{"id":4153,"date":"2025-04-26T11:12:59","date_gmt":"2025-04-26T11:12:59","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/04\/26\/toymaker-uses-lagtoy-to-sell-access-to-cactus-ransomware-gangs-for-double-extortion\/"},"modified":"2025-04-26T11:12:59","modified_gmt":"2025-04-26T11:12:59","slug":"toymaker-uses-lagtoy-to-sell-access-to-cactus-ransomware-gangs-for-double-extortion","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/04\/26\/toymaker-uses-lagtoy-to-sell-access-to-cactus-ransomware-gangs-for-double-extortion\/","title":{"rendered":"ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion"},"content":{"rendered":"<p>\u200bCybersecurity researchers have detailed the activities of an initial access broker (IAB) dubbed ToyMaker that has been observed handing over access to double extortion ransomware gangs like CACTUS.<br \/>\nThe IAB has been assessed with medium confidence to be a financially motivated threat actor, scanning for vulnerable systems and deploying a custom malware called LAGTOY (aka HOLERUN).<br \/>\n&#8220;LAGTOY can be\u00a0Cybersecurity researchers have detailed the activities of an initial access broker (IAB) dubbed ToyMaker that has been observed handing over access to double extortion ransomware gangs like CACTUS.<br \/>\nThe IAB has been assessed with medium confidence to be a financially motivated threat actor, scanning for vulnerable systems and deploying a custom malware called LAGTOY (aka HOLERUN).<br \/>\n&#8220;LAGTOY can be\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bCybersecurity researchers have detailed the activities of an initial access broker (IAB) dubbed ToyMaker that has been observed handing over access to double extortion ransomware gangs like CACTUS. The IAB has been assessed with medium confidence to be a financially motivated threat actor, scanning for vulnerable systems and deploying a custom malware called LAGTOY (aka&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/04\/26\/toymaker-uses-lagtoy-to-sell-access-to-cactus-ransomware-gangs-for-double-extortion\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":4154,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/4153"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=4153"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/4153\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/4154"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=4153"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=4153"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=4153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}