HelloKitty Ransomware Renames to ‘HelloGookie,’ Unveils CD Projekt and Cisco Data

 

The operator behind the HelloKitty ransomware has rebranded it as ‘HelloGookie,’ with passwords for previously leaked CD Projekt source code, Cisco network data, and decryption keys from earlier attacks being released.
Identified as ‘Gookee/kapuchin0,’ the threat actor claims to be the original creator of the now-defunct HelloKitty ransomware, coinciding the rebranding with the launch of a new dark web portal for HelloGookie. To mark the occasion, four private decryption keys were disclosed, enabling the recovery of files from previous attacks, alongside internal data stolen from Cisco in 2022 and passwords for leaked CD Projekt source code.
Developers have already utilized the leaked Witcher 3 source code to compile the game, showcasing screenshots and videos of development builds. The leaked source code contains binaries to launch a developer build of Witcher 3, with efforts underway to compile the game from the source.
HelloKitty, initially launched in November 2020, garnered attention for targeting corporate networks, encrypting systems, and stealing data. Notably, the ransomware group breached CD Projekt Red in February 2021, encrypting servers and pilfering source code, including for Witcher 3.
In 2022, Yanluowang’s data leak site was allegedly hacked, revealing c

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents

Read the original article: