photog.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for your photos and banter. Photog first is our motto Please refer to the site rules before posting.

Administered by:

Server stats:

286
active users

#play

6 posts6 participants0 posts today

In the small town of Kawara in Fukuoka Prefecture, something is happening at the Saidosho Community Center. While kids in most parts of Japan are obsessed with Pokémon cards, the children of Kawara are clutching to something a little closer to home.

They are playing a trading card game where the stars aren’t fantasy creatures, anime heroes or even famous baseball players, but ojisan (middle-aged or older men) from the local community.

tokyoweekender.com/entertainme

Tokyo Weekender · Middle-Aged Man Trading Cards Go Viral in Rural Japan TownA trading card game consisting of real-life ojisan (middle-aged men) are going viral with kids in the city of Kawara in Fukuoka Prefecture.

alojapan.com/1239554/a-few-tho A few thoughts about traveling to Japan to see the Cubs play #a #ABOUT #bleed #blue #ChicagoCubsEssays #cubbie #cubs #ExcludeFromStnVideo #few #FrontPage #Japan #JapanTravel #play #see #The #thoughts #to #travel #traveling I’m departing this afternoon out of O’Hare Airport in Chicago to fly to Japan to see the Cubs face the Dodgers in the 2025 season opening Tokyo Series. (If you’re interested in tracking it, I’m on United flight 881, schedul…

#ESETresearch discovered previously unknown links between the #RansomHub, #Medusa, #BianLian, and #Play ransomware gangs, and leveraged #EDRKillShifter to learn more about RansomHub’s affiliates. @SCrow357 welivesecurity.com/en/eset-res
RansomHub emerged in February 2024 and in just three months reached the top of the ransomware ladder, recruiting affiliates from disrupted #LockBit and #BlackCat. Since then, it dominated the ransomware world, showing similar growth as LockBit once did.
Previously linked to North Korea-aligned group #Andariel, Play strictly denies operating as #RaaS. We found its members utilized RansomHub’s EDR killer EDRKillShifter, multiple times during their intrusions, meaning some members likely became RansomHub affiliates.
BianLian focuses on extortion-only attacks and does not publicly recruit new affiliates. Its access to EDRKillShifter suggests a similar approach as Play – having trusted members, who are not limited to working only with them.
Medusa, same as RansomHub, is a typical RaaS gang, actively recruiting new affiliates. Since it is common knowledge that affiliates of such RaaS groups often work for multiple operators, this connection is to be expected.
Our blogpost also emphasizes the growing threat of EDR killers. We observed an increase in the number of such tools, while the set of abused drivers remains quite small. Gangs such as RansomHub and #Embargo offer their killers as part of the affiliate program.
IoCs available on our GitHub: github.com/eset/malware-ioc/tr