Hackers are constantly evolving their tactics to exploit vulnerabilities and gain unauthorized access to data. In a concerning new trend, threat actors have recently been impersonating security researchers to exploit trust and credibility. Two cases have emerged where hackers posed as security researchers and offered to hack the original ransomware group’s servers. This article delves into these cases, highlighting the







