.

Explore more

Raedbots Launches Egypt’s First Homegrown Industrial Robots

The metallic clang of traditional assembly lines is finally being replaced by the precise, rhythmic hum of domestic innovation as Raedbots unveils a suite of industrial machines that redefine local manufacturing. For decades, the Egyptian industrial sector remained shackled to the high costs of European and Asian imports, making the dream of a fully automated factory floor an expensive luxury

Trend Analysis: Sustainable E-Commerce Packaging Regulations

The ubiquitous sight of a tiny electronic component rattling inside a massive cardboard box is rapidly becoming a relic of the past as global regulators target the hidden environmental costs of e-commerce logistics. For years, the digital retail sector operated under a “speed at any cost” mentality, often prioritizing packing convenience over spatial efficiency. However, as of 2026, the legislative

How Are AI Chatbots Reshaping the Future of E-commerce?

The modern digital marketplace operates at a velocity where a three-second delay in response time can result in a permanent loss of consumer interest and substantial revenue. While traditional storefronts relied on human intuition to guide shoppers through aisles, the current e-commerce landscape uses sophisticated artificial intelligence to simulate and surpass that personalized touch across millions of simultaneous interactions. This

Stop Strategic Whiplash Through Consistent Leadership

Every time a leadership team decides to pivot without a clear explanation or warning, a shockwave travels through the entire organizational chart, leaving the workforce disoriented, frustrated, and increasingly cynical about the future. This phenomenon, frequently described as strategic whiplash, transforms the excitement of a new executive direction into a heavy burden of wasted effort for the staff. Instead of

Most Employees Learn AI by Osmosis as Training Lags

Corporate boardrooms across the country are echoing with the same relentless command to integrate artificial intelligence immediately, yet the vast majority of people expected to use these tools have never received a single hour of formal instruction. While two-thirds of organizations now demand AI implementation as a standard operating procedure, the workforce has been left to navigate this technological frontier