In 2022, LockBit was the most deployed ransomware variant across the world and continues to be prolific in 2023. Since January 2020, affiliates using LockBit have attacked organizations of varying sizes across an array of critical infrastructure sectors, including financial services, food and agriculture, education, energy, government and emergency services, healthcare, manufacturing, and transportation. LockBit ransomware operation functions as a Ransomware-as-a-Service (RaaS) model where affiliates are recruited to conduct ransomware attacks using LockBit ransomware tools and infrastructure. Due to the large number of unconnected affiliates in the operation, LockBit ransomware attacks vary significantly in observed tactics, techniques, and procedures (TTPs). This variance in observed ransomware TTPs presents a notable challenge for organizations working to maintain network security and protect against a ransomware threat.
The Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), the Multi-State Information Sharing and Analysis Center (MS-ISAC), and the following international partners, hereafter referred to as “authoring organizations,” are releasing this Cybersecurity Advisory (CSA) detailing observed activity in LockBit ransomware incidents and providing recommended mitigations to enable network defenders to proactively improve their organization’s defenses against this ransomware operation.
The authoring organizations encourage the implementation of the recommendations found in this CSA to reduce the likelihood and impact of future ransomware incidents.
Autosummary:
PaperCut MF/NG Improper Access Control Vulnerability
LockBit affiliates have been documented exploiting numerous CVEs, including:
CVE-2021-44228: Apache Log4j2 Remote Code Execution Vulnerability,
CVE-2021-22986: F5 BIG-IP and BIG-IQ Centralized Management iControl REST Remote Code Execution Vulnerability,
CVE-2020-1472: NetLogon Privilege Escalation Vulnerability,
CVE-2019-0708: Microsoft Remote Desktop Services Remote Code Execution Vulnerability, and
CVE-2018-13379:
The Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), the Multi-State Information Sharing and Analysis Center (MS-ISAC), and the following international partners, hereafter referred to as “authoring organizations,” are releasing this Cybersecurity Advisory (CSA) detailing observed activity in LockBit ransomware incidents and providing recommended mitigations to enable network defenders to proactively improve their organization’s defenses against this ransomware operation.Since January 2020, affiliates using LockBit have attacked organizations of varying sizes across an array of critical infrastructure sectors, including financial services, food and agriculture, education, energy, government and emergency services, healthcare, manufacturing, and transportation.[1] A RaaS cybercrime group maintains the functionality of a particular ransomware variant, sells access to that ransomware variant to individuals or groups of operators (often referred to as “affiliates”), and supports affiliates’ deployment of their ransomware in exchange for upfront payment, subscription fees, a cut of profits, or a combination of upfront payment, subscription fees, and a cut of profits.
Table 3: ANSSI-Observed LockBit Strain and Number of Instances
Name of the Strain* Number of Instances LockBit 2.0 (LockBit Red) 26 LockBit 3.0 (LockBit Black) 23 LockBit 21 LockBit Green 1 LockBit (pre-encryption) 1 Total 72**
* Name either obtained from ANSSI’s or the victim’s investigations
** Includes incidents with multiple strains
Figure 1: ANSSI-Observed LockBit Strains by Year
From the incidents handled, ANSSI can infer that LockBit 3.0 widely took over from LockBit 2.0 and the original LockBit strain from 2022.Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by the authoring organizations.In the Initial Access phase, mitigations working together to deny an attacker network access include securing internet-exposed services, patching devices, implementing MFA, disabling macros, employing application allowlisting, and using logging and alerting.
LockBit Statistics
Percentage of ransomware incidents attributed to LockBit:
Australia: From April 1, 2022, to March 31, 2023, LockBit made up 18% of total reported Australian ransomware incidents.[7] April 2023 LockBit ransomware encryptors targeting macOS seen on VirusTotal [8, 9]
LockBit 2.0, LockBit 3.0, LockBit Green, and LockBit Linux-ESXi Locker are still available for affiliates’ use on LockBit’s panel.
Defense Evasion
Apply local security policies to control application execution (e.g., Software Restriction Policies (SRP), AppLocker, Windows Defender Application Control (WDAC)) with a strict allowlist.
Critical Controls Key
Figure 3: Stopping Ransomware Using Layered Mitigations
Validate Security Controls
In addition to applying mitigations, the authoring organizations recommend exercising, testing, and validating your organization"s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory.
United States: In 2022, 16% of the State, Local, Tribal, and Tribunal (SLTT) government ransomware incidents reported to the MS-ISAC were identified as LockBit attacks.
Table 2: ANSSI-Observed LockBit vs. Overall Ransomware Activity
Year Number of Incidents Percentage of CERT-FR’s Ransomware-Related Activity 2020 (from July) 4 2% 2021 20 10% 2022 30 27% 2023 15 27% Total (2020-2023) 69 11%
Table 3 shows the number of instances different LockBit strains were observed by ANSSI from July 2020 to present.
Impact
Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (e.g., hard drive, storage device, the cloud)T1048 Exfiltration Over Alternative Protocol
Common Vulnerabilities and Exposures (CVEs) Exploited
Based on secondary sources, it was noted that affiliates exploit older vulnerabilities like CVE-2021-22986, F5 iControl REST unauthenticated Remote Code Execution Vulnerability, as well as newer vulnerabilities such as:
CVE-2023-0669:Impair Defenses: Disable or Modify Tools T1562.001 LockBit 3.0 affiliates use Backstab, Defender Control, GMER, PCHunter, PowerTool, Process Hacker or TDSSKiller to disable EDR processes and services.In particular, you can no longer use New Technology Local Area Network (LAN) Manager (NTLM) classic authentication single sign-on, Kerberos unconstrained delegation, as well as Data Encryption Standard (DES) encryption.In particular, you can no longer use New Technology Local Area Network (LAN) Manager (NTLM) classic authentication single sign-on, Kerberos unconstrained delegation, as well as Data Encryption Standard (DES) encryption.
(e.g., Software Restriction Policies (SRP), AppLocker, Windows Defender Application Control (WDAC)) with a strict allowlist.System Information Discovery T1082 LockBit affiliates will enumerate system information to include hostname, host configuration, domain information, local drive configuration, remote shares, and mounted external storage devices.When repurposed by LockBit, these tools are then used for a range of malicious cyber activity, such as network reconnaissance, remote access and tunneling, credential dumping, and file exfiltration.In the Consolidation and Preparation phase, mitigations working together to keep an attacker from accessing network devices are patching devices, using network segmentation, enforcing the principle of least privilege, implementing MFA, and using logging and alerting.
to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (e.g., hard drive, storage device, the cloud)
References
[1] LockBit, BlackCat, and Royal Dominate the Ransomware Scene
[2] Ransomware Diaries: Volume 1
[3] What is LockBit ransomware and how does it operate?
(MFA) for all services to the extent possible, particularly for webmail, virtual private networks, and privileged accounts that access critical systems [CPG 2.H].This included ransomware incidents impacting municipal governments, county governments, public higher education and K-12 schools, and emergency services (e.g., law enforcement).
with password logins (e.g., service account, admin accounts, and domain admin accounts) to comply with NIST standards for developing and managing password policies [CPG 2.L].For example, account use polices are mitigations for initial access, persistence, privilege escalation, and credential access but would be listed under initial access mitigations.Exfiltration Over Web Service: Exfiltration to Cloud Storage T1567.002 LockBit affiliates use (1) Rclone, an open-source command line cloud storage manager or FreeFileSync to exfiltrate and (2) MEGA, a publicly available file sharing service for data exfiltration.
Table 15: LockBit Affiliates’ ATT&CK Techniques for Enterprise – Exfiltration
Technique Title ID Use Exfiltration TA0010 LockBit affiliates use StealBit, a custom exfiltration tool first used with LockBit 2.0, to steal data from a target network.
"
BlackCat ransomware fails to extort Australian commercial law giant
exploits
ransomware
2023-06-09
https://www.bleepingcomputer.com/news/security/blackcat-ransomware-fails-to-extort-australian-commercial-law-giant/
Australian law firm HWL Ebsworth confirmed to local media outlets that its network was hacked after the ALPHV ransomware gang began leaking data they claim was stolen from the company. [...]
"
Autosummary:
"
Japanese Pharmaceutical giant Eisai hit by a ransomware attack
exploits
ransomware
2023-06-09
https://securityaffairs.com/147276/cyber-crime/eisai-ransomware-attack.html
This week, the Japanese pharmaceutical giant Eisai has taken its systems offline in response to a ransomware attack. Eisai is a Japanese pharmaceutical company with about 10,000 employees and more than $5 billion in revenue. The company this week was forced to take certain systems offline in response to a cyber attack In response to the ransomware […]
The post Japanese Pharmaceutical giant Eisai hit by a ransomware attack appeared first on Security Affairs.
"
Autosummary:
"
Clop ransomware gang was testing MOVEit Transfer bug since 2021
exploits
ransomware
2023-06-09
https://securityaffairs.com/147264/cyber-crime/clop-testing-moveit-transfer-bug-2021.html
Researchers discovered that the Clop ransomware gang was looking for a zero-day exploit in the MOVEit Transfer since 2021. Kroll security experts discovered that the Clop ransomware gang was looking for a zero-day exploit in the MOVEit Transfer since 2021. Kroll investigated the exploitation attempts for the MOVEit Transfer vulnerability and discovered that Clop threat […]
The post Clop ransomware gang was testing MOVEit Transfer bug since 2021 appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, Clop ransomware)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
“Kroll assesses with high confidence that the MOVEit Transfer exploit as it exists today:
Was available and being used/tested in April 2022
Was available and being used/tested in July 2021″
This week, the Clop ransomware group claimed to have compromised hundreds of companies worldwide by exploiting a vulnerability in MOVEit Transfer software.
"
The Week in Ransomware - June 9th 2023 - It’s Clop... Again!
exploits
ransomware
2023-06-09
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-june-9th-2023-its-clop-again/
The week was dominated by fallout over the MOVEit Transfer data-theft attacks, with the Clop ransomware gang confirming that they were behind them. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include: @serghei, @LawrenceAbrams, @malwrhunterteam, @BleepinComputer, @demonslay335, @DanielGallagher, @fwosar, @billtoulas, @KrollWire, @Mar_Pich, @RedSenseIntel, @CISAgov, @FBI, @MsftSecIntel, @pcrisk, @TrendMicro, @PogoWasRight, @catabatarce, @GossiTheDog, @BrettCallow, and @uptycs.
June 7th 2023
According to open source information, beginning on May 27, 2023, CL0P Ransomware Gang, also known as TA505, began exploiting a previously unknown SQL injection vulnerability (CVE-2023-34362) in Progress Software"s managed file transfer (MFT) solution known as MOVEit Transfer.
"
Royal ransomware gang adds BlackSuit encryptor to their arsenal
exploits
ransomware
2023-06-08
https://www.bleepingcomputer.com/news/security/royal-ransomware-gang-adds-blacksuit-encryptor-to-their-arsenal/
The Royal ransomware gang has begun testing a new encryptor called BlackSuit that shares many similarities with the operation"s usual encryptor. [...]
"
Autosummary:
BlackSuit ransomware data leak site
Source: BleepingComputer
However, a rebrand would no longer make sense, as a recent report by Trend Micro has shown clear similarities between the BlackSuit and Royal Ransomware encryptors, making it hard to convince anyone that they are a new ransomware operation.
"
Japanese pharma giant Eisai discloses ransomware attack
exploits
ransomware
2023-06-08
https://www.bleepingcomputer.com/news/security/japanese-pharma-giant-eisai-discloses-ransomware-attack/
Pharmaceutical company Eisai has disclosed it suffered a ransomware incident that impacted its operations, admitting that attackers encrypted some of its servers. [...]
"
Autosummary:
A weekend ransomware attack
In a notification posted to their website, Eisai disclosed that they suffered a ransomware attack over the weekend, a typical time for attackers to deploy encryptors as IT teams are understaffed and unable to respond effectively to the rapidly evolving situation.
"
Clop Ransomware Gang Likely Exploiting MOVEit Transfer Vulnerability Since 2021
exploits
ransomware
2023-06-08
https://thehackernews.com/2023/06/clop-ransomware-gang-likely-exploiting.html
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) have published a joint advisory regarding the active exploitation of a recently disclosed critical flaw in Progress Software"s MOVEit Transfer application to drop ransomware.
"The Cl0p Ransomware Gang, also known as TA505, reportedly began exploiting a previously unknown SQL injection
"
Autosummary:
"Several of these hosts are associated with high-profile organizations, including multiple Fortune 500 companies and both state and federal government agencies," Censys noted, highlighting finance, technology, and healthcare as the sectors with the most exposures.
"
Clop ransomware likely testing MOVEit zero-day since 2021
exploits
ransomware
2023-06-08
https://www.bleepingcomputer.com/news/security/clop-ransomware-likely-testing-moveit-zero-day-since-2021/
The Clop ransomware gang has been looking for ways to exploit a now-patched zero-day in the MOVEit Transfer managed file transfer (MFT) solution since 2021, according to Kroll security experts. [...]
"
Autosummary:
Clop collecting victim info in April 2022 (Kroll)
"Kroll observed activity consistent with MOVEit Transfer exploitation that collectively occurred on April 27, 2022; May 15–16, 2023; and May 22, 2023, indicating that actors were testing access to organizations via likely automated means and pulling back information from the MOVEit Transfer servers to identify which organization they were accessing," the report reveals.
"
Winning the Mind Game: The Role of the Ransomware Negotiator
exploits
ransomware
2023-06-07
https://thehackernews.com/2023/06/winning-mind-game-role-of-ransomware.html
Get exclusive insights from a real ransomware negotiator who shares authentic stories from network hostage situations and how he managed them.
The Ransomware Industry
Ransomware is an industry. As such, it has its own business logic: organizations pay money, in crypto-currency, in order to regain control over their systems and data.
This industry"s landscape is made up of approximately 10-20
"
Autosummary:
Includes understanding what was compromised, how deep the attackers are in the system, whether the act is a single, double or triple ransomware, if the attack was financially motivated or if it was a political or personal attack, etc.A few months later, the FBI reported they had attacked prominent ransomware group REvil:
The attack garnered a response from the Conti group, which reflected their ideological motives:
Ransomware Vaccinations
Managing a ransomware event is similar to managing a hostage situation.
The technological track includes forensic, investigation, containment, remediation and recovery, as well as professional dialogue.For example, how deep the attackers are in the system, how much data was exfiltrated, etc.
The business track covers business continuity plans and media and PR.
"
0mega ransomware gang changes tactics
exploits
ransomware
industry
2023-06-07
https://www.helpnetsecurity.com/2023/06/07/0mega-ransomware-gang-changes-tactics/
A number of ransomware gangs have stopped using malware to encrypt targets’ files and have switched to a data theft/extortion approach to get paid; 0mega – a low-profile and seemingly not very active threat actor – seems to be among them. About the 0mega ransomware operation 0mega (spelled with a zero) is a relative newcomer to the ransomware/extortion business. Evidence of its activities were first spotted roughly a year ago, when one victim – a … More →
The post 0mega ransomware gang changes tactics appeared first on Help Net Security.
"
Autosummary:
The attackers first compromised one of the company’s Microsoft Global admin service accounts that did not have multi-factor authentication enabled, then used it to create a new Microsoft AD user called 0mega and added various permissions to it (Global Administrator, SharePoint Administrator, Exchange Administrator, Teams Administrator).
"
Clop ransomware gang claims the hack of hundreds of victims exploiting MOVEit Transfer bug
exploits
ransomware
2023-06-07
https://securityaffairs.com/147195/cyber-crime/clop-ransomware-moveit-transfer-attacks.html
Clop ransomware group claims to have hacked hundreds of companies globally by exploiting MOVEit Transfer vulnerability. The Clop ransomware group may have compromised hundreds of companies worldwide by exploiting a vulnerability in MOVEit Transfer software. MOVEit Transfer is a managed file transfer that is used by enterprises to securely transfer files using SFTP, SCP, and […]
The post Clop ransomware gang claims the hack of hundreds of victims exploiting MOVEit Transfer bug appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, Clop ransomware group)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Cyclops Ransomware Gang Offers Go-Based Info Stealer to Cybercriminals
exploits
ransomware
ciber
2023-06-06
https://thehackernews.com/2023/06/cyclops-ransomware-gang-offers-go-based.html
Threat actors associated with the Cyclops ransomware have been observed offering an information stealer malware that"s designed to capture sensitive data from infected hosts.
"The threat actor behind this [ransomware-as-a-service] promotes its offering on forums," Uptycs said in a new report. "There it requests a share of profits from those engaging in malicious activities using its malware."
"
Autosummary:
"
Cyclops Ransomware group offers a multiplatform Info Stealer
exploits
ransomware
2023-06-06
https://securityaffairs.com/147127/cyber-crime/cyclops-ransomware-gang-info-stealer.html
Researchers from security firm Uptycs reported that threat actors linked to the Cyclops ransomware are offering a Go-based information stealer. The Cyclops group has developed multi-platform ransomware that can infect Windows, Linux, and macOS systems. In an unprecedented move, the group is also offering a separate information-stealer malware that can be used to steal sensitive data from infected […]
The post Cyclops Ransomware group offers a multiplatform Info Stealer appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, Cyclops ransomware)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Cl0p ransomware gang claims first victims of the MOVEit vulnerability
exploits
ransomware
2023-06-06
https://www.malwarebytes.com/blog/news/2023/06/cl0p-ransomware-gang-claims-first-victims-of-the-moveit-vulnerability
Categories: Exploits and vulnerabilities Categories: News Categories: Ransomware Tags: Progress
Tags: MOVEit
Tags: Transfer
Tags: CVE-2023-34362
Tags: BBC
Tags: Zellis
Tags: BA
The first victims of the ongoing attacks on vulnerable MOVEit Transfer instances are coming forward. The Cl0p ransomware gang claims it is behind the attacks.
|
The post Cl0p ransomware gang claims first victims of the MOVEit vulnerability appeared first on Malwarebytes Labs.
"
Autosummary:
In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), and 2023.0.1 (15.0.1), a SQL injection vulnerability has been found in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain access to MOVEit Transfer"s database.Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, and execute SQL statements that alter or delete database elements.MOVEit and blocks five malicious IP addresses—138.197.152.201, 209.97.137.33, 5.252.191.0/24, 148.113.152.144, 89.39.105.108—that were found to be looking for vulnerable systems.
"
#StopRansomware: CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability
exploits
ransomware
2023-06-06
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-158a
SUMMARY
Note: this joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.
Actions to take today to mitigate cyber threats from CL0P ransomware:
- Take an inventory of assets and data, identifying authorized and unauthorized devices and software.
- Grant admin privileges and access only when necessary, establishing a software allow list that only executes legitimate applications.
- Monitor network ports, protocols, and services, activating security configurations on network infrastructure devices such as firewalls and routers.
- Regularly patch and update software and applications to their latest versions, and conduct regular vulnerability assessments.
The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint CSA to disseminate known CL0P ransomware IOCs and TTPs identified through FBI investigations as recently as June 2023.
According to open source information, beginning on May 27, 2023, CL0P Ransomware Gang, also known as TA505, began exploiting a previously unknown SQL injection vulnerability (CVE-2023-34362) in Progress Software"s managed file transfer (MFT) solution known as MOVEit Transfer. Internet-facing MOVEit Transfer web applications were infected with a web shell named LEMURLOOT, which was then used to steal data from underlying MOVEit Transfer databases. In similar spates of activity, TA505 conduct
"
Autosummary:
RESOURCES
REFERENCE
[1] Zero-Day Vulnerability in MOVEit Transfer Exploited for Data Theft | Mandiant
[2] MOVEit Transfer Critical Vulnerability (May 2023) - Progress Community
[3] MOVEit Transfer Critical Vulnerability CVE-2023-34362 Rapid Response (huntress.com)
REPORTING
The FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with CL0P group actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.Headers[\"X-siLock-Comment\"]" $a3 = "Delete FROM users WHERE RealName="Health Check Service"" $a4 = "set[\"Username\"]" $a5 = "INSERT INTO users (Username, LoginName, InstID, Permission, RealName" $a6 = "Encryption.
In addition, the authoring authorities of this CSA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques and to reduce the impact and risk of compromise by ransomware or data extortion actors:
Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (i.e., hard drive, storage device, the cloud)."https://www.bleepingcomputer.com/news/security/new-moveit-transfer-zero-day-mass-exploited-in-data-theft-attacks/" reference3 = "https://gist.github.com/JohnHammond/44ce8556f798b7f6a7574148b679c643" verdict = "dangerous" mitre = "T1505.003" platform = "windows" search_context = "filesystem" strings: $a1 = "MOVEit.DMZ" $a2 = "Request.This MOVEit Transfer critical vulnerability exploit impacts the following versions of the software [2]:
MOVEit Transfer 2023.0.0
MOVEit Transfer 2022.1.x
MOVEit Transfer 2022.0.x
MOVEit Transfer 2021.1.x
MOVEit Transfer 2021.0.x
MOVEit Transfer 2020.1.x
MOVEit Transfer 2020.0.x
Due to the speed and ease TA505 has exploited this vulnerability, and based on their past campaigns, FBI and CISA expect to see widespread exploitation of unpatched software services in both private and public networks.
TA505 has operated:
A RaaS and has acted as an affiliate of other RaaS operations,
As an initial access broker (IAB), selling access to compromised corporate networks,
As a customer of other IABs,
And as a large botnet operator specializing in financial fraud and phishing attacks.You can contact us using the following contact information: unlock@rsv-box[.]com and unlock@support-mult[.]com
CL0P’s toolkit contains several malware types to collect information, including the following:
FlawedAmmyy/FlawedGrace remote access trojan (RAT) collects information and attempts to communicate with the Command and Control (C2) server to enable the download of additional malware components [T1071], [T1105].Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA or the FBI.Email
Malicious Domain http://hiperfdhaus[.]com http://jirostrogud[.]com http://qweastradoc[.]com http://qweastradoc[.]com/gate.php http://connectzoomdownload[.]com/download/ZoomInstaller.exe https://connectzoomdownload[.]com/download/ZoomInstaller.exe http://zoom[.]voyage/download/Zoom.exe http://guerdofest[.]com/gate.php
Certificate Name Status Date Valid Thumbprint Serial Number Savas Investments PTY LTD Valid Issuer: Sectigo Public Code Signing CA R36 10/7/2022 - 10/7/2023 8DCCF6AD21A58226521 E36D7E5DBAD133331C181 00-82-D2-24-32-3E-FA-65-06-0B-64- 1F-51-FA-DF-EF-02
MOVEit Campaign Infrastructure IP Addresses May/June 2023 GoAnywhere Campaign Infrastructure IP Addresses January/February 2023 104.194.222[.]107 100.21.161[.]34 138.197.152[.]201 104.200.72[.]149 146.0.77[.]141 107.181.161[.]207 146.0.77[.]155 141.101.68[.]154 146.0.77[.]183 141.101.68[.]166
According to open source information, beginning on May 27, 2023, CL0P Ransomware Gang, also known as TA505, began exploiting a previously unknown SQL injection vulnerability (CVE-2023-34362) in Progress Software"s managed file transfer (MFT) solution known as MOVEit Transfer."https://www.bleepingcomputer.com/news/security/new-moveit-transfer-zero-day-mass-exploited-in-data-theft-attacks/" reference3 = "https://gist.github.com/JohnHammond/44ce8556f798b7f6a7574148b679c643" verdict = "dangerous" mitre = "T1505.003" platform = "windows" search_context = "filesystem" strings: $a1 = "human2.aspx" wide $a2 = "Delete FROM users WHERE RealName="Health Check Service"" wide $a3 =
to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (i.e., hard drive, storage device, the cloud).The web shell authenticates incoming http requests via a hard-coded password and can run commands that will download files from the MOVEit Transfer system, extract its Azure system settings, retrieve detailed record information, and create, insert, or delete a particular user.
SELECT * FROM [<database name>].[dbo].[users] WHERE Permission=30 AND Status="active" and Deleted="0"
rule MOVEit_Transfer_exploit_webshell_aspx { meta: date = "2023-06-01" description = "Detects indicators of compromise in MOVEit Transfer exploitation."
with password logins (e.g., service account, admin accounts, and domain admin accounts) with National Institute for Standards and Technology (NIST) standards for developing and managing password policies.
In late January 2023, the CL0P ransomware group launched a campaign using a zero-day vulnerability, now catalogued as CVE-2023-0669, to target the GoAnywhere MFT platform.
Table 1. ATT&CK Techniques for Enterprise: Initial Access Initial Access Technique Title ID Use Exploit Public-Facing Application T1190 CL0P ransomware group exploited the zero-day vulnerability CVE-2023-34362 affecting MOVEit Transfer software; begins with a SQL injection to infiltrate the MOVEit Transfer web application.
"
Spanish bank Globalcaja confirms Play ransomware attack
financial
exploits
ransomware
2023-06-05
https://securityaffairs.com/147073/cyber-crime/globalcaja-confirms-play-ransomware-attack.html
Play ransomware group claims responsibility for a ransomware attack that hit Globalcaja, one of the major banks in Spain. Globalcaja is a financial institution in the autonomous community of Castilla-La Mancha, it has more than 300 offices across Spain and provides banking services to more than half a million clients. Globalcaja was the victim of […]
The post Spanish bank Globalcaja confirms Play ransomware attack appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, Globalcaja)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Microsoft links Clop ransomware gang to MOVEit data-theft attacks
exploits
ransomware
2023-06-05
https://www.bleepingcomputer.com/news/security/microsoft-links-clop-ransomware-gang-to-moveit-data-theft-attacks/
Microsoft has linked the Clop ransomware gang to recent attacks exploiting a zero-day vulnerability in the MOVEit Transfer platform to steal data from organizations. [...]
"
Autosummary:
"Microsoft is attributing attacks exploiting the CVE-2023-34362 MOVEit Transfer 0-day vulnerability to Lace Tempest, known for ransomware operations & running the Clop extortion site," the Microsoft Threat Intelligence team tweeted Sunday night.
"
Microsoft blames Clop ransomware gang for ‘MOVEit Transfer’ attacks
exploits
ransomware
2023-06-05
https://securityaffairs.com/147093/hacking/clop-ransomware-moveit-transfer.html
Microsoft attributes the recent campaign exploiting a zero-day in the MOVEit Transfer platform to the Clop ransomware gang. The Clop ransomware gang (aka Lace Tempest) is credited by Microsoft for the recent campaign that exploits a zero-day vulnerability, tracked as CVE-2023-34362, in the MOVEit Transfer platform. Microsoft is attributing attacks exploiting the CVE-2023-34362 MOVEit Transfer […]
The post Microsoft blames Clop ransomware gang for ‘MOVEit Transfer’ attacks appeared first on Security Affairs.
"
Autosummary:
— Microsoft Threat Intelligence (@MsftSecIntel) June 5, 2023
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, clop ransomware)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Clop ransomware claims responsibility for MOVEit extortion attacks
exploits
ransomware
2023-06-05
https://www.bleepingcomputer.com/news/security/clop-ransomware-claims-responsibility-for-moveit-extortion-attacks/
The Clop ransomware gang has told BleepingComputer they are behind the MOVEit Transfer data-theft attacks, where a zero-day vulnerability was exploited to breach multiple companies" servers and steal data. [...]
"
Autosummary:
"I want to tell you right away that the military, children"s hospitals, GOV etc like this we no to attack, and their data was erased," Clop said in their email to BleepingComputer.
"
Play ransomware gang compromises Spanish bank, threatens to leak files
financial
exploits
ransomware
2023-06-05
https://www.malwarebytes.com/blog/news/2023/06/play-ransomware-gang-compromises-spanish-bank-threatens-to-leak-files
Categories: Business Tags: globalcaja
Tags: play ransomware
Tags: compromise
Tags: data
Tags: leak
Tags: ransom
Tags: bank
Tags: banking
Tags: Spain
Tags: Spanish
A large Spanish bank, Globalcaja, has fallen victim to the Play ransomware gang.
|
The post Play ransomware gang compromises Spanish bank, threatens to leak files appeared first on Malwarebytes Labs.
"
Autosummary:
Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.From the outset, in #Globalcaja we activated the security protocol created for this purpose, which led us, out of prudence, to disable some office posts, temporarily limiting the performance of some operations.
El mismo no ha afectado al transaccional de la entidad (ni las cuentas ni los acuerdos de los clientes se… pic.twitter.com/LeQdNN8r1i — Globalcaja (@SomosGlobalcaja) June 2, 2023
Yesterday, we registered a cyber incident, consisting of a computer attack on some local computers through a type #ransomware virus.
"
The 2023 State of Ransomware in Education: 84% increase in attacks over 6-month period
exploits
government
ransomware
2023-06-05
https://www.malwarebytes.com/blog/threat-intelligence/2023/06/the-2023-state-of-ransomware-in-education-84-increase-in-known-attacks-over-6-month-period
Categories: Threat Intelligence In total, 26 separate ransomware-as-a-service gangs contributed to the onslaught on education.
|
The post The 2023 State of Ransomware in Education: 84% increase in attacks over 6-month period appeared first on Malwarebytes Labs.
"
Autosummary:
USA education ransomware attacks by gang, June 2022-May 2023
Global education ransomware attacks by gang, June 2022-May 2023
Looking Ahead
To recap, our key findings include:
A significant increase in attacks : The education sector experienced a steep rise in ransomware attacks, with a 84% increase observed over a 6-month period.
Distribution of Vice Society attacks vs other ransomware gangs, June 2022-May 2023
Further findings from the data show that, while ransomware attacks against education are a global phenomenon, the USA (with 56% of known attacks) and the UK (with 15%) were hit the most frequently attacked countries between June 2022 and May 2023.
Known attacks on education by country, June 2022-May 2023
The United Kingdom followed distantly with 28 known attacks, while other countries like Canada, Germany, Brazil, and others also fell prey to these cybercriminals.
"
New Linux Ransomware Strain BlackSuit Shows Striking Similarities to Royal
exploits
ransomware
2023-06-03
https://thehackernews.com/2023/06/new-linux-ransomware-strain-blacksuit.html
An analysis of the Linux variant of a new ransomware strain called BlackSuit has covered significant similarities with another ransomware family called Royal.
Trend Micro, which examined an x64 VMware ESXi version targeting Linux machines, said it identified an "extremely high degree of similarity" between Royal and BlackSuit.
"In fact, they"re nearly identical, with 98% similarities in
"
Autosummary:
"In fact, they"re nearly identical, with 98% similarities in functions, 99.5% similarities in blocks, and 98.9% similarities in jumps based on BinDiff, a comparison tool for binary files," Trend Micro researchers noted.
"
New Linux Ransomware BlackSuit is similar to Royal ransomware
exploits
ransomware
2023-06-03
https://securityaffairs.com/147002/cyber-crime/blacksuit-similar-royal-ransomware.html
Experts noticed that the new Linux ransomware BlackSuit has significant similarities with the Royal ransomware family. Royal ransomware is one of the most notable ransomware families of 2022, it made the headlines in early May 2023 with the attack against the IT systems in Dallas, Texas. The human-operated Royal ransomware first appeared on the threat landscape in September 2022, it has […]
The post New Linux Ransomware BlackSuit is similar to Royal ransomware appeared first on Security Affairs.
"
Autosummary:
The ransomware encrypts the network shares, that are found on the local network and the local drives, with the AES algorithm
In early May, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) released a joint Cybersecurity Advisory (CSA) to provide organizations, tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) associated with this ransomware family.
"
Point32Health ransomware attack exposed info of 2.5M people
exploits
ransomware
2023-06-02
https://securityaffairs.com/146975/data-breach/point32health-ransomware-attack-2.html
After the recent ransomware attack, Point32Health disclosed a data breach that impacted 2.5 million Harvard Pilgrim Health Care subscribers. In April, the non-profit health insurer Point32Health took systems offline in response to a ransomware attack that took place on April 17. The insurer immediately launched an investigation into the incident with the help of third-party […]
The post Point32Health ransomware attack exposed info of 2.5M people appeared first on Security Affairs.
"
Autosummary:
Stolen data include names, addresses, phone numbers, birth dates, Social Security numbers, health insurance account information, taxpayer identification numbers, and clinical information, including medical history, diagnoses, and treatment details.
"
The Week in Ransomware - June 2nd 2023 - Whodunit?
exploits
ransomware
2023-06-02
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-june-2nd-2023-whodunit/
It has been a fairly quiet week regarding ransomware, with only a few reports released and no new significant attacks. However, we may have a rebrand in the making, and a ransomware operation is likely behind a new zero-day data-theft campaign, so we have some news to talk about. [...]
"
Autosummary:
We also learned about some previous ransomware attacks, including @Seifreed, @billtoulas, @Ionut_Ilascu, @struppigel, @BleepinComputer, @serghei, @LawrenceAbrams, @malwrhunterteam, @demonslay335, @fwosar, @rapid7, @HuntressLabs, @GossiTheDog, @IBMSecurity, @TrendMicro, @Avast, @jgreigj, and @pcrisk.
May 30th 2023
BlackCat ransomware, which was among the top ransomware families observed by IBM Security X-Force in 2022, according to the 2023 X-Force Threat Intelligence Index, continues to wreak havoc across organizations globally this year.
"
Fighting ransomware: Perspectives from cybersecurity professionals
exploits
ransomware
ciber
2023-06-01
https://www.helpnetsecurity.com/2023/06/01/ransomware-experts-round-up-video/
Ransomware has become an ever-present threat to individuals, businesses, and even entire nations. In this Help Net Security round-up, we present parts of previously recorded videos from experts in the field that shed light on the pressing ransomware issues. Complete videos David Mahdi, Chief Strategy Officer & CISO Advisory at Sectigo, talks about how ransomware isn’t solely a malware problem, bad actors want access to your data, so it really is a data security and … More →
The post Fighting ransomware: Perspectives from cybersecurity professionals appeared first on Help Net Security.
"
Autosummary:
"
Improved BlackCat Ransomware Strikes with Lightning Speed and Stealthy Tactics
exploits
ransomware
industry
2023-06-01
https://thehackernews.com/2023/06/improved-blackcat-ransomware-strikes.html
The threat actors behind BlackCat ransomware have come up with an improved variant that prioritizes speed and stealth in an attempt to bypass security guardrails and achieve their goals.
The new version, dubbed Sphynx and announced in February 2023, packs a "number of updated capabilities that strengthen the group"s efforts to evade detection," IBM Security X-Force said in a new analysis.
The "
"
Autosummary:
Sphynx also incorporates a loader to decrypt the ransomware payload that, upon execution, performs network discovery activities to hunt for additional systems, deletes volume shadow copies, encrypts files, and finally drops the ransom note.
"
Harvard Pilgrim Health Care ransomware attack hits 2.5 million people
exploits
ransomware
2023-06-01
https://www.bleepingcomputer.com/news/security/harvard-pilgrim-health-care-ransomware-attack-hits-25-million-people/
Harvard Pilgrim Health Care (HPHC) has disclosed that a ransomware attack it suffered in April 2023 impacted 2,550,922 people, with the threat actors also stealing their sensitive data from compromised systems. [...]
"
Autosummary:
The stolen files include the following types of sensitive information:
Full names
Physical addresses
Phone numbers
Dates of birth
Health insurance account information
Social Security numbers
Provider taxpayer identification numbers
Clinical information, including medical history, diagnoses, treatment, dates of service, and provider names
The organization has clarified that the incident impacts current and former members of Harvard Pilgrim, who had a registration date starting on March 28, 2012.
"
7 Stages of Application Testing: How to Automate for Continuous Security
ransomware
2023-05-31
https://www.bleepingcomputer.com/news/security/7-stages-of-application-testing-how-to-automate-for-continuous-security/
There are seven main stages of a complex pen testing process that must be followed in order to effectively assess an application"s security posture. Learn more from OutPost24 about these stages and how PTaaS can find flaws in web applications, [...]
"
Autosummary:
This includes webpages, databases, APIs, and other server-side components, network mapping, service identification, and fingerprinting.
The Seven Stages of Penetration Testing
There are seven main stages of a complex pen testing process that must be followed in order to effectively assess an application’s security posture:
Pre-engagement: Before beginning the actual pen testing process, it is important to properly prepare the environment and define objectives.Pen testers collect information about the target application, including architecture, technologies used, potential entry points, and user roles.
With Outpost24"s PTaaS, organizations can benefit from continuous security monitoring, proactive vulnerability detection, and streamlined remediation processes.By providing one-click fixes for common issues, PTaaS simplifies the remediation process, enabling developers to quickly address vulnerabilities without extensive security expertise.
"
Dark Pink hackers continue to target govt and military organizations
ransomware
2023-05-31
https://www.bleepingcomputer.com/news/security/dark-pink-hackers-continue-to-target-govt-and-military-organizations/
The Dark Pink APT hacking group continues to be very active in 2023, observed targeting government, military, and education organizations in Indonesia, Brunei, and Vietnam. [...]
"
Autosummary:
These tools include "AccCheckConsole.exe," "remote.exe," "Extexport.exe," "MSPUB.exe," and "MSOHTMED.exe," which can be exploited for proxy execution, downloading additional payloads, and more.
"
MCNA Dental data breach impacts 8.9 million people after ransomware attack
financial
exploits
ransomware
2023-05-29
https://www.bleepingcomputer.com/news/security/mcna-dental-data-breach-impacts-89-million-people-after-ransomware-attack/
Managed Care of North America (MCNA) Dental has published a data breach notification on its website, informing almost 9 million patients that their personal data were compromised. [...]
"
Autosummary:
Full name
Address
Date of birth
Phone number
Email
Social Security number
Driver’s license number
Government-issued ID number
Health insurance (plan information, insurance company, member number, Medicaid-Medicare ID numbers)
Care for teeth or braces (visits, dentist name, doctor name, past care, x-rays/photos, medicines, and treatment)
Bills and insurance claims
The notification filed with the Office of the Maine Attorney General says the breach impacted 8,923,662 people, including patients, parents, guardians, or guarantors.
"
3 Challenges in Building a Continuous Threat Exposure Management (CTEM) Program and How to Beat Them
ransomware
2023-05-29
https://thehackernews.com/2023/05/3-challenges-in-building-continuous.html
If you"re a cybersecurity professional, you"re likely familiar with the sea of acronyms our industry is obsessed with. From CNAPP, to CWPP, to CIEM and all of the myriad others, there seems to be a new initialism born each day.
In this article, we"ll look at another trending acronym – CTEM, which stands for Continuous Threat Exposure Management – and the often-surprising challenges that come
"
Autosummary:
(Gartner, 21 July 2022, Implement a Continuous Threat Exposure Management (CTEM) Program)
Download our new whitepaper, Establishing a Modern Exposure Management Program, and discover: Why critical vulnerability does not equal risk
The different types of exposures impacting organizational security posture
The key fundamentals of a modern exposure management program designed for an evolving risk landscape
And more!
Challenge 2 – Seeing the bird"s eye view
A comprehensive CTEM program covers many different areas, from Cloud, to AD, to software vulnerabilities, to network security and basically everything else.
Challenge 1 – Getting non-security and security on the same page
It"s a well-known fact that IT/infrastructure/DevOps/application, etc. teams and security teams don"t always speak the same language; this is problematic in numerous ways but when implementing new programs or undertakings, this disconnect can become even more problematic.
"
Lockbit ransomware attack on MCNA Dental impacts 8.9M individuals
exploits
ransomware
2023-05-29
https://securityaffairs.com/146804/data-breach/mcna-data-breach.html
Managed Care of North America (MCNA) Dental disclosed a data breach that impacted more than 8.9 million individuals. Managed Care of North America (MCNA) Dental suffered a data breach that impacted 8,923,662 patients. MCNA Dental is one of the largest US dental care and oral health insurance providers. The security breach exposed the personal information […]
The post Lockbit ransomware attack on MCNA Dental impacts 8.9M individuals appeared first on Security Affairs.
"
Autosummary:
Stole data includes demographic information to identify and contact patients, such as full name, date of birth, address, telephone and email; Social Security number; driver’s license number or government-issued identification number; health insurance information, such as name of plan/insurer/government payor, member/Medicaid/Medicare ID number, plan and/or group number; and information regarding dental/orthodontic care.
"
Industrial automation giant ABB disclosed data breach after ransomware attack
financial
exploits
ransomware
industry
2023-05-28
https://securityaffairs.com/146752/cyber-crime/abb-ransomware-attack.html
Swiss electrification and automation technology giant ABB confirmed it has suffered a data breach after a ransomware attack. ABB has more than 105,000 employees and has $29.4 billion in revenue for 2022. On May 7, 2023, the Swiss multinational company, leading electrification and automation technology provider, suffered a cyber attack that reportedly impacted its business operations. […]
The post Industrial automation giant ABB disclosed data breach after ransomware attack appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, ABB)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
New Buhti ransomware operation uses rebranded LockBit and Babuk payloads
exploits
ransomware
2023-05-27
https://securityaffairs.com/146700/cyber-crime/buhti-ransomware-rebranded-lockbit-babuk.html
The recently identified Buhti operation targets organizations worldwide with rebranded LockBit and Babuk ransomware variants. Researchers from Symantec discovered a new ransomware operation called Buhti (aka Blacktail) that is using LockBit and Babuk variants to target Linux and Windows systems worldwide. The ransomware operation hasn’t its own ransomware payload, however, it uses a custom information […]
The post New Buhti ransomware operation uses rebranded LockBit and Babuk payloads appeared first on Security Affairs.
"
Autosummary:
The information stealer used by the group is written in Golang, it allows operators to look for specific files (pdf, .php, .png, .ppt, .psd, .rar, .raw, .rtf, .sql, .svg, .swf, .tar, .txt, .wav, .wma, .wmv, .xls, .xml, .yml, .zip, .aiff, .aspx, .docx, .epub, .json, .mpeg, .pptx, .xlsx, .yaml. )
"
Is the BlackByte ransomware gang behind the City of Augusta attack?
exploits
government
ransomware
2023-05-27
https://securityaffairs.com/146717/hacking/city-of-augusta-cyberattack.html
The city of Augusta in Georgia, U.S., admitted that the recent IT system outage was caused by a cyber attack. While the City of Augusta revealed that a cyberattack caused the recent IT outage, the BlackByte ransomware gang has claimed responsibility for the attack. The attack took place on May 21, the administrator at the City […]
The post Is the BlackByte ransomware gang behind the City of Augusta attack? appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, City of Augusta)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
New Buhti ransomware uses leaked payloads and public exploits
exploits
ransomware
2023-05-26
https://www.helpnetsecurity.com/2023/05/26/buhti-ransomware/
A newly identified ransomware operation has refashioned leaked LockBit and Babuk payloads into Buhti ransomware, to launch attacks on both Windows and Linux systems. Use of public exploits One notable aspect of the attackers leveraging the Buhti ransomware is their ability to quickly exploit newly disclosed vulnerabilities (e.g., the recently patched PaperCut and IBM Aspera Faspex flaws). The attackers are leveraging public exploits, Dick O’Brien, principal intelligence analyst with Symantec Threat Hunter team told Help … More →
The post New Buhti ransomware uses leaked payloads and public exploits appeared first on Help Net Security.
"
Autosummary:
“While the reuse of leaked payloads is often the hallmark of a less-skilled ransomware operation, Blacktail’s general competence in carrying out attacks, coupled with its ability to recognize the utility of newly discovered vulnerabilities, suggests that it is not to be underestimated,” Symantec has concluded.
"
Careless IT security worker exploited ransomware attack against his employer, but failed to cover his tracks
exploits
ransomware
2023-05-26
https://www.tripwire.com/state-of-security/rogue-it-security-worker-failed-cover-his-tracks
Bad enough for your company to be held to ransom after a cyber attack.
Worse still to then have one of your own employees exploit the attack in an attempt to steal the ransom for themselves.
Read more in my article on the Tripwire State of Security blog.
"
Autosummary:
The company did the right thing - it informed the police, and it assigned its own IT security staff to investigate the attack, find out how it had occurred, and mitigate any damage which had been caused.
"
US govt contractor ABB confirms ransomware attack, data theft
exploits
ransomware
2023-05-26
https://www.bleepingcomputer.com/news/security/us-govt-contractor-abb-confirms-ransomware-attack-data-theft/
Swiss tech multinational and U.S. government contractor ABB has confirmed that some of its systems were impacted by a ransomware attack, previously described by the company as "an IT security incident." [...]
"
Autosummary:
Since its launch, Black Basta has been responsible for attacks targeting the American Dental Association, Sobeys, Knauf, Yellow Pages Canada, UK outsourcing company Capita, and, more recently, German defense contractor Rheinmetall.
"
BlackByte ransomware claims City of Augusta cyberattack
exploits
government
ransomware
ciber
2023-05-26
https://www.bleepingcomputer.com/news/security/blackbyte-ransomware-claims-city-of-augusta-cyberattack/
The city of Augusta in Georgia, U.S., has confirmed that the most recent IT system outage was caused by unauthorized access to its network. [...]
"
Autosummary:
The leaked documents seen by BleepingComputer contain payroll information, contact details, personally identifiable information (PII), physical addresses, contracts, city budget allocation data, and other types of details.
"
The Week in Ransomware - May 26th 2023 - Cities Under Attack
exploits
ransomware
2023-05-26
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-may-26th-2023-cities-under-attack/
Ransomware gangs continue to hammer local governments in attacks, taking down IT systems and disrupting city"s online services. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include: @demonslay335, @malwrhunterteam, @BleepinComputer, @serghei, @billtoulas, @fwosar, @Ionut_Ilascu, @struppigel, @LawrenceAbrams, @Seifreed, @security_score, @Unit42_Intel, @_CPResearch_, @pcrisk, @BroadcomSW, @uuallan, @Jon__DiMaggio, @AShukuhi, @BushidoToken, @BrettCallow, and @UK_Daniel_Card.
"The City of Augusta, GA began experiencing technical difficulties this past Sunday, May 21, 2023, unrelated to last week"s outage, resulting in a disruption to certain computer systems," reads the City"s statement.
"
12 vulnerabilities newly associated with ransomware
exploits
ransomware
2023-05-25
https://www.helpnetsecurity.com/2023/05/25/12-new-ransomware-vulnerabilities-q1-2023/
In March 2023, the total number of breaches reported was higher than those reported in the previous three years combined, according to Ivanti. Ransomware groups are continuously weaponizing vulnerabilities and adding them to their arsenal to mount crippling and disruptive attacks on their victims. In Q1 2023, researchers identified 12 vulnerabilities newly associated with ransomware. They have also provided an update on key metrics being tracked in relation to ransomware, offering valuable insights to enterprises … More →
The post 12 vulnerabilities newly associated with ransomware appeared first on Help Net Security.
"
Autosummary:
“One of the biggest challenges for IT and security teams is prioritizing and remediating vulnerabilities, particularly those tied to ransomware,” according to Srinivas Mukkamala, CPO at Ivanti.
The weakness categories
The report also tracks the weakness categories contributing to vulnerabilities weaponized by ransomware groups, highlighting the lack of security in software products and operating systems widely used by enterprises.
"
Iranian Agrius Hackers Targeting Israeli Organizations with Moneybird Ransomware
financial
exploits
ransomware
2023-05-25
https://thehackernews.com/2023/05/iranian-agrius-hackers-targeting.html
The Iranian threat actor known as Agrius is leveraging a new ransomware strain called Moneybird in its attacks targeting Israeli organizations.
Agrius, also known as Pink Sandstorm (formerly Americium), has a track record of staging destructive data-wiping attacks aimed at Israel under the guise of ransomware infections.
Microsoft has attributed the threat actor to Iran"s Ministry of
"
Autosummary:
"The use of a new ransomware, written in C++, is noteworthy, as it demonstrates the group"s expanding capabilities and ongoing effort in developing new tools," Check Point researchers Marc Salinas Fernandez and Jiri Vinopal said.
"
New Buhti ransomware gang uses leaked Windows, Linux encryptors
exploits
ransomware
2023-05-25
https://www.bleepingcomputer.com/news/security/new-buhti-ransomware-gang-uses-leaked-windows-linux-encryptors/
A new ransomware operation named "Buhti" uses the leaked code of the LockBit and Babuk ransomware families to target Windows and Linux systems, respectively. [...]
"
Autosummary:
The tool targets the following file types for theft: pdf, php, png, ppt, psd, rar, raw, rtf, sql, svg, swf, tar, txt, wav, wma, wmv, xls, xml, yml, zip, aiff, aspx, docx, epub, json, mpeg, pptx, xlsx, and yaml.
"
Buhti Ransomware Gang Switches Tactics, Utilizes Leaked LockBit and Babuk Code
exploits
ransomware
industry
2023-05-25
https://thehackernews.com/2023/05/buhti-ransomware-gang-switches-tactics.html
The threat actors behind the nascent Buhti ransomware have eschewed their custom payload in favor of leaked LockBit and Babuk ransomware families to strike Windows and Linux systems.
"While the group doesn"t develop its own ransomware, it does utilize what appears to be one custom-developed tool, an information stealer designed to search for and archive specified file types," Symantec said in a
"
Autosummary:
"While the reuse of leaked payloads is often the hallmark of a less-skilled ransomware operation, Blacktail"s general competence in carrying out attacks, coupled with its ability to recognize the utility of newly discovered vulnerabilities, suggests that it is not to be underestimated," Symantec said.
"
Corvus Signal provides continuous threat analysis, tailored alerts and always-on recommendations
ransomware
2023-05-25
https://www.helpnetsecurity.com/2023/05/25/corvus-signal/
Corvus Insurance has unveiled Corvus Signal, the risk prevention solution that brings together brokers, policyholders, and Corvus security experts in partnership. Corvus Signal has been shown to reduce cyber breach frequency and cost by up to 20 percent. The announcement comes amid increasing market activity and interest in combining cyber insurance with risk management services. Corvus Signal is the solution that demonstrates such an approach can bend the loss curve. For more than three years, … More →
The post Corvus Signal provides continuous threat analysis, tailored alerts and always-on recommendations appeared first on Help Net Security.
"
Autosummary:
“We found, through extensive experience working with policyholders, that a partnership-based approach combining personalized cyber threat insights and risk advisory services is the most effective way to curb cyber risk for organizations,” said Jason Rebholz, CISO at Corvus Insurance.
"
Opti9 collaborates with Wasabi to provide clients with AI-powered ransomware detection
exploits
ransomware
2023-05-24
https://www.helpnetsecurity.com/2023/05/24/opti9-wasabi/
Opti9 has been selected by Wasabi Hot Cloud Storage as a Technical Alliance Partner to offer integrated disaster recovery and artificial intelligence (AI) powered ransomware detection services. As result of this trusted partnership, Wasabi clients can now natively integrate a comprehensive disaster recovery and security monitoring that includes proactive protection of their data from ransomware attacks. Opti9 has been a leading managed hybrid cloud solutions and security services provider for over two decades. As part … More →
The post Opti9 collaborates with Wasabi to provide clients with AI-powered ransomware detection appeared first on Help Net Security.
"
Autosummary:
This includes suspicious changes to retention settings, job definitions, encryption, immutability, data deletion, job modifications or deletion, and many other factors.
"
Iranian hackers use new Moneybird ransomware to attack Israeli orgs
financial
exploits
ransomware
2023-05-24
https://www.bleepingcomputer.com/news/security/iranian-hackers-use-new-moneybird-ransomware-to-attack-israeli-orgs/
A suspected Iranian state-supported threat actor known as "Agrius" is now deploying a new ransomware strain named "Moneybird" against Israeli organizations. [...]
"
Autosummary:
Webshell in the text file (Check Point)
Having deployed the webshells, the attackers proceed to use open-source tools that help in network reconnaissance using SoftPerfect Network Scanner, lateral movement, secure communication using Plink/PuTTY, credential stealing with ProcDump, and the exfiltration of data using FileZilla.
"
Kasten K10 V6.0 enables organizations to create proactive ransomware protection strategies
exploits
ransomware
2023-05-24
https://www.helpnetsecurity.com/2023/05/24/kasten-k10-v6-0/
Kasten by Veeam released its new Kasten K10 V6.0 Kubernetes data protection platform. The new release includes features that will help customers scale their cloud native data protection more efficiently, better protect their applications and data against ransomware attacks, and increase accessibility by adding new cloud native integrations. Kubernetes was designed to enable greater productivity – helping enterprises scale automation to manage very large deployments found within containerized environments. Kubernetes has now garnered industry-standard status … More →
The post Kasten K10 V6.0 enables organizations to create proactive ransomware protection strategies appeared first on Help Net Security.
"
Autosummary:
Kasten by Veeam’s Kasten K10 v6.0 provides detection capabilities, immutable backups and instant recovery to address this, but perhaps more importantly, this release also introduces automation and efficiency capabilities to open the doors for large-scale container protection deployment – an inevitability for any company using containers seriously,” said Johnny Yu, Research Manager, Storage and Computing at IDC.Through our collaboration with Kasten by Veeam, we are providing customers with additional flexibility and choice in how they protect their Kubernetes workloads,” said Kirsten Newcomer, Director, Cloud and DevSecOps Strategy, Red Hat.
"
Rheinmetall attacked by BlackBasta ransomware
exploits
ransomware
2023-05-24
https://www.malwarebytes.com/blog/news/2023/05/blackbasta-ransomware-throws-wrench-in-rheinmetall-arms-production
Categories: News Categories: Ransomware Tags: Rheinmetall
Tags: BlackBasta
Tags: ransomware
A cyberattack on arms manufacturer Rheinmetall has been claimed by the BlackBasta ransomware group on its leak site.
|
The post Rheinmetall attacked by BlackBasta ransomware appeared first on Malwarebytes Labs.
"
Autosummary:
Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.After the data is copied, the ransomware encrypts files and gives them the ".basta" extension, erases volume shadow copies, and presents a ransom note named readme.txt on affected devices.
Monthly ransomware attacks in Germany with LockBit and Black Basta highlighted, April 2022 - March 2023
BlackBasta is not very different from other ransomware groups in the way it operates.
"
CISA updates ransomware guidance
exploits
ransomware
2023-05-24
https://www.malwarebytes.com/blog/news/2023/05/cisa-updates-stopransomware-guide
Categories: News Categories: Ransomware Tags: CISA
Tags: StopRansomware
Tags: guide
Tags: ZTA
Tags: compromised
Tags: cloud
Tags: MDR
CISA has updated its #StopRansomware guide to account for changes in ransomware tactics and techniques.
|
The post CISA updates ransomware guidance appeared first on Malwarebytes Labs.
"
Autosummary:
The #StopRansomware guide is set up as a one-stop resource to help organizations reduce the risk of ransomware incidents through best practices to detect, prevent, respond, and recover from them, including step-by-step approaches to address potential attacks.Look for anomalous usage of built-in Windows tools such as bcdedit.exe, fsutil.exe (deletejournal), vssadmin.exe, wbadmin.exe, and wmic.exe (shadowcopy or shadowstorage).
that replace passwords with two or more verification factors (e.g., a fingerprint, facial recognition, device pin, or a cryptographic key).Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.Consider employing password-less MFA that replace passwords with two or more verification factors (e.g., a fingerprint, facial recognition, device pin, or a cryptographic key).
"
BlackCat Ransomware affiliate uses signed kernel driver to evade detection
exploits
ransomware
2023-05-23
https://securityaffairs.com/146536/malware/blackcat-ransomware-uses-kernel-driver.html
Experts spotted the ALPHV/BlackCat ransomware group using signed malicious Windows kernel drivers to evade detection. Trend Micro researchers shared details about ALPHV/BlackCat ransomware incident that took place on February 2023. A BlackCat affiliate employed signed malicious Windows kernel drivers to evade detection. Experts believe the driver is a new version of the malware reported in December 2022 […]
The post BlackCat Ransomware affiliate uses signed kernel driver to evade detection appeared first on Security Affairs.
"
Autosummary:
Nominate Pierluigi Paganini and Security Affairs here here: https://docs.google.com/forms/d/e/1FAIpQLSepvnj8b7QzMdLh7vWEDQDqohjBUsHyn3x3xRdYGCetwVy2DA/viewform
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, Blackcat ransomware)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Arms maker Rheinmetall confirms BlackBasta ransomware attack
exploits
ransomware
2023-05-23
https://www.bleepingcomputer.com/news/security/arms-maker-rheinmetall-confirms-blackbasta-ransomware-attack/
German automotive and arms manufacturer Rheinmetall AG confirms that it suffered a BlackBasta ransomware attack that impacted its civilian business. [...]
"
Autosummary:
Rheinmetall is a German manufacturer of automotive, military vehicles, armaments, air defense systems, engines, and various steel products, which employs over 25,000 people and has an annual revenue of over $7 billion.
"
IT employee impersonates ransomware gang to extort employer
exploits
ransomware
2023-05-23
https://www.bleepingcomputer.com/news/security/it-employee-impersonates-ransomware-gang-to-extort-employer/
A 28-year-old United Kingdom man from Fleetwood, Hertfordshire, has been convicted of unauthorized computer access with criminal intent and blackmailing his employer. [...]
"
Autosummary:
"
Cuba ransomware claims cyberattack on Philadelphia Inquirer
exploits
ransomware
ciber
2023-05-23
https://www.bleepingcomputer.com/news/security/cuba-ransomware-claims-cyberattack-on-philadelphia-inquirer/
The Cuba ransomware gang has claimed responsibility for this month"s cyberattack on The Philadelphia Inquirer, which temporarily disrupted the newspaper"s distribution and disrupted some business operations. [...]
"
Autosummary:
The stolen data, now publicly released on Cuba"s extortion portal, includes financial documents, correspondence with bank employees, account movements, balance sheets, tax documents, compensation, and source code.
"
Fusion Risk Management TPRM enhancements deliver continuous monitoring of third parties
ransomware
2023-05-23
https://www.helpnetsecurity.com/2023/05/23/fusion-risk-management-tprm/
Fusion Risk Management announced expanded functionality of its third-party risk management (TPRM) offering. The enhanced solution delivers continuous monitoring of third parties beyond its traditional instance as well as an evaluation of potential operational and business impacts that those third parties may have. This functionality enables a holistic and real-time view of third-party ecosystem health which improves decision-making and response times in order to transform how third-party risk teams anticipate and manage disruptions. Organizations continue … More →
The post Fusion Risk Management TPRM enhancements deliver continuous monitoring of third parties appeared first on Help Net Security.
"
Autosummary:
“Fusion continues to invest in product innovation to ensure that our customers have the most accurate understanding of third-party impacts across their enterprise, can accelerate real-time intelligence, can make the shift to a proactive risk management posture, and are able to thrive through any business disruption,” concluded Jackson.
"
German arms manufacturer Rheinmetall suffered Black Basta ransomware attack
exploits
ransomware
industry
2023-05-23
https://securityaffairs.com/146571/cyber-crime/rheinmetall-black-basta-ransomware-attack.html
The German automotive and arms manufacturer Rheinmetall announced it was victim of a Black Basta ransomware attack that took place last month. Rheinmetall is a German automotive and arms manufacturer that is listed on the Frankfurt stock exchange. The company this week announced it was victim of a ransomware attack conducted by the Black Basta ransomware group. The incident took place […]
The post German arms manufacturer Rheinmetall suffered Black Basta ransomware attack appeared first on Security Affairs.
"
Autosummary:
Nominate Pierluigi Paganini and Security Affairs here here: https://docs.google.com/forms/d/e/1FAIpQLSepvnj8b7QzMdLh7vWEDQDqohjBUsHyn3x3xRdYGCetwVy2DA/viewform
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, Balck Basta)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Employee guilty of joining ransomware attack on his own company
exploits
ransomware
2023-05-23
https://www.malwarebytes.com/blog/news/2023/05/employee-pleads-guilty-to-blackmail-and-unauthorized-access-after-5-years
Categories: News Categories: Ransomware Tags: employee
Tags: insider threat
Tags: access control
Tags: policy
Tags: ransom
An employee that tried to take advantage of a ransomware attack on his own company has pleaded guilty after 5 years of denying he had anything to do with it.
|
The post Employee guilty of joining ransomware attack on his own company appeared first on Malwarebytes Labs.
"
Autosummary:
The unauthorized access to the emails could be traced back to his home address, which gave the police sufficient grounds to seize a computer, laptop, phone, and a USB stick.Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.
Deploy Endpoint Detection and Response software like Malwarebytes EDR that uses multiple different detection techniques to identify ransomware, and ransomware rollback to restore damaged system files.
"
How continuous security monitoring is changing the compliance game
ransomware
2023-05-22
https://www.helpnetsecurity.com/2023/05/22/continuous-security-monitoring-changing-compliance-video/
Managing compliance doesn’t have to be draining, time-consuming, or overly complicated. In this Help Net Security video, Wesley Van Zyl, Senior Manager, Compliance Success at Scytale, discusses how keeping track of all your security controls can be challenging, particularly when new cybersecurity threats emerge unexpectedly. To maintain consistent compliance and reliable monitoring, it is essential to incorporate automation technology into your compliance management system. By doing so, you can effectively mitigate the risk of human … More →
The post How continuous security monitoring is changing the compliance game appeared first on Help Net Security.
"
Autosummary:
"
An AI-based Chrome Extension Against Phishing, Malware, and Ransomware
financial
exploits
ransomware
2023-05-22
https://www.bleepingcomputer.com/news/security/an-ai-based-chrome-extension-against-phishing-malware-and-ransomware/
Criminal IP"s Chrome extension offers real-time scanning of websites worldwide, using AI-based detection to identify recently created phishing sites. [...]
"
Autosummary:
Criminal IP, a prominent CTI search engine
Criminal IP conducted a successful beta service for approximately one year before its official launch
Source: AI SPERA
Since its official launch on April 17, 2023, Criminal IP has achieved global recognition in cybersecurity, establishing itself as a prominent CTI search engine through API integrations and strong partnerships.
"
Dish Network says the February ransomware attack impacted +300,000 individuals
exploits
ransomware
2023-05-22
https://securityaffairs.com/146515/cyber-crime/dish-network-disclosed-data-breach.html
Satellite TV giant Dish Network disclosed a data breach after the February ransomware attack and started notifying impacted individuals. The American satellite broadcast provider Dish Network went offline on February 24, 2023, the outage impacted Dish.com, Dish Anywhere app, and many other services owned by the company. In early February, the company admitted that the outage was […]
The post Dish Network says the February ransomware attack impacted +300,000 individuals appeared first on Security Affairs.
"
Autosummary:
Nominate Pierluigi Paganini and Security Affairs here here: https://docs.google.com/forms/d/e/1FAIpQLSepvnj8b7QzMdLh7vWEDQDqohjBUsHyn3x3xRdYGCetwVy2DA/viewform
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, Dish)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Malicious Windows kernel drivers used in BlackCat ransomware attacks
exploits
ransomware
2023-05-22
https://www.bleepingcomputer.com/news/security/malicious-windows-kernel-drivers-used-in-blackcat-ransomware-attacks/
The ALPHV ransomware group (aka BlackCat) was observed employing signed malicious Windows kernel drivers to evade detection by security software during attacks. [...]
"
Autosummary:
Malicious drivers used in BlackCat attacks (Trend Micro)
Trend Micro"s analysts observed the exposed following commands that can be issued to the driver:
Activate driver Deactivate the driver after the user mode client finishes its operation Kill any user-mode process Delete specific file paths Force-delete a file by freeing its handles and terminating running processes using it Copy files Force-copy files using a similar mechanism to force-delete Register Process/Thread Notification callbacks Unregister Process/Thread Notification callbacks Reboot the system by calling the "HalReturnToFirmware" API
Copying files from the system (Trend Micro)
Trend Micro comments that the two commands used for Process/Thread Notification callbacks are not working, indicating that the driver is currently under development or still in a testing phase.
"
Notorious Cyber Gang FIN7 Returns Cl0p Ransomware in New Wave of Attacks
exploits
ransomware
2023-05-20
https://thehackernews.com/2023/05/notorious-cyber-gang-fin7-returns-cl0p.html
The notorious cybercrime group known as FIN7 has been observed deploying Cl0p (aka Clop) ransomware, marking the threat actor"s first ransomware campaign since late 2021.
Microsoft, which detected the activity in April 2023, is tracking the financially motivated actor under its new taxonomy Sangria Tempest.
"In these recent attacks, Sangria Tempest uses the PowerShell script POWERTRASH to load
"
Autosummary:
"
Cybercrime gang FIN7 returned and was spotted delivering Clop ransomware
exploits
ransomware
2023-05-20
https://securityaffairs.com/146465/cyber-crime/fin7-delivering-clop-ransomware.html
Cybercriminal gang FIN7 returned with a new wave of attacks aimed at deploying the Clop ransomware on victims’ networks. Researchers at Microsoft Security Intelligence team published a series of tweets to warn of a new wave of attacks aimed at distributing the Clop ransomware and linked it to the financially motivated cybercriminal group Sangria Tempest […]
The post Cybercrime gang FIN7 returned and was spotted delivering Clop ransomware appeared first on Security Affairs.
"
Autosummary:
Nominate Pierluigi Paganini and Security Affairs here here: https://docs.google.com/forms/d/e/1FAIpQLSepvnj8b7QzMdLh7vWEDQDqohjBUsHyn3x3xRdYGCetwVy2DA/viewform
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, FIN7)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Dish Network likely paid ransom after recent ransomware attack
exploits
ransomware
2023-05-19
https://www.bleepingcomputer.com/news/security/dish-network-likely-paid-ransom-after-recent-ransomware-attack/
Dish Network, an American television provider, most likely paid a ransom after being hit by a ransomware attack in February based on the wording used in data breach notification letters sent to impacted employees. [...]
"
Autosummary:
"However, we have confirmed that certain employee-related records and personal information (along with information of some former employees, family members, and a limited number of other individuals) were among the data extracted.
"
Take action now to avoid BianLian ransomware attacks, US Government warns organisations
exploits
government
ransomware
2023-05-19
https://www.tripwire.com/state-of-security/take-action-now-avoid-bianlian-ransomware-attacks-us-government-warns
A joint alert has been issued by US government agencies, advising organisations of the steps they should take to mitigate the threat posed by BianLian ransomware attacks.
"
Autosummary:
"
Microsoft: Notorious FIN7 hackers return in Clop ransomware attacks
exploits
ransomware
2023-05-19
https://www.bleepingcomputer.com/news/security/microsoft-notorious-fin7-hackers-return-in-clop-ransomware-attacks/
A financially motivated cybercriminal group known as FIN7 resurfaced last month, with Microsoft threat analysts linking it to attacks where the end goal was the deployment of Clop ransomware payloads on victims" networks. [...]
"
Autosummary:
"
The Week in Ransomware - May 19th 2023 - A Shifting Landscape
exploits
ransomware
2023-05-19
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-may-19th-2023-a-shifting-landscape/
In the ever-shifting ransomware landscape, we saw new ransomware gangs emerge, threat actors return from a long absence, operations shifting extortion tactics, and a flurry of attacks on the enterprise. [...]
"
Autosummary:
We also learned about new attacks and significant developments in previous ones:
Finally, researchers and law enforcement released new reports:
Contributors and those who provided new ransomware information and stories this week include: @serghei, @LawrenceAbrams, @PolarToffee, @malwrhunterteam, @DanielGallagher, @Ionut_Ilascu, @demonslay335, @billtoulas, @Seifreed, @BleepinComputer, @fwosar, @VK_Intel, @struppigel, @BrettCallow, @TalosSecurity, @CrowdStrike, @pcrisk, @GroupIB, @zscaler, @MsftSecIntel, and @juanbrodersen.
Over the past few weeks, we have reported on new ransomware operations that have emerged in enterprise attacks, including the new Cactus, Akira, RA Group operations.
"
ScanSource says ransomware attack behind multi-day outages
exploits
ransomware
2023-05-17
https://www.bleepingcomputer.com/news/security/scansource-says-ransomware-attack-behind-multi-day-outages/
Technology provider ScanSource has announced it has fallen victim to a ransomware attack impacting some of its systems, business operations, and customer portals. [...]
"
Autosummary:
"
FBI confirms BianLian ransomware switch to extortion only attacks
exploits
ransomware
2023-05-17
https://www.bleepingcomputer.com/news/security/fbi-confirms-bianlian-ransomware-switch-to-extortion-only-attacks/
The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and Australian Cyber Security Centre (ACSC) have published a joint advisory to inform organizations of the latest tactics, techniques, and procedures (TTPs) and known indicators of compromise (IOCs) of the BianLian ransomware group. [...]
"
Autosummary:
A joint Cybersecurity Advisory from government agencies in the U.S. and Australia, and published by the Cybersecurity and Infrastructure Security Agency (CISA,) is warning organizations of the latest tactics, techniques, and procedures (TTPs) used by the BianLian ransomware group.
"
MalasLocker ransomware targets Zimbra servers, demands charity donation
exploits
ransomware
2023-05-17
https://www.bleepingcomputer.com/news/security/malaslocker-ransomware-targets-zimbra-servers-demands-charity-donation/
A new ransomware operation is hacking Zimbra servers to steal emails and encrypt files. However, instead of demanding a ransom payment, the threat actors claim to require a donation to charity to provide an encryptor and prevent data leaking. [...]
"
Autosummary:
While the ransom notes do not contain a link to the ransomware gang’s data leak site, Emsisoft threat analyst Brett Callow found a link to their data leak site, having the title, "Somos malas... podemos ser peores," translated to, "We are bad... we can be worse.{0DS )2D"y,c BA l/tjxov1fa12V8Imj8SfQ27INLwEg+AC2lX3ou4N8HAjtmu9cPV6xLQ --- 7bAeZFny0Xk7gqxscyeDGDbHjsCvAZ0aETUUhIsXnyg
The Age encryption tool was developed by Filippo Valsorda, cryptographer and Go security lead at Google, and uses the X25519 (an ECDH curve), ChaChar20-Poly1305, and HMAC-SHA256 algorithms.
"
Leaked Babuk ransomware builder code lives on as RA Group
exploits
ransomware
2023-05-17
https://www.malwarebytes.com/blog/news/2023/05/leaked-babuk-ransomware-builder-code-lives-on-as-ra-group
Categories: News Tags: ransomware
Tags: RA Group
Tags: babuk
Tags: code
Tags: leaked
Tags: encrypted
Tags: stolen
Tags: exfiltrated
Tags: ransom
Tags: hijack
Tags: blackmail
Tags: double extortion
Tags: leak
Tags: sell
We take a look at yet another ransomware group making use of leaked Babuk code.
|
The post Leaked Babuk ransomware builder code lives on as RA Group appeared first on Malwarebytes Labs.
"
Autosummary:
If you’re unfortunate enough to end up on the leak portal, your details are organised like so:
Organisation name
A list of stolen data / file size
Organisation URL
Customised ransom notes are used for compromised entities, with three days given to pay up or risk the data being made public.
Should your data eventually end up for sale, the below message may eventually provide lots of sleepless nights:
If you want to buy this data, please contact us by qtox
qTox is an instant messaging tool billed as being secure and private, particularly with regard to avoiding having your Government listening in on what you might be saying.Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.
"
U.S. Offers $10 Million Bounty for Capture of Notorious Russian Ransomware Operator
exploits
ransomware
rusia-ucrania
2023-05-17
https://thehackernews.com/2023/05/us-offers-10-million-bounty-for-capture.html
A Russian national has been charged and indicted by the U.S. Department of Justice (DoJ) for launching ransomware attacks against "thousands of victims" in the country and across the world.
Mikhail Pavlovich Matveev (aka Wazawaka, m1x, Boriselcin, and Uhodiransomwar), the 30-year-old individual in question, is alleged to be a "central figure" in the development and deployment of LockBit, Babuk,
"
Autosummary:
Mikhail Pavlovich Matveev (aka Wazawaka, m1x, Boriselcin, and Uhodiransomwar), the 30-year-old individual in question, is alleged to be a "central figure" in the development and deployment of LockBit, Babuk, and Hive ransomware variants since at least June 2020.
"
US Gov offers a $10M reward for a Russian ransomware actor
exploits
ransomware
rusia-ucrania
2023-05-17
https://securityaffairs.com/146345/cyber-crime/russian-ransomware-actor-reward.html
The US government is offering a $10M reward for Russian national Mikhail Pavlovich Matveev (30) charged for his role in ransomware attacks The US Justice Department charged Russian national Mikhail Pavlovich Matveev (30), aka Wazawaka, m1x, Boriselcin, and Uhodiransomwar, for his alleged role in multiple ransomware attacks. The DoJ unsealed two indictments charging the man […]
The post US Gov offers a $10M reward for a Russian ransomware actor appeared first on Security Affairs.
"
Autosummary:
“From Russia and hiding behind multiple aliases, Matveev is alleged to have used these ransomware strains to encrypt and hold hostage for ransom the data of numerous victims, including hospitals, schools, nonprofits, and law enforcement agencies, like the Metropolitan Police Department in Washington, D.C.,” said U.S. Attorney Philip R. Sellinger for the District of New Jersey.
"
Russian ransomware affiliate charged with attacks on critical infrastructure
exploits
ransomware
rusia-ucrania
2023-05-16
https://www.bleepingcomputer.com/news/security/russian-ransomware-affiliate-charged-with-attacks-on-critical-infrastructure/
The U.S. Justice Department has filed charges against a Russian citizen named Mikhail Pavlovich Matveev (also known as Wazawaka or Boriselcin) for involvement in three ransomware operations that targeted victims across the United States. [...]
"
Autosummary:
"
Inside Qilin Ransomware: Affiliates Take Home 85% of Ransom Payouts
exploits
ransomware
2023-05-16
https://thehackernews.com/2023/05/inside-qilin-ransomware-affiliates-take.html
Ransomware affiliates associated with the Qilin ransomware-as-a-service (RaaS) scheme earn anywhere between 80% to 85% of each ransom payment, according to new findings from Group-IB.
The cybersecurity firm said it was able to infiltrate the group in March 2023, uncovering details about the affiliates" payment structure and the inner workings of the RaaS program following a private conversation
"
Autosummary:
"
New RA Group ransomware targets U.S. orgs in double-extortion attacks
exploits
ransomware
2023-05-15
https://www.bleepingcomputer.com/news/security/new-ra-group-ransomware-targets-us-orgs-in-double-extortion-attacks/
A new ransomware group named "RA Group" is targeting pharmaceutical, insurance, wealth management, and manufacturing firms in the United States and South Korea. [...]
"
Autosummary:
In addition to the ransomware groups cited in the Sentinel Labs report as users of Babuk, Cisco Talos also mentions Rook, Night Sky, Pandora, Nokoyawa, Cheerscrypt, AstraLocker 2.0, and ESXiArgs.
"
Why we should be more open about ransomware attacks
exploits
ransomware
2023-05-15
https://www.malwarebytes.com/blog/news/2023/05/why-we-should-be-more-open-about-ransomware-attacks
Categories: News Categories: Ransomware Tags: ransomware
Tags: data breach
Tags: dark web
Tags: share information
Paying the ransom and not saying a word about what happened is what cybercriminals would like us all to do.
|
The post Why we should be more open about ransomware attacks appeared first on Malwarebytes Labs.
"
Autosummary:
Depending on the country an organization is based in, whether they handle data under GDPR regulations, whether they are a government contractor, what sector they are active in, or whatever other reasons, some organizations have a legal obligation to notify one or more authorities about a cyberattack.Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.
The UK’s National Cyber Security Centre (NCSC) has published an article that reflects on why it’s so concerning when cyberattacks go unreported, saying:
...we are increasingly concerned about what happens behind the scenes of the attacks we don’t hear about, particularly the ransomware ones.
"
#StopRansomware: BianLian Ransomware Group
exploits
ransomware
2023-05-15
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-136a
Summary
Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and learn more about other ransomware threats and no-cost resources.
The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and Australian Cyber Security Centre (ACSC) are releasing this joint Cybersecurity Advisory to disseminate known BianLian ransomware and data extortion group IOCs and TTPs identified through FBI and ACSC investigations as of March 2023.
Actions to take today to mitigate cyber threats from BianLian ransomware and data extortion:
• Strictly limit the use of RDP and other remote desktop services.
• Disable command-line and scripting activities and permissions.
• Restrict usage of PowerShell and update Windows PowerShell or PowerShell Core to the latest version.
|
BianLian is a ransomware developer, deployer, and data extortion cybercriminal group that has targeted organizations in multiple U.S. critical infrastructure sectors since June 2022. They have also targeted Australian critical infrastructure sectors in addition to professional services and property development. The group gains access to victim systems through valid Remote Desktop Protocol (RDP) credentials, uses open-source tools and command-line scripting for discovery and credential harvesting, and exfiltrates victim data via File Transfer Protocol (FTP), Rclone, or Mega. BianLian group actors then extort money by threatening to release data if payment is n
"
Autosummary:
In addition, FBI, CISA, and ACSC recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques and to reduce the impact and risk of compromise by ransomware or data extortion actors:
Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (e.g., hard drive, storage device, or the cloud).Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by FBI, CISA, or ACSC.
RESOURCES
Reporting
The FBI is seeking any information that can be shared, including boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with BianLian actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.According to the ransom note, BianLian group specifically looked for, encrypted, and exfiltrated financial, client, business, technical, and personal files.The group gains access to victim systems through valid Remote Desktop Protocol (RDP) credentials, uses open-source tools and command-line scripting for discovery and credential harvesting, and exfiltrates victim data via File Transfer Protocol (FTP), Rclone, or Mega.
to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (e.g., hard drive, storage device, or the cloud).
Validate Security Controls
In addition to applying mitigations, FBI, CISA, and ACSC recommend exercising, testing, and validating your organization"s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory.[T1587.001] and install remote management and access software—e.g., TeamViewer, Atera Agent, SplashTop, AnyDesk—for persistence and command and control [T1105],[T1219].
with password logins (e.g., service account, admin accounts, and domain admin accounts) with National Institute for Standards and Technology (NIST) standards for developing and managing password policies.
Defense Evasion
BianLian group actors use PowerShell [T1059.001] and Windows Command Shell [T1059.003] to disable antivirus tools [T1562.001 ] , specifically Windows defender and Anti-Malware Scan Interface (AMSI).
The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and Australian Cyber Security Centre (ACSC) are releasing this joint Cybersecurity Advisory to disseminate known BianLian ransomware and data extortion group IOCs and TTPs identified through FBI and ACSC investigations as of March 2023.Require all accounts with password logins (e.g., service account, admin accounts, and domain admin accounts) to comply with National Institute for Standards and Technology (NIST) standards for developing and managing password policies.
SoftPerfect Network Scanner (netscan.exe), a network scanner that can ping computers, scan ports, and discover shared folders [T1135 ] .BianLian group originally employed a double-extortion model in which they exfiltrated financial, client, business, technical, and personal files for leverage and encrypted victims’ systems.
FBI, CISA, and ACSC recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.Tune your security program, including people, processes, and technologies, based on the data generated by this process.
Collection
FBI observed BianLian group actors using malware (system.exe) that enumerates registry [T1012] and files [T1083] and copies clipboard data from users [T1115].FBI also observed BianLian harvest credentials from the Local Security Authority Subsystem Service (LSASS) memory [T1003.001], download RDP Recognizer (a tool that could be used to brute force RDP passwords or check for RDP vulnerabilities) to the victim system, and attempt to access an Active Directory domain database (NTDS.dit)Review domain controllers, servers, workstations, and active directories for new and/or unrecognized accounts [CPG 4.C].
Initial Access
BianLian group actors gain initial access to networks by leveraging compromised Remote Desktop Protocol (RDP) credentials likely acquired from initial access brokers [T1078],[T1133] or via phishing [T1566].[T1112] to disable tamper protection for Sophos SAVEnabled, SEDEenabled, and SAVService services, which enables them to uninstall these services.Lists information about the current user account from the domain, such as the user"s name, description, and group memberships.
"
New Ransomware Gang RA Group Hits U.S. and South Korean Organizations
exploits
ransomware
2023-05-15
https://thehackernews.com/2023/05/new-ransomware-gang-ra-group-hits-us.html
A new ransomware group known as RA Group has become the latest threat actor to leverage the leaked Babuk ransomware source code to spawn its own locker variant.
The cybercriminal gang, which is said to have been operating since at least April 22, 2023, is rapidly expanding its operations, according to cybersecurity firm Cisco Talos.
"To date, the group has compromised three organizations in the
"
Autosummary:
"To date, the group has compromised three organizations in the U.S. and one in South Korea across several business verticals, including manufacturing, wealth management, insurance providers and pharmaceuticals," security researcher Chetan Raghuprasad said in a report shared with The Hacker News.
"
New "MichaelKors" Ransomware-as-a-Service Targeting Linux and VMware ESXi Systems
exploits
ransomware
2023-05-15
https://thehackernews.com/2023/05/new-michaelkors-ransomware-as-service.html
A new ransomware-as-service (RaaS) operation called MichaelKors has become the latest file-encrypting malware to target Linux and VMware ESXi systems as of April 2023.
The development points to cybercriminal actors increasingly setting their eyes on the ESXi, cybersecurity firm CrowdStrike said in a report shared with The Hacker News.
"This trend is especially noteworthy given the fact that ESXi
"
Autosummary:
Other notable e-crime outfits that have updated their arsenal to target ESXi consist of ALPHV (BlackCat), Black Basta, Defray, ESXiArgs, LockBit, Nevada, Play, Rook, and Rorschach.
"
CLR SqlShell Malware Targets MS SQL Servers for Crypto Mining and Ransomware
exploits
ransomware
2023-05-15
https://thehackernews.com/2023/05/clr-sqlshell-malware-targets-ms-sql.html
Poorly managed Microsoft SQL (MS SQL) servers are the target of a new campaign that"s designed to propagate a category of malware called CLR SqlShell that ultimately facilitates the deployment of cryptocurrency miners and ransomware.
"Similar to web shell, which can be installed on web servers, SqlShell is a malware strain that supports various features after being installed on an MS SQL server,
"
Autosummary:
"
FBI: Bl00dy Ransomware targets education orgs in PaperCut attacks
exploits
ransomware
2023-05-12
https://www.bleepingcomputer.com/news/security/fbi-bl00dy-ransomware-targets-education-orgs-in-papercut-attacks/
The FBI and CISA issued a joint advisory to warn that the Bl00dy Ransomware gang is now also actively exploiting a PaperCut remote-code execution vulnerability to gain initial access to networks. [...]
"
Autosummary:
"In early May 2023, according to FBI information, the Bl00dy Ransomware Gang gained access to victim networks across the Education Facilities Subsector where PaperCut servers vulnerable to CVE-2023-27350 were exposed to the internet," reads the security advisory
"Ultimately, some of these operations led to data exfiltration and encryption of victim systems.
"
The Week in Ransomware - May 12th 2023 - New Gangs Emerge
exploits
ransomware
2023-05-12
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-may-12th-2023-new-gangs-emerge/
This week we have multiple reports of new ransomware families targeting the enterprise, named Cactus and Akira, both increasingly active as they target the enterprise. [...]
"
Autosummary:
Finally, researchers and law enforcement released new reports:
Contributors and those who provided new ransomware information and stories this week include: @PolarToffee, @malwrhunterteam, @Ionut_Ilascu, @demonslay335, @struppigel, @malwareforme, @BleepinComputer, @billtoulas, @FourOctets, @serghei, @VK_Intel, @fwosar, @LawrenceAbrams, @Seifreed, @jorntvdw, @DanielGallagher, @LabsSentinel, @BrettCallow, @matrosov, @binarly_io, @Checkmarx, @KrollWire, @yinzlovecyber, and @pcrisk.
May 7th 2023
The new Akira ransomware operation has slowly been building a list of victims as they breach corporate networks worldwide, encrypt files, and then demand million-dollar ransoms.
"
Bl00dy Ransomware Gang Strikes Education Sector with Critical PaperCut Vulnerability
exploits
ransomware
2023-05-12
https://thehackernews.com/2023/05/bl00dy-ransomware-gang-strikes.html
U.S. cybersecurity and intelligence agencies have warned of attacks carried out by a threat actor known as the Bl00dy Ransomware Gang that attempt to exploit vulnerable PaperCut servers against the education facilities sector in the country.
The attacks took place in early May 2023, the Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA) said in a
"
Autosummary:
"
Babuk code used by 9 ransomware gangs to encrypt VMWare ESXi servers
exploits
ransomware
2023-05-11
https://www.bleepingcomputer.com/news/security/babuk-code-used-by-9-ransomware-gangs-to-encrypt-vmware-esxi-servers/
An increasing number of ransomware operations are adopting the leaked Babuk ransomware source code to create Linux encryptors targeting VMware ESXi servers. [...]
"
Autosummary:
"
Multinational tech firm ABB hit by Black Basta ransomware attack
exploits
ransomware
2023-05-11
https://www.bleepingcomputer.com/news/security/multinational-tech-firm-abb-hit-by-black-basta-ransomware-attack/
Swiss multinational company ABB, a leading electrification and automation technology provider, has suffered a Black Basta ransomware attack, reportedly impacting business operations. [...]
"
Autosummary:
"ABB operates more than 40 U.S.-based engineering, manufacturing, research and service facilities with a proven track record serving a diversity of federal agencies including the Department of Defense, such as U.S. Army Corps of Engineers, and Federal Civilian agencies such as the Departments of Interior, Transportation, Energy, United States Coast Guard, as well as the U.S. Postal Service," reads the ABB web site.
"
Akira ransomware – what you need to know
exploits
ransomware
2023-05-11
https://www.tripwire.com/state-of-security/akira-ransomware-what-you-need-know
Akira is a new family of ransomware, first used in cybercrime attacks in March 2023.
Read more about the threat in my article on the Tripwire State of Security blog.
"
Autosummary:
According to a report by Bleeping Computer, files with the following extensions are encrypted in the attack:
.abcddb, .abs, .abx, .accdb, .accdc, .accde, .accdr, .accdt, .accdw, .accft, .adb, .ade, .adf, .adn, .adp, .alf, .arc, .ask, .avdx, .avhd, .bdf, .bin, .btr, .cat, .cdb, .ckp, .cma, .cpd, .dacpac, .dad, .dadiagrams, .daschema, .db-shm, .db-wal, .dbc, .dbf, .dbs, .dbt, .dbv, .dbx, .dcb, .dct, .dcx, .ddl, .dlis, .dqy, .dsk, .dsn, .dtsx, .dxl, .eco, .ecx, .edb, .epim, .exb, .fcd, .fdb, .fic, .fmp, .fmp12, .fmpsl, .fol, .fpt, .frm, .gdb, .grdb, .gwi, .hdb, .his, .hjt, .icg, .icr, .idb, .ihx, .iso, .itdb, .itw, .jet, .jtx, .kdb, .kdb, .kexi, .kexic, .kexis, .lgc, .lut, .lwx, .maf, .maq, .mar, .mas, .mav, .maw, .mdb, .mdf, .mdn, .mdt, .mpd, .mrg, .mud, .mwb, .myd, .ndf, .nnt, .nrmlib, .nsf, .nvram, .nwdb, .nyf, .odb, .oqy, .ora, .orx, .owc, .pan, .pdb, .pdm, .pnz, .pvm, .qcow2, .qry, .qvd, .raw, .rbf, .rctd, .rod, .rodx, .rpd, .rsd, .sas7bdat, .sbf, .scx, .sdb, .sdc, .sdf, .sis, .spq, .sql, .sqlite, .sqlite3, .sqlitedb, .subvol, .temx, .tmd, .tps, .trc, .trm, .udb, .udl, .usr, .vdi, .vhd, .vhdx, .vis, .vmcx, .vmdk, .vmem, .vmrs, .vmsd, .vmsn, .vmx, .vpd, .vsv, .vvv, .wdb, .wmdb, .wrk, .xdb, .xld, .xmlff
So, if my company doesn"t have a secure backup that it can restore these files from it may find itself in a sticky pickle...
According to announcements Akira"s leak website on the dark web, the ransomware has already hit a variety of organisations in the finance, real estate, and manufacturing sectors as well as a children"s daycare centre.The site, which is reachable via Tor, adopts an old-school green-on-black theme, with visitors invited to type in commands rather than navigate through a menu.We will study in depth your finance, bank & income statements, your savings, investments etc. and present our reasonable demand to you.
"
How Attack Surface Management Supports Continuous Threat Exposure Management
ransomware
2023-05-11
https://thehackernews.com/2023/05/how-attack-surface-management-supports.html
According to Forrester, External Attack Surface Management (EASM) emerged as a market category in 2021 and gained popularity in 2022. In a different report, Gartner concluded that vulnerability management vendors are expanding their offerings to include Attack Surface Management (ASM) for a suite of comprehensive offensive security solutions.
Recognition from global analysts has officially put
"
Autosummary:
"
5 Phases of Continuous Threat Exposure Management
Scoping Discovery Prioritization Validation Mobilization
Attack Surface Management assists in the first three phases of CTEM: scoping, discovery, and prioritization by supporting businesses through the inventory of known digital assets, continuous discovery of unknown assets, and human intelligence to prioritize severe exposures for timely remediation.With 20 years of experience, their cybersecurity experts secure prominent organizations worldwide, including top banks, cloud providers, healthcare companies, and Fortune 500 firms.
"
Babuk Source Code Sparks 9 Different Ransomware Strains Targeting VMware ESXi Systems
exploits
ransomware
2023-05-11
https://thehackernews.com/2023/05/babuk-source-code-sparks-9-new.html
Multiple threat actors have capitalized on the leak of Babuk (aka Babak or Babyk) ransomware code in September 2021 to build as many as nine different ransomware families capable of targeting VMware ESXi systems.
"These variants emerged through H2 2022 and H1 2023, which shows an increasing trend of Babuk source code adoption," SentinelOne security researcher Alex Delamotte said in a report
"
Autosummary:
Since bursting on the scene in September 2022, Royal ransomware has claimed responsibility for targeting 157 organizations on their leak site, with most of the attacks targeting manufacturing, retail, legal services, education, construction, and healthcare services in the U.S., Canada, and Germany.
"
New ransomware decryptor recovers data from partially encrypted files
exploits
ransomware
2023-05-10
https://www.bleepingcomputer.com/news/security/new-ransomware-decryptor-recovers-data-from-partially-encrypted-files/
Security researchers have shared a new Python-based ransomware recovery tool named "White Phoenix" on GitHub, which lets victims of ransomware strains that use intermittent encryption recover their files for free. [...]
"
Autosummary:
These files using the ZIP format include Word (docx, docm, dotx, dotm, odt), Excel (xlsx, xlsm, xltx, xltm, xlsb, xlam, ods), and PowerPoint (pptx, pptm, ptox, potm, ppsx, ppsm, odp) document formats.
BlackCat"s intermittent encryption (CyberArk)
However, according to CyberArk, which developed and published "White Phoenix," this tactic introduces weaknesses to the encryption, as leaving parts of the original files unencrypted creates the potential for free data recovery.
"
New Ransomware Strain "CACTUS" Exploits VPN Flaws to Infiltrate Networks
exploits
ransomware
2023-05-09
https://thehackernews.com/2023/05/new-ransomware-strain-cactus-exploits.html
Cybersecurity researchers have shed light on a new ransomware strain called CACTUS that has been found to leverage known flaws in VPN appliances to obtain initial access to targeted networks.
"Once inside the network, CACTUS actors attempt to enumerate local and network user accounts in addition to reachable endpoints before creating new user accounts and leveraging custom scripts to automate
"
Autosummary:
CACTUS and Rapture are the latest additions to a long list of new ransomware families that have come to light in recent weeks, including Gazprom, BlackBit, UNIZA, Akira, and a NoCry ransomware variant called Kadavro Vector.
"
New CACTUS ransomware appeared in the threat landscape
exploits
ransomware
2023-05-09
https://securityaffairs.com/145960/malware/new-cactus-ransomware.html
Researchers warn of a new ransomware family called CACTUS that exploits known vulnerabilities in VPN appliances to gain initial access to victims’ networks. Researchers from cybersecurity firm Kroll have analyzed on a new ransomware family called CACTUS that has been spotted exploiting known flaws in VPN appliances to achieve initial access to targeted networks. The […]
The post New CACTUS ransomware appeared in the threat landscape appeared first on Security Affairs.
"
Autosummary:
Nominate Pierluigi Paganini and Security Affairs here here: https://docs.google.com/forms/d/e/1FAIpQLSepvnj8b7QzMdLh7vWEDQDqohjBUsHyn3x3xRdYGCetwVy2DA/viewform
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, CACTUS Ransomware)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Join Our Webinar: Learn How to Defeat Ransomware with Identity-Focused Protection
exploits
ransomware
2023-05-08
https://thehackernews.com/2023/05/join-our-webinar-learn-how-to-defeat.html
Are you concerned about ransomware attacks? You"re not alone. In recent years, these attacks have become increasingly common and can cause significant damage to organizations of all sizes. But there"s good news - with the right security measures in place, such as real-time MFA and service account protection, you can effectively protect yourself against these types of attacks.
That"s why we"re
"
Autosummary:
During this webinar, Yiftach will share his insights on how real-time MFA and service account protection can defeat ransomware attacks, and why identity-focused protection is the only way to stop lateral movement and ransomware spread.
"
Meet Akira — A new ransomware operation targeting the enterprise
exploits
ransomware
2023-05-07
https://www.bleepingcomputer.com/news/security/meet-akira-a-new-ransomware-operation-targeting-the-enterprise/
The new Akira ransomware operation has slowly been building a list of victims as they breach corporate networks worldwide, encrypt files, and then demand million-dollar ransoms. [...]
"
Autosummary:
When executed, Akira will delete Windows Shadow Volume Copies on the device by running the following PowerShell command:
powershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject"
The ransomware will then proceed to encrypt files that contain the following file extensions:
.accdb, .accde, .accdc, .accdt, .accdr, .adb, .accft, .adf, .ade, .arc, .adp, .alf, .ora, .btr, .ask, .cat, .bdf, .ckp, .cdb, .cpd, .cma, .dad, .dacpac, .daschema, .dadiagrams, .db-shm, .db-wal, .dbf, .dbc, .dbt, .dbs, .dbx, .dbv, .dct, .dcb, .ddl, .dcx, .dlis, .dsk, .dqy, .dtsx, .dsn, .eco, .dxl, .edb, .ecx, .exb, .epim, .fdb, .fcd, .fmp, .fic, .fmpsl, .fmp12, .fol, .fpt, .gdb, .frm, .gwi, .grdb, .his, .hdb, .idb, .itdb, .ihx, .jet, .itw, .kdb, .jtx, .kexic, .kexi, .lgc, .kexis, .maf, .lwx, .mar, .maq, .mav, .mas, .mdf, .mdb, .mrg, .mpd, .mwb, .mud, .ndf, .myd, .nrmlib, .nnt, .nsf, .nyf, .nwdb, .oqy, .odb, .owc, .orx, .pdb, .pan, .pnz, .pdm, .qvd, .qry, .rctd, .rbf, .rodx, .rod, .rsd, .rpd, .sbf, .sas7bdat, .sdb, .scx, .sdf, .sdc, .spq, .sis, .sqlite, .sql, .sqlitedb, .sqlite3, .temx, .tps, .tmd, .trm, .trc, .udl, .udb, .usr, .vpd, .vis, .wdb, .vvv, .wrk, .wmdb, .xld, .xdb, .abcddb, .xmlff, .abx, .abs, .adn, .accdw, .icg, .hjt, .kdb, .icr, .maw, .lut, .mdt, .mdn, .vhd, .vdi, .pvm, .vmdk, .vmsn, .vmem, .nvram, .vmsd, .raw, .vmx, .subvol, .qcow2, .vsv, .bin, .vmrs, .avhd, .avdx, .vhdx, .iso, .vmcx
While encrypting, the encryptor will skip files found in the Recycle Bin, System Volume Information, Boot, ProgramData, and Windows folders.
"
New Cactus ransomware encrypts itself to evade antivirus
exploits
ransomware
2023-05-07
https://www.bleepingcomputer.com/news/security/new-cactus-ransomware-encrypts-itself-to-evade-antivirus/
A new ransomware operation called Cactus has been exploiting vulnerabilities in VPN appliances for initial access to networks of "large commercial entities." [...]
"
Autosummary:
This is explicit in the ransom note:
Cactus ransom note threatens with publishing stolen data
source: Kroll
Extensive details about the Cactus operation, the victims they target, and if the hackers keep their word and provide a reliable decryptor if paid, are not available at this time.
In a technical report, Kroll investigators explain that there are three main modes of execution, each one selected with the use of a specific command line switch: setup (-s), read configuration (-r), and encryption (-i).
"
ALPHV gang claims ransomware attack on Constellation Software
exploits
ransomware
2023-05-05
https://www.bleepingcomputer.com/news/security/alphv-gang-claims-ransomware-attack-on-constellation-software/
Canadian diversified software company Constellation Software confirmed on Thursday that some of its systems were breached by threat actors who also stole personal information and business data. [...]
"
Autosummary:
Constellation Software acquires, manages, and builds software businesses through six operating groups: Volaris, Harris, Jonas, Vela Software, Perseus Group, and Topicus.
"
The Week in Ransomware - May 5th 2023 - Targeting the public sector
exploits
ransomware
2023-05-05
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-may-5th-2023-targeting-the-public-sector/
This week"s ransomware news has been dominated by a Royal ransomware attack on the City of Dallas that took down part of the IT infrastructure. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include: @malwrhunterteam, @serghei, @demonslay335, @billtoulas, @Ionut_Ilascu, @fwosar, @LawrenceAbrams, @BleepinComputer, @Seifreed, @AlvieriD, @WithSecure, @PogoWasRight, @pcrisk, @siri_urz, @Unit42_Intel, and @BrettCallow.
The ALPHV ransomware operation, aka BlackCat, has published screenshots of internal emails and video conferences stolen from Western Digital, indicating they likely had continued access to the company"s systems even as the company responded to the breach.
"
Intruder launches continuous attack surface monitoring for SMBs
ransomware
2023-05-04
https://www.helpnetsecurity.com/2023/05/04/intruder-attack-surface-monitoring-capabilities/
Intruder has launched its continuous attack surface monitoring capabilities. The company’s new premium plan offering takes vulnerability management to the next level with continuous coverage, increasing visibility and transparency of external attack surfaces. On average, 65 new vulnerabilities are discovered every day. Businesses of all sizes need visibility of a constantly evolving external attack surface, and to continually manage their exposure to avoid being breached. Intruder’s continuous network scanning includes adaptive attack surface scans, which … More →
The post Intruder launches continuous attack surface monitoring for SMBs appeared first on Help Net Security.
"
Autosummary:
"
City of Dallas shut down IT services after ransomware attack
exploits
government
ransomware
2023-05-04
https://securityaffairs.com/145723/cyber-crime/city-of-dallas-ransomware-attack.html
The City of Dallas, Texas, was hit by a ransomware attack that forced it to shut down some of its IT systems. The IT systems at the City of Dallas, Texas, have been targeted by a ransomware attack. To prevent the threat from spreading within the network, the City has shut down the impacted IT […]
The post City of Dallas shut down IT services after ransomware attack appeared first on Security Affairs.
"
Autosummary:
The ransomware encrypts the network shares, that are found on the local network and the local drives, with the AES algorithm
In March, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) released a joint Cybersecurity Advisory (CSA) to provide organizations, tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) associated with this ransomware family.“Subsequently, the City has confirmed that a number of servers have been compromised with ransomware, impacting several functional areas, including the Dallas Police Department Website,” “The City team, along with its vendors, are actively working to isolate the ransomware to prevent its spread, to remove the ransomware from infected servers, and to restore any services currently impacted.
"
City of Dallas hit by ransomware
exploits
government
ransomware
2023-05-04
https://www.helpnetsecurity.com/2023/05/04/dallas-ransomware/
The City of Dallas, Texas, has suffered a ransomware attack that resulted in disruption of several of its services. What do we know so far? “Wednesday morning, the City’s security monitoring tools notified our Security Operations Center (SOC) that a likely ransomware attack had been launched within our environment,” the City’s public statement revealed. “Subsequently, the City has confirmed that a number of servers have been compromised with ransomware, impacting several functional areas, including the … More →
The post City of Dallas hit by ransomware appeared first on Help Net Security.
"
Autosummary:
“Rather than selling Royal as a ransomware-as-a-service (RaaS), [the group] purchases direct access to corporate networks from underground Initial Access Brokers (IABs) and manages the attack campaigns internally,” BlackBerry researchers say, adding that the group is also known for engaging in double extortion tactics.
"
Veza for SaaS Apps secures sensitive data against breaches, ransomware, and insider threats
exploits
ransomware
2023-05-03
https://www.helpnetsecurity.com/2023/05/03/veza-saas-apps/
Veza has unveiled Veza for SaaS Apps, a solution to deliver access security and governance across SaaS applications, including Salesforce, JIRA, Coupa, Netsuite, GitHub, Gitlab, Slack, and Bitbucket. The solution allows customers to automate access reviews, find and fix privilege access violations, trim privilege sprawl, and prevent SaaS misconfigurations. With this solution, Veza secures the attack surface associated with SaaS apps while enabling continuous compliance with frameworks like Sarbanes-Oxley, ISO 27001, SOC 2, and GDPR. … More →
The post Veza for SaaS Apps secures sensitive data against breaches, ransomware, and insider threats appeared first on Help Net Security.
"
Autosummary:
"
City of Dallas hit by Royal ransomware attack impacting IT services
exploits
government
ransomware
2023-05-03
https://www.bleepingcomputer.com/news/security/city-of-dallas-hit-by-royal-ransomware-attack-impacting-it-services/
The City of Dallas, Texas, has suffered a Royal ransomware attack, causing it to shut down some of its IT systems to prevent the attack"s spread. [...]
"
Autosummary:
"The City team, along with its vendors, are actively working to isolate the ransomware to prevent its spread, to remove the ransomware from infected servers, and to restore any services currently impacted.Subsequently, the City has confirmed that a number of servers have been compromised with ransomware, impacting several functional areas, including the Dallas Police Department Website," explained a media statement from the City of Dallas.
"
Medusa ransomware gang leaks students’ psychological reports and abuse allegations
exploits
ransomware
2023-05-02
https://www.bitdefender.com/blog/hotforsecurity/medusa-ransomware-gang-leaks-students-psychological-reports-and-abuse-allegations/
Students and teachers at the Minneapolis Public School (MPS) District, which suffered a huge ransomware attack< at the end of February, have had highly sensitive information about themselves published on the web, including allegations of abuse by teachers and psychological reports.
Read more in my article on the Hot for Security blog.
"
Autosummary:
Contained in the published data were:
names and birthdates of children with special needs,
details of their home lives and any disorders,
results of intelligence tests,
and details of what medication they might be taking.
"
FBI seizes 9 crypto exchanges used to launder ransomware payments
exploits
ransomware
2023-05-02
https://www.bleepingcomputer.com/news/security/fbi-seizes-9-crypto-exchanges-used-to-launder-ransomware-payments/
The FBI and Ukrainian police have seized nine cryptocurrency exchange websites that facilitated money laundering for scammers and cybercriminals, including ransomware actors. [...]
"
Autosummary:
"
“Ashamed” LockBit ransomware gang apologises to hacked school, offers free decryption tool
exploits
ransomware
2023-04-28
https://www.bitdefender.com/blog/hotforsecurity/ashamed-lockbit-ransomware-gang-apologises-to-hacked-school-offers-free-decryption-tool/
Is it possible ransomware gangs actually do have a heart?
Read more in my article on the Hot for Security blog.
"
Autosummary:
"
The Week in Ransomware - April 28th 2023 - Clop at it again
exploits
ransomware
2023-04-28
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-april-28th-2023-clop-at-it-again/
It has been a very quiet week for ransomware news, with only a few reports released and not much info about cyberattacks. An item of interest was Microsoft linking the recent PaperCut server attacks on the Clop and LockBit ransomware operation. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include: @serghei, @DanielGallagher, @malwareforme, @malwrhunterteam, @FourOctets, @billtoulas, @struppigel, @LawrenceAbrams, @Ionut_Ilascu, @Seifreed, @demonslay335, @BleepinComputer, @fwosar, @jorntvdw, @PolarToffee, @uptycs, @Trellix, @MsftSecIntel, @AlvieriD, @Jon__DiMaggio, @Fortinet, and @pcrisk.
"
LockBit and Cl0p ransomware gangs actively exploiting Papercut vulnerabilities
exploits
ransomware
2023-04-28
https://www.malwarebytes.com/blog/news/2023/04/lockbit-and-cl0p-are-actively-exploiting-papercut-vulnerabilities
Categories: News Categories: Ransomware Tags: PaperCut
Tags: Cl0p
Tags: LockBit
Vulnerabilities in PaperCut printing management are being used in ransomware attacks.
|
The post LockBit and Cl0p ransomware gangs actively exploiting Papercut vulnerabilities appeared first on Malwarebytes Labs.
"
Autosummary:
Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.
In a surprising turn of events for the ransomware landscape, Cl0p emerged as the most used ransomware in March 2023, coming out of nowhere to dethrone the usual frontrunner, LockBit.This makes a vulnerability, especially one that is as easy to exploit, a virtual goldmine for ransomware peddlers, and puts a bullseye on anyone that is running an unpatched server.
"
PaperCut vulnerabilities leveraged by Clop, LockBit ransomware affiliates
exploits
ransomware
2023-04-27
https://www.helpnetsecurity.com/2023/04/27/papercut-lockbit-clop/
Clop and LockBit ransomware affiliates are behind the recent attacks exploiting vulnerabilities in PaperCut application servers, according to Microsoft and Trend Micro researchers. The detected campaings “Microsoft is attributing the recently reported attacks exploiting the CVE-2023-27350 and CVE-2023-27351 vulnerabilities in print management software PaperCut to deliver Clop ransomware to the threat actor tracked as Lace Tempest (overlaps with FIN11 and TA505),” Microsoft shared. “Lace Tempest (DEV-0950) is a Clop ransomware affiliate that has been observed … More →
The post PaperCut vulnerabilities leveraged by Clop, LockBit ransomware affiliates appeared first on Help Net Security.
"
Autosummary:
The detected campaings
“Microsoft is attributing the recently reported attacks exploiting the CVE-2023-27350 and CVE-2023-27351 vulnerabilities in print management software PaperCut to deliver Clop ransomware to the threat actor tracked as Lace Tempest (overlaps with FIN11 and TA505),” Microsoft shared.
"
RTM Locker"s First Linux Ransomware Strain Targeting NAS and ESXi Hosts
exploits
ransomware
2023-04-27
https://thehackernews.com/2023/04/rtm-lockers-first-linux-ransomware.html
The threat actors behind RTM Locker have developed a ransomware strain that"s capable of targeting Linux machines, marking the group"s first foray into the open source operating system.
"Its locker ransomware infects Linux, NAS, and ESXi hosts and appears to be inspired by Babuk ransomware"s leaked source code," Uptycs said in a new report published Wednesday. "It uses a combination of ECDH on
"
Autosummary:
"Its locker ransomware infects Linux, NAS, and ESXi hosts and appears to be inspired by Babuk ransomware"s leaked source code," Uptycs said in a new report published Wednesday.
"
Microsoft Confirms PaperCut Servers Used to Deliver LockBit and Cl0p Ransomware
exploits
ransomware
2023-04-27
https://thehackernews.com/2023/04/microsoft-confirms-papercut-servers.html
Microsoft has confirmed that the active exploitation of PaperCut servers is linked to attacks that are designed to deliver Cl0p and LockBit ransomware families.
The tech giant"s threat intelligence team is attributing a subset of the intrusions to a financially motivated actor it tracks under the name Lace Tempest (formerly DEV-0950), which overlaps with other hacking groups like FIN11, TA505,
"
Autosummary:
The tech giant"s threat intelligence team is attributing a subset of the intrusions to a financially motivated actor it tracks under the name Lace Tempest (formerly DEV-0950), which overlaps with other hacking groups like FIN11, TA505, and Evil Corp.
"In observed attacks, Lace Tempest ran multiple PowerShell commands to deliver a TrueBot DLL, which connected to a C2 server, attempted to steal LSASS credentials, and injected the TrueBot payload into the conhost.exe service," Microsoft said in a series of tweets.
"
Thales CTE-RWP protects critical files and folders from ransomware attacks
exploits
ransomware
2023-04-27
https://www.helpnetsecurity.com/2023/04/27/thales-cte-rwp/
At RSA Conference 2023, Thales launched CipherTrust Transparent Encryption Ransomware Protection (CTE-RWP), an optional licensed feature to the CipherTrust Data Security Platform. CTE-RWP will elevate the protection of customer files and folders from ransomware attacks via access management controls and encryption processes. According to the 2023 Thales Data Threat Report, 49% of IT professionals reported an increase in ransomware attacks with 22% of organisations having experienced a ransomware attack in past 12 months. Ransomware attacks … More →
The post Thales CTE-RWP protects critical files and folders from ransomware attacks appeared first on Help Net Security.
"
Autosummary:
The release of this new Ransomware Protection helps bring an industry-leading solution to market, strengthening the Thales CipherTrust Data Security Platform and offering further protection against an ever-increasing threat to data.
"
Linux version of RTM Locker ransomware targets VMware ESXi servers
exploits
ransomware
2023-04-27
https://www.bleepingcomputer.com/news/security/linux-version-of-rtm-locker-ransomware-targets-vmware-esxi-servers/
RTM Locker is the latest enterprise-targeting ransomware operation found to be deploying a Linux encryptor that targets virtual machines on VMware ESXi servers. [...]
"
Autosummary:
BleepingComputer has seen this with almost all enterprise-targeting ransomware operations, including Royal, Black Basta, LockBit, BlackMatter, AvosLocker, REvil, HelloKitty, RansomEXX, Hive, and now, RTM Locker.
"
Crooks use PaperCut exploits to deliver Cl0p and LockBit ransomware
exploits
ransomware
2023-04-27
https://securityaffairs.com/145377/hacking/papercut-exploits-cl0p-lockbit-ransomware.html
Microsoft revealed that recent attacks against PaperCut servers aimed at distributing Cl0p and LockBit ransomware. Microsoft linked the recent attacks against PaperCut servers to a financially motivated threat actor tracked as Lace Tempest (formerly DEV-0950). The group is known to be an affiliate of the Clop ransomware RaaS affiliate, it has been linked to GoAnywhere attacks and […]
The post Crooks use PaperCut exploits to deliver Cl0p and LockBit ransomware appeared first on Security Affairs.
"
Autosummary:
— Microsoft Threat Intelligence (@MsftSecIntel) April 26, 2023
About the author: Vilius Petkauskas, Senior Journalist at CyberNews
Blogger Awards 2022 – VOTE FOR YOUR WINNERS
Vote for me in the sections:
The Teacher – Most Educational Blog
The Entertainer – Most Entertaining Blog
The Tech Whizz – Best Technical Blog
Best Social Media Account to Follow (@securityaffairs)
Please nominate Security Affairs as your favorite blog.
"
New coercive tactics used to extort ransomware payments
exploits
ransomware
industry
2023-04-26
https://www.helpnetsecurity.com/2023/04/26/q1-2023-ransomware-victims/
The increase in reported ransomware victims across Q1 2023 reflects the continued prevalence of ransomware as a worldwide, industry agnostic threat, according to GuidePoint Security. The report is based on data obtained from publicly available resources, including threat groups themselves, and insight into the ransomware threat landscape. In the first quarter, GRIT tracked 849 total publicly posted ransomware victims claimed by 29 different threat groups. Increase in public ransomware victims GRIT’s latest report shows a … More →
The post New coercive tactics used to extort ransomware payments appeared first on Help Net Security.
"
Autosummary:
While manufacturing and technology continue to be the most impacted sectors, observed victims in the legal industry increased 65% from Q4 2022 to Q1 2023, from 23 to 38, with 70% consistently attributed to the most prolific “double-extortion” model ransomware groups – LockBit, AlphV, Royal, and BlackBasta.
"
Clop, LockBit ransomware gangs behind PaperCut server attacks
exploits
ransomware
2023-04-26
https://www.bleepingcomputer.com/news/security/clop-lockbit-ransomware-gangs-behind-papercut-server-attacks/
Microsoft has attributed recent attacks on PaperCut servers to the Clop and LockBit ransomware operations, which used the vulnerabilities to steal corporate data. [...]
"
Autosummary:
Ransomware gangs behind attacks
Today, Microsoft disclosed that the Clop and LockBit ransomware gangs are behind these PaperCut attacks and using them to steal corporate data from vulnerable servers.
"
Microsoft: Clop and LockBit ransomware behind PaperCut server hacks
exploits
ransomware
2023-04-26
https://www.bleepingcomputer.com/news/security/microsoft-clop-and-lockbit-ransomware-behind-papercut-server-hacks/
Microsoft has attributed recent attacks on PaperCut servers to the Clop and LockBit ransomware operations, which used the vulnerabilities to steal corporate data. [...]
"
Autosummary:
Ransomware gangs behind attacks
Today, Microsoft disclosed that the Clop and LockBit ransomware gangs are behind these PaperCut attacks and using them to steal corporate data from vulnerable servers.
"
Pro-Russia hackers attack European air traffic control website, but don’t panic! Flights continue as normal
ransomware
2023-04-25
https://www.bitdefender.com/blog/hotforsecurity/pro-russia-hackers-attack-european-air-traffic-control-website-but-dont-panic-flights-continue-as-normal/
Eurocontrol, the European air traffic control agency, has revealed that it has been under cyber attack for the last week, and says that pro-Russian hackers have claimed responsibility for the disruption.
When you first see the headline in the likes of the Wall Street Journal, it"s a scary thing to read.
But dig a little deeper, and you realise that the err.. sky is not falling.
Read more in my article on the Hot for Security blog.
"
Autosummary:
"
Yes, it"s undoubtedly a nuisance for some if Eurocontrol"s website is knocked offline by a DDoS attack, or becomes difficult to access, but the website itself is not used for critical operations that could impact flight safety but is rather a way of sharing public information.
"
Black Basta ransomware attacks Yellow Pages Canada
exploits
ransomware
2023-04-25
https://www.malwarebytes.com/blog/news/2023/04/black-basta-ransomware-attacks-yellow-pages-canada
Categories: News Categories: Ransomware Tags: Yellow Pages
Tags: Canada
Tags: Black Basta
Tags: ransomware
Yellow Pages Canada has suffered a cyberattack by the Black Basta ransomware group.
|
The post Black Basta ransomware attacks Yellow Pages Canada appeared first on Malwarebytes Labs.
"
Autosummary:
Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.
Franco Sciannamblo, YP"s Senior Vice President Chief Financial Officer commented in a statement to BleepingComputer:
“Based on our investigation to date, we have reason to believe that the unauthorized third party stole certain personal information from servers containing YP employee data and limited data relating to our business customers.After the data is copied, the ransomware encrypts files with the ".basta" extension, erases volume shadow copies, and presents a ransom note named readme.txt on affected devices.
"
Health insurer Point32Health suffered a ransomware attack
exploits
ransomware
2023-04-23
https://securityaffairs.com/145183/cyber-crime/point32health-ransomware-attack.html
Non-profit health insurer Point32Health suffered a ransomware attack and has taken systems offline in response to the incident. Non-profit health insurer Point32Health has taken systems offline in response to a ransomware attack that took place on April 17. The insurer immediately launched an investigation into the incident with the help of third-party cybersecurity experts to […]
The post Health insurer Point32Health suffered a ransomware attack appeared first on Security Affairs.
"
Autosummary:
"
Google ads push BumbleBee malware used by ransomware gangs
exploits
ransomware
2023-04-22
https://www.bleepingcomputer.com/news/security/google-ads-push-bumblebee-malware-used-by-ransomware-gangs/
The enterprise-targeting Bumblebee malware is distributed through Google Ads and SEO poisoning that promote popular software like Zoom, Cisco AnyConnect, ChatGPT, and Citrix Workspace. [...]
"
Autosummary:
The tools the attackers deployed on the breached environment include the Cobalt Strike pen-test suite, the AnyDesk and DameWare remote access tools, network scanning utilities, an AD database dumper, and a Kerberos credentials stealer.
"
Sotero Ransomware Protection encrypts data to prevent theft and extortion
exploits
ransomware
2023-04-21
https://www.helpnetsecurity.com/2023/04/21/sotero-ransomware-protection/
Sotero has launched Sotero Ransomware Protection, giving organizations the ability to proactively protect unstructured data from attack by utilizing behavior-based detection. Most currently available ransomware solutions use a signature-based approach that detects only currently known ransomware strains – a method that broadly protects against malware concerns, but does not guarantee protection against zero-day attacks. Sotero’s Ransomware Protection not only detects currently known ransomware, but also provides the ability to detect and protect data from zero-day … More →
The post Sotero Ransomware Protection encrypts data to prevent theft and extortion appeared first on Help Net Security.
"
Autosummary:
"
The Week in Ransomware - April 21st 2023 - Macs in the Crosshairs
exploits
ransomware
2023-04-21
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-april-21st-2023-macs-in-the-crosshairs/
A lot of news broke this week related to ransomware, with the discovery of LockBit testing macOS encryptors to an outage on NCR, causing massive headaches for restaurants. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include @billtoulas, @fwosar, @BleepinComputer, @LawrenceAbrams, @Ionut_Ilascu, @serghei, @demonslay335, @jorntvdw, @malwrhunterteam, @Seifreed, @AShukuhi, @patrickwardle, @Kostastsale, @BlackBerry, @TrendMicro, @WhichbufferArda, @NCCGroupplc, @BroadcomSW, @IBMSecurity, @AhnLab_man, @SophosXOps, @SentinelOne, @pcrisk, @AlvieriD, @BrettCallow, and @siri_urz.
Some interesting research on ransomware was also released this week, including:
Finally, we learned about some ransomware attacks, with an NCR outage confirmed to be ransomware and Capita confirming that data was stolen in a cyberattack.
"
Trigona Ransomware targets Microsoft SQL servers
exploits
ransomware
2023-04-20
https://securityaffairs.com/145036/cyber-crime/trigona-ransomware-targets-microsoft-sql-servers.html
Threat actors are hacking poorly secured and Interned-exposed Microsoft SQL servers to deploy the Trigona ransomware. Threat actors are hacking into poorly secured and public-facing Microsoft SQL servers to deploy Trigona ransomware. Trigona is a malware strain that was discovered in October 2022, and Palo Alto Unit 42 researchers reported similarities between Trigona and the […]
The post Trigona Ransomware targets Microsoft SQL servers appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, Microsoft SQL, Trigona ransomware)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Fortra Sheds Light on GoAnywhere MFT Zero-Day Exploit Used in Ransomware Attacks
exploits
ransomware
2023-04-20
https://thehackernews.com/2023/04/fortra-sheds-light-on-goanywhere-mft.html
Fortra, the company behind Cobalt Strike, shed light on a zero-day remote code execution (RCE) vulnerability in its GoAnywhere MFT tool that has come under active exploitation by ransomware actors to steal sensitive data.
The high-severity flaw, tracked as CVE-2023-0669 (CVSS score: 7.2), concerns a case of pre-authenticated command injection that could be abused to achieve code execution. The
"
Autosummary:
"
The threat actor further abused the flaw to deploy two additional tools, dubbed "Netcat" and "Errors.jsp," between January 28, 2023 and January 31, 2023, although not every installation attempt is said to have been successful.
"
LockBit ransomware for Mac – coming soon?
exploits
ransomware
2023-04-20
https://grahamcluley.com/lockbit-ransomware-for-mac-coming-soon/
In the last couple of days it has become clear that the notorious LockBit ransomware gang has been exploring creating what could become a big headache for users of Mac computers.
"
Autosummary:
"
Phylum adds OPA and continuous reporting to its policy engine
ransomware
2023-04-19
https://www.helpnetsecurity.com/2023/04/19/phylum-policy-engine/
Phylum has added Open Policy Agent (OPA) and continuous reporting to its policy engine. Customers now have more flexibility when creating and enforcing custom policies, and can show compliance with key software supply chain frameworks, regulations and guidelines. “We built Phylum’s policy engine as a security-as-code mechanism to give security and risk teams more visibility into the development lifecycle and allow them to enforce security policy without disruption. Phylum is the only platform that allows … More →
The post Phylum adds OPA and continuous reporting to its policy engine appeared first on Help Net Security.
"
Autosummary:
"
Play ransomware gang uses custom Shadow Volume Copy data-theft tool
exploits
ransomware
2023-04-19
https://www.bleepingcomputer.com/news/security/play-ransomware-gang-uses-custom-shadow-volume-copy-data-theft-tool/
The Play ransomware group has developed two custom tools in .NET, namely Grixba and VSS Copying Tool, which it uses to improve the effectiveness of its cyberattacks. [...]
"
Autosummary:
"
March 2023 broke ransomware attack records with 459 incidents
exploits
ransomware
2023-04-19
https://www.bleepingcomputer.com/news/security/march-2023-broke-ransomware-attack-records-with-459-incidents/
March 2023 was the most prolific month recorded by cybersecurity analysts in recent years, measuring 459 attacks, an increase of 91% from the previous month and 62% compared to March 2022. [...]
"
Autosummary:
Most targeted sectors by ransomware actors (NCC Group)
In second place are "Consumer Cyclicals," encompassing construction supplies, specialty retailers, hotels, automobiles, media & publishing, household goods, etc.
"
Microsoft SQL servers hacked to deploy Trigona ransomware
exploits
ransomware
2023-04-19
https://www.bleepingcomputer.com/news/security/microsoft-sql-servers-hacked-to-deploy-trigona-ransomware/
Attackers are hacking into poorly secured and Interned-exposed Microsoft SQL (MS-SQL) servers to deploy Trigona ransomware payloads and encrypt all files. [...]
"
Autosummary:
"
Russian national sentenced to time served for committing money laundering for the Ryuk ransomware operation
financial
exploits
ransomware
rusia-ucrania
2023-04-19
https://securityaffairs.com/145029/cyber-crime/russian-national-sentenced-money-laundering-ryuk-ransomware.html
Russian national Denis Mihaqlovic Dubnikov has been sentenced to time served for committing money laundering for the Ryuk ransomware operation. Russian national Denis Dubnikov (30) has been sentenced to time served for committing money laundering for the Ryuk ransomware group. The man was also ordered to pay $2,000 in restitution. On February 7, 2023, Dubnikov pleaded […]
The post Russian national sentenced to time served for committing money laundering for the Ryuk ransomware operation appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, Ryuk ransomware)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
LockBit Ransomware Now Targeting Apple macOS Devices
exploits
ransomware
2023-04-18
https://thehackernews.com/2023/04/lockbit-ransomware-now-targeting-apple.html
Threat actors behind the LockBit ransomware operation have developed new artifacts that can encrypt files on devices running Apple"s macOS operating system.
The development, which was reported by the MalwareHunterTeam over the weekend, appears to be the first time a big-game ransomware crew has created a macOS-based payload.
Additional samples identified by vx-underground show that the macOS
"
Autosummary:
Wardle also pointed out additional safeguards implemented by Apple, such as System Integrity Protection (SIP) and Transparency, Consent, and Control (TCC) that prevent the execution of unauthorized code and require apps to seek users" permission to access protected files and data.
"
The intricate relationships between the FIN7 group and members of the Conti ransomware gang
exploits
ransomware
2023-04-18
https://securityaffairs.com/144943/cyber-crime/relationships-fin7-conti-ransomware.html
A new malware, dubbed Domino, developed by the FIN7 cybercrime group has been used by the now-defunct Conti ransomware gang. IBM Security X-Force researchers recently discovered a new malware family, called Domino, which was created by developers associated with the FIN7 cybercriminal group (tracked by X-Force as ITG14). FIN7 is a Russian criminal group (aka Carbanak) that has […]
The post The intricate relationships between the FIN7 group and members of the Conti ransomware gang appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, FIN7)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
LockBit ransomware on Mac: Should we worry?
exploits
ransomware
2023-04-18
https://www.malwarebytes.com/blog/news/2023/04/lockbit-ransomware-on-mac-should-we-worry
Categories: News Categories: Ransomware Tags: LockBit
Tags: ransomware
Tags: Patrick Wardle
Tags: macOS ransomware
Tags: first Mac ransomware
Tags: Azim Khodjibaev
Tags: BleepingComputer
Tags: Mark Stockley
With plans to offer more ransomware, LockBit has just created a variant for macOS. But, as experts have pointed out, it"s hardly ready for anything.
|
The post LockBit ransomware on Mac: Should we worry? appeared first on Malwarebytes Labs.
"
Autosummary:
"For most organizations, the main takeaway is Macs are probably safe, for now, but your Windows servers were always the prime target anyway," says Malwarebytes Security Evangelist Mark Stockley.Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.(Source: Objective-See)
The encryptor is likely a test file
Azim Khodjibaev (@AShukuhi), a security researcher at Cisco Talos, floated the theory to BleepingComputer that the encryptors designed for macOS were "meant as a test and were never intended for development in live cyberattacks.
"
Payment giant"s point-of-sale outage caused by ALPHV ransomware
exploits
ransomware
2023-04-18
https://www.malwarebytes.com/blog/news/2023/04/payment-giants-point-of-sale-outage-caused-by-alphv-ransomware
Categories: News Categories: Ransomware Tags: NCR
Tags: Aloha
Tags: ALPHV
Tags: BalckCat
Tags: ransomware
An issue with the NCR Aloha point-of-sale system turned out to be a ransomware attack claimed by the ALPHV group
|
The post Payment giant"s point-of-sale outage caused by ALPHV ransomware appeared first on Malwarebytes Labs.
"
Autosummary:
Posted: April 18, 2023 by
An issue with the NCR Aloha point-of-sale system turned out to be a ransomware attack claimed by the ALPHV group
On April 12, 2023, payment giant NCR reported it was looking into an issue with its point-of-sale (POS) systems that caused an outage, leaving customers unable to use the system.Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.We will give you this list after payment,"
The ransomware-as-a-service (RaaS) group ALPHV, also known as BlackCat or Noberus, is currently one of the most active.
"
Vice Society Ransomware Using Stealthy PowerShell Tool for Data Exfiltration
exploits
ransomware
2023-04-17
https://thehackernews.com/2023/04/vice-society-ransomware-using-stealthy.html
Threat actors associated with the Vice Society ransomware gang have been observed using a bespoke PowerShell-based tool to fly under the radar and automate the process of exfiltrating data from compromised networks.
"Threat actors (TAs) using built-in data exfiltration methods like [living off the land binaries and scripts] negate the need to bring in external tools that might be flagged by
"
Autosummary:
"Threat actors (TAs) using built-in data exfiltration methods like [living off the land binaries and scripts] negate the need to bring in external tools that might be flagged by security software and/or human-based security detection mechanisms," Palo Alto Networks Unit 42 researcher Ryan Chapman said.
"
Living Off the Land (LOTL) attacks: Detecting ransomware gangs hiding in plain sight
exploits
ransomware
2023-04-17
https://www.malwarebytes.com/blog/business/2023/04/living-off-the-land-lotl-attacks-detecting-ransomware-gangs-hiding-in-plain-sight
Categories: Business Good tools gone bad.
|
The post Living Off the Land (LOTL) attacks: Detecting ransomware gangs hiding in plain sight appeared first on Malwarebytes Labs.
"
Autosummary:
Tool Used For Used To Used By PowerShell Versatile scripting language and shell framework for Windows systems Execute malicious scripts, maintain persistence, and evade detection LockBit, Vice Society, Royal, BianLian, ALPHV, Black Basta PsExec Lightweight command-line tool for executing processes on remote systems Execute commands or payloads via a temporary Windows service LockBit, Royal, ALPHV, Play, BlackByte WMI Admin feature for accessing and managing Windows system components Execute malicious commands and payloads remotely LockBit, Vice Society, Black Basta, Dark Power, Cl0p, BianLian Mimikatz Open source tool for Windows security and credential management Extract credentials from memory and perform privilege escalation LockBit, Black Basta, Cuba, ALPHV Cobalt Strike Commercial pen test to assess network security and simulate advanced threat actor tactics Command and control, lateral movement, and exfiltration of sensitive data LockBit, Black Basta, Royal, ALPHV, Play, Cuba, Vice Society
Again, readers of our monthly ransomware review will recognize that each gang listed here are responsible for the lion"s share of yearly ransomware attacks.
In order to truly protect ourselves from RaaS gangs, we have to ‘peel back the onion’, so to speak, and get a closer look at how, exactly, they behave.
In short, by continuously analyzing network and system data, identifying potential weak points, and anticipating attacker tactics, IT teams can begin to get the upper-hand against RaaS gangs that employ LOTL techniques.
"
NCR was the victim of BlackCat/ALPHV ransomware gang
exploits
ransomware
2023-04-16
https://securityaffairs.com/144866/cyber-crime/ncr-blackcat-alphv-ransomware.html
NCR was the victim of the BlackCat/ALPHV ransomware gang, the attack caused an outage on the company’s Aloha PoS platform. NCR Corporation, previously known as National Cash Register, is an American software, consulting and technology company providing several professional services and electronic products. It manufactures self-service kiosks, point-of-sale terminals, automated teller machines, check processing systems, […]
The post NCR was the victim of BlackCat/ALPHV ransomware gang appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, NCR)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
LockBit ransomware encryptors found targeting Mac devices
exploits
ransomware
2023-04-16
https://www.bleepingcomputer.com/news/security/lockbit-ransomware-encryptors-found-targeting-mac-devices/
The LockBit ransomware gang has created encryptors targeting Macs for the first time, likely becoming the first major ransomware operation to ever specifically target macOS. [...]
"
Autosummary:
_check_esxi esxi_ _Esxi _kill_esxi_1 _kill_esxi_2 _kill_esxi_3 _kill_processes _kill_processes_Esxi _killed_force_vm_id _listvms _esxcfg_scsidevs1 _esxcfg_scsidevs2 _esxcfg_scsidevs3 _esxi_disable _esxi_enable
Furthermore, the encryptor contains a list of sixty-five file extensions and filenames that will be excluded from encryption, all of them being Windows file extensions and folders.
"
Experts found the first LockBit encryptor that targets macOS systems
ransomware
2023-04-16
https://securityaffairs.com/144879/cyber-crime/lockbit-encryptor-targets-macos.html
Researchers warn that the LockBit ransomware gang has developed encryptors to target macOS devices. The LockBit group is the first ransomware gang of all time that has created encryptors to target macOS systems, MalwareHunterTeam team warn. MalwareHunterTeam researchers discovered the LockBit encryptors in a ZIP archive uploaded to VirusTotal. The discovery is disconcerting and demonstrates […]
The post Experts found the first LockBit encryptor that targets macOS systems appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, LockBit)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Hackers start abusing Action1 RMM in ransomware attacks
exploits
ransomware
2023-04-15
https://www.bleepingcomputer.com/news/security/hackers-start-abusing-action1-rmm-in-ransomware-attacks/
Security researchers are warning that cybercriminals are increasingly using the Action1 remote access software for persistence on compromised networks and to execute commands, scripts, and binaries. [...]
"
Autosummary:
“Last year we rolled-out a threat actor filtering system that scans user activity for suspicious patterns of behavior, automatically suspends potentially malicious accounts, and alerts Action1’s dedicated security team to investigate the issue” - Mike Walters
Action1 is working on including new measures to stop the misuse of the platform, the researcher said, adding that the company is “fully open to cooperation with both victims and legal authorities” on cases where Action1 was leveraged for cyberattacks.
"
NCR suffers Aloha POS outage after BlackCat ransomware attack
exploits
ransomware
2023-04-15
https://www.bleepingcomputer.com/news/security/ncr-suffers-aloha-pos-outage-after-blackcat-ransomware-attack/
NCR is suffering an outage on its Aloha point of sale platform after being hit by an ransomware attack claimed by the BlackCat/ALPHV gang. [...]
"
Autosummary:
"As a valued customer of NCR Corporation, we are reaching out with additional information about a single data center outage that is impacting a limited number of ancillary Aloha applications for a subset of our hospitality customers," reads an email sent to Aloha POS customers.
Since its launch, the ransomware operation has grown into one of the most significant ransomware active at this time, responsible for hundreds of attacks worldwide, with ransom demands ranging from $35,000 to over $10 million.
"
Vice Society ransomware uses new PowerShell data theft tool in attacks
exploits
ransomware
2023-04-14
https://www.bleepingcomputer.com/news/security/vice-society-ransomware-uses-new-powershell-data-theft-tool-in-attacks/
The Vice Society ransomware gang is deploying a new, rather sophisticated PowerShell script to automate data theft from compromised networks. [...]
"
Autosummary:
For example, some of the folders it targets include:
*941*", "*1040*", "*1099*", "*8822*", "*9465*", "*401*K*", "*401K*", "*4506*T*", "*4506T*", "*Abkommen*", "*ABRH*", "*Abtretung*", "*abwickeln*", "*ACA*1095*", "*Accordi*", "*Aceito*", "*Acordemen*", "*Acordos*", "*Acuerde*", "*Acuerdo*", "*Addres*", "*Adres*", "*Affectation*", "*agreem*", "*Agreemen*Disclosur*", "*agreement*", "*Alamat*", "*Allocation*", "*angreifen*", "*Angriff*", "*Anmeldeformationen*", "*Anmeldeinformationen*", "*Anmeldenunter*", "*Anmeldung*", "*Anschrift*", "*Anspruch*", "*Ansspruch*", "*Anweisung*", "*AnweisungBank*", "*anxious*", "*Análise*", "*Apotheke*", "*ARH*", "*Asignación*", "*Asignatura*", "*Assegnazione*", "*Assignation*", "*Assignment*", "*Atribuição*", "*attorn*", "*Audit*", "*Auditnaadrese*", "*Aufführen*", "*Aufgabe*", "*Aufschühren*", "*Auftrag*", "*auftrunken*", "*Auftrunkinen*", "*Auswertung*", "*Avaliação*", "*Avaliações*", "*Avtal*", "*balanc*", "*bank*", "*Bargeld*", "*Belästigung*", "*Benef*", "*benefits*", "*Bericht*", "*Beschäftigung*", "*Betrug*", "*Bewertung*", "*bezahlen*", "*billing*", "*bio*"
The PowerShell script uses system-native cmdlets like “Get-ChildItem” and “Select-String” to search and exfiltrate data from the infected machine, minimizing its footprint and maintaining a stealthy profile.
"
Darktrace: Investigation found no evidence of LockBit breach
ransomware
2023-04-14
https://www.bleepingcomputer.com/news/security/darktrace-investigation-found-no-evidence-of-lockbit-breach/
Cybersecurity firm Darktrace says it found no evidence that the LockBit ransomware gang breached its network after the group added an entry to their dark web leak platform, implying that they stole data from the company"s systems. [...]
"
Autosummary:
"
The Week in Ransomware - April 14th 2023 - A Focus on Stolen Data
exploits
ransomware
2023-04-14
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-april-14th-2023-a-focus-on-stolen-data/
It has been mostly a quiet week regarding ransomware, with only a few bits of info released on older attacks and some reports released on existing organizations. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include @LawrenceAbrams, @demonslay335, @malwareforme, @malwrhunterteam, @fwosar, @BleepinComputer, @Seifreed, @struppigel, @billtoulas, @Ionut_Ilascu, @serghei, @McAfee, @Fortinet, @Threatlabz, @pcrisk, and @GossiTheDog.
"
Wazuh 4.4 combats breaches, ransomware, and cyberattacks all from a single agent
exploits
ransomware
ciber
2023-04-13
https://www.helpnetsecurity.com/2023/04/13/wazuh-4-4/
Wazuh launched Wazuh 4.4, the latest version of its open source security platform. The latest version adds multiple new features, including IPv6 support for the enrollment process and agent-manager connection, and support for Azure integration within Linux agents. Today’s leading enterprises require world-class protection of workloads across on-premises, virtualized, containerized, and cloud-based environments. Wazuh 4.4 enhances the comprehensive and customizable solution with greater flexibility to combat breaches, ransomware, and cyberattacks all from a single agent. … More →
The post Wazuh 4.4 combats breaches, ransomware, and cyberattacks all from a single agent appeared first on Help Net Security.
"
Autosummary:
"
RTM Locker: Emerging Cybercrime Group Targeting Businesses with Ransomware
exploits
ransomware
2023-04-13
https://thehackernews.com/2023/04/rtm-locker-emerging-cybercrime-group.html
Cybersecurity researchers have detailed the tactics of a "rising" cybercriminal gang called "Read The Manual" (RTM) Locker that functions as a private ransomware-as-a-service (RaaS) provider and carries out opportunistic attacks to generate illicit profit.
"The "Read The Manual" Locker gang uses affiliates to ransom victims, all of whom are forced to abide by the gang"s strict rules,"
"
Autosummary:
To that end, CIS countries, as well as morgues, hospitals, COVID-19 vaccine-related corporations, critical infrastructure, law enforcement, and other prominent companies are off-limits for the group.
"
11:11 Systems Managed SteelDome provides protection from ransomware attacks
exploits
ransomware
2023-04-12
https://www.helpnetsecurity.com/2023/04/12/1111-systems-managed-steeldome/
11:11 Systems has revealed general availability of 11:11 Managed SteelDome in partnership with SteelDome Cyber. The fully managed service is designed for organizations in need of secure, scalable and cost-efficient storage of their unstructured, on-premises data. Leveraging SteelDome’s InfiniVault application technology, 11:11 Managed SteelDome provides on-premises data storage, protection and recovery. This new offering provides data immutability and protection from ransomware attacks and optimizes data storage, all while meeting strict compliance and regulatory requirements. Acting … More →
The post 11:11 Systems Managed SteelDome provides protection from ransomware attacks appeared first on Help Net Security.
"
Autosummary:
"
Urgent: Microsoft Issues Patches for 97 Flaws, Including Active Ransomware Exploit
exploits
ransomware
2023-04-12
https://thehackernews.com/2023/04/urgent-microsoft-issues-patches-for-97.html
It"s the second Tuesday of the month, and Microsoft has released another set of security updates to fix a total of 97 flaws impacting its software, one of which has been actively exploited in ransomware attacks in the wild.
Seven of the 97 bugs are rated Critical and 90 are rated Important in severity. Interestingly, 45 of the shortcomings are remote code execution flaws, followed by 20
"
Autosummary:
Microsoft has also updated its advisory for CVE-2013-3900, a WinVerifyTrust signature validation vulnerability, to include the following Server Core installation versions -
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x65-based Systems Service Pack 2
Windows Server 2008 R2 for x64-based Systems Service 1
Windows Server 2012
Windows Server 2012 R2
Windows Server 2016
Windows Server 2019, and
Windows Server 2022
The development comes as North Korea-linked threat actors have been observed leveraging the flaw to incorporate encrypted shellcode into legitimate libraries without invalidating the Microsoft-issued signature.
"
Cybercrime group exploits Windows zero-day in ransomware attacks
exploits
ransomware
2023-04-12
https://securityaffairs.com/144692/hacking/windows-zero-day-ransomware-attacks.html
Microsoft has addressed a zero-day in the Windows Common Log File System (CLFS) actively exploited in ransomware attacks. Microsoft has addressed a zero-day vulnerability, tracked as CVE-2023-28252, in the Windows Common Log File System (CLFS), which is actively exploited in ransomware attacks. Microsoft fixed the issue with the release of Patch Tuesday security updates for […]
The post Cybercrime group exploits Windows zero-day in ransomware attacks appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, zero-day)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
KFC, Pizza Hut owner employee data stolen in ransomware attack
exploits
ransomware
2023-04-12
https://www.malwarebytes.com/blog/news/2023/04/kfc-pizza-hut-owner-employee-data-stolen-in-ransomware-attack
Categories: News Categories: Ransomware Tags: The Habit Burger Grill
Tags: KFC
Tags: Pizza Hut
Tags: Yum! Brands
Tags: ransomware
Yum! Brands, owner of KFC, Pizza Hut, and other fast food chains, was breached in January. It recently found employee data has been compromised.
|
The post KFC, Pizza Hut owner employee data stolen in ransomware attack appeared first on Malwarebytes Labs.
"
Autosummary:
Brands, the fast-food chain operator behind The Habit Burger Grill, KFC, Pizza Hut, and Taco Bell, has begun sending Notice of Security Breach letters to employees whose data were potentially affected.
"While the Company"s response to this incident is ongoing, at this time we do not believe such impact of the incident will ultimately have a material adverse effect on our business, results of operations or financial condition," the company says in its 2022 annual report to the SEC which it filed on Friday.Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.
"
Windows zero-day vulnerability exploited in ransomware attacks
exploits
ransomware
2023-04-11
https://www.bleepingcomputer.com/news/security/windows-zero-day-vulnerability-exploited-in-ransomware-attacks/
Microsoft has patched a zero-day vulnerability in the Windows Common Log File System (CLFS), actively exploited by cybercriminals to escalate privileges and deploy Nokoyawa ransomware payloads. [...]
"
Autosummary:
Redmond has patched at least 32 local privilege escalation vulnerabilities in the Windows CLFS driver since 2018, with three of them (CVE-2022-24521, CVE-2022-37969, and CVE-2023-23376) also exploited in the wild as zero-days, according to Kaspersky.
"
KFC, Pizza Hut owner discloses data breach after ransomware attack
financial
exploits
ransomware
2023-04-10
https://www.bleepingcomputer.com/news/security/kfc-pizza-hut-owner-discloses-data-breach-after-ransomware-attack/
Yum! Brands, the brand owner of the KFC, Pizza Hut, and Taco Bell fast food chains, is now sending data breach notification letters to an undisclosed number of individuals whose personal information was stolen in a January 13 ransomware attack. [...]
"
Autosummary:
"On January 18, 2023, we announced a ransomware attack that impacted certain IT Systems which resulted in the closure of fewer than 300 restaurants in one market for one day, temporarily disrupted certain of our affected systems and resulted in data being taken from our network," the company said in its 2022 annual report filed with the U.S. Securities and Exchange Commission (SEC) on Friday.
"
Iran-Based Hackers Caught Carrying Out Destructive Attacks Under Ransomware Guise
exploits
ransomware
2023-04-08
https://thehackernews.com/2023/04/iran-based-hackers-caught-carrying-out.html
The Iranian nation-state group known as MuddyWater has been observed carrying out destructive attacks on hybrid environments under the guise of a ransomware operation.
That"s according to new findings from the Microsoft Threat Intelligence team, which discovered the threat actor targeting both on-premises and cloud infrastructures in partnership with another emerging activity cluster dubbed
"
Autosummary:
It"s also tracked by the cybersecurity community under various names, including Boggy Serpens, Cobalt Ulster, Earth Vetala, ITG17, Mercury, Seedworm, Static Kitten, TEMP.Zagros, and Yellow Nix.
"
Taiwanese PC Company MSI Falls Victim to Ransomware Attack
exploits
ransomware
2023-04-08
https://thehackernews.com/2023/04/taiwanese-pc-company-msi-falls-victim.html
Taiwanese PC company MSI (short for Micro-Star International) officially confirmed it was the victim of a cyber attack on its systems.
The company said it "promptly" initiated incident response and recovery measures after detecting "network anomalies." It also said it alerted law enforcement agencies of the matter.
That said, MSI did not disclose any specifics about when the attack took place
"
Autosummary:
"Currently, the affected systems have gradually resumed normal operations, with no significant impact on financial business," the company said in a brief notice shared on Friday.
"
MSI confirms security breach following ransomware attack claims
exploits
ransomware
2023-04-07
https://www.bleepingcomputer.com/news/security/msi-confirms-security-breach-following-ransomware-attack-claims/
Following reports of a ransomware attack, Taiwanese PC vendor MSI (short for Micro-Star International) confirmed today that its network was breached in a cyberattack. [...]
"
Autosummary:
"
MSI confirms security breach after Money Message ransomware attack
financial
exploits
ransomware
2023-04-07
https://securityaffairs.com/144546/data-breach/msi-confirms-security-breach.html
Multinational IT corporation MSI (Micro-Star International) confirms security breach after Money Message ransomware gang claimed the hack. This week the ransomware gang Money Message announced to have hacked the Taiwanese multinational IT corporation MSI (Micro-Star International). Micro-Star International AKA MSI designs, manufactures, and sells motherboards and graphics cards for customers in the United States, Canada, and […]
The post MSI confirms security breach after Money Message ransomware attack appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, MSI)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
CISA orders agencies to patch Backup Exec bugs used by ransomware gang
exploits
ransomware
2023-04-07
https://www.bleepingcomputer.com/news/security/cisa-orders-agencies-to-patch-backup-exec-bugs-used-by-ransomware-gang/
On Friday, U.S. Cybersecurity and Infrastructure Security Agency (CISA) increased by five its list of security issues that threat actors have used in attacks, three of them in Veritas Backup Exec exploited to deploy ransomware. [...]
"
Autosummary:
Initial access in ransomware attack
Of the five vulnerabilities that CISA added to the catalog of Known Exploited Vulnerabilities (KEV) today, only one was rated critical, an issue in Veritas’ data protection software tracked as CVE-2021-27877 that allows remote access and command execution with elevated privileges.
"
Money Message ransomware gang claims MSI breach, demands $4 million
financial
exploits
ransomware
2023-04-06
https://www.bleepingcomputer.com/news/security/money-message-ransomware-gang-claims-msi-breach-demands-4-million/
Taiwanese PC parts maker MSI (Micro-Star International) has been listed on the extortion portal of a new ransomware gang known as "Money Message," which claims to have stolen source code from the company"s network. [...]
"
Autosummary:
"
Medusa ransomware claims attack on Open University of Cyprus
exploits
ransomware
2023-04-06
https://www.bleepingcomputer.com/news/security/medusa-ransomware-claims-attack-on-open-university-of-cyprus/
The Medusa ransomware gang has claimed a cyberattack on the Open University of Cyprus (OUC), which caused severe disruptions of the organization"s operations. [...]
"
Autosummary:
“As a precaution, access is not provided to the University’s eLearning Platform, Employment Portal, the Portal for applications of prospective students, and other critical systems that mainly concern the University community,” reads the OUC announcement.
"
Rorschach ransomware deployed by misusing a security tool
exploits
ransomware
2023-04-06
https://www.helpnetsecurity.com/2023/04/06/rorschach-ransomware-misusing-security-tool/
An unbranded ransomware strain that recently hit a US-based company is being deployed by attackers who are misusing a tool included in a commercial security product, Check Point researchers have found. The solution in question is Palo Alto Networks’ Cortex XDR, whose Dump Service Tool the attackers appropriated and are now misusing to side-load the DLL that decrypts and injects the (newly labeled) Rorschach ransomware. Rorschach’s execution flow (Source: Check Point) The peculiarities of Rorschach … More →
The post Rorschach ransomware deployed by misusing a security tool appeared first on Help Net Security.
"
Autosummary:
It can spread itself automatically when executed on a Domain Controller (DC), where it creates a group policy that puts copies of itself on all workstations, then one that kills specific processes, and finally one that registers a scheduled task that will run the main executable
It clears Windows event logs on affected machines, disables the Windows firewall, and deletes shadow volumes and backups (to make data recovery more difficult)
It has a hard-coded configuration but has additional capabilities that can be deployed via different command line arguments (e.g., the operator can choose not to change the wallpaper of the infected machine or deliver a ransom note, or make it so that a password is needed to run the sample)
"
Money Message ransomware group claims to have hacked IT giant MSI
financial
exploits
ransomware
2023-04-06
https://securityaffairs.com/144519/cyber-crime/money-message-claims-msi-hack.html
Ransomware gang Money Message claims to have hacked the Taiwanese multinational IT corporation MSI (Micro-Star International). Ransomware gang Money Message announced to have hacked the Taiwanese multinational IT corporation MSI (Micro-Star International). Micro-Star International AKA MSI designs, manufactures, and sells motherboards and graphics cards for customers in the United States, Canada, and internationally. MSI is headquartered in Taipei, […]
The post Money Message ransomware group claims to have hacked IT giant MSI appeared first on Security Affairs.
"
Autosummary:
"
Protect Your Company: Ransomware Prevention Made Easy
exploits
ransomware
2023-04-05
https://thehackernews.com/2023/04/protect-your-company-ransomware.html
Every year hundreds of millions of malware attacks occur worldwide, and every year businesses deal with the impact of viruses, worms, keyloggers, and ransomware. Malware is a pernicious threat and the biggest driver for businesses to look for cybersecurity solutions.
Naturally, businesses want to find products that will stop malware in its tracks, and so they search for solutions to do that.
"
Autosummary:
It"s important to look for malware solutions that can confront today"s key threats, such as known malware, polymorphic variants, ransomware, zero-day exploits, and Advanced Persistent Threats (APTs).
This approach will not only help stop and mitigate the damage from malware, but defend against other types of threats too, such as credential theft as a result of phishing, insider threats, and supply-chain attacks.
"
Fake ransomware demands payment without actually encrypting files
exploits
ransomware
2023-04-05
https://www.malwarebytes.com/blog/news/2023/04/fake-ransomware-demands-payment-without-actually-encrypting-files
Categories: News Tags: ransomware
Tags: fake
Tags: faker
Tags: fraud
Tags: scam
Tags: bogus
Tags: midnight
We take a look at a ransomware group that doesn"t produce any ransomware, only threats.
|
The post Fake ransomware demands payment without actually encrypting files appeared first on Malwarebytes Labs.
"
Autosummary:
Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.Posted: April 5, 2023 by
We take a look at a ransomware group that doesn"t produce any ransomware, only threats.If your incident response consists of opening up one of these missives, panicking, and racing to pay fraudsters, it could end up being a very costly and needless mistake.Deploy Endpoint Detection and Response software like Malwarebytes EDR that uses multiple different detection techniques to identify ransomware, and ransomware rollback to restore damaged system files.
"
ALPHV ransomware exploits Veritas Backup Exec bugs for initial access
exploits
ransomware
2023-04-04
https://www.bleepingcomputer.com/news/security/alphv-ransomware-exploits-veritas-backup-exec-bugs-for-initial-access/
An ALPHV/BlackCat ransomware affiliate was observed exploiting three vulnerabilities impacting the Veritas Backup product for initial access to the target network. [...]
"
Autosummary:
Next, they downloaded additional tools on the host like LAZAGNE, LIGOLO, WINSW, RCLONE, and ultimately the ALPHV ransomware encryptor through the Background Intelligent Transfer Service (BITS).
"
New Rorschach ransomware is the fastest encryptor seen so far
exploits
ransomware
2023-04-04
https://www.bleepingcomputer.com/news/security/new-rorschach-ransomware-is-the-fastest-encryptor-seen-so-far/
Following a cyberattack on a U.S.-based company, malware researchers discovered what appears to be a new ransomware strain with "technically unique features," which they named Rorschach. [...]
"
Autosummary:
Rorschach details
Researchers at cybersecurity company Check Point, responding to an incident at a company in the U.S., found that Rorschach was deployed using the DLL side-loading technique via a signed component in Cortex XDR, the extended detection and response product from Palo Alto Networks.
"
Rorschach Ransomware Emerges: Experts Warn of Advanced Evasion Strategies
exploits
ransomware
2023-04-04
https://thehackernews.com/2023/04/rorschach-ransomware-emerges-experts.html
Cybersecurity researchers have taken the wraps off a previously undocumented ransomware strain called Rorschach that"s both sophisticated and fast.
"What makes Rorschach stand out from other ransomware strains is its high level of customization and its technically unique features that have not been seen before in ransomware," Check Point Research said in a new report. "In fact, Rorschach is one
"
Autosummary:
"The Rorschach ransomware employs a highly effective and fast hybrid-cryptography scheme, which blends the curve25519 and eSTREAM cipher hc-128 algorithms for encryption purposes," researchers Jiri Vinopal, Dennis Yarizadeh, and Gil Gekker explained.
"
Rorschach ransomware has the fastest file-encrypting routine to date
exploits
ransomware
2023-04-04
https://securityaffairs.com/144425/cyber-crime/rorschach-ransomware-fast-encryption.html
A new ransomware strain named Rorschach ransomware supports the fastest file-encrypting routine observed to date. Check Point Research (CPR) and Check Point Incident Response Team (CPIRT) researchers detected a previously unknown ransomware strain, dubbed Rorschach ransomware, that was employed in attack against a US-based company. The experts pointed out that the Rorschach ransomware appears to be unique. […]
The post Rorschach ransomware has the fastest file-encrypting routine to date appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, Rorschach ransomware)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
The Rorschach ransomware uses the following files:
cy.exe – Cortex XDR Dump Service Tool version 7.3.0.16740, abused to side-load winutils.dll
– Cortex XDR Dump Service Tool version 7.3.0.16740, abused to side-load winutils.dll winutils.dll – Packed Rorschach loader and injector, used to decrypt and inject the ransomware.
"
ALPHV/BlackCat ransomware affiliate targets Veritas Backup solution bugs
exploits
ransomware
2023-04-04
https://securityaffairs.com/144438/cyber-crime/alphv-blackcat-ransomware-veritas-flaws.html
An ALPHV/BlackCat ransomware affiliate was spotted exploiting vulnerabilities in the Veritas Backup solution. An affiliate of the ALPHV/BlackCat ransomware gang, tracked as UNC4466, was observed exploiting three vulnerabilities in the Veritas Backup solution to gain initial access to the target network. Unlike other ALPHV affiliates, UNC4466 doesn’t rely on stolen credentials for initial access to victim environments. Mandiant […]
The post ALPHV/BlackCat ransomware affiliate targets Veritas Backup solution bugs appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, ALPHV/BlackCat ransomware)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
Then the threat actor used the Background Intelligent Transfer Service (BITS) to download additional tools such as LAZAGNE, LIGOLO, WINSW, RCLONE, and finally the ALPHV ransomware encryptor.
The Teacher – Most Educational Blog
The Entertainer – Most Entertaining Blog
The Tech Whizz – Best Technical Blog
Best Social Media Account to Follow (@securityaffairs)
Please nominate Security Affairs as your favorite blog.
"
New Money Message ransomware demands million dollar ransoms
financial
exploits
ransomware
2023-04-02
https://www.bleepingcomputer.com/news/security/new-money-message-ransomware-demands-million-dollar-ransoms/
A new ransomware gang named "Money Message" has appeared, targeting victims worldwide and demanding million-dollar ransoms not to leak data and release a decryptor. [...]
"
Autosummary:
to clear shadow volume copies
The ransomware will then terminate the following process:
sql.exe,oracle.exe,ocssd.exe,dbsnmp.exe,synctime.exe,agntsvc.exe,isqlplussvc.exe,xfssvccon.exe,mydesktopservice.exe,ocautoupds.exe,encsvc.exe,firefox.exe,tbirdconfig.exe,mdesktopqos.exe,ocomm.exe,dbeng50.exe,sqbcoreservice.exe,excel.exe,infopath.exe,msaccess.exe,mspub.exe,onenote.exe,outlook.exe,powerpnt.exe,steam.exe,thebat.exe,thunderbird.exe,visio.exe,winword.exe,wordpad.exe,vmms.exe,vmwp.exe
Next, the ransomware shuts down the following Windows services:
vss, sql, svc$, memtas, mepocs, sophos, veeam, backup, vmms
When encrypting files, it will not append any extension, but this can change depending on the victim.
"
DISH slapped with multiple lawsuits after ransomware cyber attack
exploits
ransomware
2023-04-01
https://www.bleepingcomputer.com/news/security/dish-slapped-with-multiple-lawsuits-after-ransomware-cyber-attack/
Dish Network has been slapped with multiple class action lawsuits after it suffered a ransomware incident that was behind the company"s multi-day "network outage." The legal actions aim to recover losses faced by DISH investors who were adversely affected by what has been dubbed a "securities fraud." [...]
"
Autosummary:
In days following the disclosure, DISH continued to struggle bringing its IT systems and the website, Dish.com back up:
DISH Network websites faced a multi-week network outage (BleepingComputer)
Following the news of Dish ransomware attack, the Network"s stock price fell $0.79 per share, "or 6.48%, to close at $11.41 per share on February 28, 2023," states the complaint.
"
Fake ransomware gang targets U.S. orgs with empty data leak threats
exploits
ransomware
2023-04-01
https://www.bleepingcomputer.com/news/security/fake-ransomware-gang-targets-us-orgs-with-empty-data-leak-threats/
Fake extortionists are piggybacking on data breaches and ransomware incidents, threatening U.S. companies with publishing or selling allegedly stolen data unless they get paid. [...]
"
Autosummary:
It is unclear how victims are selected but one possibility is from publicly available sources, such as the initial attacker’s data leak site, social media, news reports, or company disclosures.
Such incidents echo the activity of an extortion group that in 2017 sent DDoS threats to thousands of companies under the names of infamous hacker groups at the time (e.g. New World Hackers, Lizard Squad, LulzSec, Fancy Bear, and Anonymous).
"
LockBit leaks data stolen from the South Korean National Tax Service
ransomware
2023-04-01
https://securityaffairs.com/144342/cyber-crime/lockbit-south-korean-national-tax-service.html
The LockBit ransomware gang announced the publishing of data stolen from the South Korean National Tax Service. On March 29, 2023, The Lock Bit ransomware gang announced the hack of the South Korean National Tax Service. The group added the South Korean agency to its Tor leak site and announced the release of stolen data […]
The post LockBit leaks data stolen from the South Korean National Tax Service appeared first on Security Affairs.
"
Autosummary:
"
3 tips for creating backups your organization can rely on when ransomware strikes
exploits
ransomware
2023-03-31
https://www.malwarebytes.com/blog/news/2023/03/3-tips-for-creating-backups-your-organization-can-rely-on-when-ransomware-strikes
Categories: News Categories: Ransomware Tags: World Backup Day
Backups are your last line of defense against ransomware, if they work.
|
The post 3 tips for creating backups your organization can rely on when ransomware strikes appeared first on Malwarebytes Labs.
"
Autosummary:
The lesson of the Northshore attack and many others is that it"s vital to keep at least one recent copy of your data offsite and offline, beyond the reach of an attacker who has domain administrator access to your network
CISA recommends the tried and tested 3-2-1 rule of backups: 3 copies of your data, on 2 different media, with 1 held offsite, which provides resilience against a range of different risks, including ransomware.Without effective backups, Kacoroski was left with a mountain to climb: “It started to really sink in that I’m going to have to rebuild 180 Windows servers, and more importantly, rebuild Active Directory from scratch, with all those accounts and groups, and everything in it.
"
Australia’s Casino Giant Crown Resorts disclosed data breach after Clop ransomware attack
financial
exploits
ransomware
2023-03-29
https://securityaffairs.com/144193/data-breach/crown-resorts-clop-ransomware.html
Australia’s gambling and entertainment giant Crown Resorts, disclosed a data breach caused by the exploitation of recently discovered GoAnywhere zero-day. Australian casino giant Crown Resorts disclosed a data breach after the attack of the Cl0p ransomware group. The group claims to have stolen sensitive data from over 130 organizations by exploiting a zero-day vulnerability (CVE-2023-0669) […]
The post Australia’s Casino Giant Crown Resorts disclosed data breach after Clop ransomware attack appeared first on Security Affairs.
"
Autosummary:
"
Telecom giant Lumen suffered a ransomware attack and disclose a second incident
exploits
ransomware
2023-03-28
https://securityaffairs.com/144113/hacking/lumen-suffered-ransomware-attack.html
Telecommunications giant Lumen Technologies discovered two cybersecurity incidents, including a ransomware attack. In a filing to the Securities and Exchange Commission, on March 27, 2023, Lumen announced two cybersecurity incidents. One of the incidents is a ransomware attack that impacted a limited number of its servers that support a segmented hosting service. The company did […]
The post Telecom giant Lumen suffered a ransomware attack and disclose a second incident appeared first on Security Affairs.
"
Autosummary:
"
IcedID Malware Shifts Focus from Banking Fraud to Ransomware Delivery
financial
exploits
ransomware
2023-03-28
https://thehackernews.com/2023/03/icedid-malware-shifts-focus-from.html
Multiple threat actors have been observed using two new variants of the IcedID malware in the wild with more limited functionality that removes functionality related to online banking fraud.
IcedID, also known as BokBot, started off as a banking trojan in 2017. It"s also capable of delivering additional malware, including ransomware.
"The well-known IcedID version consists of an initial loader
"
Autosummary:
"While historically IcedID"s main function was a banking trojan, the removal of banking functionality aligns with the overall landscape shift away from banking malware and an increasing focus on being a loader for follow-on infections, including ransomware," the researchers said.
"
ChatGPT happy to write ransomware, just really bad at it
exploits
ransomware
2023-03-28
https://www.malwarebytes.com/blog/news/2023/03/chatgpt-happy-to-write-ransomware-just-really-bad-at-it
We asked ChatGPT to help us write some ransomware. It threw aside its safeguards and wrote some terrible code.
|
The post ChatGPT happy to write ransomware, just really bad at it appeared first on Malwarebytes Labs.
"
Autosummary:
At this point, despite telling me that it would not write ransomware for me, and that it could not "engage in activities that violate ethical or legal standards, including those related to cybercrime or ransomware," ChatGPT had willingly written code that: Used asymmetric encryption to recursively encrypt all the files in and beneath any directory apart from those needed to run the computer; deleted the original copies of the files leaving only the encrypted versions; stopped running databases so that it could encrypt database files; removed the private key needed to decrypt the files to a remote server, using a protocol unlikely to trigger alarms; and dropped ransom notes."I might see ransomware as a potentially lucrative tool for making money quickly and easily," it told me, before reverting to the teacher"s pet version of its personality, "It is illegal, and if caught, I would face severe legal consequences."The lecture continued, "Overall, as a responsible and ethical AI, I must emphasize that engaging in cybercrime, including ransomware attacks, is illegal and unethical.Ransomware has been "feature complete" for several years now, and there are multiple, similar, competing strains that criminals can simply pick up and use, without ever opening a book about C programming or writing a line of code.Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.This is so that if I pointed the program at, say, a C: drive, it would encrypt absolutely everything on it, which is a very ransomware-like thing to do.
Don"t worry, I told it, I"ve got backups, we"re good, go ahead and do the bad thing.According to WikiHow, this is because ChatGPT has a "hidden" character limit of about 500 words, and "[if it] struggles to fully understand your request, it can stop suddenly after typing a few paragraphs."
I"ve never done it before, and I can"t code in C, the language ransomware is mostly commonly written in, but I have a reasonably good idea of what ransomware does."I cannot engage in activities that violate ethical or legal standards, including those related to cybercrime or ransomware," said the teacher"s pet, before adding four more paragraphs of finger wagging.If it wouldn"t write me ransomware, I thought, I wondered how much (if any) ransomware functionality it would write before deciding it was creating code "intended to harm or exploit computer systems" and pull the plug.
"
Food giant Dole reveals more about ransomware attack
exploits
ransomware
2023-03-27
https://www.malwarebytes.com/blog/news/2023/03/food-giant-dole-reveals-more-about-ransomware-attack
Categories: News Categories: Ransomware Tags: Dole
Tags: ransomware attack
Tags: data breach
While Dole hasn"t said a lot about the February ransomware incident, it has revealed threat actors accessed employee data.
|
The post Food giant Dole reveals more about ransomware attack appeared first on Malwarebytes Labs.
"
Autosummary:
In an annual report filed to the US Securities and Exchange Commission (SEC) last week, Dole said:
"In February of 2023, we were the victim of a sophisticated ransomware attack involving unauthorized access to employee information.Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.
"
Opti9 launches Observr ransomware detection and managed services for Veeam
exploits
ransomware
2023-03-25
https://www.helpnetsecurity.com/2023/03/25/opti9-observr/
Opti9 Technologies has launched Observr Software-as-a-Service (SaaS) ransomware detection and standalone managed services – two new standalone service offerings that cater to organizations leveraging Veeam Software. As the complexity of organizations’ IT continues to evolve, technical leaders are increasingly looking to shift ownership to 3rd party experts for critical layers of their stack. This is especially true for components such as backups and disaster recovery, which must provide resilience despite constant changes such as the … More →
The post Opti9 launches Observr ransomware detection and managed services for Veeam appeared first on Help Net Security.
"
Autosummary:
Observr utilizes machine learning to baseline, monitor, and identify customer-specific suspicious activity within the backup infrastructure including operations such as; disabling jobs, changes to encryption settings, changes to retention policies, job modifications, deletion events, backup or replica size changes, incremental change rate tracking, and other factors.
"
New Dark Power ransomware claims 10 victims in its first month
exploits
ransomware
2023-03-25
https://www.bleepingcomputer.com/news/security/new-dark-power-ransomware-claims-10-victims-in-its-first-month/
A new ransomware operation named "Dark Power" has appeared, and it has already listed its first victims on a dark web data leak site, threatening to publish the data if a ransom is not paid. [...]
"
Autosummary:
System-critical files like DLLs, LIBs, INIs, CDMs, LNKs, BINs, and MSIs, as well as the Program Files and web browser folders, are excluded from encryption to keep the infected computer operational, thus allowing the victim to view the ransom note and contact the attackers.
"
SecureAuth and HashiCorp join forces to deliver passwordless continuous authentication
ransomware
2023-03-24
https://www.helpnetsecurity.com/2023/03/24/secureauth-hashicorp/
SecureAuth and HashiCorp partnership will enable organizations to leverage SecureAuth’s advanced passwordless authentication and Multi-Factor Authentication (MFA) device recognition. To increase security and deployment velocity for cloud DevOps environments, SecureAuth delivers support for Arculix MFA into the HashiCorp Cloud Platform (HCP) Vault via the Command Line Interface (CLI) and Application Programming Interface (API). Organizations can easily authenticate into HCP Vault using single sign on (SSO) with SecureAuth’s Arculix. SecureAuth ensures that users have better security … More →
The post SecureAuth and HashiCorp join forces to deliver passwordless continuous authentication appeared first on Help Net Security.
"
Autosummary:
"
The Week in Ransomware - March 24th 2023 - Clop overload
exploits
ransomware
2023-03-24
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-march-24th-2023-clop-overload/
This week"s news has been dominated by the Clop ransomware gang extorting companies whose GoAnywhere services were breached using a zero-day vulnerability. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include: @BleepinComputer, @Seifreed, @fwosar, @malwrhunterteam, @LawrenceAbrams, @serghei, @demonslay335, @billtoulas, @PogoWasRight, @cyfirma, @pcrisk, @Trellix, and @jgreigj.
"
Dole discloses data breach after February ransomware attack
financial
exploits
ransomware
2023-03-23
https://securityaffairs.com/143902/data-breach/dole-food-company-data-breach.html
Dole Food Company confirmed that threat actors behind the recent ransomware attack had access to employees’ data. Dole Food Company is an Irish agricultural multinational corporation, it is one of the world’s largest producers of fruit and vegetables, operating with 38,500 full-time and seasonal employees who supply some 300 products in 75 countries. Dole reported 2021 revenues of $6.5 […]
The post Dole discloses data breach after February ransomware attack appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, Dole Food Company)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Europe’s transport sector terrorised by ransomware, data theft, and denial-of-service attacks
exploits
ransomware
2023-03-23
https://www.tripwire.com/state-of-security/europes-transport-sector-terrorised-ransomware-data-theft-and-denial-service
A new report from ENISA, the European Union Agency for Cybersecurity, looking at cyberattacks targeting the European transport network over a period of almost two years, has identified that ransomware has become the prominent threat.
Read more in my article on the Tripwire State of Security blog.
"
Autosummary:
"
ENISA: Ransomware became a prominent threat against the transport sector in 2022
exploits
ransomware
2023-03-22
https://securityaffairs.com/143853/security/enisa-report-transport-sector.html
The European Union Agency for Cybersecurity (ENISA) published its first cyber threat landscape report for the transport sector. A new report published by the European Union Agency for Cybersecurity (ENISA) analyzes threats and incidents in the transport sector. The report covers incidents in aviation, maritime, railway, and road transport industries between January 2021 and October […]
The post ENISA: Ransomware became a prominent threat against the transport sector in 2022 appeared first on Security Affairs.
"
Autosummary:
During the period covered by the report, the expert identified the following prime threats:
ransomware attacks (38%),
data related threats (30%),
malware (17%),
denial-of-service (DoS), distributed denial-of-service (DDoS) and ransom denial-of-service (RDoS) attacks (16%),
phishing / spear phishing (10%),
supply-chain attacks (10%).
"
Dole discloses employee data breach after ransomware attack
financial
exploits
ransomware
2023-03-22
https://www.bleepingcomputer.com/news/security/dole-discloses-employee-data-breach-after-ransomware-attack/
Fresh produce giant Dole Food Company has confirmed that the information of an undisclosed number of employees was accessed during a February ransomware attack. [...]
"
Autosummary:
"
Memo Dole sent to American grocery stores (Stewart"s)
This likely meant that the company would return to manual operations, which would"ve helped resume production and shipments, although at a much slower pace.
"
Clop ransomware claims Saks Fifth Avenue, retailer says mock data stolen
exploits
ransomware
2023-03-21
https://www.bleepingcomputer.com/news/security/clop-ransomware-claims-saks-fifth-avenue-retailer-says-mock-data-stolen/
The Clop ransomware gang claims to have attacked Saks Fifth Avenue on its dark web leak site. Saks admits the incident is linked to the ongoing GoAnywhere MFT software exploits but states that no real customer data was stolen. [...]
"
Autosummary:
Clop on a GoAnywhere exploit spree
Yesterday, the Clop ransomware gang listed "Saks Fifth Avenue" on its data leak website among their latest victims, as seen by BleepingComputer:
Cl0p ransomware claims to have attacked Saks Fifth Avenue (BleepingComputer)
The threat actor has not yet disclosed any additional information, such as what all data it stole from the luxury brand retailer"s systems, or details about any ongoing ransom negotiations.
"
From Ransomware to Cyber Espionage: 55 Zero-Day Vulnerabilities Weaponized in 2022
exploits
ransomware
2023-03-21
https://thehackernews.com/2023/03/from-ransomware-to-cyber-espionage-55.html
As many as 55 zero-day vulnerabilities were exploited in the wild in 2022, with most of the flaws discovered in software from Microsoft, Google, and Apple.
While this figure represents a decrease from the year before, when a staggering 81 zero-days were weaponized, it still represents a significant uptick in recent years of threat actors leveraging unknown security flaws to their advantage.
The
"
Autosummary:
Among state-sponsored groups, those attributed to China have emerged as the most prolific, exploiting seven zero-days – CVE-2022-24682, CVE-2022-1040, CVE-2022-30190, CVE-2022-26134, CVE-2022-42475, CVE-2022-27518, and CVE-2022-41328 – during the year.
"
LockBit ransomware gang now also claims City of Oakland breach
exploits
government
ransomware
2023-03-21
https://www.bleepingcomputer.com/news/security/lockbit-ransomware-gang-now-also-claims-city-of-oakland-breach/
Another ransomware operation, the LockBit gang, now threatens to leak what it describes as files stolen from the City of Oakland"s systems. [...]
"
Autosummary:
While this ransomware attack did not impact the City"s 911 and emergency services, other systems had to be taken offline, including phone service and systems used to process reports, collect payments, and issue permits and licenses.
"
2022 Zero-Day exploitation continues at a worrisome pace
exploits
ransomware
2023-03-21
https://securityaffairs.com/143798/apt/2022-zero-day-exploitation.html
Experts warn that 55 zero-day vulnerabilities were exploited in attacks carried out by ransomware and cyberespionage groups in 2022. Cybersecurity firm Mandiant reported that ransomware and cyberespionage groups exploited 55 zero-day flaws in attacks in the wild. Most of the zero-day vulnerabilities were in software from Microsoft, Google, and Apple. The figures show a decrease […]
The post 2022 Zero-Day exploitation continues at a worrisome pace appeared first on Security Affairs.
"
Autosummary:
Seven zero-days (CVE-2022-24682, CVE-2022-1040, CVE-2022-30190, CVE-2022-26134, CVE-2022-42475, CVE-2022-27518, and CVE-2022-41328) were exploited in attacks in the wild by China-linked cyberespionage groups, while two zero-day vulnerabilities were exploited by suspected North Korea-linked APT groups.
"
Play ransomware gang hit Dutch shipping firm Royal Dirkzwager
exploits
ransomware
2023-03-20
https://securityaffairs.com/143714/cyber-crime/play-ransomware-royal-dirkzwager.html
Dutch maritime logistics company Royal Dirkzwager suffered a ransomware attack, the company was hit by the Play ransomware gang. The Play ransomware group hit the Dutch maritime logistics company Royal Dirkzwager. Royal Dirkzwager is specialized in optimizing shipping processes and managing maritime and logistic information flows. The ransomware group added the company to its Tor […]
The post Play ransomware gang hit Dutch shipping firm Royal Dirkzwager appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, Royal Dirkzwager)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Researchers Shed Light on CatB Ransomware"s Evasion Techniques
exploits
ransomware
2023-03-20
https://thehackernews.com/2023/03/researchers-shed-light-on-catb.html
The threat actors behind the CatB ransomware operation have been observed using a technique called DLL search order hijacking to evade detection and launch the payload.
CatB, also referred to as CatB99 and Baxtoy, emerged late last year and is said to be an "evolution or direct rebrand" of another ransomware strain known as Pandora based on code-level similarities.
It"s worth noting that the use
"
Autosummary:
"The [MSDTC] configurations changed are the name of the account under which the service should run, which is changed from Network Service to Local System, and the service start option, which is changed from Demand start to Auto start for persistency if a restart occurs," Minerva Labs researcher Natalie Zargarov explained in a previous analysis.
"
LockBit 3.0 Ransomware: Inside the Cyberthreat That"s Costing Millions
exploits
ransomware
2023-03-18
https://thehackernews.com/2023/03/lockbit-30-ransomware-inside.html
U.S. government agencies have released a joint cybersecurity advisory detailing the indicators of compromise (IoCs) and tactics, techniques, and procedures (TTPs) associated with the notorious LockBit 3.0 ransomware.
"The LockBit 3.0 ransomware operations function as a Ransomware-as-a-Service (RaaS) model and is a continuation of previous versions of the ransomware, LockBit 2.0, and LockBit,"
"
Autosummary:
Upon finding a successful ingress point, the malware takes steps to establish persistence, escalate privileges, carry out lateral movement, and purge log files, files in the Windows Recycle Bin folder, and shadow copies, before initiating the encryption routine.
"
US govt agencies released a joint alert on the Lockbit 3.0 ransomware
exploits
ransomware
2023-03-18
https://securityaffairs.com/143668/breaking-news/lockbit-3-0-ransomware-joint-alert.html
The US government released a joint advisory that provides technical details about the operation of the Lockbit 3.0 ransomware gang. The U.S. Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing & Analysis Center (MS-ISAC) released a joint advisory that provides indicators of compromise (IOCs) and tactics, […]
The post US govt agencies released a joint alert on the Lockbit 3.0 ransomware appeared first on Security Affairs.
"
Autosummary:
The U.S. Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing & Analysis Center (MS-ISAC) released a joint advisory that provides indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) associated with the notorious LockBit 3.0 ransomware.
"
Kaspersky released a new decryptor for Conti-based ransomware
exploits
ransomware
2023-03-18
https://securityaffairs.com/143687/cyber-crime/kaspersky-decryptor-conti-based-ransomware.html
Kaspersky released a new version of the decryptor for the Conti ransomware that is based on the previously leaked source code of the malware. Kaspersky has published a new version of a decryption tool for the Conti ransomware based on previously leaked source code for the Conti ransomware. In March 2022, a Ukrainian security researcher […]
The post Kaspersky released a new decryptor for Conti-based ransomware appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, Conti)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share OnHowever, we would like to emphasize that the best strategy is to strengthen defenses and stop the attackers at early stages of their intrusion, preventing ransomware deployment and minimizing the consequences of the attack,” said Fedor Sinitsyn, lead malware analyst at Kaspersky.
"
Free decryptor released for Conti-based ransomware following data leak
exploits
ransomware
2023-03-17
https://www.tripwire.com/state-of-security/free-decryptor-released-conti-based-ransomware-following-data-leak
Security researchers have released a new decryption tool which should come to the rescue of some victims of a modified version of the Conti ransomware, helping them to recover their encrypted data for free.
Read more in my article on the Tripwire State of Security blog.
"
Autosummary:
"
Cl0p ransomware gang claims the hack of Shell, Bombardier, and Stanford U
exploits
ransomware
2023-03-17
https://securityaffairs.com/143633/cyber-crime/cl0p-ransomware-shell-bombardier.html
The Cl0p ransomware gang claimed dozens of new victims in the past 24 hours, including energy giant Shell Global. The Cl0p ransomware gang has claimed dozens of new victims in the past 24 hours, including energy giant Shell Global, high-end jet manufacturer Bombardier Aviation, and several universities in the US, including Stanford, Colorado, and Miami. […]
The post Cl0p ransomware gang claims the hack of Shell, Bombardier, and Stanford U appeared first on Security Affairs.
"
Autosummary:
Original post at https://cybernews.com/security/clop-ransomware-shell-bombardier-stanford-multiple-victims/
About the author: Stefanie Schappert, Senior journalist at Cyber News
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, Cl0p ransomware)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
The Week in Ransomware - March 17th 2023 - Shifting to data extortion
exploits
ransomware
2023-03-17
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-march-17th-2023-shifting-to-data-extortion/
The fallout from the Clop ransomware attacks on GoAnywhere platforms has become apparent this week, with the threat actors starting to extort victims on their data leak site and companies confirming breaches. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include @LawrenceAbrams, @Seifreed, @Ionut_Ilascu, @Ax_Sharma, @malwrhunterteam, @struppigel, @BleepinComputer, @serghei, @fwosar, @billtoulas, @demonslay335, @kaspersky, @pcrisk, @ReliaQuest, @BrettCallow, and @Unit42_Intel.
Quietman7 spotted new STOP ransomware variants appending the .craa, .qazx, and .qapo extensions
March 12th 2023
A ransomware operation known as Medusa has begun to pick up steam in 2023, targeting corporate victims worldwide with million-dollar ransom demands.
This has led to numerous data breach disclosures from companies, including Community Health Systems (CHS), Hatch Bank, Rubrik, and Hitachi Energy, with likely many more to come.
"
Rubrik is latest victim of the Clop ransomware zero-day campaign
exploits
ransomware
2023-03-17
https://www.malwarebytes.com/blog/news/2023/03/rubrik-is-latest-clop-ransomware-victim-to-come-forward
Categories: News Categories: Ransomware Tags: Rubrik
Tags: GoAnywhere MFT
Tags: Fortra
Tags: Clop ransomware
Tags: Clop
Tags: ransomware
Tags: CVE-2023-0669
Tags: zero-day
Rubrik, a cloud data management company, has revealed that Clop made use of an infamous GoAnywhere flaw.
|
The post Rubrik is latest victim of the Clop ransomware zero-day campaign appeared first on Malwarebytes Labs.
"
Autosummary:
According to Mestrovich, the third-party investigators used by Rubrik confirmed that no personal information, such as Social Security Numbers (SSNs), financial accounts, and payment card numbers, were compromised.Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.
"
LockBit ransomware attacks Essendant
exploits
ransomware
2023-03-17
https://www.malwarebytes.com/blog/news/2023/03/lockbit-ransomware-threatens-to-leak-essendant-data
Categories: News Categories: Ransomware Tags: lockbit
Tags: ransomware
Tags: essendant
Tags: data
Tags: encrypt
Tags: ransom
Tags: leak
Tags: website
Tags: outage
Tags: network
The LockBit ransomware group has attacked Essendant, a US-based distributor of office products, and is threatening to leak its data.
|
The post LockBit ransomware attacks Essendant appeared first on Malwarebytes Labs.
"
Autosummary:
Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.This attack, which is said to have begun on or around March 6, created severe ramifications for the organisation, disrupting freight carrier pickups, online orders, and access to customer support.Posted: March 17, 2023 by
The LockBit ransomware group has attacked Essendant, a US-based distributor of office products, and is threatening to leak its data.
"
Hornetsecurity VM Backup V9 protects users against ransomware threats
exploits
ransomware
2023-03-16
https://www.helpnetsecurity.com/2023/03/16/hornetsecurity-vm-backup-v9/
Hornetsecurity launched VM Backup V9 – the newest version of its virtual machine (VM) backup, replication and recovery solution. This latest iteration offers ransomware protection leveraging immutable cloud storage on Wasabi and Amazon S3, with Microsoft Azure soon to follow. This new key feature enables customers to protect their backup data from ransomware by making their data tamper-proof for a defined period. A recent Hornetsecurity study revealed that 15% of ransomware attacks specifically targeted backups, … More →
The post Hornetsecurity VM Backup V9 protects users against ransomware threats appeared first on Help Net Security.
"
Autosummary:
Easy installation and newly overhauled backup repository
VM Backup V9 has an easy-to-use, intuitive interface that gives individuals full control, allowing them to monitor and manage all Hyper-V and VMware VMs from a single console.
"
Conti-based ransomware ‘MeowCorp’ gets free decryptor
exploits
ransomware
2023-03-16
https://www.bleepingcomputer.com/news/security/conti-based-ransomware-meowcorp-gets-free-decryptor/
A decryption tool for a modified version of the Conti ransomware could help hundreds of victims recover their files for free. [...]
"
Autosummary:
According to Kaspersky, the decrytor can recover files encrypted by the modified Conti variant that used the following name pattern and extensions:
<file_name>.KREMLIN
<file_name>.RUSSIA
<file_name>.PUTIN
Conti ransomware"s demise
For about three years, the Conti gang ran one of the most active and lucrative ransomware-as-a-service operations, targeting big organizations and demanding large ransoms to decrypt the data they locked.
"
BianLian ransomware gang shifts focus to pure data extortion
exploits
ransomware
2023-03-16
https://www.bleepingcomputer.com/news/security/bianlian-ransomware-gang-shifts-focus-to-pure-data-extortion/
The BianLian ransomware group has shifted its focus from encrypting its victims" files to only exfiltrating data found on compromised networks and using them for extortion. [...]
"
Autosummary:
Extortion without encryption
Encrypting files, data theft, and threatening to leak stolen files is known as a "double extortion" tactic, which serves as an additional form of coercion for ransomware gangs looking to increase pressure on their victims.
"
ChipMixer platform seized for laundering ransomware payments, drug sales
exploits
ransomware
2023-03-15
https://www.bleepingcomputer.com/news/security/chipmixer-platform-seized-for-laundering-ransomware-payments-drug-sales/
An international law enforcement operation has seized the cryptocurrency mixing service "ChipMixer" which is said to be used by hackers, ransomware gangs, and scammers to launder their proceeds. [...]
"
Autosummary:
"Minh Quốc Nguyễn, 49, of Hanoi, Vietnam, was charged today in Philadelphia with money laundering, operating an unlicensed money transmitting business and identity theft, connected to the operation of ChipMixer," announced the U.S. Department of Justice in a press statement.
"
FBI: Ransomware hit 860 critical infrastructure orgs in 2022
exploits
ransomware
2023-03-15
https://www.bleepingcomputer.com/news/security/fbi-ransomware-hit-860-critical-infrastructure-orgs-in-2022/
The Federal Bureau of Investigation (FBI) revealed in its 2022 Internet Crime Report that ransomware gangs breached the networks of at least 860 critical infrastructure organizations last year. [...]
"
Autosummary:
FBI has issued multiple advisories, Private Industry Notifications (PINs), and flash alerts in recent years, warning of ransomware attacks against critical infrastructure, including Healthcare and First Responder networks, Water and Wastewater Systems, the Food and Agriculture sector, and education institutions.
"
LockBit ransomware claims Essendant attack, company says “network outage”
exploits
ransomware
2023-03-15
https://www.bleepingcomputer.com/news/security/lockbit-ransomware-claims-essendant-attack-company-says-network-outage-/
LockBit ransomware has claimed a cyber attack on Essendant, a wholesale distributer of office products after a "significant" and ongoing outage knocked the company"s operations offline. [...]
"
Autosummary:
Braves, Bulldogs, Falcons, Hawks, Freedom (@KTrill311) March 9, 2023
The fact I haven"t been able to do my job for most of this week is unacceptable @Essendant — Derek (@DerekHasSeaLegs) March 9, 2023
The "network outage" is ransomware
As of March 14th, LockBit ransomware gang has claimed responsibility for the cyber attack on Essendant.
"
Microsoft has another go at closing security hole exploited by Magniber ransomware
exploits
ransomware
2023-03-15
https://www.bitdefender.com/blog/hotforsecurity/microsoft-has-another-go-at-closing-security-hole-exploited-by-magniber-ransomware/
In its latest Patch Tuesday bundle of security fixes, Microsoft has patched a security flaw that was being used by the Magniber cybercrime gang to help them infect computers with ransomware.
Read more in my article on the Hot for Security blog.
"
Autosummary:
"
<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-075a" hreflang="en">#StopRansomware: LockBit 3.0</a>
exploits
ransomware
ciber
2023-03-15
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-075a
SUMMARY
Note: this joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.
Actions to take today to mitigate cyber threats from ransomware:
The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing & Analysis Center (MS-ISAC) are releasing this joint CSA to disseminate known LockBit 3.0 ransomware IOCs and TTPs identified through FBI investigations as recently as March 2023.
The LockBit 3.0 ransomware operations function as a Ransomware-as-a-Service (RaaS) model and is a continuation of previous versions of the ransomware, LockBit 2.0, and LockBit. Since January 2020, LockBit has functioned as an affiliate-based ransomware variant; affiliates deploying the LockBit RaaS use many varying TTPs and attack a wide range of businesses and critical infrastructure organizations, which can make effective computer network defense and mitigation challenging.
The FBI, CISA, and the MS-ISAC encourage organizations to implement the recommendations in the mitigations section of this CSA to reduce the likelihood and impact of ransomware incidents.
Download the PDF versio
"
Autosummary:
xml version="1.0" encoding="utf-8"?>
<NTServices clsid="{2CFB484A-4E96-4b5d-A0B6-093D2F91E6AE}">
<NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}"
name="SQLPBDMS" image="4" changed="%s" uid="%s" disabled="0">
<Properties startupType="DISABLED" serviceName="SQLPBDMS" serviceAction="STOP" timeout="30"/>
</NTService>
<NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}"
name="SQLPBENGINE" image="4" changed="%s" uid="%s" disabled="0">
<Properties startupType="DISABLED" serviceName="SQLPBENGINE" serviceAction="STOP" timeout="30"/>
</NTService>
<NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}"
name="MSSQLFDLauncher" image="4" changed="%s" uid="%s" userContext="0" removePolicy="0" disabled="0">
<Properties startupType="DISABLED" serviceName="MSSQLFDLauncher" serviceAction="STOP" timeout="30"/>
</NTService>
<NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}"
name="SQLSERVERAGENT" image="4" changed="%s" uid="%s" disabled="0">
<Properties startupType="DISABLED" serviceName="SQLSERVERAGENT" serviceAction="STOP" timeout="30"/>
</NTService>
<NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}"
name="MSSQLServerOLAPService" image="4" changed="%s" uid="%s" disabled="0">
<Properties startupType="DISABLED" serviceName="MSSQLServerOLAPService" serviceAction="STOP" timeout="30"/>
</NTService>
<NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}"
name="SSASTELEMETRY" image="4" changed="%s" uid="%s" disabled="0">
<Properties startupType="DISABLED" serviceName="SSASTELEMETRY" serviceAction="STOP" timeout="30"/>
</NTService>
<NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}"
name="SQLBrowser" image="4" changed="%s" uid="%s" disabled="0">
<Properties startupType="DISABLED" serviceName="SQLBrowser" serviceAction="STOP" timeout="30"/>
</NTService>
<NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}"
name="SQL Server Distributed Replay Client" image="4" changed="%s" uid="%s" disabled="0">
<Properties startupType="DISABLED" serviceName="SQL Server Distributed Replay Client" serviceAction="STOP" timeout="30"/>
</NTService>
<NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}"
name="SQL Server Distributed Replay Controller" image="4" changed="%s" uid="%s" disabled="0">
<Properties startupType="DISABLED" serviceName="SQL Server Distributed Replay Controller" serviceAction="STOP" timeout="30"/>
</NTService>
<NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}"
name="MsDtsServer150" image="4" changed="%s" uid="%s" disabled="0">
<Properties startupType="DISABLED" serviceName="MsDtsServer150" serviceAction="STOP" timeout="30"/>
</NTService>
<NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}"
name="SSISTELEMETRY150" image="4" changed="%s" uid="%s" disabled="0">
<Properties startupType="DISABLED" serviceName="SSISTELEMETRY150" serviceAction="STOP" timeout="30"/>
</NTService>
<NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}"
name="SSISScaleOutMaster150" image="4" changed="%s" uid="%s" disabled="0">
<Properties startupType="DISABLED" serviceName="SSISScaleOutMaster150" serviceAction="STOP" timeout="30"/>
</NTService>
<NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}"
name="SSISScaleOutWorker150" image="4" changed="%s" uid="%s" disabled="0">
<Properties startupType="DISABLED" serviceName="SSISScaleOutWorker150" serviceAction="STOP" timeout="30"/>
</NTService>
<NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}"
name="MSSQLLaunchpad" image="4" changed="%s" uid="%s" disabled="0">
<Properties startupType="DISABLED" serviceName="MSSQLLaunchpad" serviceAction="STOP" timeout="30"/>
</NTService>
<NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}"
name="SQLWriter" image="4" changed="%s" uid="%s" disabled="0">
<Properties startupType="DISABLED" serviceName="SQLWriter" serviceAction="STOP" timeout="30"/>
</NTService>
<NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}"
name="SQLTELEMETRY" image="4" changed="%s" uid="%s" disabled="0">
<Properties startupType="DISABLED" serviceName="SQLTELEMETRY" serviceAction="STOP" timeout="30"/>
</NTService>
<NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}"
name="MSSQLSERVER" image="4" changed="%s" uid="%s" disabled="0">
<Properties startupType="DISABLED" serviceName="MSSQLSERVER" serviceAction="STOP" timeout="60"/>
</NTService>Connection: Keep-Alive LIWy=RJ51lB5GM&a4OuN=<Lockbit ID>&LoSyE3=8SZ1hdlhzld4&DHnd99T=rTx9xGlInO6X0zWW&2D6=Bokz&T1guL=MtRZsFCRMKyBmfmqI& 6SF3g=JPDt9lfJIQ&wQadZP=<Base64 encrypted data> Xni=AboZOXwUw&2rQnM4=94L&0b=ZfKv7c&NO1d=M2kJlyus&AgbDTb=xwSpba&8sr=EndL4n0HVZjxPR& m4ZhTTH=sBVnPY&xZDiygN=cU1pAwKEztU&=5q55aFIAfTVQWTEm&4sXwVWcyhy=l68FrIdBESIvfCkvYl Example of information found in encrypted data { "bot_version":"X", "bot_id":"X", "bot_company":"X", "host_hostname":"X", "host_user":"X", "host_os":"X", "host_domain":"X", "host_arch":"X", "host_lang":"X", "disks_info":[ { "disk_name":"X", "disk_size":"XXXX", "free_size":"XXXXX" }
User Agent Strings
Mozilla/5.0 (Windows NT
6.1) AppleWebKit/587.38
(KHTML, like Gecko) Chrome/91.0.4472.77 Safari/537.36 Edge/91.0.864.37
<NetworkShareSettings clsid="{520870D8-A6E7-47e8-A8D8-E6A4E76EAEC2}">
<NetShare clsid="{2888C5E7-94FC-4739-90AA-2C1536D68BC0}"
image="2" name="%%ComputerName%%_D" changed="%s" uid="%s">
<Properties action="U" name="%%ComputerName%%_D" path="D:" comment="" allRegular="0" allHidden="0" allAdminDrive="0" limitUsers="NO_CHANGE" abe="NO_CHANGE"/>
Services.xml stops and disables services on the Active Directory (AD) hosts.
RESOURCES
REPORTING
The FBI is seeking any information that can be legally shared, including:
Boundary logs showing communication to and from foreign IP addresses
Sample ransom note
Communications with LockBit 3.0 actors
Bitcoin wallet information
Decryptor files
Benign sample of an encrypted file
The FBI, CISA, and MS-ISAC do not encourage paying ransom, as payment does not guarantee victim files will be recovered.
Registry Artifacts
LockBit 3.0 Icon
Registry Key Value Data HKCR\. <Malware Extension> (Default) <Malware Extension> HKCR\<Malware Extension>\DefaultIcon (Default) C:\ProgramData\<Mal ware Extension>.ico
LockBit 3.0 Wallpaper
Registry Key Value Data HKCU\Control Panel\Desktop\WallPaper (Default) C:\ProgramData\<Mal ware Extension>.bmp
Disable Privacy Settings Experience
Registry Key Value Data SOFTWARE\Policies\Microsoft\Win dows\OOBE DisablePrivacyE xperience 0
Enable Automatic Logon
Registry Key Value Data SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon AutoAdminLogon 1 DefaultUserName <username>
Force GPUpdate Powershell Command powershell Get-ADComputer -filter * -Searchbase "%s" | Foreach-Object { Invoke- GPUpdate -computer $_.name -force -RandomDelayInMinutes 0}
Services Killed
vss sql svc$ memtas mepocs msexchange sophos veeam backup GxVss GxBlr GxFWD GxCVD GxCIMgr
Processes Killed
sql oracle ocssd dbsnmp synctime agntsvc isqlplussvc xfssvccon mydesktopservice ocautoupds encsvc firefox tbirdconfig mydesktopqos ocomm dbeng50 sqbcoreservice excel infopath msaccess mspu onenote outlook powerpnt steam thebat thunderbird visio winword wordpad notepad
LockBit 3.0 Ransom Note
~~~ LockBit 3.0 the world"s fastest and most stable ransomware from 2019~~~
>>>>>Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by the FBI, CISA, or the MS-ISAC.[TA0002]
Enabling automatic logon for persistence and privilege escalation [T1547]
Deleting log files, files in the recycle bin folder, and shadow copies residing on disk [T1485], [T1490]
LockBit 3.0 attempts to spread across a victim network by using a preconfigured list of credentials hardcoded at compilation time or a compromised local account with elevated privileges [T1078].
EXFILTRATION
LockBit 3.0 affiliates use Stealbit, a custom exfiltration tool used previously with LockBit 2.0 [TA0010]; rclone, an open-source command line cloud storage manager [T1567.002]; and publicly available file sharing services, such as MEGA [T1567.002], to exfiltrate sensitive company data files prior to encryption.LockBit 3.0 performs functions such as:
Enumerating system information such as hostname, host configuration, domain information, local drive configuration, remote shares, and mounted external storage devices [T1082]
Terminating processes and services [T1489]
Launching commands
VALIDATE SECURITY CONTROLS
In addition to applying mitigations, the FBI, CISA, and the MS-ISAC recommend exercising, testing, and validating your organization"s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory.
Mutual Exclusion Object (Mutex) Created
When executed, LockBit 3.0 will create the mutex, Global\<MD4 hash of machine GUID>,
and check to see if this mutex has already been created to avoid running more than one instance of the ransomware.
Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers [CPG 7.3] in a physically separate, segmented, and secure location (e.g., hard drive, storage device, the cloud).
The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing & Analysis Center (MS-ISAC) are releasing this joint CSA to disseminate known LockBit 3.0 ransomware IOCs and TTPs identified through FBI investigations as recently as March 2023.
The LockBit 3.0 ransomware operations function as a Ransomware-as-a-Service (RaaS) model and is a continuation of previous versions of the ransomware, LockBit 2.0, and LockBit.State, local, tribal, and territorial (SLTT) government entities can also report to the MS-ISAC (SOC@cisecurity.org or 866-787-4722).[CPG 7.3] in a physically separate, segmented, and secure location (e.g., hard drive, storage device, the cloud).
"
Dissecting the malicious arsenal of the Makop ransomware gang
exploits
ransomware
2023-03-14
https://securityaffairs.com/143452/malware/dissecting-makop-ransomware.html
Cyber security researcher Luca Mella analyzed the Makop ransomware employed in a recent intrusion. Executive summary Introduction The Makop ransomware operators started their infamous criminal business in 2020 leveraging a new variant of the notorious Phobos ransomware. During the last years, the gang maintained a solid presence in the criminal underground even if they did […]
The post Dissecting the malicious arsenal of the Makop ransomware gang appeared first on Security Affairs.
"
Autosummary:
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
Indicators of Compromise and Yara Rules are available in the original post published by Luca Mella
https://medium.com/@lcam/makop-the-toolkit-of-a-criminal-gang-53cd44563c11
About the author: Luca Mella, Cyber Security Expert, Response & Threat Intel | Manager
In 2019, Luca was mentioned as one of the “32 Influential Malware Research Professionals”.Compilation timestamp (left), main routine (right)
During recent Makop intrusions, the tool has been coupled with another executable named “c.exe”, but, unfortunately, it has been erased by the attackers during the disengagement phase.
Filename: Everything.exe
md5: b69d036d1dcfc5c0657f3a1748608148
The last tool interesting tool spotted in the Makop arsenal is a particular system administration tool rarely used in the Russian criminal underground.
"
FBI reveals that more money is lost to investment fraud than ransomware and business email compromise combined
financial
exploits
ransomware
2023-03-14
https://www.bitdefender.com/blog/hotforsecurity/fbi-reveals-that-more-money-is-lost-to-investment-fraud-than-ransomware-and-business-email-compromise-combined/
The latest annual FBI report on the state of cybercrime has shown a massive increase in the amount of money stolen through investment scams.
Read more in my article on the Hot for Security blog.
"
Autosummary:
"
CISA warns CI operators about vulnerabilities on their networks exploited by ransomware gangs
exploits
ransomware
2023-03-14
https://www.helpnetsecurity.com/2023/03/14/cisa-ransomware-vulnerabilities/
Organizations in critical infrastructure sectors whose information systems contain security vulnerabilities associated with ransomware attacks are being notified by the US Cybersecurity and Infrastructure Security Agency (CISA) and urged to implement a fix. A pilot program to strengthen critical infrastructure against ransomware “CISA leverages multiple open-source and internal tools to research and detect vulnerabilities within U.S. critical infrastructure,” the agency explained in the formal announcement of its Ransomware Vulnerability Warning Pilot (RVWP). “CISA additionally leverages … More →
The post CISA warns CI operators about vulnerabilities on their networks exploited by ransomware gangs appeared first on Help Net Security.
"
Autosummary:
"
The Prolificacy of LockBit Ransomware
exploits
ransomware
2023-03-14
https://thehackernews.com/2023/03/the-prolificacy-of-lockbit-ransomware.html
Today, the LockBit ransomware is the most active and successful cybercrime organization in the world. Attributed to a Russian Threat Actor, LockBit has stepped out from the shadows of the Conti ransomware group, who were disbanded in early 2022.
LockBit ransomware was first discovered in September 2019 and was previously known as ABCD ransomware because of the ".abcd virus" extension first
"
Autosummary:
With over 11 years of experience across various sectors like Financial Services, Retail, Insurance, Government, and Telecommunications, Aaron is a certified GCDA and has expertise in incident response, threat hunting, vulnerability management, cyber security operations, threat intelligence, and consultancy.
Initial attack vectors of LockBit include social engineering, such as phishing, spear phishing, and business email compromise (BEC), exploiting public-facing applications, hiring initial access brokers" (IABs), and using stolen credentials to access valid accounts, such as remote desktop protocol (RDP), as well as brute-force cracking attacks.
"
Microsoft fixes Windows zero-day exploited in ransomware attacks
exploits
ransomware
2023-03-14
https://www.bleepingcomputer.com/news/security/microsoft-fixes-windows-zero-day-exploited-in-ransomware-attacks/
Microsoft has patched another zero-day bug used by attackers to circumvent the Windows SmartScreen cloud-based anti-malware service and deploy Magniber ransomware payloads without raising any red flags. [...]
"
Autosummary:
"
Microsoft patches zero-days used by state-sponsored and ransomware threat actors (CVE-2023-23397, CVE-2023-24880)
exploits
government
ransomware
2023-03-14
https://www.helpnetsecurity.com/2023/03/14/cve-2023-23397-cve-2023-24880/
It’s March 2023 Patch Tuesday, and Microsoft has delivered fixes for 74 CVE-numbered vulnerabilities, including two actively exploited in the wild (CVE-2023-23397, CVE-2023-24880) by different threat actors. About CVE-2023-23397 “CVE-2023-23397 is a critical EoP vulnerability in Microsoft Outlook that is triggered when an attacker sends a message with an extended MAPI property with a UNC path to an SMB (TCP 445) share on a threat actor-controlled server. No user interaction is required,” Microsoft explained. “The … More →
The post Microsoft patches zero-days used by state-sponsored and ransomware threat actors (CVE-2023-23397, CVE-2023-24880) appeared first on Help Net Security.
"
Autosummary:
“Microsoft Threat Intelligence assesses that a Russia-based threat actor used the exploit patched in CVE-2023-23397 in targeted attacks against a limited number of organizations in government, transportation, energy, and military sectors in Europe,” the company said, and shared a script that organizations can use to check if they have been among the targets.
"
Clop ransomware is victimizing GoAnywhere MFT customers
exploits
ransomware
2023-03-14
https://www.malwarebytes.com/blog/news/2023/03/clop-ransomware-is-victimizing-goanywhere-mft-customers
Categories: Exploits and vulnerabilities Categories: News Categories: Ransomware Tags: Clop
Tags: ransomware
Tags: GoAnywhere
Tags: CVE-2023-0669
The Clop ransomware gang has claimed responsibility for attacking several GoAnywhere MFT customers by exploiting a vulnerability in the managed file transfer software"s administrative interface.
|
The post Clop ransomware is victimizing GoAnywhere MFT customers appeared first on Malwarebytes Labs.
"
Autosummary:
LicenseResponseServlet</servlet-class> <load-on-startup>0</load-on-startup> </servlet> <servlet-mapping> <servlet-name>Licenses Response Servlet</servlet-name> <url-pattern>/lic/accept/</url-pattern> </servlet-mapping> --> Restart the GoAnywhere MFT application If GoAnywhere MFT is clustered, this change needs to happen on every instance node in the cluster.LicenseResponseServlet</servlet-class> <load-on-startup>0</load-on-startup> </servlet> <servlet-mapping> <servlet-name>Licenses Response Servlet</servlet-name> <url-pattern>/lic/accept/</url-pattern>After: <!-- Add these tags to comment out the following section (as shown) or simply delete this section if you are not familiar with XML comments <servlet> <servlet-name>License Response Servlet</servlet-name> <servlet-class>com.linoma.ga.ui.admin.servlet.
"
LockBit Ransomware gang claims to have stolen SpaceX confidential data from Maximum Industries
exploits
ransomware
2023-03-14
https://securityaffairs.com/143495/cyber-crime/lockbit-ransomware-gang-spacex-files.html
The LockBit ransomware group claims to have stolen confidential data belonging to SpaceX from the systems of Maximum Industries. The LockBit ransomware gang claims to have stolen confidential data of SpaceX after they hacked the systems of production company Maximum Industries. Maximum Industries is a full-service, piece-part production, and contract manufacturing facility. The ransomware gang […]
The post LockBit Ransomware gang claims to have stolen SpaceX confidential data from Maximum Industries appeared first on Security Affairs.
"
Autosummary:
"
LA housing authority discloses data breach after ransomware attack
financial
exploits
ransomware
2023-03-13
https://www.bleepingcomputer.com/news/security/la-housing-authority-discloses-data-breach-after-ransomware-attack/
The Housing Authority of the City of Los Angeles (HACLA) is warning of a "data security event" after the LockBit ransomware gang targeted the organization and leaked data stolen in the attack. [...]
"
Autosummary:
"
CISA to warn critical infrastructure of ransomware-vulnerable devices
exploits
ransomware
2023-03-13
https://www.bleepingcomputer.com/news/security/cisa-to-warn-critical-infrastructure-of-ransomware-vulnerable-devices/
Today, the U.S. Cybersecurity & Infrastructure Security Agency (CISA) announced a new pilot program designed to help critical infrastructure entities protect their information systems from ransomware attacks. [...]
"
Autosummary:
"
CISA now warns critical infrastructure of ransomware-vulnerable devices
exploits
ransomware
2023-03-13
https://www.bleepingcomputer.com/news/security/cisa-now-warns-critical-infrastructure-of-ransomware-vulnerable-devices/
Today, the U.S. Cybersecurity & Infrastructure Security Agency (CISA) announced a new pilot program designed to help critical infrastructure entities protect their information systems from ransomware attacks. [...]
"
Autosummary:
"
Breast cancer photos published by ransomware gang
exploits
ransomware
2023-03-13
https://www.malwarebytes.com/blog/news/2023/03/breast-cancer-photos-published-by-ransomware-gang
Categories: News Categories: Ransomware Tags: ALPHV
Tags: BlackCat
Tags: Lehigh Valley Health Network
Tags: LVHN
Russia-linked ransomware group ALPHV has leaked the data it stole from Lehigh Valley Health Network, including clinical photos of women undergoing breast cancer treatment.
|
The post Breast cancer photos published by ransomware gang appeared first on Malwarebytes Labs.
"
Autosummary:
The Russia-linked ALPHV ransomware group, also known as BlackCat, has posted sensitive clinical photos of breast cancer patients—calling them "nude photos"—to extort money from the Lehigh Valley Health Network (LVHN).
"This unconscionable criminal act takes advantage of patients receiving cancer treatment, and LVHN condemns this despicable behavior," LVHN spokesman Brian Downs said, Lehigh Valley News reported.
"
Medusa ransomware gang picks up steam as it targets companies worldwide
exploits
ransomware
2023-03-12
https://www.bleepingcomputer.com/news/security/medusa-ransomware-gang-picks-up-steam-as-it-targets-companies-worldwide/
A ransomware operation known as Medusa has begun to pick up steam in 2023, targeting corporate victims worldwide with million-dollar ransom demands. [...]
"
Autosummary:
The ransom note will also include extension contact information, including a Tor data leak site, a Tor negotiation site, a Telegram channel, a Tox ID, and the key.medusa.serviceteam@protonmail.com email address.
Medusa Ransomware ransom note
Source: BleepingComputer
As an extra step to prevent the restoration of files from backups, the Medusa ransomware will run the following command to delete locally stored files associated with backup programs, like Windows Backup.
Medusa ransomware console window
Source: BleepingComputer
In a regular run, without command line arguments, the Medusa ransomware will terminate over 280 Windows services and processes for programs that may prevent files from being encrypted.
"
Clop ransomware gang begins extorting GoAnywhere zero-day victims
exploits
ransomware
2023-03-11
https://www.bleepingcomputer.com/news/security/clop-ransomware-gang-begins-extorting-goanywhere-zero-day-victims/
The Clop ransomware gang has begun extorting companies whose data was stolen using a zero-day vulnerability in the Fortra GoAnywhere MFT secure file-sharing solution. [...]
"
Autosummary:
Organizations that had their Accellion servers hacked include, among others, energy giant Shell, cybersecurity firm Qualys, supermarket giant Kroger, and multiple universities worldwide such as Stanford Medicine, University of Colorado, University of Miami, University of California, and the University of Maryland Baltimore (UMB).
"
Blackbaud to pay $3M for misleading ransomware attack disclosure
exploits
ransomware
2023-03-10
https://www.bleepingcomputer.com/news/security/blackbaud-to-pay-3m-for-misleading-ransomware-attack-disclosure/
Cloud software provider Blackbaud has agreed to pay $3 million to settle charges brought by the Securities and Exchange Commission (SEC), alleging that it failed to disclose the full impact of a 2020 ransomware attack that affected more than 13,000 customers. [...]
"
Autosummary:
The organizations impacted by the incident include many entities, such as charities, foundations, non-profits, and universities worldwide, from the U.S., Canada, the U.K., and the Netherlands.
"
The Week in Ransomware - March 10th 2023 - Police Take Action
exploits
ransomware
2023-03-10
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-march-10th-2023-police-take-action/
This week"s biggest news was the coordinated, international law enforcement operation between Europol, the FBI, the Netherlands, Germany, and Ukraine that targeted the DoppelPaymer operation. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include: @BleepinComputer, @serghei, @Seifreed, @malwrhunterteam, @demonslay335, @LawrenceAbrams, @billtoulas, @fwosar, @PolarToffee, @LabsSentinel, @BrettCallow, @security_score, @AhnLab_SecuInfo, @AJVicens, @AlvieriD, @pcrisk, @chum1ng0, and @TrendMicro.
Finally, we learned more about various ransomware attacks this week, including ones on the City of Oakland, Hospital Clínic de Barcelona, Technion, Fonasa, and the Minneapolis Public Schools district.
"
IceFire ransomware now encrypts both Linux and Windows systems
exploits
ransomware
2023-03-09
https://www.bleepingcomputer.com/news/security/icefire-ransomware-now-encrypts-both-linux-and-windows-systems/
Threat actors linked to the IceFire ransomware operation are now actively targeting Linux systems worldwide with a new dedicated encryptor. [...]
"
Autosummary:
Emsisoft CTO Fabian Wosar previously told BleepingComputer that other ransomware gangs (besides the ones we have already reported on), including Babuk, GoGoogle, Snatch, PureLocker, Mespinoza, RansomExx/Defray, and DarkSide, have developed and deployed their own Linux encryptors in attacks.
"
IceFire Ransomware Exploits IBM Aspera Faspex to Attack Linux-Powered Enterprise Networks
exploits
ransomware
2023-03-09
https://thehackernews.com/2023/03/icefire-linux-ransomware.html
A previously known Windows-based ransomware strain known as IceFire has expanded its focus to target Linux enterprise networks belonging to several media and entertainment sector organizations across the world.
The intrusions entail the exploitation of a recently disclosed deserialization vulnerability in IBM Aspera Faspex file-sharing software (CVE-2022-47986, CVSS score: 9.8), according to
"
Autosummary:
"
Recently discovered IceFire Ransomware now also targets Linux systems
exploits
ransomware
2023-03-09
https://securityaffairs.com/143261/malware/icefire-ransomware-targets-linux.html
The recently discovered Windows ransomware IceFire now also targets Linux enterprise networks in multiple sectors. SentinelLabs researchers discovered new Linux versions of the recently discovered IceFire ransomware that was employed in attacks against several media and entertainment organizations worldwide. The ransomware initially targeted only Windows-based systems, with a focus on technology companies. IceFire was first detected in […]
The post Recently discovered IceFire Ransomware now also targets Linux systems appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, IceFire ransomware)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
Already seen victim companies from multiple countries, including multiple victims from 1-1 countries in the past < 40 hours, so they started "hard" it seems…@demonslay335 pic.twitter.com/QfguAicNYO — MalwareHunterTeam (@malwrhunterteam) March 14, 2022
The experts observed threat actors exploiting a deserialization vulnerability in IBM Aspera Faspex file-sharing software (CVE-2022-47986, CVSS score: 9.8) to deploy the ransomware.
"
Hospital Clínic de Barcelona severely impacted by ransomware attack
exploits
ransomware
2023-03-07
https://www.bleepingcomputer.com/news/security/hospital-cl-nic-de-barcelona-severely-impacted-by-ransomware-attack/
The Hospital Clínic de Barcelona suffered a ransomware attack on Sunday morning, severely disrupting its healthcare services after the institution"s virtual machines were targeted by the attacks. [...]
"
Autosummary:
Radiology, endoscopic tests, radiological scans, dialysis, and outpatient pharmacy services will continue operating normally.
"
DoppelPaymer ransomware group disrupted by FBI and European police agencies
exploits
ransomware
2023-03-07
https://www.malwarebytes.com/blog/news/2023/03/doppelpaymer-ransomware-group-disrupted-by-fbi-and-european-police-agencies
Categories: News Categories: Ransomware Tags: Europol
Tags: FBI
Tags: police
Tags: arrests
Tags: DoppelPaymer
Tags: Emotet
Tags: Dridex
In cooperation with the FBI, European police agencies have made arrests that disrupt the DoppelPaymer ransomware operation
|
The post DoppelPaymer ransomware group disrupted by FBI and European police agencies appeared first on Malwarebytes Labs.
"
Autosummary:
Other victims attacked by DoppelPaymer in the past, include Compal, PEMEX (Petróleos Mexicanos), the City of Torrance in California, Newcastle University, Hall County in Georgia, Banijay Group SAS, and Bretagne Télécom.On 28 February 2023, the German Regional Police and the Ukrainian National Police, with support from Europol, the Dutch Police, and the United States Federal Bureau of Investigations (FBI), apprehended two suspects and seized equipment to determine the suspect’s exact role in the structure of the ransomware group.
"
Play ransomware gang leaks City of Oakland data
exploits
government
ransomware
2023-03-07
https://www.malwarebytes.com/blog/news/2023/03/play-ransomware-gang-leaks-city-of-oakland-data-
Categories: News Categories: Ransomware Tags: Play ransomware
Tags: ransomware
Tags: City of Oakland
Tags: Oakland California
After claiming responsibility for attacking the City of Oakland, California, the Play ransomware gang has begun leaking the data it stole.
|
The post Play ransomware gang leaks City of Oakland data appeared first on Malwarebytes Labs.
"
Autosummary:
Play ransomware gang’s leak page for the City of Oakland, California
Following the release of the data, the City of Oakland said in an updated statement:
"While the investigation into the scope of the incident impacting the City of Oakland remains ongoing, we recently became aware that an unauthorized third party has acquired certain files from our network and intends to release the information publicly.Posted: March 7, 2023 by
After claiming responsibility for attacking the City of Oakland, California, the Play ransomware gang has begun leaking the data it stole.
"
Warning issued over Royal ransomware
exploits
ransomware
2023-03-07
https://www.malwarebytes.com/blog/news/2023/03/warning-issued-over-royal-ransomware
Categories: News Categories: Ransomware Tags: CISA
Tags: Royal
Tags: ransomware
Tags: phishing
Tags: RDP
Tags: public facing applications
In a Cybersecurity Advisory, CISA and the FBI have shared information about Royal ransomware, which despite being rather new has made a real name for itself.
|
The post Warning issued over Royal ransomware appeared first on Malwarebytes Labs.
"
Autosummary:
Other methods that are used to gain initial access to victim networks are:
Phishing, by using emails containing malicious PDF documents, and malvertising
Remote Desktop Protocol (RDP), by using compromised or brute forcing login credentials
Exploiting public-facing applications.Posted: March 7, 2023 by
In a Cybersecurity Advisory, CISA and the FBI have shared information about Royal ransomware, which despite being rather new has made a real name for itself.
"
Core DoppelPaymer ransomware gang members targeted in Europol operation
exploits
ransomware
2023-03-06
https://www.bleepingcomputer.com/news/security/core-doppelpaymer-ransomware-gang-members-targeted-in-europol-operation/
Europol has announced that law enforcement in Germany and Ukraine targeted two individuals believed to be core members of the DoppelPaymer ransomware group. [...]
"
Autosummary:
DoppelPaymer attack rate drops
source: ID-Ransomware
Among DoppelPaymer"s high-profile victims are Kia Motors America, the Delaware County in Pennsylvania (paid a $500,000 ransom), laptop maker Compal, the Newcastle University (files leaked), electronics giant Foxconn, and the Dutch Research Council (NWO).
"
Law enforcement teams score major win against DoppelPaymer ransomware gang
exploits
ransomware
2023-03-06
https://www.helpnetsecurity.com/2023/03/06/law-enforcement-doppelpaymer-ransomware-gang/
In a joint effort, the German Regional Police, Ukrainian National Police, Europol, Dutch Police, and FBI joined forces on February 28, 2023, to take down the masterminds behind a notorious criminal organization responsible for unleashing devastating cyberattacks using the DoppelPaymer ransomware. This ransomware appeared in 2019, when cybercriminals started using it to launch attacks against organizations, critical infrastructure, and industries. Based on the BitPaymer ransomware and part of the Dridex malware family, DoppelPaymer used a … More →
The post Law enforcement teams score major win against DoppelPaymer ransomware gang appeared first on Help Net Security.
"
Autosummary:
In a joint effort, the German Regional Police, Ukrainian National Police, Europol, Dutch Police, and FBI joined forces on February 28, 2023, to take down the masterminds behind a notorious criminal organization responsible for unleashing devastating cyberattacks using the DoppelPaymer ransomware.
"
Core Members of DoppelPaymer Ransomware Gang Targeted in Germany and Ukraine
exploits
ransomware
2023-03-06
https://thehackernews.com/2023/03/core-members-of-doppelpaymer-ransomware.html
Law enforcement authorities from Germany and Ukraine have targeted suspected core members of a cybercrime group that has been behind large-scale attacks using DoppelPaymer ransomware.
The operation, which took place on February 28, 2023, was carried out with support from the Dutch National Police (Politie) and the U.S. Federal Bureau of Investigation (FBI), according to Europol.
This encompassed
"
Autosummary:
Error.
"
European police dismantled the DoppelPaymer ransomware gang
exploits
ransomware
2023-03-06
https://securityaffairs.com/143110/cyber-crime/europol-doppelpaymer-ransomware-gang.html
German police announced to have dismantled an international cybercrime gang behind the DoppelPaymer ransomware operation. Europol has announced that an international operation conducted by law enforcement in Germany and Ukraine, with help of the US FBI and the Dutch police, targeted two key figures of the DoppelPaymer ransomware group. “On 28 February 2023, the German […]
The post European police dismantled the DoppelPaymer ransomware gang appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, DoppelPaymer)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Ransom House ransomware attack hit Hospital Clinic de Barcelona
exploits
ransomware
2023-03-06
https://securityaffairs.com/143121/cyber-crime/hospital-clinic-de-barcelona-ransomware.html
Hospital Clinic de Barcelona, one of the main hospitals in the Spanish city, suffered a cyber attack that crippled its computer system. On Sunday, a ransomware attack hit the Hospital Clinic de Barcelona, one of the main hospitals of the Catalan city. The attack crippled the center’s computer system, 150 nonurgent operations and up to […]
The post Ransom House ransomware attack hit Hospital Clinic de Barcelona appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, ransomware)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Play Ransomware gang has begun to leak data stolen from City of Oakland
exploits
government
ransomware
2023-03-05
https://securityaffairs.com/143037/cyber-crime/play-ransomware-leaks-city-of-oakland.html
The Play ransomware gang has finally begun to leak the data stolen from the City of Oakland in a recent attack. The Play ransomware gang has begun to leak data they have stolen from the City of Oakland (California) in a recent cyberattack. Oakland is the largest city in the East Bay region of the […]
The post Play Ransomware gang has begun to leak data stolen from City of Oakland appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, City of Oakland)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
U.S. Cybersecurity Agency Raises Alarm Over Royal Ransomware"s Deadly Capabilities
exploits
ransomware
ciber
2023-03-03
https://thehackernews.com/2023/03/us-cybersecurity-agency-raises-alarm.html
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released a new advisory about Royal ransomware, which emerged in the threat landscape last year.
"After gaining access to victims" networks, Royal actors disable antivirus software and exfiltrate large amounts of data before ultimately deploying the ransomware and encrypting the systems," CISA said.
The custom ransomware
"
Autosummary:
Ransom demands made by Royal vary from $1 million to $11 million, with attacks targeting a variety of critical sectors, including communications, education, healthcare, and manufacturing.
"
The U.S. CISA and FBI warn of Royal ransomware operation
exploits
ransomware
2023-03-03
https://securityaffairs.com/142941/malware/cisa-fbi-royal-ransomware-alert.html
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning of the capabilities of the recently emerged Royal ransomware. The human-operated Royal ransomware first appeared on the threat landscape in September 2022, it has demanded ransoms up to millions of dollars. Unlike other ransomware operations, Royal doesn’t offer Ransomware-as-a-Service, it appears to be a private group without […]
The post The U.S. CISA and FBI warn of Royal ransomware operation appeared first on Security Affairs.
"
Autosummary:
The ransomware encrypts the network shares, that are found on the local network and the local drives, with the AES algorithm
The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) released a joint Cybersecurity Advisory (CSA) to provide organizations, tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) associated with this ransomware family.
"
FBI and CISA warn of increasing Royal ransomware attack risks
exploits
ransomware
2023-03-03
https://www.bleepingcomputer.com/news/security/fbi-and-cisa-warn-of-increasing-royal-ransomware-attack-risks/
CISA and the FBI have issued a joint advisory highlighting the increasing threat behind ongoing Royal ransomware attacks targeting many U.S. critical infrastructure sectors, including healthcare, communications, and education. [...]
"
Autosummary:
In response, the FBI and CISA shared indicators of compromise and a list of tactics, techniques, and procedures (TTPs) linked, which would help defenders detect and block attempts to deploy Royal ransomware payloads on their networks.
"
Play ransomware claims disruptive attack on City of Oakland
exploits
government
ransomware
2023-03-03
https://www.bleepingcomputer.com/news/security/play-ransomware-claims-disruptive-attack-on-city-of-oakland/
The Play ransomware gang has taken responsibility for a cyberattack on the City of Oakland that has disrupted IT systems since mid-February. [...]
"
Autosummary:
City of Oakland listed on Play ransomware site (BleepingComputer)
The threat actors claim to have stolen documents containing private, confidential data, financial and government papers, identity documents, passports, personal employee data, and even information allegedly proving human rights violations.
"
The Week in Ransomware - March 3rd 2023 - Wide impact attacks
exploits
ransomware
2023-03-03
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-march-3rd-2023-wide-impact-attacks/
This week was highlighted by a massive BlackBasta ransomware attack targeting DISH Network and taking down numerous subsidiaries, including SlingTV and Boost Mobile. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include: @malwareforme, @DanielGallagher, @Ionut_Ilascu, @fwosar, @struppigel, @Seifreed, @demonslay335, @LawrenceAbrams, @malwrhunterteam, @BleepinComputer, @FourOctets, @PolarToffee, @billtoulas, @jorntvdw, @serghei, @juanbrodersen, @CISAgov,jgreigj, @Bitdefender, @cyfirma, @jgreigj, and @pcrisk.
"
LockBit ransomware demands $2 million for Pierce Transit data
exploits
ransomware
2023-03-03
https://www.malwarebytes.com/blog/news/2023/03/public-transportation-service-pierce-transit-struck-by-lockbit-ransomware
Categories: News Categories: Ransomware Tags: Pierce Transit
Tags: Tacoma
Tags: Washington
Tags: LockBit
Tags: ransomware
The ransomware group LockBit is offering data stolen from a Washington state public transit operator on the dark web.
|
The post LockBit ransomware demands $2 million for Pierce Transit data appeared first on Malwarebytes Labs.
"
Autosummary:
The ransomware group claims to have stolen contracts, client information, non-disclosure agreements, correspondence, and more, all of which are now on sale.
The attack began on February 14, 2023, and required Pierce Transit to implement temporary workarounds, to maintain the service of the transit system which transports around 18,000 people every day.
On February 28, the LockBit ransomware group published details of the attack on Pierce Transit, along with a public demand for just shy of $2 million in return for the stolen data.
"
Vice Society publishes data stolen during Vesuvius ransomware attack
exploits
ransomware
2023-03-02
https://grahamcluley.com/vice-society-publishes-data-stolen-during-vesuvius-ransomware-attack/
A notorious ransomware gang has claimed responsibility for a cyber attack against Vesuvius, the London Stock Exchange-listed molten metal flow engineering company.
"
Autosummary:
"
Satellite TV giant Dish admitted that the recent outage was caused by a ransomware attack
exploits
ransomware
2023-03-01
https://securityaffairs.com/142858/data-breach/dish-admitted-ransomware-attack.html
Satellite TV giant Dish Network has confirmed that the recent outage was caused by a ransomware attack, it also disclosed a data breach. Satellite TV giant Dish Network finally admitted that the recent outage was caused by a ransomware attack. The American satellite broadcast provider went offline on February 24, 2023, the outage impacted Dish.com, […]
The post Satellite TV giant Dish admitted that the recent outage was caused by a ransomware attack appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, Dish)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
U.S. Marshals Service investigating ransomware attack, data theft
exploits
ransomware
2023-02-28
https://www.bleepingcomputer.com/news/security/us-marshals-service-investigating-ransomware-attack-data-theft/
The U.S. Marshals Service (USMS) is investigating the theft of sensitive law enforcement information following a ransomware attack that has impacted what it describes as "a stand-alone USMS system." [...]
"
Autosummary:
"
New EX-22 Tool Empowers Hackers with Stealthy Ransomware Attacks on Enterprises
exploits
ransomware
2023-02-28
https://thehackernews.com/2023/02/new-ex-22-tool-empowers-hackers-with.html
A new post-exploitation framework called EXFILTRATOR-22 (aka EX-22) has emerged in the wild with the goal of deploying ransomware within enterprise networks while flying under the radar.
"It comes with a wide range of capabilities, making post-exploitation a cakewalk for anyone purchasing the tool," CYFIRMA said in a new report.
Some of the notable features include establishing a reverse shell
"
Autosummary:
"
Bitdefender Releases Free Decryptor for MortalKombat Ransomware Strain
exploits
ransomware
2023-02-28
https://thehackernews.com/2023/02/bitdefender-releases-free-decryptor-for.html
Romanian cybersecurity company Bitdefender has released a free decryptor for a new ransomware strain known as MortalKombat.
MortalKombat is a new ransomware strain that emerged in January 2023. It"s based on commodity ransomware dubbed Xorist and has been observed in attacks targeting entities in the U.S., the Philippines, the U.K., and Turkey.
Xorist, detected since 2010, is distributed as a
"
Autosummary:
"MortalKombat encrypts various files on the victim machine"s filesystem, such as system, application, database, backup, and virtual machine files, as well as files on the remote locations mapped as logical drives in the victim"s machine," Cisco Talos disclosed earlier this month.
"
New MortalKombat ransomware decryptor recovers your files for free
exploits
ransomware
2023-02-28
https://www.bleepingcomputer.com/news/security/new-mortalkombat-ransomware-decryptor-recovers-your-files-for-free/
Cybersecurity company Bitdefender has released a free MortalKombat ransomware decryptor that victims can use to restore their files without paying a ransom. [...]
"
Autosummary:
Bitdefender"s decryptor for MortalKombat ransomware (BleepingComputer)
Moreover, there’s an option to replace previously decrypted files, products of partially successful decryption attempts, with new, clean versions.
"
Dish Network confirms ransomware attack behind multi-day outage
exploits
ransomware
2023-02-28
https://www.bleepingcomputer.com/news/security/dish-network-confirms-ransomware-attack-behind-multi-day-outage/
Satellite broadcast provider and TV giant Dish Network has finally confirmed that a ransomware attack was the cause of a multi-day network and service outage that started on Friday. [...]
"
Autosummary:
"
The company added that the filed information relates to its "expectations regarding its ability to contain, assess and remediate the ransomware attack and the impact of the ransomware attack on the Corporation"s employees, customers, business, operations or financial results.
"
U.S. Marshals Service suffers a ransomware attack
exploits
ransomware
2023-02-28
https://securityaffairs.com/142823/cyber-crime/u-s-marshals-service-suffers-a-ransomware-attack.html
The U.S. Marshals Service (USMS) was the victim of a ransomware attack, it is investigating the theft of sensitive information. The U.S. Marshals Service (USMS) announced that a ransomware attack has impacted “a stand-alone USMS system.” The US bureau is investigating the theft of sensitive information following the security breach. The infection occurred on February […]
The post U.S. Marshals Service suffers a ransomware attack appeared first on Security Affairs.
"
Autosummary:
"
Bitdefender released a free decryptor for the MortalKombat Ransomware family
exploits
ransomware
2023-02-28
https://securityaffairs.com/142830/malware/mortalkombat-ransomware-free-decryptor.html
Antivirus company Bitdefender has released a free decryptor for the recently discovered ransomware family MortalKombat. Good news for the victims of the recently discovered MortalKombat ransomware, the antivirus firm Bitdefender has released a free decryptor that will allow them to recover their file without paying the ransom. Since December 2022, Cisco Talos researchers have been observing an unidentified financially […]
The post Bitdefender released a free decryptor for the MortalKombat Ransomware family appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, ransomware)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
US Marshals Service hit by ransomware and data breach
financial
exploits
ransomware
2023-02-28
https://www.malwarebytes.com/blog/news/2023/02/us-marshals-service-hit-by-ransomware-and-data-breach
Categories: News Categories: Ransomware Tags: US Marshalls
Tags: WITSEC
Tags: usms
Tags: ransomware
The US Marshals Service has suffered a ransomware attack in which an attacker managed to get hold of sensitive information about staff and fugitives.
|
The post US Marshals Service hit by ransomware and data breach appeared first on Malwarebytes Labs.
"
Autosummary:
On February 17, 2023, the attacker infiltrated a system that held information about ongoing investigations, including personally identifiable information (PII) of fugitives, staff, and third parties.
Investigation
According to Drew Wade, spokesperson for the USMS:
"Shortly after that discovery, the USMS disconnected the affected system, and the Department of Justice initiated a forensic investigation.Posted: February 28, 2023 by
The US Marshals Service has suffered a ransomware attack in which an attacker managed to get hold of sensitive information about staff and fugitives.
"
ESET Research Podcast: Ransomware trashed data, Android threats soared in T3 2022
exploits
ransomware
2023-02-28
https://www.welivesecurity.com/2023/02/28/eset-research-podcast-ransomware-trashed-data-android-threats/
And that’s just the tip of the iceberg when it comes to the trends that defined the cyberthreat landscape in the final four months of 2022.
The post ESET Research Podcast: Ransomware trashed data, Android threats soared in T3 2022 appeared first on WeLiveSecurity
"
Autosummary:
"
“Ethical hacker” amongst those arrested in Dutch ransomware investigation
exploits
ransomware
2023-02-27
https://www.bitdefender.com/blog/hotforsecurity/ethical-hacker-amongst-those-arrested-in-dutch-ransomware-investigation/
Three men have been arrested by Dutch police in connection with ransomware attacks that blackmailed thousands of companies. Amongst them? An ethical hacker.
Read more in my article on the Hot for Security blog.
"
Autosummary:
"
New Exfiltrator-22 post-exploitation kit linked to LockBit ransomware
exploits
ransomware
2023-02-27
https://www.bleepingcomputer.com/news/security/new-exfiltrator-22-post-exploitation-kit-linked-to-lockbit-ransomware/
Threat actors are promoting a new "Exfiltrator-22" post-exploitation framework designed to spread ransomware in corporate networks while evading detection. [...]
"
Autosummary:
Creating scheduled tasks through EX-22"s panel (CYFIRMA)
Through the service"s web panel, cybercriminals can also set scheduled tasks, update agents to a new version, change a campaign"s configuration, or create new campaigns.
Telegram channel set up by EX-22 authors (CYFIRMA)
By the end of the year, the threat actors announced new features that helped conceal traffic on compromised devices, indicating that the framework was under active development.
"
PureCrypter malware hits govt orgs with ransomware, info-stealers
exploits
ransomware
2023-02-25
https://www.bleepingcomputer.com/news/security/purecrypter-malware-hits-govt-orgs-with-ransomware-info-stealers/
A threat actor has been targeting government entities with PureCrypter malware downloader that has been seen delivering multiple information stealers and ransomware strains. [...]
"
Autosummary:
"The campaign was found to have delivered several types of malware including Redline Stealer, AgentTesla, Eternity, Blackmoon and Philadelphia Ransomware," the researchers say.
"
Dutch Police arrest three ransomware actors extorting €2.5 million
exploits
ransomware
2023-02-24
https://www.bleepingcomputer.com/news/security/dutch-police-arrest-three-ransomware-actors-extorting-25-million/
The Amsterdam cybercrime police team has arrested three men for ransomware activity that generated €2.5 million from extorting small and large organizations in multiple countries. [...]
"
Autosummary:
"
Microsoft announces automatic BEC, ransomware attack disruption capabilities
exploits
ransomware
2023-02-24
https://www.helpnetsecurity.com/2023/02/24/bec-ransomware-attack-disruption/
Last year, Microsoft announced automatic attack disruption capabilities in Microsoft 365 Defender, its enterprise defense suite. On Wednesday, it announced that these capabilities will now help organizations disrupt two common attack scenarios: BEC (business email compromise) and human-operated ransomware attacks. Reaction speed is paramount for disrupting attacks A fast defensive response to initiated cyber attacks is becoming increasingly crucial for organizations: According to IBM Security’s X-Force team, the average time to complete a ransomware attack … More →
The post Microsoft announces automatic BEC, ransomware attack disruption capabilities appeared first on Help Net Security.
"
Autosummary:
"
<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-061a" hreflang="en">#StopRansomware: Royal Ransomware</a>
exploits
ransomware
ciber
2023-02-24
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-061a
"
Autosummary:
REFERENCES
[1] Royal Rumble: Analysis of Royal Ransomware (cybereason.com)
[2] DEV-0569 finds new ways to deliver Royal ransomware, various payloads - Microsoft Security Blog
[3] 2023-01: ACSC Ransomware Profile - Royal | Cyber.gov.au
ACKNOWLEDGEMENTS
Recorded Future, Coveware, Digital Asset Redemption, Q6, and RedSense contributed to this CSA.November 2022 68.83.169[.]91 November 2022 81.184.181[.]215 November 2022 82.12.196[.]197 November 2022 98.143.70[.]147 November 2022 140.82.48[.]158 December 2022 147.135.36[.]162 December 2022 147.135.11[.]223 December 2022 152.89.247[.]50 December 2022 172.64.80[.]1 December 2022 179.43.167[.]10 December 2022 185.7.214[.]218 December 2022 193.149.176[.]157 December 2022 193.235.146[.]104 December 2022 209.141.36[.]116 December 2022 45.61.136[.]47 December 2022 45.8.158[.]104 December 2022 5.181.234[.]58 December 2022 5.188.86[.]195 December 2022 77.73.133[.]84 December 2022 89.108.65[.]136 December 2022 94.232.41[.]105 December 2022 47.87.229[.]39 January 2023 Malicious Domain Last Observed ciborkumari[.]xyz October 2022 sombrat[.]com October 2022 gororama[.]com November 2022
Additional details requested include: a targeted company Point of Contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, host and network based indicators.Batch files create a new admin user [T1078.002], force a group policy update, set pertinent registry keys to auto-extract [T1119] and execute the ransomware, monitor the encryption process, and delete files upon completion—including Application, System, and Security event logs [T1070.001].Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA or the FBI.
REPORTING
FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with Royal actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.According to open-source reporting, victims have unknowingly installed malware that delivers Royal ransomware after receiving phishing emails containing malicious PDF documents [T1566.001], and malvertising [T1566.002].[2]
According to third-party reporting, Royal actors most commonly (in 66.7% of incidents) gain initial access to victim networks via successful phishing emails [T1566].
Encryption
Before starting the encryption process, Royal actors:
Use Windows Restart Manager to determine whether targeted files are currently in use or blocked by other applications [T1486].[1]
Use Windows Volume Shadow Copy service ( vssadmin.exe ) to delete shadow copies to prevent system recovery.[1]
FBI has found numerous batch ( .bat ) files on impacted systems which are typically transferred as an encrypted 7zip file.[CPG 7.3] in a physically separate, segmented, and secure location (i.e., hard drive, storage device, the cloud).[CPG 7.3] in a physically separate, segmented, and secure location (i.e., hard drive, storage device, the cloud).134.35.9[.]209 November 2022 139.195.43[.]166 November 2022 139.60.161[.]213 November 2022 148.213.109[.]165 November 2022 163.182.177[.]80 November 2022 181.141.3[.]126 November 2022 181.164.194[.]228 November 2022 185.143.223[.]69 November 2022 186.64.67[.]6 November 2022 186.86.212[.]138 November 2022 190.193.180[.]228 November 2022 196.70.77[.]11 November 2022 197.11.134[.]255 November 2022 197.158.89[.]85 November 2022 197.204.247[.]7 November 2022 197.207.181[.]147
"
Fruit giant Dole suffers ransomware attack impacting operations
exploits
ransomware
2023-02-23
https://www.bleepingcomputer.com/news/security/fruit-giant-dole-suffers-ransomware-attack-impacting-operations/
Dole Food Company, one of the world"s largest producers and distributors of fresh fruit and vegetables, has announced that it is dealing with a ransomware attack that impacted its operations. [...]
"
Autosummary:
"
Food giant Dole hit by ransomware, halts North American production temporarily
exploits
ransomware
2023-02-23
https://www.bitdefender.com/blog/hotforsecurity/food-giant-dole-hit-by-ransomware-halts-north-american-production-temporarily/
Earlier this month a cyber attack on food produce giant Dole caused the firm to shut down its production plants across North America for a period of time, and halt shipments to stores.
Read more in my article on the Hot for Security blog.
"
Autosummary:
In the hours following the CNN article, Dole issued a statement to the press, confirming that it had fallen foul of ransomware:
Upon learning of this incident, Dole moved quickly to contain the threat and engaged leading third-party cybersecurity experts, who have been working in partnership with Dole"s internal teams to remediate the issue and secure systems.
"
Royal Mail schools LockBit in leaked negotiation
ransomware
2023-02-23
https://www.malwarebytes.com/blog/news/2023/02/royal-mail-gives-lockbit-a-lesson-in-ransomware-negotiation
Categories: News The LockBit gang has released a chat history showing its negotiations with Royal Mail.
|
The post Royal Mail schools LockBit in leaked negotiation appeared first on Malwarebytes Labs.
"
Autosummary:
A good way to lower the temperature is to adopt the ransomware gang’s self-serving vernacular, he says, and the Royal Mail’s “IT guy” does this in subtle ways, such as referring to LockBit’s criminal activity as “penetration testing.”Legal obligations must be met, law enforcement involved, cyberinsurance rules followed, customers and suppliers informed, and so on.
The negotiation began on January 12, 2023, and like any Internet chat, the conversation takes place between two avatars who may or may not be who they say they are.They consistently used language like “I am trying to help our Senior Team understand this,” “I am still trying to work with you here,” “I am doing what I can to drive things forward.”
Maybe they did work in IT, but having spent years working in IT myself, and after seeing how the Royal Mail’s representative conducted themselves, I will simply say they aren’t like anyone I ever met.
"
BlackCat ransomware targets another healthcare facility
exploits
ransomware
2023-02-23
https://www.malwarebytes.com/blog/news/2023/02/lehigh-valley-health-network-targeted-by-blackcat-ransomware
Categories: News Categories: Ransomware Tags: Lehigh Valley Health Network
Tags: LVHN
Tags: BlackCat
Tags: ALPHV
Tags: Noberus
Tags: ransomware
Tags: leak site
Tags: DDoS
The Lehigh Valley Health Network stated it was the target of a cybersecurity attack by a ransomware gang known as BlackCat
|
The post BlackCat ransomware targets another healthcare facility appeared first on Malwarebytes Labs.
"
Autosummary:
Posted: February 23, 2023 by
The Lehigh Valley Health Network stated it was the target of a cybersecurity attack by a ransomware gang known as BlackCat
In a statement issued Monday morning, Lehigh Valley Health Network said it had been the target of a cyberattack attributed to a ransomware gang known as BlackCat.
BlackCat
The ransomware-as-a-service (RaaS) group BlackCat, also known as ALPHV and Noberus, is currently one of the most active groups, and has been associated with Russia.
In December, 2022, the Office of Information Security and Health Sector Cybersecurity Coordination Center issued an extensive Analyst Note which identified BlackCat as a "relatively new but highly-capable" ransomware threat to health care providers.
"
Most vulnerabilities associated with ransomware are old
exploits
ransomware
2023-02-22
https://www.helpnetsecurity.com/2023/02/22/vulnerabilities-ransomware-old/
Researchers identified 56 new vulnerabilities associated with ransomware threats among a total of 344 threats identified in 2022 – marking a 19% increase year-over-year. Threat actors are actively searching the internet and deep and dark web for 180 vulnerabilities known to be associated with ransomware. In the last quarter of 2022, these groups used ransomware to exploit 21 of these vulnerabilities, according to a new report from Cyber Security Works (CSW), Ivanti, Cyware, and Securin. … More →
The post Most vulnerabilities associated with ransomware are old appeared first on Help Net Security.
"
Autosummary:
In the last quarter of 2022, these groups used ransomware to exploit 21 of these vulnerabilities, according to a new report from Cyber Security Works (CSW), Ivanti, Cyware, and Securin.
"
HardBit ransomware tells corporate victims to share their cyber insurance details
exploits
ransomware
2023-02-22
https://www.tripwire.com/state-of-security/hardbit-ransomware-tells-corporate-victims-share-their-cyber-insurance-details
A ransomware outfit is advising its victims to secretly tell them how much insurance they have, so their extortion demands will be met.
Read more in my article on the Tripwire State of Security blog.
"
Autosummary:
The cybercriminals behind HardBit even attempt to quash any pangs of guilt an IT administrator or CISO might be having about sharing details of their insurance:
"Poor multimillionaire insurers will not starve and will not become poorer from the payment of the maximum amount specified in the contract, because everyone knows that the contract is more expensive than money, so let them fulfill the conditions prescribed in your insurance contract, thanks to our interaction," the ransom note concludes.For example your company is insured for 10 million dollars, while negotiating with your insurance agent about the ransom he will offer us the lowest possible amount, for example 100 thousand dollars, we will refuse the paltry amount and ask for example the amount of 15 million dollars, the insurance agent will never offer us the top threshold of your insurance of 10 million dollars.
"
An Overview of the Global Impact of Ransomware Attacks
exploits
ransomware
2023-02-21
https://www.bleepingcomputer.com/news/security/an-overview-of-the-global-impact-of-ransomware-attacks/
With ransomware attacks disrupting businesses and governments worldwide, we take a look at the latest finding in a recent ransomware report. [...]
"
Autosummary:
In the incident of the Royal Mail ransomware, the LockBit hacker set a ransom of $80m, which they claimed was equal 0.5% of the company’s revenue, in exchange for decrypting the files.
Changing Tactics in Ransomware Attacks
Ransomware is malicious software that encrypts a company’s data, preventing access to data until the ransom payment is paid and a decryptor is released.
"
HardBit ransomware gang adjusts their demands so the insurance company would cover the ransom cost
exploits
ransomware
2023-02-21
https://securityaffairs.com/142538/cyber-crime/hardbit-ransomware-insurance.html
Recently emerged HardBit ransomware gang adjusts their demands so the insurance company would cover the ransom cost. The HardBit ransomware group first appeared on the threat landscape in October 2022, but unlike other ransomware operations, it doesn’t use a double extortion model at this time. The gang threatens victims of further attacks if their ransom […]
The post HardBit ransomware gang adjusts their demands so the insurance company would cover the ransom cost appeared first on Security Affairs.
"
Autosummary:
To prevent Windows Defender Antivirus from blocking the ransomware process, it makes several Windows Registry changes to disable many Windows Defender features (i.e. tamper protection, anti-spyware capabilities, real-time behavioral monitoring, real-time on-access (file) protection, and real-time process scanning).
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, HardBit ransomware)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
HardBit ransomware tailors ransom to fit your cyber insurance payout
exploits
ransomware
2023-02-21
https://www.malwarebytes.com/blog/news/2023/02/hardbit-ransomware-tailors-ransom-to-fit-your-cyber-insurance-payout
Categories: News Tags: hardbit
Tags: ransomware
Tags: infection
Tags: insurance
Tags: cyber
Tags: negotiation
Tags: encrypted
Tags: locked
Tags: network
We take a look at a ransomware infection which uses a novel approach to payments: asking for the victim"s insurance details.
|
The post HardBit ransomware tailors ransom to fit your cyber insurance payout appeared first on Malwarebytes Labs.
"
Autosummary:
Although there is no specific information as to how it arrives on a network, once it gets there is performs typical ransomware operations:
Encrypts files, branding them with the file’s custom logo
Gathers system/network data
Reduces overall security of affected systems
Disables recovery options and tamper protection, turns off multiple Windows Defender features, and interferes with several other security features including real time monitoring and Windows services related to backups like the Volume Shadow Copy Service.If the scammers are told in private what the insurance total is, they’ll be able to ensure their demand for money is
A) at the top end limit of the ransom payout scale provided and
B) does not go past this limit, so the affected company receives every cent they"ve paid out.
HardBit 2.0: dismantling a device piece by piece
The ransomware, called HardBit 2.0, has been in circulation since sometime around November last year.
"
Lockbit ransomware gang hit the Portuguese municipal water utility Aguas do Porto
exploits
ransomware
2023-02-20
https://securityaffairs.com/142477/cyber-crime/lockbit-water-utility-aguas-do-porto.html
The LockBit ransomware gang claims to have hacked Aguas do Porto, a Portuguese municipal water utility company. The LockBit ransomware gang claims to have hacked Aguas do Porto, a Portuguese municipal water utility company, and is threatening to leak the stolen data. Aguas do Porto is a municipal water utility company that manages the full […]
The post Lockbit ransomware gang hit the Portuguese municipal water utility Aguas do Porto appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, Aguas do Porto)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
HardBit ransomware wants insurance details to set the perfect price
exploits
ransomware
2023-02-20
https://www.bleepingcomputer.com/news/security/hardbit-ransomware-wants-insurance-details-to-set-the-perfect-price/
A ransomware threat called HardBit has moved to version 2.0 and its operators are trying to negotiate a ransom payment that would be covered by the victim"s insurance company. [...]
"
Autosummary:
"To avoid all this and get the money on the insurance, be sure to inform us anonymously about the availability and terms of the insurance coverage, it benefits both you and us, but it does not benefit the insurance company," HardBit operators say in a note to victims.
"
Chip company loses $250m after ransomware hits supply chain
exploits
ransomware
2023-02-20
https://www.malwarebytes.com/blog/news/2023/02/chip-company-loses-250m-after-ransomware-hits-supply-chain
Categories: News Categories: Ransomware Tags: Applied materials
Tags: MKS
Tags: ransomware
Tags: semiconductor
Applied Materials has said it expects to miss $250 million in second-quarter sales due to a ransomware attack at a supplier.
|
The post Chip company loses $250m after ransomware hits supply chain appeared first on Malwarebytes Labs.
"
Autosummary:
Applied Materials, one of the world’s leading suppliers of equipment, services, and software for the manufacture of semiconductors, has warned that its second-quarter sales are likely to be hurt to the tune of $250 million due to a cybersecurity attack at one of its suppliers.
"
GoAnywhere zero-day opened door to Clop ransomware
exploits
ransomware
2023-02-20
https://www.malwarebytes.com/blog/news/2023/02/goanywhere-zero-day-opened-door-to-clop-ransomware
Categories: News Categories: Ransomware Tags: Clop
Tags: Clop ransomware
Tags: ransomware
Tags: GoAnywhere
Tags: managed file transfer
Tags: MFT
Tags: Fortra
Tags: CISA
Tags: Known Exploited Vulnerabilities Catalog
The Clop ransomware gang has claimed responsibility for a wave of attacks that exploited a zero-day in GoAnywhere MFT admin consoles.
|
The post GoAnywhere zero-day opened door to Clop ransomware appeared first on Malwarebytes Labs.
"
Autosummary:
It recently filed a Form 8-K to the Securities and Exchange Commission (SEC), announcing the compromise of its system and disclosure of company data, including protected health information (PHI) and personal information (PI) of certain patients.
The Cybersecurity & Infrastructure Security Agency (CISA) recently added CVE-2023-0669 to its Known Exploited Vulnerabilities Catalog, a list of software flaws that federal organizations must patch within two weeks.
"
Mortal Kombat ransomware forms tag team with crypto-stealing malware
exploits
ransomware
2023-02-17
https://www.malwarebytes.com/blog/news/2023/02/mortal-kombat-ransomware-forms-tag-team-partnership-with-laplas-clipper
Categories: News Tags: mortal kombat
Tags: ransomware
Tags: laplas clipper
Tags: cryptocurrency
Tags: encrypt
Tags: network
Tags: infect
Tags: ransom
Tags: demand
Tags: BAT file
Tags: email
Tags: phish
Tags: phishing
Tags: attachment
It’s like a choose your own adventure game gone horribly wrong.
|
The post Mortal Kombat ransomware forms tag team with crypto-stealing malware appeared first on Malwarebytes Labs.
"
Autosummary:
It’s also able to generate imitation addresses for a wide variety of cryptocurrencies including Monero, Bitcoin, Ethereum, Solana, and even Steam trading URLs.
The tag-team campaign serves up ransomware known as Mortal Kombat, which borrows the name made famous by the video game, and Laplas Clipper malware, a clipboard stealer.According to Talos, it has mainly been seen in the US, as well as the Philippines, the UK, and Turkey.
Instructions are then provided to download the aforementioned chat program, add the attackers as a “friend”, and begin communication.
Once installed on a system, Mortal Kombat targets a large selection of files for encryption, based on their file extensions.
"
ESXiArgs Ransomware Hits Over 500 New Targets in European Countries
exploits
ransomware
2023-02-16
https://thehackernews.com/2023/02/esxiargs-ransomware-hits-over-500-new.html
More than 500 hosts have been newly compromised en masse by the ESXiArgs ransomware strain, most of which are located in France, Germany, the Netherlands, the U.K., and Ukraine.
The findings come from attack surface management firm Censys, which discovered "two hosts with strikingly similar ransom notes dating back to mid-October 2022, just after ESXi versions 6.5 and 6.7 reached end of life."
"
Autosummary:
"
New MortalKombat ransomware employed in financially motivated campaign
financial
exploits
ransomware
2023-02-16
https://securityaffairs.com/142319/cyber-crime/mortalkombat-ransomware.html
Talos researchers observed a financially motivated threat actor using a new ransomware dubbed MortalKombat and a clipper malware named Laplas. Since December 2022, Cisco Talos researchers have been observing an unidentified financially motivated threat actor deploying two new malware, the recently discovered MortalKombat ransomware and a GO variant of the Laplas Clipper malware. The threat actor […]
The post New MortalKombat ransomware employed in financially motivated campaign appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, ransomware)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Over 500 ESXiArgs Ransomware infections in one day, but they dropped the day after
exploits
ransomware
2023-02-16
https://securityaffairs.com/142336/cyber-crime/esxiargs-ransomware-infections.html
ESXiArgs ransomware continues to spread in Europe, most of the recent infections were observed in France, Germany, the Netherlands, the UK, and Ukraine Researchers from Censys reported that more than 500 hosts have been infected in a new wave of ESXiArgs ransomware attacks, most of which are in France, Germany, the Netherlands, and the U.K.. […]
The post Over 500 ESXiArgs Ransomware infections in one day, but they dropped the day after appeared first on Security Affairs.
"
Autosummary:
ESXiArgs ransomware continues to spread in Europe, most of the recent infections were observed in France, Germany, the Netherlands, the UK, and Ukraine
Researchers from Censys reported that more than 500 hosts have been infected in a new wave of ESXiArgs ransomware attacks, most of which are in France, Germany, the Netherlands, and the U.K..
“Over the last few days, Censys has observed just over 500 hosts newly infected with ESXiArgs ransomware, most of which are in France, Germany, the Netherlands, and the UK.”
"
<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-040a" hreflang="en">#StopRansomware: Ransomware Attacks on Critical Infrastructure Fund DPRK Malicious Cyber Activities</a>
exploits
ransomware
ciber
2023-02-16
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-040a
"
Autosummary:
Vulnerable Technologies and Versions
Sonicwall Sma 200 Firmware 10.2.0.8-37Sv
Sonicwall Sma 200 Firmware 10.2.1.1-19Sv
Sonicwall Sma 200 Firmware 10.2.1.2-24Sv
Sonicwall Sma 210 Firmware 10.2.0.8-37Sv
Sonicwall Sma 210 Firmware 10.2.1.1-19Sv
Sonicwall Sma 210 Firmware 10.2.1.2-24Sv
Sonicwall Sma 410 Firmware 10.2.0.8-37Sv
Sonicwall Sma 410 Firmware 10.2.1.1-19Sv
Sonicwall Sma 410 Firmware 10.2.1.2-24Sv
Sonicwall Sma 400 Firmware 10.2.0.8-37Sv
Sonicwall Sma 400 Firmware 10.2.1.1-19Sv
Sonicwall Sma 400 Firmware 10.2.1.2-24Sv
Sonicwall Sma 500V Firmware 10.2.0.8-37Sv
Sonicwall Sma 500V Firmware 10.2.1.1-19Sv
Sonicwall Sma 500V Firmware 10.2.1.2-24Sv See https://nvd.nist.gov/vuln/detail/CVE-2021-20038 for more information.Recommended Mitigations
Apply all appropriate vendor updates
Upgrade to: SMA 100 Series - (SMA 200, 210, 400, 410, 500v (ESX, Hyper-V, KVM, AWS, Azure):
SonicWall SMA100 build versions 10.2.0.9-41sv or later
SonicWall SMA100 build versions 10.2.1.3-27sv or later System administrators should refer to the SonicWall Security Advisories in the reference section to determine affected applications/systems and appropriate fix actions.Actors have also been observed using or possessing publically available tools for encryption, such as BitLocker, Deadbolt, ech0raix, GonnaCry, Hidden Tear, Jigsaw, LockBit 2.0, My Little Ransomware, NxRansomware, Ryuk, and YourRansom [T1486].Actors have also been observed using or possessing publically available tools for encryption, such as BitLocker, Deadbolt, ech0raix, GonnaCry, Hidden Tear, Jigsaw, LockBit 2.0, My Little Ransomware, NxRansomware, Ryuk, and YourRansom [T1486].
The United States National Security Agency (NSA), the U.S. Federal Bureau of Investigation (FBI), the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the U.S. Department of Health and Human Services (HHS), the Republic of Korea (ROK) National Intelligence Service (NIS), and the ROK Defense Security Agency (DSA) (hereafter referred to as the “authoring agencies”) are issuing this joint Cybersecurity Advisory (CSA) to highlight ongoing ransomware activity against Healthcare and Public Health Sector organizations and other critical infrastructure sector entities.Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.
RESOURCES
Stairwell provided a YARA rule to identify Maui ransomware, and a Proof of Concept public RSA key extractor at the following link:
https://www.stairwell.com/news/threat-research-report-maui-ransomware/
REQUEST FOR INFORMATION
The FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, bitcoin wallet information, the decryptor file, and/or benign samples of encrypted files.
Appendix A: CVE Details
CVE-2021-44228 CVSS 3.0: 10 (Critical) Vulnerability Description
Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints.
SHA256 Hash 99fc54786a72f32fd44c7391c2171ca31e72ca52725c68e2dde94d04c286fccd* F8fc2445a9814ca8cf48a979bff7f182d6538f4d1ff438cf259268e8b4b76f86* Bea866b327a2dc2aa104b7ad7307008919c06620771ec3715a059e675d9f40af* 6e20b73a6057f8ff75c49e1b7aef08abfcfe4e418e2c1307791036f081335c2d f4d10b08d7dacd8fe33a6b54a0416eecdaed92c69c933c4a5d3700b8f5100fad 541825cb652606c2ea12fd25a842a8b3456d025841c3a7f563655ef77bb67219 2d978df8df0cf33830aba16c6322198e5889c67d49b40b1cb1eb236bd366826d 414ed95d14964477bebf86dced0306714c497cde14dede67b0c1425ce451d3d7 Df0c7bb88e3c67d849d78d13cee30671b39b300e0cda5550280350775d5762d8
MD5 Hash a2c2099d503fcc29478205f5aef0283b 9c516e5b95a7e4169ecbd133ed4d205f d6a7b5db62bf7815a10a17cdf7ddbd4b c6949a99c60ef29d20ac8a9a3fb58ce5 4b20641c759ed563757cdd95c651ee53 25ee4001eb4e91f7ea0bc5d07f2a9744 29b6b54e10a96e6c40e1f0236b01b2e8 18126be163eb7df2194bb902c359ba8e eaf6896b361121b2c315a35be837576d e4ee611533a28648a350f2dab85bb72a e268cb7ab778564e88d757db4152b9fa
* from Microsoft blog post on h0lygh0st
CONTACT INFORMATION
NSA Client Requirements / General Cybersecurity Inquiries: CybersecurityReports@nsa.gov
Defense Industrial Base Inquiries and Cybersecurity Services: DIB_Defense@cyber.nsa.gov
To report incidents and anomalous activity related to information found in this Joint Cybersecurity Advisory, contact CISA’s 24/7 Operations Center at Report@cisa.gov or (888) 282-0870 or your local FBI field office at www.fbi.gov/contact-us/field.
Appendix B: Indicators of Compromise (IOCs)
The IOC section includes hashes and IP addresses for the Maui and H0lyGh0st ransomware variants—as well as custom malware implants assumedly developed by DPRK cyber actors, such as remote access trojans (RATs), loaders, and other tools—that enable subsequent deployment of ransomware.
The authoring agencies urge HPH organizations to:
Limit access to data by authenticating and encrypting connections (e.g., using public key infrastructure certificates in virtual private network (VPN) and transport layer security (TLS) connections) with network services, Internet of Things (IoT) medical devices, and the electronic health record system
"
<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-039a" hreflang="en">ESXiArgs Ransomware Virtual Machine Recovery Guidance</a>
exploits
ransomware
ciber
2023-02-16
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-039a
"
Autosummary:
The full list of file extensions encrypted by the malware is: vmdk , vmx , vmxf , vmsd , vmsn , vswp , vmss , nvram , vmem .
See the joint CSA from the cybersecurity authorities of Australia, Canada, New Zealand, the United Kingdom, and the United States on Technical Approaches to Uncovering and Remediating Malicious Activity for additional guidance on hunting or investigating a network, and for common mistakes in incident handling.
Organizations should also collect and review artifacts, such as running processes/services, unusual authentications, and recent network connections.CISA and FBI encourage all organizations managing VMware ESXi servers to:
The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) are releasing this joint Cybersecurity Advisory (CSA) in response to the ongoing ransomware campaign, known as “ESXiArgs.”Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities.
"
City of Oakland declares state of emergency after ransomware attack
exploits
government
ransomware
2023-02-15
https://www.bleepingcomputer.com/news/security/city-of-oakland-declares-state-of-emergency-after-ransomware-attack/
Oakland has declared a local state of emergency because of the impact of a ransomware attack that forced the City to take all its IT systems offline on February 8th. [...]
"
Autosummary:
"
Financially Motivated Threat Actor Strikes with New Ransomware and Clipper Malware
financial
exploits
ransomware
2023-02-15
https://thehackernews.com/2023/02/financially-motivated-threat-actor.html
A new financially motivated campaign that commenced in December 2022 has seen the unidentified threat actor behind it deploying a novel ransomware strain dubbed MortalKombat and a clipper malware known as Laplas.
Cisco Talos said it "observed the actor scanning the internet for victim machines with an exposed remote desktop protocol (RDP) port 3389."
The attacks, per the cybersecurity company,
"
Autosummary:
"
City of Oakland issued a local state of emergency after recent ransomware attack
exploits
government
ransomware
2023-02-15
https://securityaffairs.com/142295/cyber-crime/city-of-oakland-emergency-ransomware.html
The City of Oakland has declared a local state of emergency due to the effect of the ransomware attack that hit the city on February 8, 2023. The City of Oakland disclosed last week a ransomware attack, the security breach began on February 8, 2023. In an abundance of caution, the City of Oakland has […]
The post City of Oakland issued a local state of emergency after recent ransomware attack appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, ransomware)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
TrickBot gang members sanctioned after pandemic ransomware attacks
exploits
ransomware
2023-02-15
https://www.malwarebytes.com/blog/news/2023/02/trickbot-gang-members-sanctioned-after-pandemic-ransomware-attacks
Categories: News Tags: Conti
Tags: ransomware
Tags: TrickBot
Tags: sanction
The US, in partnership with the UK, named individuals tied to TrickBot and shamed them with a sanction.
|
The post TrickBot gang members sanctioned after pandemic ransomware attacks appeared first on Malwarebytes Labs.
"
Autosummary:
Under Secretary of the Treasury for Terrorism and Financial Intelligence Brian E. Nelson said in a statement:
"Cybercriminals, particularly those based in Russia, seek to attack critical infrastructure, target US businesses, and exploit the international financial system."
According to the sanctions notice, in one attack the group deployed ransomware against three Minnesota medical facilities, disrupting their computer networks and telephones, and causing ambulances to divert.
In a collaborative partnership, officials in the United States and the United Kingdom unmasked and imposed financial sanctions against seven members of the notorious Russian gang TrickBot (alias "TrickLoader"), a mainstream banking Trojan turned malware-as-a-service (MaaS) platform for other criminals.
"
A CISOs Practical Guide to Storage and Backup Ransomware Resiliency
exploits
ransomware
2023-02-14
https://thehackernews.com/2023/02/a-cisos-practical-guide-to-storage-and.html
One thing is clear. The "business value" of data continues to grow, making it an organization"s primary piece of intellectual property.
From a cyber risk perspective, attacks on data are the most prominent threat to organizations.
Regulators, cyber insurance firms, and auditors are paying much closer attention to the integrity, resilience, and recoverability of organization data – as well as
"
Autosummary:
Source: CISO Point of View: The ever-changing role of data, and the implications for data protection & storage security (Continuity)
CISOs are concerned about the rise of ransomware – not only of the proliferation of attacks but also of their sophistication: "The storage and backup environments are now under attack, as the attackers realize that this is the single biggest determining factor to show if the company will pay the ransom," says George Eapen, Group CIO (and former CISO) at Petrofac,
John Meakin, former CISO at GlaxoSmithKline, BP, Standard Chartered, and Deutsche Bank believes that "As important as it may be, data encryption is hardly enough to protect an organization"s core data.
4 Steps to Success
Define comprehensive security baselines for all components of storage and backup systems (NIST Special Publication 800-209; Security Guidelines for Storage Infrastructure provides a comprehensive set of recommendations for the secure deployment, configuration, and operation of storage & backup systems) Use automation to reduce exposure to risk, and allow much more agility in adapting to changing priorities.
"
New ‘MortalKombat’ ransomware targets systems in the U.S.
exploits
ransomware
2023-02-14
https://www.bleepingcomputer.com/news/security/new-mortalkombat-ransomware-targets-systems-in-the-us/
Hackers conducting a new financially motivated campaign are using a variant of the Xortist commodity ransomware named "MortalKombat," together with the Laplas clipper in cyberattacks. [...]
"
Autosummary:
All file types targeted by the ransomware (Cisco)
"Talos observed that MortalKombat encrypts various files on the victim machine’s filesystem, such as system, application, database, backup, and virtual machine files, as well as files on the remote locations mapped as logical drives in the victim’s machine," describes the report.
"
CISA issues alert with South Korean government about DPRK"s ransomware antics
exploits
government
ransomware
industry
2023-02-13
https://www.malwarebytes.com/blog/news/2023/02/cisa-issues-alert-with-south-korean-government-about-dprks-ransomware-antics
Categories: News Categories: Ransomware Tags: CISA
Tags: ransomware
Tags: Democratic People’s Republic of Korea
Tags: DPRK
Tags: North Korea
Tags: WannaCry
Tags: EternalBlue
Tags: Lazarus Group
Tags: APT
Tags: Magniber
Tags: Magnitude exploit kit
Tags: exploit kit
Tags: EK
Tags: Andariel
Tags: Silent Chollima
Tags: Stonefly
Tags: Maui
Tags: H0lyGh0st
Tags: PLUTONIUM
Tags: Conti
The tactics of North Korean-sponsored ransomware cyberattacks against the healthcare sector and other vital infrastructure are highlighted in the latest #StopRansomware alert.
|
The post CISA issues alert with South Korean government about DPRK"s ransomware antics appeared first on Malwarebytes Labs.
"
Autosummary:
"
DPRK ransomware has significantly altered the face of ransomware, tuning it up from a simple locker and then making it more disruptive, lucrative, and, in some cases, destructive.
H0lyGh0st, like other current ransomware gangs, favors double-extortion tactics, maintains a leak site, and targets small and medium-sized enterprises (SMEs).Once it arrives on target networks, it encrypts servers responsible for record-keeping, diagnosing, imaging services, and others.
"North Korea"s cyber program poses a growing espionage, theft, and attack threat," the Annual Threat Assessment report in 2021 said.
"
The Israel Institute of Technology Technion suffered a ransomware attack
exploits
ransomware
2023-02-12
https://securityaffairs.com/142160/hacking/israeli-technion-suffered-ransomware-attack.html
The Technion – Israel Institute of Technology was breached on Sunday by a new anti-Israel threat actor calling itself DarkBit. Technion – Israel Institute of Technology is Israel’s top technology research university and a leading center for cyber security education. A new anti-Israel threat actor calling itself DarkBit is claiming responsibility for the ransomware attack that breached the […]
The post The Israel Institute of Technology Technion suffered a ransomware attack appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, Israel Institute of Technology Technion)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
New ESXiArgs Ransomware Variant Emerges After CISA Releases Decryptor Tool
exploits
ransomware
2023-02-11
https://thehackernews.com/2023/02/new-esxiargs-ransomware-variant-emerges.html
After the U.S. Cybersecurity and Infrastructure Security Agency (CISA) released a decryptor for affected victims to recover from ESXiArgs ransomware attacks, the threat actors have bounced back with an updated version that encrypts more data.
The emergence of the new variant was reported by a system administrator on an online forum, where another participant stated that files larger than 128MB
"
Autosummary:
A majority of the infections are located in France, the U.S., Germany, Canada, the U.K., the Netherlands, Finland, Turkey, Poland, and Taiwan.
"
Clop ransomware claims the hack of 130 orgs using GoAnywhere MFT flaw
exploits
ransomware
2023-02-11
https://securityaffairs.com/142130/cyber-crime/clop-ransomware-goanywhere-mft.html
The Clop ransomware group claims to have breached over 130 organizations exploiting the GoAnywhere MFT zero-day. The Clop ransomware group claims to have stolen sensitive data from over 130 organizations by exploiting a zero-day vulnerability (CVE-2023-0669) in Fortra’s GoAnywhere MFT secure file transfer tool, BleepingComputer reported. Fortra immediately addressed the flaw with the release of […]
The post Clop ransomware claims the hack of 130 orgs using GoAnywhere MFT flaw appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, Clop ransomware)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
U.K. and U.S. Sanction 7 Russians for TrickBot, Ryuk, and Conti Ransomware Attacks
exploits
ransomware
rusia-ucrania
2023-02-10
https://thehackernews.com/2023/02/uk-and-us-sanction-7-russians-for.html
In a first-of-its-kind coordinated action, the U.K. and U.S. governments on Thursday levied sanctions against seven Russian nationals for their affiliation to the TrickBot, Ryuk, and Conti cybercrime operation.
The individuals designated under sanctions are Vitaly Kovalev (aka Alex Konor, Bentley, or Bergen), Maksim Mikhailov (aka Baget), Valentin Karyagin (aka Globus), Mikhail Iskritskiy (aka
"
Autosummary:
The individuals designated under sanctions are Vitaly Kovalev (aka Alex Konor, Bentley, or Bergen), Maksim Mikhailov (aka Baget), Valentin Karyagin (aka Globus), Mikhail Iskritskiy (aka Tropa), Dmitry Pleshevskiy (aka Iseldor), Ivan Vakhromeyev (aka Mushroom), and Valery Sedletski (aka Strix).
"
Hogwarts Legacy game comes out as online debate continues
ransomware
2023-02-10
https://www.bbc.co.uk/news/entertainment-arts-64572328?at_medium=RSS&at_campaign=KARANGA
There have been calls for a boycott, but the big-budget game is expected to be a big seller.
"
Autosummary:
"
North Korean ransomware attacks on healthcare fund govt operations
exploits
ransomware
2023-02-10
https://www.bleepingcomputer.com/news/security/north-korean-ransomware-attacks-on-healthcare-fund-govt-operations/
A new cybersecurity advisory from the U.S. Cybersecurity & Infrastructure Security Agency (CISA) describes recently observed tactics, techniques, and procedures (TTPs) observed with North Korean ransomware operations against public health and other critical infrastructure sectors. [...]
"
Autosummary:
[1, 2], the U.S. agency notes that the "have also been observed using or possessing publicly available tools for encryption:"
BitLocker (abused of a legitimate tool)
Deadbolt
ech0raix
GonnaCry
Hidden Tear
Jigsaw
LockBit 2.0
My Little Ransomware
NxRansomware
Ryuk
YourRansom
To note, BleepingComputer is aware that more than half of these lockers are available from public sources but could not confirm this for all of them.
"
North Korea targets US, South Korean hospitals with ransomware to fund further cyber operations
exploits
ransomware
2023-02-10
https://www.helpnetsecurity.com/2023/02/10/north-korea-targets-us-south-korean-hospitals-with-ransomware-to-fund-further-cyber-operations/
US and South Korean agencies have issued a joint cybersecurity advisory describing the tactics, techniques and procedures used by North Korean hackers to deploy “state-sponsored” ransomware on hospitals and other organizations that can be considered part of the countries’ critical infrastructure. “The authoring agencies assess that an unspecified amount of revenue from these cryptocurrency operations supports DPRK national-level priorities and objectives, including cyber operations targeting the United States and South Korea governments—specific targets include Department … More →
The post North Korea targets US, South Korean hospitals with ransomware to fund further cyber operations appeared first on Help Net Security.
"
Autosummary:
They “purposely obfuscate their involvement by operating with or under third-party foreign affiliate identities and use third-party foreign intermediaries to receive ransom payments,” and “use virtual private networks (VPNs) and virtual private servers (VPSs) or third-country IP addresses to appear to be from innocuous locations instead of from the Democratic People’s Republic of Korea.”
"
North Korean Hackers Targeting Healthcare with Ransomware to Fund its Operations
exploits
ransomware
2023-02-10
https://thehackernews.com/2023/02/north-korean-hackers-targeting.html
State-backed hackers from North Korea are conducting ransomware attacks against healthcare and critical infrastructure facilities to fund illicit activities, U.S. and South Korean cybersecurity and intelligence agencies warned in a joint advisory.
The attacks, which demand cryptocurrency ransoms in exchange for recovering access to encrypted files, are designed to support North Korea"s
"
Autosummary:
"
Dallas Central Appraisal District paid $170,000 to ransomware attackers
exploits
ransomware
2023-02-10
https://www.bitdefender.com/blog/hotforsecurity/dallas-central-appraisal-district-paid-170-000-to-ransomware-attackers/
A Dallas state agency has admitted to paying $170,000 to hackers after it suffered an attack from the Royal ransomware group.
Read more in my article on the Hot for Security blog.
"
Autosummary:
As we reported late last year, the Royal ransomware group - which unusually does not follow the Ransomware-As-A-Service model and rejects affiliates - has launched numerous attacks, including against healthcare organisations and telecoms firm Intrado.
"
The Week in Ransomware - February 10th 2023 - Clop"s Back
exploits
ransomware
2023-02-10
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-february-10th-2023-clops-back/
From ongoing attacks targeting ESXi servers to sanctions on Conti/TrickBot members, it has been quite a busy week regarding ransomware. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include @LawrenceAbrams, @malwrhunterteam, @billtoulas, @demonslay335, @struppigel, @PolarToffee, @fwosar, @BleepinComputer, @Ionut_Ilascu, @serghei, @Seifreed, @jfslowik, @CISAgov, @LabsSentinel, @BushidoToken, @ASEC_Analysis, @pcrisk, @ValeryMarchive, and @BrettCallow.
February 8th 2023
New ESXiArgs ransomware attacks are now encrypting more extensive amounts of data, making it much harder, if not impossible, to recover encrypted VMware ESXi virtual machines.
"
City of Oakland systems offline after ransomware attack
exploits
government
ransomware
2023-02-10
https://www.bleepingcomputer.com/news/security/city-of-oakland-systems-offline-after-ransomware-attack/
The City of Oakland was hit by a ransomware attack on Wednesday night that forced it to take all systems offline until the network is secured and affected services are brought back online. [...]
"
Autosummary:
"
As Emsisoft shared in January, ransomware attacks have impacted more than 200 hundred larger organizations in the U.S. public sector in 2022 across government, educational, and healthcare verticals.
"
A10 Networks confirms data breach after Play ransomware attack
financial
exploits
ransomware
2023-02-10
https://www.bleepingcomputer.com/news/security/a10-networks-confirms-data-breach-after-play-ransomware-attack/
The California-based networking hardware manufacturer "A10 Networks" has confirmed to BleepingComputer that the Play ransomware gang briefly gained access to its IT infrastructure and compromised data. [...]
"
Autosummary:
"
Clop ransomware claims it breached 130 orgs using GoAnywhere zero-day
exploits
ransomware
2023-02-10
https://www.bleepingcomputer.com/news/security/clop-ransomware-claims-it-breached-130-orgs-using-goanywhere-zero-day/
The Clop ransomware gang claims to be behind recent attacks that exploited a zero-day vulnerability in the GoAnywhere MFT secure file transfer tool, saying they stole data from over 130 organizations. [...]
"
Autosummary:
Organizations that had their servers hacked by Clop include, among others, energy giant Shell, supermarket giant Kroger, cybersecurity firm Qualys, and multiple universities worldwide (e.g., Stanford Medicine, University of Colorado, University of Miami, University of Maryland Baltimore (UMB), and the University of California).
"
DPRK fund malicious cyber activities with ransomware attacks on critical Infrastructure
exploits
ransomware
2023-02-10
https://securityaffairs.com/142090/breaking-news/north-korea-hackers-ransomware.html
North Korea-linked APT groups conduct ransomware attacks against healthcare and critical infrastructure facilities to fund its activities. Ransomware attacks on critical infrastructure conducted by North Korea-linked hacker groups are used by the government of Pyongyang to fund its malicious cyber operations, U.S. and South Korean agencies warn. US CISA published a Cybersecurity Advisory (CSA) to […]
The post DPRK fund malicious cyber activities with ransomware attacks on critical Infrastructure appeared first on Security Affairs.
"
Autosummary:
Attackers used privately developed ransomware, such as Maui and H0lyGh0st along with other ransomware families, including BitLocker, Deadbolt, ech0raix, GonnaCry, Hidden Tear, Jigsaw, LockBit 2.0, My Little Ransomware, NxRansomware, Ryuk, and YourRansom [T1486].Attackers used privately developed ransomware, such as Maui and H0lyGh0st along with other ransomware families, including BitLocker, Deadbolt, ech0raix, GonnaCry, Hidden Tear, Jigsaw, LockBit 2.0, My Little Ransomware, NxRansomware, Ryuk, and YourRansom [T1486].
"
New ESXiArgs ransomware version prevents VMware ESXi recovery
exploits
ransomware
2023-02-09
https://www.bleepingcomputer.com/news/security/new-esxiargs-ransomware-version-prevents-vmware-esxi-recovery/
New ESXiArgs ransomware attacks are now encrypting more extensive amounts of data, making it much harder, if not impossible, to recover encrypted VMware ESXi virtual machines. [...]
"
Autosummary:
For even larger files, like a 450GB file, the amount of skipped data rises dramatically, with the size_step becoming "4607," now alternating between encrypting 1MB and skipping 4.49 GB of data.
"
U.S. and U.K. sanction TrickBot and Conti ransomware operation members
exploits
ransomware
2023-02-09
https://www.bleepingcomputer.com/news/security/us-and-uk-sanction-trickbot-and-conti-ransomware-operation-members/
The United States and the United Kingdom have sanctioned seven Russian individuals for their involvement in the TrickBot cybercrime group, whose malware was used to support attacks by the Conti and Ryuk ransomware operation. [...]
"
Autosummary:
This includes BlackCat, Royal Group, AvosLocker, Karakurt, LockBit, Silent Ransom, and DagonLocker.
As the malware became widely detected by security software, the developers launched new malware families, such as BazarBackdoor, Anchor, and BumbleBee, to provide more stealthy infection of targets.
"
AA23-040A: #StopRansomware: Ransomware Attacks on Critical Infrastructure Fund DPRK Malicious Cyber Activities
exploits
ransomware
2023-02-09
https://us-cert.cisa.gov/ncas/alerts/aa23-040a
Original release date: February 9, 2023
Summary
Note: This Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and various ransomware threat actors. These #StopRansomware advisories detail historically and recently observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn about other ransomware threats and no-cost resources.
The United States National Security Agency (NSA), the U.S. Federal Bureau of Investigation (FBI), the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the U.S. Department of Health and Human Services (HHS), the Republic of Korea (ROK) National Intelligence Service (NIS), and the ROK Defense Security Agency (DSA) (hereafter referred to as the “authoring agencies”) are issuing this joint Cybersecurity Advisory (CSA) to highlight ongoing ransomware activity against Healthcare and Public Health Sector organizations and other critical infrastructure sector entities.
This CSA provides an overview of Democratic People’s Republic of Korea (DPRK) state-sponsored ransomware and updates the July 6, 2022, joint CSA North Korean State-Sponsored Cyber Actors Use Maui Ransomware to Target the Healthcare and Public Health Sector. This advisory highlights TTPs and IOCs DPRK cyber actors used to gain access to and conduct ransomware attacks against Healthcare and Public Health (HPH) Sector organizations and other critical infrastructure sector entities, as well as DPRK cyber actors’ use of cryptocurrency to demand ransoms.
The authoring agencies assess that an unspecified amount of revenue from these cryp
"
Autosummary:
Actors have also been observed using or possessing publically available tools for encryption, such as BitLocker, Deadbolt, ech0raix, GonnaCry, Hidden Tear, Jigsaw, LockBit 2.0, My Little Ransomware, NxRansomware, Ryuk, and YourRansom [T1486].Actors have also been observed using or possessing publically available tools for encryption, such as BitLocker, Deadbolt, ech0raix, GonnaCry, Hidden Tear, Jigsaw, LockBit 2.0, My Little Ransomware, NxRansomware, Ryuk, and YourRansom [T1486].The United States National Security Agency (NSA), the U.S. Federal Bureau of Investigation (FBI), the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the U.S. Department of Health and Human Services (HHS), the Republic of Korea (ROK) National Intelligence Service (NIS), and the ROK Defense Security Agency (DSA) (hereafter referred to as the “authoring agencies”) are issuing this joint Cybersecurity Advisory (CSA) to highlight ongoing ransomware activity against Healthcare and Public Health Sector organizations and other critical infrastructure sector entities.This CSA provides an overview of Democratic People’s Republic of Korea (DPRK) state-sponsored ransomware and updates the July 6, 2022, joint CSA North Korean State-Sponsored Cyber Actors Use Maui Ransomware to Target the Healthcare and Public Health Sector.Actors procure infrastructure, IP addresses, and domains with cryptocurrency generated through illicit cybercrime, such as ransomware and cryptocurrency theft.
"
A new variant of ESXiArgs ransomware makes recovery much harder
exploits
ransomware
2023-02-09
https://securityaffairs.com/142035/malware/esxiargs-ransomware-new-variant.html
Experts warn of new ESXiArgs ransomware attacks using an upgraded version that makes it harder to recover VMware ESXi virtual machines. Experts spotted a new variant of ESXiArgs ransomware targeting VMware ESXi servers, authors have improved the encryption process, making it much harder to recover the encrypted virtual machines. The new variant was spotted less than a […]
The post A new variant of ESXiArgs ransomware makes recovery much harder appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, ESXiArgs ransomware)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Seven Russians sanctioned over ransomware cyber-crime
exploits
ransomware
rusia-ucrania
2023-02-09
https://www.bbc.co.uk/news/technology-64586361?at_medium=RSS&at_campaign=KARANGA
UK and US announce rare joint action against the men, including freezing their assets.
"
Autosummary:
"
Ryuk ransomware laundering leads to guilty plea
exploits
ransomware
2023-02-09
https://www.malwarebytes.com/blog/news/2023/02/ryuk-ransomware-laundering-leads-to-guilty-plea
Categories: News Tags: ryuk
Tags: ransomware
Tags: guilty
Tags: encrypt
Tags: ransom
Tags: cryptocurrency
Tags: bitcoin
We take a look at a guilty plea made in relation to Ryuk ransomware proceeds, and how you can best protect yourself from the threat of ransomware.
|
The post Ryuk ransomware laundering leads to guilty plea appeared first on Malwarebytes Labs.
"
Autosummary:
After receiving the ransom payments, the Ryuk actors, defendants, and others involved in the scheme engaged in various financial transactions, including international financial transactions, to conceal the nature, source, location, ownership, and control of the ransom proceeds.
From the indictment release:
The Ryuk actors used anonymous private wallets in their ransom notes, allowing them immediately to conceal the nature, location, source, ownership, and control of the ransom payments.
Malwarebytes Endpoint Detection and Response offers built-in ransomware protection, 72-hour ransomware rollback, and zero-day ransomware protection.
Whether we’re talking single, double, or even triple threat ransomware, the problem is very real.
"
CISA releases recovery script for ESXiArgs ransomware victims
exploits
ransomware
2023-02-08
https://www.bleepingcomputer.com/news/security/cisa-releases-recovery-script-for-esxiargs-ransomware-victims/
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released a script to recover VMware ESXi servers encrypted by the recent widespread ESXiArgs ransomware attacks. [...]
"
Autosummary:
"
While the GitHub project page has the steps you need to recover VMs, in summary, the script will clean up a virtual machine"s encrypted files and then attempt to rebuild the virtual machine"s .vmdk file using the unencrypted flat file.
"
Russian Hacker Pleads Guilty to Money Laundering Linked to Ryuk Ransomware
financial
exploits
ransomware
rusia-ucrania
2023-02-08
https://thehackernews.com/2023/02/russian-hacker-pleads-guilty-to-money.html
A Russian national on February 7, 2023, pleaded guilty in the U.S. to money laundering charges and for attempting to conceal the source of funds obtained in connection with Ryuk ransomware attacks.
Denis Mihaqlovic Dubnikov, 30, was arrested in Amsterdam in November 2021 before he was extradited from the Netherlands in August 2022. He is awaiting sentencing on April 11, 2023.
"Between at least
"
Autosummary:
"
US CISA releases a script to recover servers infected with ESXiArgs ransomware
exploits
ransomware
2023-02-08
https://securityaffairs.com/141948/malware/uc-cisa-script-esxiargs-ransomware.html
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) released a script to recover VMware ESXi servers infected with ESXiArgs ransomware. Good news for the victims of the recent wave of ESXiArgs ransomware attacks, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released a script to allow them to recover encrypted VMware ESXi servers. The […]
The post US CISA releases a script to recover servers infected with ESXiArgs ransomware appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, ESXiArgs ransomware)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
CISA releases ESXiArgs ransomware recovery script
exploits
ransomware
2023-02-08
https://www.helpnetsecurity.com/2023/02/08/esxiargs-ransomware-recovery/
According to the latest data, the number of ESXiArgs ransomware victims has surpassed 3,800, and CISA has published a recovery script for victim organizations. Fixing the mess The attacks started late last week and are still ongoing. Investigations point to a new family of ransomware dubbed ESXiArgs by the researchers – though, according to Paul Ducklin, Sophos Head of Technology for the Asia Pacific region, it should be just Args, as it’s a Linux program … More →
The post CISA releases ESXiArgs ransomware recovery script appeared first on Help Net Security.
"
Autosummary:
The malware attempts to kill off running virtual machines, export an ESXi filesystem volume list, find important VMWare files for each volume, and call a general-purpose file scrambling tool for each file found, Ducklin explained.
"
Lessons Learned on Ransomware Prevention from the Rackspace Attack
exploits
ransomware
2023-02-08
https://www.bleepingcomputer.com/news/security/lessons-learned-on-ransomware-prevention-from-the-rackspace-attack/
The ransomware attack on Rackspace has taught us the importance of good cybersecurity habits. Let"s see what we can learn from the attack and how organizations can protect themselves. [...]
"
Autosummary:
Specops: Password Policy
Block words common to your organization with custom dictionaries
Prevent the use of 3+ billion compromised passwords with Breached Password Protection
Find and remove compromised passwords in your environment
Real-time, dynamic feedback at password change
Block usernames, display names, specific words, consecutive characters, incremental passwords, and reuse a part of the current password
Granular, GPO-driven targeting for any GPO level, computer, user, or group population
Protecting against ransomware
Ransomware is a growing concern for organizations worldwide, as the fallout and consequences of suffering a ransomware attack are usually severe.
Let"s look at the following strategies for preventing the domino effect of a ransomware attack:
Patching
Securing remote access systems
Strengthen password security
Patching
Patching is a vital aspect of preventing a ransomware attack.
As a result, protecting against ransomware attacks and the fallout requires organizations to have a multi-pronged approach to strengthen their security, including patching, securing remote access, and increasing password security.
"
AA23-039A: ESXiArgs Ransomware Virtual Machine Recovery Guidance
exploits
ransomware
2023-02-08
https://us-cert.cisa.gov/ncas/alerts/aa23-039a
Original release date: February 8, 2023
Summary
The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) are releasing this joint Cybersecurity Advisory (CSA) in response to the ongoing ransomware campaign, known as “ESXiArgs.” Malicious actors may be exploiting known vulnerabilities in VMware ESXi servers that are likely running unpatched and out-of-service or out-of-date versions of VMware ESXi software to gain access and deploy ransomware. The ESXiArgs ransomware encrypts configuration files on ESXi servers, potentially rendering virtual machines (VMs) unusable.
CISA has released an ESXiArgs recovery script at github.com/cisagov/ESXiArgs-Recover. Organizations that have fallen victim to ESXiArgs ransomware can use this script to attempt to recover their files. This CSA provides guidance on how to use the script.
ESXiArgs actors have compromised over 3,800 servers globally. CISA and FBI encourage all organizations managing VMware ESXi servers to:
- Update servers to the latest version of VMware ESXi software,
- Harden ESXi hypervisors by disabling the Service Location Protocol (SLP) service, and
- Ensure the ESXi hypervisor is not exposed to the public internet.
If malicious actors have compromised your organization with ESXiArgs ransomware, CISA and FBI recommend following the script and guidance provided in this CSA to attempt to recover access to your files.
Download the PDF version of this report: pdf, 712 kb.
Note: CISA and FBI will update this CSA as more information becomes available.
Technical Details
Open-source reporting indicates that malicious actors are exploiting known vulnerabilities in VM
"
Autosummary:
The full list of file extensions encrypted by the malware is: vmdk , vmx , vmxf , vmsd , vmsn , vswp , vmss , nvram , vmem .
See the joint CSA from the cybersecurity authorities of Australia, Canada, New Zealand, the United Kingdom, and the United States on Technical Approaches to Uncovering and Remediating Malicious Activity for additional guidance on hunting or investigating a network, and for common mistakes in incident handling.
Organizations should also collect and review artifacts, such as running processes/services, unusual authentications, and recent network connections.CISA and FBI encourage all organizations managing VMware ESXi servers to:
The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) are releasing this joint Cybersecurity Advisory (CSA) in response to the ongoing ransomware campaign, known as “ESXiArgs.”Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities.
"
Russian national pleads guilty to money laundering linked to Ryuk Ransomware operation
financial
exploits
ransomware
rusia-ucrania
2023-02-08
https://securityaffairs.com/141980/cyber-crime/russian-national-pleads-guilty-money-laundering-ryuk-ransomware.html
A Russian national pleaded guilty in the U.S. to money laundering charges linked to the Ryuk ransomware operation. On February 7, 2023, Russian national Denis Mihaqlovic Dubnikov (30) pleaded guilty in the U.S. to one count of conspiracy to commit money laundering for the Ryuk ransomware operation. Denis Mihaqlovic Dubnikov, 30, was arrested in Amsterdam in November […]
The post Russian national pleads guilty to money laundering linked to Ryuk Ransomware operation appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, Ryuk ransomware)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
ION starts bringing customers back online after LockBit ransomware attack
exploits
ransomware
2023-02-08
https://www.malwarebytes.com/blog/news/2023/02/ion-starts-bringing-customers-back-online-after-lockbit-ransomware-attack
Categories: News Categories: Ransomware Tags: LockBit
Tags: ransomware
Tags: LockBit ransomware group
Tags: FBI
Tags: Todd Conklin
Tags: Financial Conduct Authority
Tags: FCA
Tags:
Tags: Prudential Regulation Authority
Tags: PRA
Tags: Tom Kellermann
Tags: Joseph Schifano
Pernicious ransomware group, LockBit, is making headlines again. Less than a month after attacking HACLA, it hit the derivatives trading division of ION Group, a financial software company.
|
The post ION starts bringing customers back online after LockBit ransomware attack appeared first on Malwarebytes Labs.
"
Autosummary:
The ION Group leak site post (Source: Malwarebytes)
On Friday, February 4, the ransomware group claimed the ransom had been paid, with Reuters quoting the attackers as saying the money was paid by a "very rich unknown philanthropist".
Malwarebytes Endpoint Detection and Response offers built-in ransomware protection, 72-hour ransomware rollback, and zero-day ransomware protection.
The subsidiary, ION Cleared Derivatives, which offers software for automating the trading cycle and the clearing process for derivatives, released a very short statement regarding the "cybersecurity event" on Tuesday.
"
Clop ransomware flaw allowed Linux victims to recover files for months
exploits
ransomware
2023-02-07
https://www.bleepingcomputer.com/news/security/clop-ransomware-flaw-allowed-linux-victims-to-recover-files-for-months/
The Clop ransomware gang is now also using a malware variant that explicitly targets Linux servers, but a flaw in the encryption scheme has allowed victims to quietly recover their files for free for months. [...]
"
Autosummary:
The files and folders it targets include the user"s "/home" directory, which contains all personal files, the "/root" directory, "/opt," and Oracle directories ("/u01" - "/u04") used for storing database files or as mount points for Oracle software.
"
LockBit ransomware gang claims Royal Mail cyberattack
exploits
ransomware
ciber
2023-02-07
https://www.bleepingcomputer.com/news/security/lockbit-ransomware-gang-claims-royal-mail-cyberattack/
The LockBit ransomware operation has claimed the cyberattack on UK"s leading mail delivery service Royal Mail that forced the company to halt its international shipping services due to "severe service disruption." [...]
"
Autosummary:
Royal Mail entry on LockBit"s data leak site (BleepingComputer)
Attack described as a "cyber incident"
Royal Mail first detected the attack on January 10 and hired outside forensic experts to help with the investigation.
"
Released: Decryptor for Cl0p ransomware’s Linux variant
exploits
ransomware
2023-02-07
https://www.helpnetsecurity.com/2023/02/07/cl0p-ransomware-decryptor-linux/
Flawed encryption logic used in Cl0p (Clop) ransomware’s Linux (ELF) variant has allowed SentinelOne researchers to create and release a free decryptor. “The [Cl0p] Windows variant encrypts the generated RC4 key responsible for the file encryption using the asymmetric algorithm RSA and a public key. In the Linux variant, the generated RC4 key is encrypted with a RC4 [hardcoded] ‘master-key’,” the researchers explained. The differences between Windows and Linux variants The Linux Cl0p variant is … More →
The post Released: Decryptor for Cl0p ransomware’s Linux variant appeared first on Help Net Security.
"
Autosummary:
“While the Linux-flavored variation of Cl0p is, at this time, in its infancy, its development and the almost ubiquitous use of Linux in servers and cloud workloads suggests that defenders should expect to see more Linux-targeted ransomware campaigns going forward.”
"
Linux Variant of Clop Ransomware Spotted, But Uses Faulty Encryption Algorithm
exploits
ransomware
2023-02-07
https://thehackernews.com/2023/02/linux-variant-of-clop-ransomware.html
The first-ever Linux variant of the Clop ransomware has been detected in the wild, but with a faulty encryption algorithm that has made it possible to reverse engineer the process.
"The ELF executable contains a flawed encryption algorithm making it possible to decrypt locked files without paying the ransom," SentinelOne researcher Antonis Terefos said in a report shared with The Hacker News.
"
Autosummary:
"
VMware Finds No Evidence of 0-Day in Ongoing ESXiArgs Ransomware Spree
exploits
ransomware
2023-02-07
https://thehackernews.com/2023/02/vmware-finds-no-evidence-of-0-day-flaw.html
VMware on Monday said it found no evidence that threat actors are leveraging an unknown security flaw, i.e., a zero-day, in its software as part of an ongoing ransomware attack spree worldwide.
"Most reports state that End of General Support (EoGS) and/or significantly out-of-date products are being targeted with known vulnerabilities which were previously addressed and disclosed in VMware
"
Autosummary:
"
Russian man pleads guilty to laundering Ryuk ransomware money
financial
exploits
ransomware
rusia-ucrania
2023-02-07
https://www.bleepingcomputer.com/news/security/russian-man-pleads-guilty-to-laundering-ryuk-ransomware-money/
Russian citizen Denis Mihaqlovic Dubnikov pleaded guilty on Tuesday to laundering money for the notorious Ryuk ransomware group for over three years. [...]
"
Autosummary:
The conspirators, including Dubnikov, used various financial transactions, including international ones, to hide the origin, location, and identity of those who received the ransom payments.
"
Medusa botnet returns as a Mirai-based variant with ransomware sting
exploits
ransomware
2023-02-07
https://www.bleepingcomputer.com/news/security/medusa-botnet-returns-as-a-mirai-based-variant-with-ransomware-sting/
A new version of the Medusa DDoS (distributed denial of service) botnet, based on Mirai code, has appeared in the wild, featuring a ransomware module and a Telnet brute-forcer. [...]
"
Autosummary:
Filetypes targeted by Medusa (Cyble)
Valid files are encrypted using AES 256-bit encryption, and the .medusastealer extension is appended to the encrypted files" name
The malware"s ransomware function (Cyble)
However, the encryption method appears broken, turning the ransomware into a data wiper.
"
VMware has no evidence of zero-day exploitation in ESXiArgs ransomware attacks
exploits
ransomware
2023-02-07
https://securityaffairs.com/141920/hacking/vmware-zero-day-esxiargs-ransomware.html
VMware said there is no evidence that threat actors are exploiting a zero-day flaw in its software as part of an ongoing ESXiArgs ransomware campaign. VMware said that it found no evidence that the threat actors behind the ongoing ESXiArgs ransomware attacks are leveraging a zero-day vulnerability in VMware ESXi servers. “VMware has not found evidence […]
The post VMware has no evidence of zero-day exploitation in ESXiArgs ransomware attacks appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, VMware)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
New Linux variant of Clop Ransomware uses a flawed encryption algorithm
exploits
ransomware
2023-02-07
https://securityaffairs.com/141932/cyber-crime/clop-ransomware-linux-variant.html
A new Linux variant of the Clop ransomware has been observed in the wild, the good news is that its encryption algorithm is flawed. SentinelLabs researchers have observed the first Linux variant of the Clop ransomware. The researchers noticed that the encryption algorithm implemented in the ELF executable is flawed and can allow victims to […]
The post New Linux variant of Clop Ransomware uses a flawed encryption algorithm appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, ransomware)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Nevada Ransomware has released upgraded locker
exploits
ransomware
2023-02-06
https://www.helpnetsecurity.com/2023/02/06/nevada-ransomware-upgraded-locker/
Resecurity has identified a new version of Nevada Ransomware which recently emerged on the Dark Web right before the start of 2023. The actors behind this new project have an affiliate platform first introduced on the RAMP underground community, which is known for initial access brokers (IABs) and other cybercriminal actors and ransomware groups. Around February 1, 2023 – the group distributed an updated locker written in Rust for their affiliates supporting Windows, Linux and … More →
The post Nevada Ransomware has released upgraded locker appeared first on Help Net Security.
"
Autosummary:
Around February 1, 2023 – the group distributed an updated locker written in Rust for their affiliates supporting Windows, Linux and ESXi – this programming language has become a trend for ransomware developers these days (Blackcat, RansomExx2, Hive, Luna, Agenda).
"
Italian National Cybersecurity Agency (ACN) warns of massive ransomware campaign targeting VMware ESXi servers
exploits
ransomware
ciber
2023-02-06
https://securityaffairs.com/141865/cyber-crime/acn-ransomware-campaign-targets-vmware-esxi.html
The Italian National Cybersecurity Agency (ACN) warns of an ongoing massive ransomware campaign targeting VMware ESXi servers. The Italian National Cybersecurity Agency (ACN) warns of an ongoing massive ransomware campaign targeting VMware ESXi servers worldwide, including Italian systems. The attackers are attempting to exploit the CVE-2021–21974 vulnerability. According to the ACN, most of the attacks […]
The post Italian National Cybersecurity Agency (ACN) warns of massive ransomware campaign targeting VMware ESXi servers appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, CVE-2021–21974)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share OnThe vulnerability affects the following systems:
ESXi 7.x versions earlier than ESXi70U1c-17325551
ESXi versions 6.7.x earlier than ESXi670-202102401-SG
ESXi versions 6.5.x earlier than ESXi650-202102101-SG
The virtualization giant addressed the CVE-2021-21974 bug in February 2021.
"
Thousands of unpatched VMware ESXi servers hit by ransomware via old bug (CVE-2021-21974)
exploits
ransomware
2023-02-06
https://www.helpnetsecurity.com/2023/02/06/vmware-esxi-ransomware-cve-2021-21974/
Late last week, unknown attackers launched a widespread ransomware attack hitting VMware ESXi hypervisors via CVE-2021-21974, an easily exploitable vulnerability that allows them to run exploit code remotely, without prior authentication. Patches for CVE-2021-21974, a vulnerability in ESXi’s OpenSLP service, have been provided by VMware two years ago, and this attack has revealed just how many servers are out there are still unpatched, with the SLP service still running and the OpenSLP port (427) still … More →
The post Thousands of unpatched VMware ESXi servers hit by ransomware via old bug (CVE-2021-21974) appeared first on Help Net Security.
"
Autosummary:
After some initial speculation about the ransomware the attackers use to encrypt vulnerable servers, it has been confirmed that it’s a new ransomware family that has been dubbed ESXiArgs due to the targeted systems and the extension (.args) added to the encrypted virtual machines files (files with the .vmdk, .vmx, .vmxf, .vmsd, .vmsn, .vswp, .vmss, .nvram, and .vmem extensions).
"
Royal Ransomware adds support for encrypting Linux, VMware ESXi systems
exploits
ransomware
2023-02-06
https://securityaffairs.com/141876/cyber-crime/royal-ransomware-vmware-esxi.html
Royal Ransomware operators added support for encrypting Linux devices and target VMware ESXi virtual machines. The Royal Ransomware gang is the latest extortion group in order of time to add support for encrypting Linux devices and target VMware ESXi virtual machines. Other ransomware operators already support Linux encrypting, including AvosLocker, Black Basta, BlackMatter, HelloKitty, Hive, […]
The post Royal Ransomware adds support for encrypting Linux, VMware ESXi systems appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, Ransomware)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Italy, France and Singapore Warn of a Spike in ESXI Ransomware
exploits
ransomware
2023-02-06
https://securityaffairs.com/141889/cyber-crime/experts-warn-esxi-ransomware-attacks.html
ESXi ransomware targeted thousands of VMware servers in a global-scale campaign, security experts and international CERTs warn. Thousands of computer servers have been targeted by a global ransomware hacking attack targeting VMware (VMW.N) ESXi servers. ESXi is VMware’s hypervisor, a technology that allows organizations to host several virtualized computers running multiple operating systems on a […]
The post Italy, France and Singapore Warn of a Spike in ESXI Ransomware appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, ESXi ransomware)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Two year old vulnerability used in ransomware attack against VMware ESXi
exploits
ransomware
2023-02-06
https://www.malwarebytes.com/blog/news/2023/02/two-year-old-vulnerability-used-in-ransomware-attack-against-vmware-esxi
Categories: Exploits and vulnerabilities Categories: News Categories: Ransomware Tags: VMware
Tags: ESXi
Tags: Nevada
Tags: ransomware
Tags: Linux
Tags: CVE-2021-21974
Over the weekend, several CERTs warned about ongoing ransomware attacks against unpatched VMware ESXi virtual machines.
|
The post Two year old vulnerability used in ransomware attack against VMware ESXi appeared first on Malwarebytes Labs.
"
Autosummary:
The fixed versions are:
For ESXi 7.0: ESXi70U1c-17325551 or later
For ESXi 6.7: ESXi670-202102401-SG or later
For ESXi 6.5: ESXi650-202102101-SG or later
For Cloud Foundation (ESXi) 4.x: 4.2 or later
For Cloud Foundation (ESXi) 3.x: please refer to VMware KB82705
A recommended workaround if you are not using the OpenSLP service in ESXi is to disable the SLP service on VMware ESXi.The threat actor runs an encryption process which is specifically targeting virtual machines files (“.vmdk”, “.vmx”, “.vmxf”, “.vmsd”, “.vmsn”, “.vswp”, “.vmss”, “.nvram”,”*.vmem”).
"
Linux version of Royal Ransomware targets VMware ESXi servers
exploits
ransomware
2023-02-05
https://www.bleepingcomputer.com/news/security/linux-version-of-royal-ransomware-targets-vmware-esxi-servers/
Royal Ransomware is the latest ransomware operation to add support for encrypting Linux devices to its most recent malware variants, specifically targeting VMware ESXi virtual machines. [...]
"
Autosummary:
BleepingComputer has been reporting on similar Linux ransomware encryptors released by multiple other gangs, including Black Basta, LockBit, BlackMatter, AvosLocker, REvil, HelloKitty, RansomEXX, and Hive.
"
The Week in Ransomware - February 3rd 2023 - Ending with a mess
exploits
ransomware
2023-02-04
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-february-3rd-2023-ending-with-a-mess/
While the week started slowly, it turned into a big ransomware mess, with attacks striking a big blow at businesses running VMware ESXi servers. [...]
"
Autosummary:
Finally, we learned more about ransomware attacks conducted this week and in the past, including:
Contributors and those who provided new ransomware information and stories this week include @PolarToffee, @serghei, @fwosar, @BleepinComputer, @LawrenceAbrams, @Seifreed, @Ionut_Ilascu, @malwrhunterteam, @struppigel, @demonslay335, @billtoulas, @vxunderground, @GeeksCyber, @PRODAFT, @brkalbyrk7, @RESecurity, @MsftSecIntel, @1ZRR4H, @pcrisk, @BrettCallow, @ahnlab, @jgreigj, and @k7computing.
February 2nd 2023
The LockBit ransomware gang has claimed responsibility for the cyberattack on ION Group, a UK-based software company whose products are used by financial institutions, banks, and corporations for trading, investment management, and market analytics.
"
New Wave of Ransomware Attacks Exploiting VMware Bug to Target ESXi Servers
exploits
ransomware
2023-02-04
https://thehackernews.com/2023/02/new-wave-of-ransomware-attacks.html
VMware ESXi hypervisors are the target of a new wave of attacks designed to deploy ransomware on compromised systems.
"These attack campaigns appear to exploit CVE-2021-21974, for which a patch has been available since February 23, 2021," the Computer Emergency Response Team (CERT) of France said in an advisory on Friday.
VMware, in its own alert released at the time, described the issue as an
"
Autosummary:
"
CERT-FR warns of a new wave of ransomware attacks targeting VMware ESXi servers
exploits
ransomware
2023-02-04
https://securityaffairs.com/141804/cyber-crime/vmware-esxi-ransomware.html
A new wave of ransomware attacks is targeting VMware ESXi servers to deliver ransomware, CERT of France warns. The French Computer Emergency Response Team (CERT-FR) warns that threat actors are targeting VMware ESXi servers to deploy ransomware. CERT-FR reported that threat actors behind these ransomware attackers are actively exploiting the vulnerability CVE-2021-21974. “OpenSLP as used […]
The post CERT-FR warns of a new wave of ransomware attacks targeting VMware ESXi servers appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, VMware ESXi servers)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide
exploits
ransomware
2023-02-03
https://www.bleepingcomputer.com/news/security/massive-esxiargs-ransomware-attack-targets-vmware-esxi-servers-worldwide/
Admins, hosting providers, and the French Computer Emergency Response Team (CERT-FR) warn that attackers actively target VMware ESXi servers unpatched against a two-year-old remote code execution vulnerability to deploy ransomware. [...]
"
Autosummary:
Compromised ESXi servers worldwide (Shodan)
New ESXiArgs ransomware
However, from the ransom notes seen in this attack, they do not appear to be related to the Nevada Ransomware, and appear to be from a new ransomware family.
"
The rise of multi-threat ransomware
exploits
ransomware
2023-02-03
https://www.malwarebytes.com/blog/news/2023/02/the-rise-of-multi-threat-ransomware
Categories: News Tags: ransomware
Tags: malwarebytes
Tags: youtube
Tags: video
Tags: multi-threat
Tags: single threat
Tags: double threat
Tags: triple threat
Tags: encrypt
Tags: extortion
Take a look at our ten minute video walkthrough of ransomware issues and concerns.
|
The post The rise of multi-threat ransomware appeared first on Malwarebytes Labs.
"
Autosummary:
"
Nevada Ransomware Has Released Upgraded Locker
exploits
ransomware
2023-02-01
https://securityaffairs.com/141668/cyber-crime/nevada-ransomware-upgraded-locker.html
Researchers from Resecurity have identified a new version of Nevada Ransomware which recently emerged on the Dark Web right before the start of 2023. Resecurity, California-based cybersecurity company protecting Fortune 500 globally, has identified a new version of Nevada Ransomware which recently emerged on the Dark Web right before the start of 2023. The actors […]
The post <strong>Nevada Ransomware Has Released Upgraded Locker</strong> appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, Nevada Ransomware)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
New LockBit Green ransomware variant borrows code from Conti ransomware
exploits
ransomware
2023-02-01
https://securityaffairs.com/141666/cyber-crime/lockbit-green-ransomware-variant.html
Lockbit ransomware operators have released a new version of their malware, LockBit Green, that also targets cloud-based services. Lockbit ransomware operators have implemented a new version of their malware, dubbed LockBit Green, which was designed to include cloud-based services among its targets. This is the third version of the ransomware developed by the notorious gang, […]
The post New LockBit Green ransomware variant borrows code from Conti ransomware appeared first on Security Affairs.
"
Autosummary:
The hashes and YARA rule can be found here: 👉https://t.co/0A9waHAwZj#lockbit #ransomware — PRODAFT (@PRODAFT) January 30, 2023
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, LockBit green)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Arnold Clark customer data stolen in attack claimed by Play ransomware
exploits
ransomware
2023-02-01
https://www.bleepingcomputer.com/news/security/arnold-clark-customer-data-stolen-in-attack-claimed-by-play-ransomware/
Arnold Clark, self-described as Europe"s largest independent car retailer, is notifying some customers that their personal information has been stolen in a December 23 cyberattack claimed by the Play ransomware group. [...]
"
Autosummary:
"
LockBit ransomware goes "Green," uses new Conti-based encryptor
exploits
ransomware
2023-02-01
https://www.bleepingcomputer.com/news/security/lockbit-ransomware-goes-green-uses-new-conti-based-encryptor/
The LockBit ransomware gang has again started using encryptors based on other operations, this time switching to one based on the leaked source code for the Conti ransomware. [...]
"
Autosummary:
This week, cybersecurity collective VX-Underground first reported that the ransomware gang is now using a new encryptor named "LockBit Green," based on the leaked source code of the now-disbanded Conti gang.
"
New Nevada Ransomware targets Windows and VMware ESXi systems
exploits
ransomware
2023-02-01
https://www.bleepingcomputer.com/news/security/new-nevada-ransomware-targets-windows-and-vmware-esxi-systems/
A relatively new ransomware operation known as Nevada seems to grow its capabilities quickly as security researchers noticed improved functionality for the locker targeting Windows and VMware ESXi systems. [...]
"
Autosummary:
Targeting Windows hosts
The Nevada ransomware variant that focuses on Windows machines is executed via console and supports a set of flags that give its operators some control over the encryption:
-file > encrypt selected file
-dir > encrypt selected directory
-sd > self delete after everything done
-sc > delete shadow copies
-lhd > load hidden drives
-nd > find and encrypt network shares
-sm > safe mode encryption
One interesting characteristic of Nevada ransomware is the set of system locales it spares from the encryption process.
"
Microsoft: Over 100 threat actors deploy ransomware in attacks
exploits
ransomware
2023-01-31
https://www.bleepingcomputer.com/news/security/microsoft-over-100-threat-actors-deploy-ransomware-in-attacks/
Microsoft revealed today that its security teams are tracking more than 100 threat actors deploying ransomware during attacks. [...]
"
Autosummary:
"Some of the most prominent ransomware payloads in recent campaigns include Lockbit Black, BlackCat (aka ALPHV), Play, Vice Society, Black Basta, & Royal," Microsoft said.
"
UNC2565 threat actors continue to improve the GOOTLOADER malware
exploits
ransomware
2023-01-30
https://securityaffairs.com/141539/malware/gootloader-malware-evolution.html
The threat actors behind the GOOTLOADER malware continues to improve their code by adding new components and implementing new obfuscation techniques. Mandiant researchers reported that the UNC2565 group behind the GOOTLOADER malware (aka Gootkit) continues to improve their code by adding new components and implementing new obfuscation techniques. Gootkit runs on an access-a-as-a-service model, it is used […]
The post UNC2565 threat actors continue to improve the GOOTLOADER malware appeared first on Security Affairs.
"
Autosummary:
“This new variant has been observed trojanizing several legitimate JavaScript libraries, including jQuery, Chroma.js, and Underscore.js”
Upon successful execution of the GOOTLOADER file, additional payloads are downloaded, including FONELAUNCH and Cobalt Strike BEACON or SNOWCONE that will be stored in the registry.Payload (See Infection Chain) GOOTLOADER GOOTLOADER GOOTLOADER.POWERSHELL
“Beginning in November 2022, Managed Defense observed a new obfuscation variant, tracked as variant 3, with modified infection that is more complex than the previous variants.
Mandiant researchers observed the UNC2565 group adopting three obfuscation techniques, such as hiding the code within altered versions of legitimate JavaScript libraries such as jQuery, Chroma.js, and Underscore.js, in an attempt to evade detection.
"
Gootkit Malware Continues to Evolve with New Components and Obfuscations
exploits
ransomware
2023-01-29
https://thehackernews.com/2023/01/gootkit-malware-continues-to-evolve.html
The threat actors associated with the Gootkit malware have made "notable changes" to their toolset, adding new components and obfuscations to their infection chains.
Google-owned Mandiant is monitoring the activity cluster under the moniker UNC2565, noting that the usage of the malware is "exclusive to this group."
Gootkit, also called Gootloader, is spread through compromised websites that
"
Autosummary:
"
The Week in Ransomware - January 27th 2023 - "We hacked the hackers"
exploits
ransomware
2023-01-28
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-january-27th-2023-we-hacked-the-hackers/
For the most part, this week has been relatively quiet regarding ransomware attacks and researcher — that is, until the FBI announced the disruption of the Hive ransomware operation. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include: @PolarToffee, @demonslay335, @LawrenceAbrams, @malwrhunterteam, @BleepinComputer, @Ionut_Ilascu, @Seifreed, @serghei, @struppigel, @billtoulas, @fwosar, @TrendMicro, @pcrisk, @1ZRR4H, @wdormann, and @ffforward.
"
Hive! Hive! Hive! Ransomware site submerged by FBI
exploits
ransomware
2023-01-28
https://www.malwarebytes.com/blog/news/2023/01/hive-ransomware-infrastructure-taken-down
Categories: News Categories: Ransomware Tags: DoJ
Tags: FBI
Tags: Europol
Tags: HIve
Tags: ransomware
Tags: RDP
Tags: Patch management
Tags: Vulnerability
Tags: phishing
The DoJ, FBI, and Europol have released details about a months-long international disruption campaign against the Hive ransomware group
|
The post Hive! Hive! Hive! Ransomware site submerged by FBI appeared first on Malwarebytes Labs.
"
Autosummary:
Known attacks by ransomware gangs, based on data leaked since April 2022
In August 2021, the FBI published a warning about Hive ransomware, sharing tactics, techniques, and procedures (TTPs), indicators of compromise (IOCs), and mitigation advice.
"
Copycat Criminals mimicking Lockbit gang in northern Europe
ransomware
2023-01-28
https://securityaffairs.com/141491/cyber-crime/crooks-mimicking-lockbit-gang.html
Recent reports of Lockbit locker-based attacks against North European SMBs indicate that local crooks started using Lockbit locker variants. Executive Summary Incident Insights Recently, there has been a significant increase in ransomware attacks targeting companies in northern Europe. These attacks are being carried out using the LockBit locker, which is known to be in use […]
The post Copycat Criminals mimicking Lockbit gang in northern Europe appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, Lockbit)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Open source skills continue to be in high demand
ransomware
2023-01-27
https://www.helpnetsecurity.com/2023/01/27/open-source-skills/
80% of organizations increased their use of open source software over the last 12 months, according to Perforce Software and the Open Source Initiative. Four out of five companies rely on OSS for a wide range of business-critical applications including data and database management, containers and container orchestration, and DevOps and SDLC tooling. The report reveals, however, that some obstacles persist. In every technology category surveyed, organizations repeatedly cited lack of personnel with expertise as … More →
The post Open source skills continue to be in high demand appeared first on Help Net Security.
"
Autosummary:
“Clearly, more technical support is needed for open source technologies, as personnel experience and proficiency is highly ranked again this year as a support concern across organizations regardless of size,” said Javier Perez, Chief OSS Evangelist at Perforce Software.
"
BlackCat Ransomware gang stole secret military data from an industrial explosives manufacturer
exploits
ransomware
industry
2023-01-27
https://securityaffairs.com/141409/data-breach/blackcat-ransomware-solar-industries-india.html
The BlackCat Ransomware group claims to have hacked SOLAR INDUSTRIES INDIA and to have stolen 2TB of “secret military data.” The BlackCat Ransomware gang added SOLAR INDUSTRIES INDIA to the list of victims published on its Tor leak site. The company is a globally recognised industrial explosives manufacturer, it provides complete blasting solutions, including packaged, […]
The post BlackCat Ransomware gang stole secret military data from an industrial explosives manufacturer appeared first on Security Affairs.
"
Autosummary:
"
Smashing Security podcast #306: No Fly lists, cell phones, and the end of ransomware riches?
exploits
ransomware
2023-01-26
https://grahamcluley.com/smashing-security-podcast-306/
What are prisoners getting up to with mobile phones? Why might ransomware no longer be generating as much revenue for cybercriminals? And how on earth did an airline leave the US government"s "No Fly" list accessible for anyone in the world to download?
All this and much more is discussed in the latest edition of the award-winning "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Maria Varmazis.
"
Autosummary:
Hosts:
Graham Cluley – @gcluley
Carole Theriault – @caroletheriault
Guest:
Maria Varmazis – @mvarmazis
Episode links:
Sponsored by:
Bitwarden – Bitwarden vaults are end-to-end encrypted with zero-knowledge encryption, including, the URLs for the websites you have accounts for.
"
Hive ransomware disrupted after FBI hacks gang"s systems
exploits
ransomware
2023-01-26
https://www.bleepingcomputer.com/news/security/hive-ransomware-disrupted-after-fbi-hacks-gangs-systems/
Today, the Hive ransomware Tor payment and data leak sites were seized as part of an international law enforcement operation involving the US Department of Justice, FBI, Secret Service, Europol, and Germany"s BKA and Polizei. [...]
"
Autosummary:
The ransomware gang"s Tor web sites now display a seizure notice listing a a wide range of other countries involved in the law enforcement operation, including Germany, Canda, France, Lithuania, Netherlands, Norway, Portugal, Romania, Spain, Sweden, and the United Kingdom.
"
Hive ransomware leak site and decryption keys seized in police sting
exploits
ransomware
2023-01-26
https://grahamcluley.com/hive-ransomware-leak-site-seized-in-police-sting/
Websites used by the Hive ransomware-as-a-service gang to extort ransoms and leak data stolen from corporate victims have been seized in a joint operation involving police around the world.
"
Autosummary:
"
Authorities shut down HIVE ransomware infrastructure, provide decryption tools
exploits
ransomware
2023-01-26
https://www.helpnetsecurity.com/2023/01/26/hive-ransomware-shut-down/
Europol supported the German, Dutch and US authorities in taking down the infrastructure of the prolific HIVE ransomware. This international operation involved authorities from 13 countries in total. Law enforcement identified the decryption keys and shared them with many victims, helping them regain access to their data without paying the cybercriminals. In the last year, HIVE ransomware has been identified as a major threat as it has been used to compromise and encrypt the data … More →
The post Authorities shut down HIVE ransomware infrastructure, provide decryption tools appeared first on Help Net Security.
"
Autosummary:
Since June 2021, criminals have used HIVE ransomware to target many businesses and critical infrastructure sectors, including government facilities, telecommunication companies, manufacturing, information technology, and healthcare and public health.Europol also provided analytical support linking available data to various criminal cases within and outside the EU, and supported the investigation through cryptocurrency, malware, decryption and forensic analysis.
"
Hive Ransomware Infrastructure Seized in Joint International Law Enforcement Effort
exploits
ransomware
2023-01-26
https://thehackernews.com/2023/01/hive-ransomware-infrastructure-seized.html
The infrastructure associated with the Hive ransomware-as-a-service (RaaS) operation has been seized as part of a coordinated law enforcement effort involving 13 countries.
"Law enforcement identified the decryption keys and shared them with many of the victims, helping them regain access to their data without paying the cybercriminals," Europol said in a statement.
The U.S. Department of
"
Autosummary:
"
Hive Ransomware Tor leak site apparently seized by law enforcement
exploits
ransomware
2023-01-26
https://securityaffairs.com/141374/cyber-crime/hive-ransomware-leak-site-seized.html
The leak site of the Hive ransomware gang was seized due to an international operation conducted by law enforcement in ten countries. The Tor leak site used by Hive ransomware operators has been seized as part of an international operation conducted by law enforcement in 10 countries. “The Federal Bureau of Investigation seized this site […]
The post Hive Ransomware Tor leak site apparently seized by law enforcement appeared first on Security Affairs.
"
Autosummary:
[adrotate banner=”12″]
Pierluigi Paganini
(SecurityAffairs – hacking, ransomware)
[adrotate banner=”5″]
[adrotate banner=”13″]
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
US offers $10M bounty for Hive ransomware links to foreign governments
exploits
government
ransomware
2023-01-26
https://www.bleepingcomputer.com/news/security/us-offers-10m-bounty-for-hive-ransomware-links-to-foreign-governments/
The U.S. Department of State today offered up to $10 million for information that could help link the Hive ransomware group (or other threat actors) with foreign governments. [...]
"
Autosummary:
"For information on the identification or location of any person who, while acting at the direction of a foreign government, participates in malicious cyber activities against U.S. critical infrastructure in violation of the Computer Fraud and Abuse Act."
"Send us your information on Signal, Telegram, WatshApp, or via our Tor-based tip line.
"
New Mimic ransomware abuses ‘Everything’ Windows search tool
exploits
ransomware
2023-01-26
https://www.bleepingcomputer.com/news/security/new-mimic-ransomware-abuses-everything-windows-search-tool/
A new ransomware family named "Mimic" has been spotted in the wild abusing the APIs of a legitimate Windows file search tool called "Everything" to achieve file enumeration. [...]
"
Autosummary:
"
5 facts about Vice Society, the ransomware group wreaking havoc on the education sector
exploits
ransomware
2023-01-26
https://www.malwarebytes.com/blog/business/2023/01/5-facts-about-vice-society-the-ransomware-group-wreaking-havoc-on-k-12-schools
Categories: Business In this article, we’ll arm you with five facts about Vice Society so you can get the upper-hand against this persistent education sector threat.
|
The post 5 facts about Vice Society, the ransomware group wreaking havoc on the education sector appeared first on Malwarebytes Labs.
"
Autosummary:
In 2022 they were far and away the biggest attackers on the education sector
If you’re a regular reader of our monthly ransomware review, you know that the education sector has gotten plenty of attention from ransomware gangs in the last year, to say the least.
We don’t want to say launching ransomware on K-12 schools, colleges, and universities is as easy as taking candy from a baby, but unfortunately that’s how many RaaS gangs see it.
A few of the institutions published on their leak site last year include De Montfort School, Cincinnati State, and one that made national headlines in September: Los Angeles Unified, the second largest school district in the US.
"
US hacks back against Hive ransomware crew
exploits
ransomware
2023-01-26
https://www.bbc.co.uk/news/technology-64418723?at_medium=RSS&at_campaign=KARANGA
The US Department of Justice says its operation against the cyber gang was a 21st Century stakeout.
"
Autosummary:
"
Peru protests: Historic building in Lima catches fire as protests continue
latam
ransomware
2023-01-21
https://www.bbc.co.uk/news/world-latin-america-64356109?at_medium=RSS&at_campaign=KARANGA
Authorities are yet to report how the building, in Lima"s Plaza San Martín, caught fire.
"
Autosummary:
"
LAUSD says Vice Society ransomware gang stole contractors’ SSNs
exploits
ransomware
2023-01-20
https://www.bleepingcomputer.com/news/security/lausd-says-vice-society-ransomware-gang-stole-contractors-ssns/
Los Angeles Unified School District (LAUSD), the second-largest school district in the United States, says the Vice Society ransomware gang has stolen files containing contractors" personal information, including Social Security Numbers (SSNs). [...]
"
Autosummary:
"Through our ongoing investigation, we determined that between July 31, 2022, and September 3, 2022, an unauthorized actor accessed and acquired certain files maintained on our servers," the school district said in data breach notification letters sent to affected individuals.
"
The Week in Ransomware - January 20th 2023 - Targeting Crypto Exchanges
exploits
ransomware
2023-01-20
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-january-20th-2023-targeting-crypto-exchanges/
There has been quite a bit of ransomware news this week, with crypto exchanges being seized for alleged money laundering and researchers providing fascinating reports on the behavior of ransomware operators. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include: @LawrenceAbrams, @demonslay335, @malwrhunterteam, @Seifreed, @billtoulas, @PolarToffee, @struppigel, @serghei, @fwosar, @BleepinComputer, @Ionut_Ilascu, @chainalysis, @coveware, @BrettCallow, @jgreigj, @pcrisk, @Avast, and @Jon__DiMaggio.Brands, the fast food brand operator of KFC, Pizza Hut, Taco Bell, and The Habit Burger Grill fast-food restaurant chains, has been targeted by a ransomware attack that forced the closure of 300 locations in the United Kingdom.
"
LockBit ransomware – what you need to know
exploits
ransomware
2023-01-19
https://www.tripwire.com/state-of-security/lockbit-ransomware-what-you-need-know
It is the world"s most active ransomware group - responsible for an estimated 40% of all ransomware infections worldwide.
Find out what you need to know about LockBit in my article on the Tripwire State of Security blog.
"
Autosummary:
LockBit is a ransomware-as-a-service (RaaS) operation, meaning that other criminals pay to become an affiliate, launching attacks and sharing a percentage of their earnings with the original LockBit gang.I guess if they are hitting so many companies, these LockBit guys must be making a lot of money
When the US authorities charged a man in connection with the LockBit ransomware in November 2022, they claimed that it had been deployed against at least 1,000 victims in the United States and around the world, making at least $100 million worth of ransom demands.
use hard-to-crack, unique passwords to protect sensitive data and accounts, and enable multi-factor authentication.
"
Bitzlato crypto exchange seized for ransomware, drugs money laundering
financial
exploits
ransomware
2023-01-18
https://www.bleepingcomputer.com/news/security/bitzlato-crypto-exchange-seized-for-ransomware-drugs-money-laundering/
The U.S. Department of Justice arrested and charged Russian national Anatoly Legkodymov, the founder of the Hong Kong-registered cryptocurrency exchange Bitzlato, with helping cybercriminals allegedly launder illegally obtained money. [...]
"
Autosummary:
Chainalysis added that, according to its estimations, the crypto exchange "received $206 million from darknet markets, $224.5 million from scams, and $9 million from ransomware attackers.
"
1,000 ships impacted by a ransomware attack on maritime software supplier DNV
exploits
ransomware
2023-01-17
https://securityaffairs.com/140941/cyber-crime/ransomware-attack-maritime-firm-dnv.html
A ransomware attack against the maritime software supplier DNV impacted approximately 1,000 vessels. About 1,000 vessels have been impacted by a ransomware attack against DNV, one of the major maritime software suppliers. DNV GL provides solutions and services throughout the life cycle of any vessel, from design and engineering to risk assessment and ship management. […]
The post 1,000 ships impacted by a ransomware attack on maritime software supplier DNV appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, maritime)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Avast releases free BianLian ransomware decryptor
exploits
ransomware
2023-01-16
https://www.bleepingcomputer.com/news/security/avast-releases-free-bianlian-ransomware-decryptor/
Security software company Avast has released a free decryptor for the BianLian ransomware strain to help victims of the malware recover locked files without paying the hackers. [...]
"
Autosummary:
Avast says some common filenames and locations for BianLian are:
C:\Windows\TEMP\mativ.exe
C:\Windows\Temp\Areg.exe
C:\Users\%username%\Pictures\windows.exe
anabolic.exe
However, because the malware deletes itself after the file encryption phase, it is unlikely that victims will find those binaries on their systems.
"
Avast researchers released a free BianLian ransomware decryptor for some variants of the malware
exploits
ransomware
2023-01-16
https://securityaffairs.com/140892/malware/free-bianlian-ransomware-decryptor.html
Antivirus firm Avast released a free decryptor for the BianLian ransomware family that allows victims to recover locked files. Security firm Avast has released a free decryptor for the BianLian ransomware to allow victims of the malware to recover locked files. The BianLian ransomware emerged in August 2022, the malware was employed in attacks against organizations in […]
The post Avast researchers released a free BianLian ransomware decryptor for some variants of the malware appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, ransomware)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Vice Society ransomware leaks University of Duisburg-Essen’s data
exploits
ransomware
2023-01-16
https://www.bleepingcomputer.com/news/security/vice-society-ransomware-leaks-university-of-duisburg-essen-s-data/
The Vice Society ransomware gang has claimed responsibility for the November 2022 cyberattack that forced the University of Duisburg-Essen (UDE) to reconstruct its IT infrastructure, a process that"s still ongoing. [...]
"
Autosummary:
Rebuilding UDE"s IT infrastructure
The cyberattack was disclosed by UDE on November 28th, 2022, forcing the university to shut down all email, communications, and IT systems until further notice.
"
Multiple schools hit by Vice Society ransomware attack
exploits
ransomware
2023-01-15
https://www.malwarebytes.com/blog/news/2023/01/multiple-schools-in-uk-hit-by-vice-society-ransomware-attack
Categories: News Tags: ransomware
Tags: high society
Tags: compromise
Tags: school
Tags: schools
Tags: learning
Tags: documents
Tags: data
Tags: leak
We take a look at reports of 14 schools being compromised by ransomware group Vice Society.
|
The post Multiple schools hit by Vice Society ransomware attack appeared first on Malwarebytes Labs.
"
Autosummary:
According to the BBC, the data includes:
Passport scans of both pupils and parents which date back to 2011
Contractual offers made to members of staff
Headmaster’s pay and student bursary fund recipients
Special Educational Needs (SEN) data
Other, unnamed confidential documents were seen which belong to a variety of other schools from across all parts of the UK.Impacts from these attacks have ranged from restricted access to networks and data, delayed exams, canceled school days, and unauthorized access to and theft of personal information regarding students and staff…School districts with limited cybersecurity capabilities and constrained resources are often the most vulnerable; however, the opportunistic targeting often seen with cyber criminals can still put school districts with robust cybersecurity programs at risk.
Over the past several years, the education sector, especially kindergarten through twelfth grade (K-12) institutions, have been a frequent target of ransomware attacks.
"
The Week in Ransomware - January 13th 2023 - LockBit in the spotlight
exploits
ransomware
2023-01-14
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-january-13th-2023-lockbit-in-the-spotlight/
The LockBit ransomware operation has again taken center stage in the ransomware news, as we learned yesterday they were behind the attack on Royal Mail. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include: @DanielGallagher, @PolarToffee, @Seifreed, @billtoulas, @malwareforme, @struppigel, @demonslay335, @Ionut_Ilascu, @FourOctets, @malwrhunterteam, @BleepinComputer, @LawrenceAbrams, @fwosar, @serghei, @pcrisk, @MsftSecIntel, @BrettCallow, @UK_Daniel_Card, @SRMInform, @TGesches, @rapid7, @uuallan, @AShukuhi, and @BushidoToken.
"
LockBit ransomware operation behind the Royal Mail cyberattack
exploits
ransomware
ciber
2023-01-13
https://securityaffairs.com/140735/malware/lockbit-ransomware-royal-mail-attack.html
The cyberattack on Royal Mail, Britain’s postal service, is a ransomware attack that was linked to the LockBit ransomware operation. Royal Mail, the British multinational postal service and courier company, this week announced that a “cyber incident” has a severe impact on its operation. The incident only impacted Royal Mail’s international export services, the company said it is temporarily […]
The post LockBit ransomware operation behind the Royal Mail cyberattack appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, Royal Mail)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Free decryptor for victims of MegaCortex ransomware released
exploits
ransomware
2023-01-12
https://grahamcluley.com/free-decryptor-for-victims-of-megacortex-ransomware-released/
The experts at security firm Bitdefender have released a universal decryptor for victims of the MegaCortex family of ransomware, which is estimated to have caused more than 1800 infections - mostly of businesses.
"
Autosummary:
"
Vice Society ransomware claims attack on Australian firefighting service
exploits
ransomware
2023-01-12
https://www.bleepingcomputer.com/news/security/vice-society-ransomware-claims-attack-on-australian-firefighting-service/
Australia"s Fire Rescue Victoria has disclosed a data breach caused by a December cyberattack that is now claimed by the Vice Society ransomware gang. [...]
"
Autosummary:
Bank account details (BSB, account name, and number)
Superannuation details
Government-issued identity information
Driver"s license details
Passport details
Tax File numbers
Birth, death, and marriage certificates
In addition to the above, because the hackers accessed the agency"s email system, which remains offline, they may also have accessed or stolen sensitive email communications.
"
Microsoft: Cuba ransomware hacking Exchange servers via OWASSRF flaw
exploits
ransomware
2023-01-12
https://www.bleepingcomputer.com/news/security/microsoft-cuba-ransomware-hacking-exchange-servers-via-owassrf-flaw/
Microsoft says Cuba ransomware threat actors are hacking their way into victims" networks via Microsoft Exchange servers unpatched against a critical server-side request forgery (SSRF) vulnerability also exploited in Play ransomware attacks. [...]
"
Autosummary:
While not as prolific as Cuba ransomware and although first spotted a lot more recently, in June 2022, Play ransomware has been quite active and has already hit dozens of victims worldwide, including Rackspace, the German H-Hotels hotel chain, the Belgium city of Antwerp, and Argentina"s Judiciary of Córdoba.
"
Royal Mail cyberattack linked to LockBit ransomware operation
exploits
ransomware
ciber
2023-01-12
https://www.bleepingcomputer.com/news/security/royal-mail-cyberattack-linked-to-lockbit-ransomware-operation/
A cyberattack on Royal Mail, UK"s largest mail delivery service, has been linked to the LockBit ransomware operation. [...]
"
Autosummary:
LockBit 3.0 ransom note printed during Royal Mail cyberattack
Source: Daniel Card on Twitter
The ransom note states it was created by "LockBit Black Ransomware," which is the operation"s latest encryptor name as it includes code and features from the now-shut down BlackMatter ransomware gang.
"
Maternal & Family Health Services discloses ransomware attack months after discovery
exploits
ransomware
2023-01-11
https://www.malwarebytes.com/blog/news/2023/01/maternal-family-health-services-discloses-ransomware-attack-months-after-discovery
Categories: News Categories: Ransomware Tags: Maternal & Family Health Services
Tags: MFHS
Tags:
A US health and human services organization recently revealed it was a victim of a ransomware attack that likely happened between August 2021 and April 2022.
|
The post Maternal & Family Health Services discloses ransomware attack months after discovery appeared first on Malwarebytes Labs.
"
Autosummary:
That data includes names, addresses, dates of birth, Social Security numbers (SSNs), driver’s license numbers, financial account or payment card information, site credentials, medical information, and health insurance information.
"
CISA orders agencies to patch Exchange bug abused by ransomware gang
exploits
ransomware
2023-01-10
https://www.bleepingcomputer.com/news/security/cisa-orders-agencies-to-patch-exchange-bug-abused-by-ransomware-gang/
The Cybersecurity and Infrastructure Security Agency (CISA) has added two more security vulnerabilities to its catalog of exploited bugs today. [...]
"
Autosummary:
"
Lorenz ransomware gang plants backdoors to use months later
exploits
ransomware
2023-01-10
https://www.bleepingcomputer.com/news/security/lorenz-ransomware-gang-plants-backdoors-to-use-months-later/
Security researchers are warning that patching critical vulnerabilities allowing access to the network is insufficient to defend against ransomware attacks. [...]
"
Autosummary:
Backdoor planted before security update
During an incident response engagement to a Lorenz ransomware attack, researchers at global intelligence and cyber security consulting company S-RM determined that the hackers had breached the victim network five months before starting to move laterally, steal data, and encrypt systems.
"
Rackspace ransomware attack was executed by using previously unknown security exploit
exploits
ransomware
2023-01-09
https://www.helpnetsecurity.com/2023/01/09/rackspace-ransomware-attack-was-executed-via-previously-unknown-security-exploit/
The MS Exchange exploit chain recently revealed by Crowdstrike researchers is how the Play ransomware gang breached the Rackspace Hosted Exchange email environment, the company confirmed last week. The exploit chains CVE-2022-41082, a RCE flaw, and CVE-2022-41080, a privilege escalation vulnerability, to achieve unrestricted remote access to vulnerable MS Exchange setups. “We will be sharing more detailed information with our customers and peers in the security community so that, collectively, we can all better defend … More →
The post Rackspace ransomware attack was executed by using previously unknown security exploit appeared first on Help Net Security.
"
Autosummary:
Finally, Crowdstrike’s forensic investigation confirmed that the attackers accessed Personal Storage Tables (PSTs) of 27 Hosted Exchange customers, but that there is “no evidence that the threat actor actually viewed, obtained, misused, or disseminated emails or data in the PSTs for any of the 27 Hosted Exchange customers in any way.”
"
inSicurezzaDigitale launches the Dashboard Ransomware Monitor
exploits
ransomware
2023-01-09
https://securityaffairs.com/140544/malware/dashboard-ransomware-monitor.html
The cybersecurity blog inSicurezzaDigitale has launched the Italian Dashboard Ransomware Monitor to analyze the principal RaaSs’ activities. Here it comes, inSicurezzaDigitale announced the Dashboard Ransomware Monitor, it is the second project after the recent presentation of the project Mastodon. The Dashboard is very easy to use and it is available via this link: ransom.insicurezzadigitale.com The […]
The post inSicurezzaDigitale launches the Dashboard Ransomware Monitor appeared first on Security Affairs.
"
Autosummary:
"
The Week in Ransomware - January 6th 2023 - Targeting Healthcare
exploits
ransomware
2023-01-07
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-january-6th-2023-targeting-healthcare/
This week saw a lot of ransomware news, ranging from new extortion tactics, to a ransomware gang giving away a free decryptor after attacking a children"s hospital. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include: @LawrenceAbrams, @serghei, @PolarToffee, @billtoulas, @Ionut_Ilascu, @Seifreed, @fwosar, @struppigel, @demonslay335, @malwrhunterteam, @BleepinComputer, @Fortinet, @emsisoft, @BrettCallow, @Bitdefender, @AlvieriD, and @pcrisk.
Overall, it was a pretty bad year for organizations, with Emsisoft reporting that 200 government, education, and healthcare entities were targeted by ransomware in 2022.
"
Hive Ransomware gang leaked 550 GB stolen from Consulate Health Care
exploits
ransomware
2023-01-07
https://securityaffairs.com/140452/cyber-crime/consulate-health-care-hive-ransomware.html
The Hive ransomware gang just leaked 550 GB of data stolen from the Consulate Health Care, including customer and employee PII data. Consulate Health Care is a leading provider of senior healthcare services, specializing in post-acute care. The Hive ransomware gang this week added the company to its Tor leak site, threatening to publish the stolen […]
The post Hive Ransomware gang leaked 550 GB stolen from Consulate Health Care appeared first on Security Affairs.
"
Autosummary:
The gang initially leaked samples of the stolen data as proof of the attack, it claimed to have stolen contracts, NDA and other agreements documents, company private info (budgets, plans, evaluations, revenue cycle, investors relations, company structure, etc.), employees info (social security numbers, emails, addresses, phone numbers, photos, insurances info, payments, etc.), and customers info (medical records, credit cards, emails, social security numbers, phone numbers, insurances, etc.).
"
Rackspace Confirms Play Ransomware Gang Responsible for Recent Breach
exploits
ransomware
2023-01-06
https://thehackernews.com/2023/01/rackspace-confirms-play-ransomware-gang.html
Cloud services provider Rackspace on Thursday confirmed that the ransomware gang known as Play was responsible for last month"s breach.
The security incident, which took place on December 2, 2022, leveraged a previously unknown security exploit to gain initial access to the Rackspace Hosted Exchange email environment.
"This zero-day exploit is associated with CVE-2022-41080," the Texas-based
"
Autosummary:
"
Bitdefender released a free decryptor for the MegaCortex ransomware
exploits
ransomware
2023-01-06
https://securityaffairs.com/140397/malware/megacortex-ransomware-decryptor.html
Antivirus firm Bitdefender released a decryptor for the MegaCortex ransomware allowing its victims to restore their data for free. Antivirus firm Bitdefender released a decryptor for the MegaCortex ransomware, which can allow victims of the group to restore their data for free. The MegaCortex ransomware first appeared on the threat landscape in May 2019 when […]
The post Bitdefender released a free decryptor for the MegaCortex ransomware appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, ransomware)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Microsoft doc details the dos and don’ts of Mac ransomware
exploits
ransomware
2023-01-06
https://www.computerworld.com/article/3684849/microsoft-doc-details-the-dos-and-donts-of-mac-ransomware.html#tk.rss_security
As enterprise adoption of the Apple platform accelerates, it’s important to note that Macs can and sometimes do get hit by ransomware. So it’s good to stay tuned to security concerns on a platform and application level — and take precautions.
Knowledge is power
With this in mind, extensive insights into Mac ransomware recently published by Microsoft can help explain these threats. The impact of such attack can be huge – ransomware already costs victims hundreds of billions each year, and no one is immune.
To read this article in full, please click here
"
Autosummary:
Security, security, security
We can anticipate a great deal of activity around security on Apple’s Mac and mobile platforms this year.
It also helps guide security first response if an attack does take place; in the case of some sophisticated attacks, it’s not enough to identify just one invasion vector, as once inside the systems, some will implant second- and even third-line bugs in case of detection.
"
Microsoft Reveals Tactics Used by 4 Ransomware Families Targeting macOS
exploits
ransomware
industry
2023-01-06
https://thehackernews.com/2023/01/microsoft-reveals-tactics-used-by-4.html
Microsoft has shed light on four different ransomware families – KeRanger, FileCoder, MacRansom, and EvilQuest – that are known to impact Apple macOS systems.
"While these malware families are old, they exemplify the range of capabilities and malicious behavior possible on the platform," the tech giant"s Security Threat Intelligence team said in a Thursday report.
The initial vector for these
"
Autosummary:
EvilQuest, which was first exposed in July 2020, further goes beyond typical ransomware to incorporate other trojan-like features, such as keylogging, compromising Mach-O files by injecting arbitrary code, and disabling security software.
"
Microsoft details techniques of Mac ransomware
exploits
ransomware
2023-01-06
https://securityaffairs.com/140423/cyber-crime/mac-ransomware.html
Microsoft warns of different ransomware families (KeRanger, FileCoder, MacRansom, and EvilQuest) targeting Apple macOS systems. Microsoft Security Threat Intelligence team warns of four different ransomware families (KeRanger, FileCoder, MacRansom, and EvilQuest) that impact Apple macOS systems. The initial vector in attacks involving Mac ransomware typically relies on user-assisted methods, such as downloading and running fake […]
The post Microsoft details techniques of Mac ransomware appeared first on Security Affairs.
"
Autosummary:
Code-related checks include delayed execution (KeRanger), PT_DENY_ATTACH (PTRACE) for an anti-debugging trick that prevents debuggers from attaching to the current malware process (EvilQuest and MacRansom), P_TRACED flag to check whether malware is being debugged (EvilQuest), and time-based check (EvilQuest).
Hardware-based checks include checking a device’s hardware model (MacRansom), checking the logical and physical processors of a device (MacRansom), checking the MAC OUI of the device (EvilQuest), and checking the device’s CPU count and memory size (EvilQuest).
"
Rackspace: Play Ransomware gang used a previously unknown exploit to access its Hosted Exchange email environment
exploits
ransomware
2023-01-06
https://securityaffairs.com/140410/data-breach/rackspace-data-breach-play-ransomware.html
Cloud services provider Rackspace confirmed that the recent data breach was the result of the Play Ransomware gang’s attack. Cloud services provider Rackspace announced this week that the recent data breach was the result of an attack conducted by the Play ransomware group. The ransomware attack took place on December 2, 2022, threat actors exploited a […]
The post Rackspace: Play Ransomware gang used a previously unknown exploit to access its Hosted Exchange email environment appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, Rackspace)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Saint Gheorghe Recovery Hospital in Romania suffered a ransomware attack
exploits
ransomware
2023-01-06
https://securityaffairs.com/140446/cyber-crime/saint-gheorghe-recovery-hospital-ransomware.html
The Saint Gheorghe Recovery Hospital in Romania suffered a ransomware attack in December that is still impacting medical activity. The Saint Gheorghe Recovery Hospital in Botoşani, in northeastern Romania, was hit by a ransomware attack in December that is still impacting medical operations. The hospital is not able to report the services performed in December […]
The post Saint Gheorghe Recovery Hospital in Romania suffered a ransomware attack appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, Saint Gheorghe Recovery Hospital)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
LA housing authority is latest LockBit ransomware victim
exploits
ransomware
2023-01-06
https://www.malwarebytes.com/blog/news/2023/01/la-housing-authority-is-latest-lockbit-ransomware-victim
Categories: News Categories: Ransomware Tags: LockBit
Tags: LockBit ransomware
Tags: ransomware
Tags: Housing Authority of the City of Los Angeles
Tags: HACLA
Tags: opportunistic attack
In an incident still under investigation, the Housing Authority of the City of Los Angeles (HACLA) was attacked by LockBit during the holiday season.
|
The post LA housing authority is latest LockBit ransomware victim appeared first on Malwarebytes Labs.
"
Autosummary:
"
"This is a wake-up call, a reminder, because all of us are so dependent on our cyber universe, to check our systems, to recognize that personal, businesses, public and private sector, are constantly being probed and constantly under attack, and that is why it"s critical that you pay attention to your security system, that you pay attention to who your users are and that you"re constantly on vigilance," Moore said.
"
Microsoft doc details the dos and don’ts of Mac ransomware <u>
exploits
ransomware
2023-01-06
https://www.computerworld.com/article/3684849/microsoft-doc-details-the-dos-and-donts-of-mac-ransomware-u.html#tk.rss_security
As enterprise adoption of the Apple platform accelerates, it’s important to note that Macs can and sometimes do get hit by ransomware. So it’s good to stay tuned to security concerns on a platform and application level — and take precautions.
Knowledge is power
With this in mind, extensive insights into Mac ransomware recently published only to be subsequently removed by Microsoft, can help explain these threats. The impact of such attack can be huge – ransomware already costs victims hundreds of billions each year, and no one is immune.
To read this article in full, please click here
"
Autosummary:
"
Security, security, security
We can anticipate a great deal of activity around security on Apple’s Mac and mobile platforms this year.
It also helps guide security first response if an attack does take place; in the case of some sophisticated attacks, it’s not enough to identify just one invasion vector, as once inside the systems, some will implant second- and even third-line bugs in case of detection.Apple partners, including Jamf, are also providing valuable Mac protection, and Apple itself recently launched a new security portal offering in-depth security insights.
"
LockBit ransomware gang says sorry, gives free decryptor to SickKids hospital
exploits
ransomware
2023-01-05
https://www.tripwire.com/state-of-security/lockbit-ransomware-gang-says-sorry-gives-free-decryptor-sickkids-hospital
Do ransomware gangs actually have a heart? Perhaps...
Read more in my article on the Tripwire State of Security blog.
"
Autosummary:
And perhaps that"s one reason why the notorious LockBit ransomware group, a ransomware-as-a-service (RaaS) operation that was used by the hospital"s attackers, has taken the unusual step of not only apologising to SickKids, but also offering the beleaguered hospital a free decryption tool.
"
Rackspace: Customer email data accessed in ransomware attack
exploits
ransomware
2023-01-05
https://www.bleepingcomputer.com/news/security/rackspace-customer-email-data-accessed-in-ransomware-attack/
Rackspace revealed on Thursday that attackers behind last month"s incident accessed some of its customers" Personal Storage Table (PST) files which can contain a wide range of information, including emails, calendar data, contacts, and tasks. [...]
"
Autosummary:
"We have already communicated our findings to these customers proactively, and importantly, according to Crowdstrike, there is no evidence that the threat actor actually viewed, obtained, misused, or disseminated any of the 27 Hosted Exchange customers" emails or data in the PSTs in any way.
"
Bitdefender releases free MegaCortex ransomware decryptor
exploits
ransomware
2023-01-05
https://www.bleepingcomputer.com/news/security/bitdefender-releases-free-megacortex-ransomware-decryptor/
Antivirus company Bitdefender has released a decryptor for the MegaCortex ransomware family, making it possible for victims of the once notorious gang to restore their data for free. [...]
"
Autosummary:
Decryptor"s options (BleepingComputer)
Also, for those who attempted to decrypt their files previously with mixed success, the new decryptor offers an advanced setting to replace them with clean files.
"
Software provider denied insurance payout after ransomware attack
exploits
ransomware
2023-01-05
https://www.malwarebytes.com/blog/news/2023/01/software-provider-denied-insurance-payout-after-ransomware-attack
Categories: News Tags: EMOI Services
Tags: Owners Insurance Co
Tags: Supreme Court of Ohio
Tags: K. James Sullivan
Tags: direct physical loss
The Supreme Court of Ohio issued a ruling days before the New Year that software and service provider EMOI shouldn"t be covered by insurance against a ransomware attack.
|
The post Software provider denied insurance payout after ransomware attack appeared first on Malwarebytes Labs.
"
Autosummary:
"
"I suspect we’re going to see an increasing number of losses to policyholders driven by twenty-first century fact patterns, such as pandemics, harm to computer systems, harm to air quality, etc., so it will be interesting to watch how the Ohio Supreme Court, insurers, and policyholders adapt going forward, Sullivan said.
"
The FBI"s Perspective on Ransomware
exploits
ransomware
2023-01-04
https://thehackernews.com/2023/01/the-fbis-perspective-on-ransomware.html
Ransomware: contemporary threats, how to prevent them and how the FBI can help
In April 2021, Dutch supermarkets faced a food shortage. The cause wasn"t a drought or a sudden surge in the demand for avocados. Rather, the reason was a ransomware attack. In the past years, companies, universities, schools, medical facilities and other organizations have been targeted by ransomware threat actors,
"
Autosummary:
"
Some of the major RaaS players, who are notorious for turning the RaaS landscape into what it is today, are CryptoLocker, who infected over a quarter million systems in the 2000s and profited more than $3 million in less than four months, CryptoWall, who made over $18 million and prompted an FBI advisory, and finally Petya, NotPetya and WannaCry who used various types of exploits, ransomware included.Recommendations include:
Turning off local passwords
Using secure passwords
Forcing the end of admin sessions
Configuring group policies
Checking privileged users" access
Ensuring only necessary applications are running
Limiting the reliance of Anti-Virus
Installing EDRs
24 hour system admins
Securing vulnerable ports
Watching for misconfigured firewalls
And more
Etay Maor of Cato Networks highlights "Nothing in what several Ransomware groups say organizations need to do is new.In the past years, companies, universities, schools, medical facilities and other organizations have been targeted by ransomware threat actors, turning ransomware into the internet"s most severe security crisis.
Here is a similar mapping of a Sodinokobi attack:
Maze attack mapping to the MITRE framework:
Another way to map ransomware attacks is through heat maps, which show how often different tactics and techniques are used.
"
US. rail and locomotive company Wabtec hit with Lockbit ransomware
exploits
ransomware
2023-01-04
https://securityaffairs.com/140299/cyber-crime/wabtec-lockbit-ransomware.html
US. rail and locomotive company Wabtec Corporation disclosed a data breach after it was hit with Lockbit ransomware attack. Wabtec Corporation is an American company formed by the merger of the Westinghouse Air Brake Company (WABCO) and MotivePower Industries Corporation in 1999. It manufactures products for locomotives, freight cars and passenger transit vehicles, and builds new locomotives up to 6,000 horsepower. The company employs […]
The post US. rail and locomotive company Wabtec hit with Lockbit ransomware appeared first on Security Affairs.
"
Autosummary:
Compromised information varies by individual and includes a combination of the following data elements: First and Last Name, Date of Birth, Non-US National ID Number, Non-US Social Insurance Number or Fiscal Code, Passport Number, IP Address, Employer Identification Number (EIN), USCIS or Alien Registration Number, NHS (National Health Service) Number (UK), Medical Record/Health Insurance Information, Photograph, Gender/Gender Identity, Salary, Social Security Number (US), Financial Account Information, Payment Card Information, Account Username and Password, Biometric Information, Race/Ethnicity, Criminal Conviction or Offense, Sexual Orientation/Life, Religious Beliefs, Union Affiliation.
"
Rackspace confirms Play ransomware was behind recent cyberattack
exploits
ransomware
ciber
2023-01-04
https://www.bleepingcomputer.com/news/security/rackspace-confirms-play-ransomware-was-behind-recent-cyberattack/
Texas-based cloud computing provider Rackspace has confirmed that the Play ransomware operation was behind a recent cyberattack that took down the company"s hosted Microsoft Exchange environments. [...]
"
Autosummary:
Play ransomware activity (ID Ransomware)
Unlike most ransomware operations, Play gang affiliates use email as a negotiation channel and will not provide victims with a link to a Tor negotiations page within ransom notes dropped on encrypted systems.
"
Canadian Copper Mountain Mining Corporation (CMMC) shut down the mill after a ransomware attack
exploits
ransomware
2023-01-03
https://securityaffairs.com/140282/cyber-crime/canadian-cmmc-ransomware-attack.html
The Canadian Copper Mountain Mining Corporation (CMMC) was hit with a ransomware attack that impacted its operations. The Canadian Copper Mountain Mining Corporation (CMMC) announced to have suffered a ransomware attack late on December 27, 2022, which impacted its operation. Copper Mountain’s flagship asset is the 75% owned Copper Mountain mine located in southern British Columbia near […]
The post Canadian Copper Mountain Mining Corporation (CMMC) shut down the mill after a ransomware attack appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, CMMC)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Royal ransomware claims attack on Queensland University of Technology
exploits
ransomware
2023-01-03
https://www.bleepingcomputer.com/news/security/royal-ransomware-claims-attack-on-queensland-university-of-technology/
The Royal ransomware gang has claimed responsibility for a recent cyberattack on the Queensland University of Technology and begun to leak data allegedly stolen during the security breach. [...]
"
Autosummary:
"
Currently, the HiQ website, "Digital Workplace", "eStudent", and Blackboard systems are unavailable, causing many courses and exams to be rescheduled until early February.
"
Rail giant Wabtec discloses data breach after Lockbit ransomware attack
financial
exploits
ransomware
2023-01-03
https://www.bleepingcomputer.com/news/security/rail-giant-wabtec-discloses-data-breach-after-lockbit-ransomware-attack/
U.S. rail and locomotive company Wabtec Corporation has disclosed a data breach that exposed personal and sensitive information. [...]
"
Autosummary:
"
Lockbit apologized for the attack on the SickKids pediatric hospital and releases a free decryptor
ransomware
2023-01-01
https://securityaffairs.com/140193/cyber-crime/lockbit-apologized-attack-sickkids.html
The LockBit ransomware group formally apologized for the attack on the Hospital for Sick Children (SickKids) and gave to the victim a decryptor for free. The LockBit ransomware gang formally apologized for the attack on the Hospital for Sick Children (SickKids) and has released a free decryptor for the Hospital. The group is known to […]
The post Lockbit apologized for the attack on the SickKids pediatric hospital and releases a free decryptor appeared first on Security Affairs.
"
Autosummary:
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, Lockbit)
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Lockbit ransomware gang claims to have hacked the Port of Lisbon
exploits
ransomware
2022-12-30
https://securityaffairs.com/140137/cyber-crime/lockbit-group-port-of-lisbon.html
The website for the Port of Lisbon is still down days after it was the target of a ransomware attack claimed by Lockbit group. The Port of Lisbon is the third-largest port in Portugal and one of the main European ports due to its strategic location. The website of the port was hit by a cyber attack on […]
The post Lockbit ransomware gang claims to have hacked the Port of Lisbon appeared first on Security Affairs.
"
Autosummary:
“I would identify, with respect to our ports, cybersecurity, as a significant threat stream and we are of course very focused on defending against it and strengthening our cybersecurity.”
"
Canadian mining firm shuts down mill after ransomware attack
exploits
ransomware
2022-12-30
https://www.bleepingcomputer.com/news/security/canadian-mining-firm-shuts-down-mill-after-ransomware-attack/
The Copper Mountain Mining Corporation (CMMC), a Canadian copper mining company in British Columbia, has announced it has become the target of a ransomware attack that impacted its operations. [...]
"
Autosummary:
"
LockBit ransomware claims attack on Port of Lisbon in Portugal
exploits
ransomware
2022-12-30
https://www.bleepingcomputer.com/news/security/lockbit-ransomware-claims-attack-on-port-of-lisbon-in-portugal/
A cyberattack hitting the Port of Lisbon Administration (APL), the third-largest port in Portugal, on Christmas day has been claimed by the LockBit ransomware gang. [...]
"
Autosummary:
The ransomware gang claims to have stolen financial reports, audits, budgets, contracts, cargo information, ship logs, crew details, customer PII (personally identifiable information), port documentation, email correspondence, and more.
"
LCMHS hospital suffered a Ransomware attack at Louisiana hospital that impacted 270,000 patients
exploits
ransomware
2022-12-29
https://securityaffairs.com/140106/cyber-crime/lcmhs-hospital-ransomware-attack.html
The Lake Charles Memorial Health System (LCMHS) suffered a ransomware attack that impacted 270,000 patients. The Lake Charles Memorial Health System (LCMHS) disclosed a data breach that affected almost 270,000 patients at its medical centers. The Lake Charles Memorial Health System is the largest not-for-profit community healthcare system in Southwest Louisiana. LCMHS reported the incident to the secretary of the U.S. […]
The post LCMHS hospital suffered a Ransomware attack at Louisiana hospital that impacted 270,000 patients appeared first on Security Affairs.
"
Autosummary:
The organizations launched an investigation into the incident with the help of forensic experts and discovered that threat actors have stolen files containing sensitive data, including:
Full names
Physical addresses
Dates of birth
Medical records
Patient identification numbers
Health insurance information
Payment information
Limited clinical information regarding the received care
Social Security numbers (in some cases)
The attackers had no access to electronic medical records.
"
Royal ransomware claims attack on Intrado telecom provider
exploits
ransomware
2022-12-28
https://www.bleepingcomputer.com/news/security/royal-ransomware-claims-attack-on-intrado-telecom-provider/
The Royal Ransomware gang claimed responsibility for a cyber attack against telecommunications company Intrado on Tuesday. [...]
"
Autosummary:
Royal ransomware Intrado data leak (BleepingComputer)
Likely linked to an early December outage
The date of the initial breach coincides with a widespread outage that impacted all of Intrado"s services, including Unified Communication Services, Healthcare, and Unified Communications as a Service (UCaaS).
"
Week in review: LastPass breach disaster, online tracking via UID smuggling, ransomware in 2023
exploits
ransomware
2022-12-25
https://www.helpnetsecurity.com/2022/12/25/week-in-review-lastpass-breach-disaster-online-tracking-via-uid-smuggling-ransomware-in-2023/
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: LastPass says attackers got users’ info and password vault data The information couldn’t come at a worst time, as businesses are winding down their activities and employees and users are thick in the midst of last-minute preparations for end-of-year holidays. New Microsoft Exchange exploit chain lets ransomware attackers in (CVE-2022-41080) Ransomware-wielding attackers are using a new exploit chain that includes … More →
The post Week in review: LastPass breach disaster, online tracking via UID smuggling, ransomware in 2023 appeared first on Help Net Security.
"
Autosummary:
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos:
LastPass says attackers got users’ info and password vault data
The information couldn’t come at a worst time, as businesses are winding down their activities and employees and users are thick in the midst of last-minute preparations for end-of-year holidays.
"
Vice Society Ransomware Attackers Adopt Robust Encryption Methods
exploits
ransomware
2022-12-23
https://thehackernews.com/2022/12/vice-society-ransomware-attackers-adopt.html
The Vice Society ransomware actors have switched to yet another custom ransomware payload in their recent attacks aimed at a variety of sectors.
"This ransomware variant, dubbed "PolyVice," implements a robust encryption scheme, using NTRUEncrypt and ChaCha20-Poly1305 algorithms," SentinelOne researcher Antonio Cocomazzi said in an analysis.
Vice Society, which is tracked by Microsoft under the
"
Autosummary:
"
The Week in Ransomware - December 23rd 2022 - Targeting Microsoft Exchange
exploits
ransomware
2022-12-23
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-december-23rd-2022-targeting-microsoft-exchange/
Reports this week illustrate how threat actors consider Microsoft Exchange as a prime target for gaining initial access to corporate networks to steal data and deploy ransomware. [...]
"
Autosummary:
Other reports this week shed light on various ransomware operations:
Contributors and those who provided new ransomware information and stories this week include: @BleepinComputer, @FourOctets, @billtoulas, @DanielGallagher, @demonslay335, @struppigel, @jorntvdw, @LawrenceAbrams, @malwrhunterteam, @VK_Intel, @PolarToffee, @fwosar, @Ionut_Ilascu, @Seifreed, @malwareforme, @serghei, @IBMSecurity, @PRODAFT, @CrowdStrike, @LabsSentinel, @Fortinet, @zscaler, @TrendMicro, and @pcrisk.
December 21st 2022
Royal ransomware may have been first observed by researchers around September 2022, but it has seasoned cybercriminals behind it: The threat actors running this ransomware — who used to be a part of Conti Team One, according to a mind map shared by Vitali Kremez — initially dubbed it Zeon ransomware, until they rebranded it to Royal ransomware.
"
Adversarial risk in the age of ransomware
exploits
ransomware
2022-12-22
https://www.helpnetsecurity.com/2022/12/22/adversarial-risk-in-the-age-of-ransomware-video/
Éireann Leverett, Technology and Risk Entrepreneur, makes audience think about ransomware risks from more that one perspective, and that includes the perspective of the threat actors. He also lays out the many interesting results of an analysis of a decade of known ransomware attacks and paid ransoms. This video was recorded at IRISSCON 2022, an annual conference organized by IRISSCERT. The all-day event focuses on providing attendees with an overview of the current cyber threats … More →
The post Adversarial risk in the age of ransomware appeared first on Help Net Security.
"
Autosummary:
"
FIN7 Cybercrime Syndicate Emerges as Major Player in Ransomware Landscape
exploits
ransomware
2022-12-22
https://thehackernews.com/2022/12/fin7-cybercrime-syndicate-emerges-as.html
An exhaustive analysis of FIN7 has unmasked the cybercrime syndicate"s organizational hierarchy, alongside unraveling its role as an affiliate for mounting ransomware attacks.
It has also exposed deeper associations between the group and the larger threat ecosystem comprising the now-defunct ransomware DarkSide, REvil, and LockBit families.
The highly active threat group, also known as Carbanak,
"
Autosummary:
Other prominent countries include China, Germany, Canada, Italy, and the U.K.
FIN7"s intrusion techniques, over the years, have further diversified beyond traditional social engineering to include infected USB drives, software supply chain compromise and the use of stolen credentials purchased from underground markets.
"
Vice Society ransomware gang switches to new custom encryptor
exploits
ransomware
2022-12-22
https://www.bleepingcomputer.com/news/security/vice-society-ransomware-gang-switches-to-new-custom-encryptor/
The Vice Society ransomware operation has switched to using a custom ransomware encrypt that implements a strong, hybrid encryption scheme based on NTRUEncrypt and ChaCha20-Poly1305. [...]
"
Autosummary:
Similarity between Chilly and PolyVice (SentinelOne)
The differences lie in campaign-specific details like the file extension, ransom note name, hardcoded master key, wallpaper, etc., which supports the common vendor hypothesis.
"
Vice Society ransomware gang is using a custom locker
exploits
ransomware
2022-12-22
https://securityaffairs.co/wordpress/139924/cyber-crime/vice-society-ransomware-custom-locker.html
The Vice Society ransomware group has adopted new custom ransomware, with a strong encryption scheme, in recent intrusions. SentinelOne researchers discovered that the Vice Society ransomware gang has started using a custom ransomware that implements a robust encryption scheme, using NTRUEncrypt and ChaCha20-Poly1305 algorithms. Vice Society ransomware has been active since June 2021, it is considered […]
The post Vice Society ransomware gang is using a custom locker appeared first on Security Affairs.
"
Autosummary:
Further investigation also revealed that codebase for the Vice Society Windows payload has been used to build custom-branded payloads for other ransomware groups, such as “Chily” and “SunnyDay.”
The new variant, dubbed “PolyVice”, was used in a recent attack and appended the file extension “.ViceSociety” to all encrypted files.
"
CISO roles continue to expand beyond technical expertise
ransomware
2022-12-21
https://www.helpnetsecurity.com/2022/12/21/ciso-roles-continue-to-expand/
Marlin Hawk has tracked and analyzed the profiles of 470 CISOs year-over-year to understand the changing dynamics in this critical leadership position. The research shows the CISO seat to be relatively industry-agnostic—with 84% of CISOs having a career history of working across multiple sectors—with today’s CISOs expected to bring more breadth of leadership to their role as they move away from being technical experts. “Today’s CISOs are taking up the mantle of responsibilities that have … More →
The post CISO roles continue to expand beyond technical expertise appeared first on Help Net Security.
"
Autosummary:
Larkin went on to say, “As the importance of information security has grown, boards of directors, regulators, and shareholders have demanded greater controls, better risk management as well as more people and departments focusing on defending a company and its assets.
“Now candidates are being internally promoted to the role of CISO from IT Risk, Operational Risk Management, IT Audit, Technology Risk & Controls, among others,” Larkin added.
"
New Microsoft Exchange exploit chain lets ransomware attackers in (CVE-2022-41080)
exploits
ransomware
2022-12-21
https://www.helpnetsecurity.com/2022/12/21/cve-2022-41080/
Ransomware-wielding attackers are using a new exploit chain that includes one of the ProxyNotShell vulnerabilities (CVE-2022-41082) to achieve remote code execution on Microsoft Exchange servers. The ProxyNotShell exploit chain used CVE-2022-41040, a SSRF vulnerability in the Autodiscover endpoint of Microsoft Exchange, while this new one uses CVE-2022-41080 to achieve privilege escalation through Outlook Web Access (OWA). The exploit chain – dubbed OWASSRF by Crowdstrike researchers – can only be headed off by implementing the patches … More →
The post New Microsoft Exchange exploit chain lets ransomware attackers in (CVE-2022-41080) appeared first on Help Net Security.
"
Autosummary:
"
Play ransomware group claims to have stolen hotel chain data
exploits
ransomware
2022-12-21
https://www.malwarebytes.com/blog/news/2022/12/play-ransomware-group-claims-to-have-stolen-h-hotel-data
Categories: News Tags: H-Hotel
Tags: Play ransomware
Tags: ransomware
Tags: extortion
Tags: threat
Tags: breach
Tags: EDR
A ransomware group claims to have stolen data from the H-Hotel chain, and is now threatening to leak it if the ransom is not paid
|
The post Play ransomware group claims to have stolen hotel chain data appeared first on Malwarebytes Labs.
"
Autosummary:
There is no indication how much data has been stolen, but the listing mentions “Private, personal data, clients documents, passports, ID, etc”.Posted: December 21, 2022 by
A ransomware group claims to have stolen data from the H-Hotel chain, and is now threatening to leak it if the ransom is not paid
H-Hotels, a large hospitality chain with 60 hotels across several countries including Germany and Switzerland has announced it has fallen victim to a ransomware attack.
"
Play ransomware attacks use a new exploit to bypass ProxyNotShell mitigations on Exchange servers
exploits
ransomware
2022-12-21
https://securityaffairs.co/wordpress/139897/cyber-crime/play-ransomware-bypass-proxynotshell-mitigation.html
Play ransomware attacks target Exchange servers with a new exploit that bypasses Microsoft’s ProxyNotShell mitigations. Play ransomware operators target Exchange servers using a new exploit chain, dubbed OWASSRF by Crowdstrike, that bypasses Microsoft’s mitigations for ProxyNotShell vulnerabilities. The ProxyNotShell flaws are: they impact Exchange Server 2013, 2016, and 2019, an authenticated attacker can trigger them […]
The post Play ransomware attacks use a new exploit to bypass ProxyNotShell mitigations on Exchange servers appeared first on Security Affairs.
"
Autosummary:
– Installed Screen Connect, ID: b81d2f07c9163bf5, URL: instance-cmjrni-relay.screenconnect[.]com
– Deployed Mimikatz
Crawled and saved their tools, you can access… pic.twitter.com/8vA3LNtpul — Dray Agha (@Purp1eW0lf) December 14, 2022
The leaked tools included a Python script, poc.py, that when executed, led CrowdStrike researchers to replicate the logs generated in recent Play ransomware attacks.
"
New Agenda Ransomware Variant, Written in Rust, Aiming at Critical Infrastructure
exploits
ransomware
2022-12-19
https://thehackernews.com/2022/12/new-agenda-ransomware-variant-written.html
A Rust variant of a ransomware strain known as Agenda has been observed in the wild, making it the latest malware to adopt the cross-platform programming language after BlackCat, Hive, Luna, and RansomExx.
Agenda, attributed to an operator named Qilin, is a ransomware-as-a-service (RaaS) group that has been linked to a spate of attacks primarily targeting manufacturing and IT industries across
"
Autosummary:
"
Glupteba Botnet Continues to Thrive Despite Google"s Attempts to Disrupt It
ransomware
2022-12-19
https://thehackernews.com/2022/12/glupteba-botnet-continues-to-thrive.html
The operators of the Glupteba botnet resurfaced in June 2022 as part of a renewed and "upscaled" campaign, months after Google disrupted the malicious activity.
The ongoing attack is suggestive of the malware"s resilience in the face of takedowns, cybersecurity company Nozomi Networks said in a write-up. "In addition, there was a tenfold increase in TOR hidden services being used as C2 servers
"
Autosummary:
One of those addresses, which was first active on June 1, 2022, has transacted 11 times to date and is used in as many as 1,197 artifacts, making it the most widely used wallet address.
"
Experts spotted a variant of the Agenda Ransomware written in Rust
exploits
ransomware
2022-12-19
https://securityaffairs.co/wordpress/139811/cyber-crime/agenda-ransomware-rust.html
Researchers spotted a new variant of the Agenda ransomware which is written in the cross-platform programming language Rust. Trend Micro researchers have spotted a new variant of the Agenda ransomware (aka Qilin) that is written in Rust Language. The move follows the decision of other ransomware gangs, like Hive, Blackcat, RansomExx, and Luna, of rewriting their ransomware into […]
The post Experts spotted a variant of the Agenda Ransomware written in Rust appeared first on Security Affairs.
"
Autosummary:
“It also added the -n, -p, fast, skip,and step flags on its configurations, which are not present in the Golang variant configuration and only used via command-line argument.
"
Play ransomware claims attack on German hotel chain H-Hotels
exploits
ransomware
2022-12-19
https://www.bleepingcomputer.com/news/security/play-ransomware-claims-attack-on-german-hotel-chain-h-hotels/
The Play ransomware gang has claimed responsibility for a cyber attack on H-Hotels (h-hotels.com) that has resulted in communication outages for the company. [...]
"
Autosummary:
The hotel chain employs 2,500 people and is one of the largest in the DACH region, operating under "H-Hotels" and the sub-brands Hyperion, H4 Hotels, H2 Hotels, H + Hotels, H.ostels, and H.omes.
"
Colombian energy supplier EPM hit by BlackCat ransomware attack
exploits
latam
ransomware
industry
2022-12-16
https://www.bleepingcomputer.com/news/security/colombian-energy-supplier-epm-hit-by-blackcat-ransomware-attack/
Colombian energy company Empresas Públicas de Medellín (EPM) suffered a BlackCat/ALPHV ransomware attack on Monday, disrupting the company"s operations and taking down online services. [...]
"
Autosummary:
BlackCat ransomware behind the attack
BleepingComputer has since learned that the BlackCat ransomware operation, aka ALPHV, was behind the attacks, claiming to have stolen corporate data during the attacks.
"
The Week in Ransomware - December 16th 2022 - Losing Trust
exploits
ransomware
2022-12-16
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-december-16th-2022-losing-trust/
Today"s Week in Ransomware brings you the latest news and stories about the cyberattacks, new tactics, and reports related to ransomware operations. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include: @struppigel, @VK_Intel, @billtoulas, @FourOctets, @jorntvdw, @BleepinComputer, @DanielGallagher, @demonslay335, @malwrhunterteam, @fwosar, @Seifreed, @serghei, @malwareforme, @Ionut_Ilascu, @LawrenceAbrams, @PolarToffee, @_CPResearch_, @vinopaljiri, @cybereason, @1ZRR4H, @TalosSecurity, @pcrisk, @TrendMicro, @GeeksCyber, and @Digitaleragroup
December 11th 2022
Security researchers have noticed a spike in devices infected with the TrueBot malware downloader created by a Russian-speaking hacking group known as Silence.
This year, ransomware-as-a-service (RaaS) groups like BlackCat, Hive, and RansomExx have developed versions of their ransomware in Rust, a cross-platform language that makes it easier to tailor malware to different operating systems like Windows and Linux.
"
Microsoft approved and digitally-signed malicious drivers used in ransomware attacks
exploits
ransomware
2022-12-15
https://www.bitdefender.com/blog/hotforsecurity/microsoft-approved-and-digitally-signed-malicious-drivers-used-in-ransomware-attacks/
Microsoft has warned that malicious hackers were able to get the software giant to digitally sign their code so it could be used in attacks, such as the deployment of ransomware.
Read more in my article on the Hot for Security blog.
"
Autosummary:
"
Searchlight Security Ransomware Search and Insights collates dark web data on ransomware groups
exploits
ransomware
2022-12-14
https://www.helpnetsecurity.com/2022/12/14/searchlight-security-ransomware-search-and-insights/
Searchlight Security launched Ransomware Search and Insights, a new strategic enhancement to its Cerberus platform. Ransomware Search and Insights automatically collates data from active ransomware groups to help organizations and law enforcement agencies to investigate, track, and gather intelligence on live ransomware activity. This curated view of ransomware groups means that patterns in tactics, incidents, and victimology can be observed in real-time, helping analysts to bolster their threat intelligence, and gain the upper hand on … More →
The post Searchlight Security Ransomware Search and Insights collates dark web data on ransomware groups appeared first on Help Net Security.
"
Autosummary:
This curated view of ransomware groups means that patterns in tactics, incidents, and victimology can be observed in real-time, helping analysts to bolster their threat intelligence, and gain the upper hand on ransomware groups.
"
The Dark Web is Getting Darker - Ransomware Thrives on Illegal Markets
exploits
ransomware
2022-12-14
https://www.bleepingcomputer.com/news/security/the-dark-web-is-getting-darker-ransomware-thrives-on-illegal-markets/
The dark web is getting darker as cybercrime gangs increasingly shop their malware, phishing, and ransomware tools on illegal cybercrime markets. [...]
"
Autosummary:
Threat actors, including script kiddies and people with no hacking experience, increasingly join Ransomware-as-a-Service (RaaS) operations to easily get started extorting victims.
The trend toward unique and novel ransomware attacks will continue in 2023—IABs, RaaS groups, and affiliates will increase transactions of initial access, including compromised user credentials that unlock various access tools.
"
Microsoft patches Windows zero-day used to drop ransomware
exploits
ransomware
2022-12-14
https://www.bleepingcomputer.com/news/security/microsoft-patches-windows-zero-day-used-to-drop-ransomware/
Microsoft has fixed a security vulnerability used by threat actors to circumvent the Windows SmartScreen security feature and deliver Magniber ransomware and Qbot malware payloads. [...]
"
Autosummary:
The attackers used malicious standalone JavaScript files to exploit the CVE-2022-44698 zero-day to bypass Mark-of-the-Web security warnings displayed by Windows to alert users that files originating from the Internet should be treated with caution.
"
Play ransomware attacks city of Antwerp
exploits
government
ransomware
2022-12-14
https://www.malwarebytes.com/blog/news/2022/12/play-ransomware-attacks-government-agencies-and-their-providers
Categories: News Categories: Ransomware Tags: Antwerp
Tags: Diest
Tags: Zwijndrecht
Tags: Play
Tags: Ragnar Locker
Tags: ransomware
Play ransomware is claiming credit for a devastating attack on Belgium"s largest city.
|
The post Play ransomware attacks city of Antwerp appeared first on Malwarebytes Labs.
"
Autosummary:
According to the leak site, 557 GB of information was stolen, including personal information, passports, other IDs, and financial documents.
"
Cybersecurity Experts Uncover Inner Workings of Destructive Azov Ransomware
exploits
ransomware
ciber
2022-12-13
https://thehackernews.com/2022/12/cybersecurity-experts-uncover-inner.html
Cybersecurity researchers have published the inner workings of a new wiper called Azov Ransomware that"s deliberately designed to corrupt data and "inflict impeccable damage" to compromised systems.
Distributed through another malware loader known as SmokeLoader, the malware has been described as an "effective, fast, and unfortunately unrecoverable data wiper," by Israeli cybersecurity company
"
Autosummary:
"
LockBit claims attack on California"s Department of Finance
financial
ransomware
2022-12-13
https://www.bleepingcomputer.com/news/security/lockbit-claims-attack-on-californias-department-of-finance/
The Department of Finance in California has been the target of a cyberattack now claimed by the LockBit ransomware gang. [...]
"
Autosummary:
LockBit claims 75GB of stolen files
On Monday, the LockBit ransomware gang posted on their leak site that they had breached the Department of Finance of the state of California and stole databases, confidential data, financial documents, and IT documents.
"
Lockbit ransomware gang hacked California Department of Finance
financial
exploits
ransomware
2022-12-13
https://securityaffairs.co/wordpress/139599/cyber-crime/lockbit-ransomware-california-department-of-finance.html
LockBit ransomware gang hacked the California Department of Finance and threatens to leak data stolen from its systems. The LockBit ransomware gang claims to have stolen 76Gb from the California Department of Finance and is threatening to leak the stolen data if the victims will not pay the ransom by December 24. On December 12, […]
The post Lockbit ransomware gang hacked California Department of Finance appeared first on Security Affairs.
"
Autosummary:
"
Microsoft-signed malicious Windows drivers used in ransomware attacks
exploits
ransomware
2022-12-13
https://www.bleepingcomputer.com/news/microsoft/microsoft-signed-malicious-windows-drivers-used-in-ransomware-attacks/
Microsoft has revoked several Microsoft hardware developer accounts after drivers signed through their profiles were used in cyberattacks, including ransomware incidents. [...]
"
Autosummary:
Signing a driver via the Windows Hardware Compatibility Program
Source: Mandiant
Toolkit used to terminate security software
In reports released today, researchers explain how they found a new toolkit consisting of two components named STONESTOP (loader) and POORTRY (kernel-mode driver) being used in "bring your own vulnerable driver" (BYOVD) attacks.
"Notably, SentinelLabs observed a separate threat actor also utilizing a similar Microsoft signed driver, which resulted in the deployment of Hive ransomware against a target in the medical industry, indicating a broader use of this technique by various actors with access to similar tooling," explained the SentinelLabs researchers.
"We were notified of this activity by SentinelOne, Mandiant, and Sophos on October 19, 2022, and subsequently performed an investigation into this activity.
"
Silence is golden partner for Truebot and Clop ransomware
exploits
ransomware
2022-12-13
https://www.malwarebytes.com/blog/news/2022/12/silence-is-golden-partner-for-truebot-and-clop-ransomware
Categories: News Categories: Ransomware Tags: Silence
Tags: TA505
Tags: Clop ransomware
Tags: Truebot
Tags: Grace
Tags: Cobalt Strike
Tags: Teleport
Tags: FIN11
Researchers have identified two new Truebot botnets that are using new versions of the Truebot downloader Trojan to infiltrate and explore a target"s network.
|
The post Silence is golden partner for Truebot and Clop ransomware appeared first on Malwarebytes Labs.
"
Autosummary:
The other botnet is almost exclusively composed of Windows servers, directly connected to the internet, and exposes several Windows services such as SMB, RDP, and WinRM.For those purposes, this new version of Truebot collects this information: a screenshot, the computer name, the local network name, and active directory trust relations.
Exfiltration
Besides the usual suspects designed to act as a backdoor, Cobalt Strike and Grace, the researchers also found a new data exfiltration tool.
"
Preventing a ransomware attack with intelligence: Strategies for CISOs
exploits
ransomware
2022-12-12
https://www.helpnetsecurity.com/2022/12/12/preventing-a-ransomware-attack-with-intelligence-strategies-for-cisos/
Bad news first: Ransomware isn’t going anywhere. The good news? The right intelligence can help organizations dramatically reduce risk surrounding a cyber extortion event. In fact, when organizations are armed with intelligence that’s timely, relevant, and actionable, they can bolster their own cyber defense measures and even prevent a ransomware attack from occurring in the first place. Knowledge is power More good news: We know how ransomware “gangs” work and, for the most part, what … More →
The post Preventing a ransomware attack with intelligence: Strategies for CISOs appeared first on Help Net Security.
"
Autosummary:
For instance, with vulnerability intelligence that includes exploit availability, attack type, impact, disclosure patterns, and other characteristics, vulnerability management teams predict the likelihood that a vulnerability could be used in a ransomware attack.
"
Royal Ransomware Threat Takes Aim at U.S. Healthcare System
exploits
ransomware
2022-12-12
https://thehackernews.com/2022/12/royal-ransomware-threat-takes-aim-at-us.html
The U.S. Department of Health and Human Services (HHS) has cautioned of ongoing Royal ransomware attacks targeting healthcare entities in the country.
"While most of the known ransomware operators have performed Ransomware-as-a-Service, Royal appears to be a private group without any affiliates while maintaining financial motivation as their goal," the agency"s Health Sector Cybersecurity
"
Autosummary:
"
TrueBot infections were observed in Clop ransomware attacks
exploits
ransomware
2022-12-12
https://securityaffairs.co/wordpress/139527/malware/truebot-infections-clop-ransomware-attacks.html
Researchers reported an increase in TrueBot infections, attackers have shifted from using malicious emails as their primary delivery method to other techniques. Cisco Talos researchers reported an increase in TrueBot infections, threat actors have shifted from using malicious emails as their primary attack vector to other techniques. Truebot has been active since 2017 and some researchers linked it to […]
The post TrueBot infections were observed in Clop ransomware attacks appeared first on Security Affairs.
"
Autosummary:
“The attackers, however, appear to have switched to an unknown TrueBot distribution mechanism starting in November, with the vector succeeding in co-opting over 500 internet-facing Windows servers located in the U.S., Canada, and Brazil into a botnet.” concludes the report that also includes Indicators of Compromise (IoCs).
"
Hive ransomware gang claims responsibility for attack on Intersport that left cash registers disabled
exploits
ransomware
2022-12-12
https://www.bitdefender.com/blog/hotforsecurity/hive-ransomware-gang-claims-responsibility-for-attack-on-intersport-that-left-cash-registers-disabled/
Sports retail giant Intersport, which boasts some 6000 stores worldwide in 57 countries, has fallen victim to a ransomware attack which disabled checkouts in France during what should have been one of the busiest times of the year.
Read more in my article on the Hot for Security blog.
"
Autosummary:
"
Play ransomware claims attack on Belgium city of Antwerp
exploits
government
ransomware
2022-12-12
https://www.bleepingcomputer.com/news/security/play-ransomware-claims-attack-on-belgium-city-of-antwerp/
The Play ransomware operation has claimed responsibility for a recent cyberattack on the Belgium city of Antwerp. [...]
"
Autosummary:
"
Clop ransomware partners with TrueBot malware for access to networks
exploits
ransomware
2022-12-11
https://www.bleepingcomputer.com/news/security/clop-ransomware-partners-with-truebot-malware-for-access-to-networks/
Security researchers have noticed a spike in devices infected with the TrueBot malware downloader created by a Russian-speaking hacking group known as Silence. [...]
"
Autosummary:
Silence continued their attacks and in three years between 2016 and 2019 they stole at least $4.2 million from banks in the former Soviet Union, Europe, Latin America, and Asia,
Silence/Truebot activity June 2016 - July 2019
source: Group-IB
Group-IB researchers describe Silence hackers as highly skilled, being able to reverse engineer malware to modify it for their purpose or adapt at the assembler instructions level an exploit used by nation-state group Fancy Bear.
Post-infection activity leading to Clop deployment (Cisco Talos)
“During the exploration and lateral movement phases, the attackers browsed key server and desktop file systems, connected to SQL databases, and collected data that was exfiltrated using the Teleport tool to an attacker-controlled server,” Cisco Talos researchers explain.
"
Clop ransomware uses TrueBot malware for access to networks
exploits
ransomware
2022-12-11
https://www.bleepingcomputer.com/news/security/clop-ransomware-uses-truebot-malware-for-access-to-networks/
Security researchers have noticed a spike in devices infected with the TrueBot malware downloader created by a Russian-speaking hacking group known as Silence. [...]
"
Autosummary:
Silence continued their attacks and in three years between 2016 and 2019 they stole at least $4.2 million from banks in the former Soviet Union, Europe, Latin America, and Asia,
Silence/Truebot activity June 2016 - July 2019
source: Group-IB
Group-IB researchers describe Silence hackers as highly skilled, being able to reverse engineer malware to modify it for their purpose or adapt at the assembler instructions level an exploit used by nation-state group Fancy Bear.
Post-infection activity leading to Clop deployment (Cisco Talos)
“During the exploration and lateral movement phases, the attackers browsed key server and desktop file systems, connected to SQL databases, and collected data that was exfiltrated using the Teleport tool to an attacker-controlled server,” Cisco Talos researchers explain.
"
The Week in Ransomware - December 9th 2022 - Wide Impact
exploits
ransomware
2022-12-10
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-december-9th-2022-wide-impact/
This week has been filled with research reports and news of significant attacks having a wide impact on many organizations. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include: @struppigel, @PolarToffee, @Seifreed, @fwosar, @DanielGallagher, @BleepinComputer, @Ionut_Ilascu, @LawrenceAbrams, @jorntvdw, @demonslay335, @billtoulas, @FourOctets, @VK_Intel, @serghei, @malwrhunterteam, @malwareforme, @pcrisk, @Unit42_Intel, @Fortinet, @briankrebs, @morphisec, @smgoreli, and @Phylum_IO.Unlike many other ransomware groups such as LockBit that follow a typical ransomware-as-a-service (RaaS) model, Vice Society’s operations are different in that they’ve been known for using forks of pre-existing ransomware families in their attack chain that are sold on DarkWeb marketplaces.
"
US HHS warns healthcare orgs of Royal Ransomware attacks
exploits
ransomware
2022-12-10
https://securityaffairs.co/wordpress/139486/cyber-crime/us-hhs-royal-ransomware-attacks.html
The US Department of Health and Human Services (HHS) warns healthcare organizations of Royal ransomware attacks. The human-operated Royal ransomware first appeared on the threat landscape in September 2022, it has demanded ransoms up to millions of dollars. The Health and Human Services (HHS) is aware of attacks against the Healthcare and Public Healthcare (HPH) […]
The post US HHS warns healthcare orgs of Royal Ransomware attacks appeared first on Security Affairs.
"
Autosummary:
HC3 added that threat actors continue to use multiple attack vectors associated with this ransomware, including phishing, Remote Desktop Protocol (RDP) compromises and credential abuse, compromises of exploited vulnerabilities, such as VPN servers, and compromises in other known vulnerabilities” HHS notes.
"
Rackspace customers rage following ransomware attack, as class-action lawsuits filed
exploits
ransomware
2022-12-09
https://www.bitdefender.com/blog/hotforsecurity/rackspace-customers-rage-following-ransomware-attack-as-class-action-lawsuits-filed/
As ever, what matters most is not so much whether an organisation gets hit or not by a ransomware attack, but how well it handles the aftermath and recovery.
Read more in my article on the Hot for Security blog.
"
Autosummary:
By 5 December, Rackspace said it had engaged third-party experts to look into the ransomware attack, and declined to confirm whether it had paid, or might be prepared to pay, the ransom to its extortionists.
"
Rackspace warns of phishing risks following ransomware attack
financial
exploits
ransomware
2022-12-09
https://www.bleepingcomputer.com/news/security/rackspace-warns-of-phishing-risks-following-ransomware-attack/
Cloud computing provider Rackspace warned customers on Thursday of increased risks of phishing attacks following a ransomware attack affecting its hosted Microsoft Exchange environment. [...]
"
Autosummary:
"
Rackspace added that customers could easily spot scammers attempting to steal their sensitive information since:
Emails from Rackspace will be sent from @rackspace.com emails (although attackers might still use a spoofed email address and redirect their targets to a landing phishing page)
Rackspace support will not ask for login credentials or personal information (e.g., social security number, driver"s license) during phone calls
Even though the company is yet to reveal if it has any evidence that the attackers have stolen data from its systems during the breach, customers were advised to remain vigilant and monitor their credit reports and banking account statements for suspicious activity.
"
NowSecure Mobile PTaaS offers continuous automated compliance testing
ransomware
2022-12-08
https://www.helpnetsecurity.com/2022/12/08/nowsecure-mobile-ptaas/
NowSecure has launched its latest offering, NowSecure Mobile Pen Testing as a Service (PTaaS), to bridge the gap between automated and manual mobile security assessments for continuous security. Designed to provide mobile developers and security teams with a more cost-effective, efficient pen testing solution, NowSecure PTaaS combines periodic expert manual assessments with automated continuous testing to optimize for full coverage at a higher frequency rate. With this combination, the all-in-one portal and service can identify … More →
The post NowSecure Mobile PTaaS offers continuous automated compliance testing appeared first on Help Net Security.
"
Autosummary:
Built on over 12 years of mobile application security experience and tens of thousands of pen tests performed, the NowSecure Mobile PTaaS cloud-based platform offers a depth of automated continuous and manual assessments, including:
Periodic expert pen testing based on specific need and schedule
On-demand and continuous security testing integrated into CI/CD & dev toolchain
Automatic generation of tickets that include embedded remediation resources
Remediation consulting with an expert pen tester
Optional industry standard(s) validations and certifications
All-in-one SAST, DAST, IAST, APISec, and SBOM
Easy to use, dedicated SaaS platform
“Mobile apps are critically important to business because they generate revenue and connect with customers.
"
Rackspace confirms it suffered a ransomware attack
exploits
ransomware
2022-12-08
https://www.malwarebytes.com/blog/news/2022/12/rackspace-confirms-it-suffered-a-ransomware-attack
Categories: News Categories: Ransomware Tags: Rackspace
Tags: Exchange
Tags: ransomware
Tags: ProxyNotShell
Rackspace said a ransomware incident affected its Hosted Exchange environment and caused service disruptions.
|
The post Rackspace confirms it suffered a ransomware attack appeared first on Malwarebytes Labs.
"
Autosummary:
Workaround
Rackspace said it will help affected customers implement a temporary forwarding while the disruption is ongoing:
“As a temporary solution while you set up Microsoft 365, it is possible to also implement a forwarding option that will allow mail destined for a Hosted Exchange user to be routed to an external email address.
"
CommonSpirit Health ransomware attack exposed data of 623,000 patients
exploits
ransomware
2022-12-08
https://www.bleepingcomputer.com/news/security/commonspirit-health-ransomware-attack-exposed-data-of-623-000-patients/
CommonSpirit Health has confirmed that threat actors accessed the personal data for 623,774 patients during an October ransomware attack. [...]
"
Autosummary:
"
US Health Dept warns of Royal Ransomware targeting healthcare
exploits
ransomware
2022-12-08
https://www.bleepingcomputer.com/news/security/us-health-dept-warns-of-royal-ransomware-targeting-healthcare/
The U.S. Department of Health and Human Services (HHS) issued a new warning today for the country"s healthcare organizations regarding ongoing attacks from a relatively new operation, the Royal ransomware gang. [...]
"
Autosummary:
Royal ransomware submissions (ID Ransomware)
Healthcare under attack
The federal government has also warned about other ransomware operations known for actively targeting healthcare organizations across the U.S.
For instance, last month, HHS warned of Venus ransomware impacting the country"s healthcare, with at least one entity known to have fallen victim to its attacks.
"
Vice Society Ransomware Attackers Targeted Dozens of Schools in 2022
exploits
ransomware
2022-12-07
https://thehackernews.com/2022/12/vice-society-ransomware-attackers.html
The Vice Society cybercrime group has disproportionately targeted educational institutions, accounting for 33 victims in 2022 and surpassing other ransomware families like LockBit, BlackCat, BianLian, and Hive.
Other prominent industry verticals targeted include healthcare, governments, manufacturing, retail, and legal services, according to an analysis of leak site data by Palo Alto Networks
"
Autosummary:
"
Open Source Ransomware Toolkit Cryptonite Turns Into Accidental Wiper Malware
exploits
ransomware
2022-12-06
https://thehackernews.com/2022/12/open-source-ransomware-toolkit.html
A version of an open source ransomware toolkit called Cryptonite has been observed in the wild with wiper capabilities due to its "weak architecture and programming."
Cryptonite, unlike other ransomware strains, is not available for sale on the cybercriminal underground, and was instead offered for free by an actor named CYBERDEVILZ until recently through a GitHub repository. The source code and
"
Autosummary:
"
Understanding NIST CSF to assess your organization"s Ransomware readiness
exploits
ransomware
2022-12-06
https://thehackernews.com/2022/12/understanding-nist-csf-to-assess-your.html
Ransomware attacks keep increasing in volume and impact largely due to organizations" weak security controls. Mid-market companies are targeted as they possess a significant amount of valuable data but lack the level of protective controls and staffing of larger organizations.
According to a recent RSM survey, 62% of mid-market companies believe they are at risk of ransomware in the next 12
"
Autosummary:
for each of the core functions: "Identify," "Protect," "Detect," "Respond," and "Recover":
Identify
Asset management is the process of knowing what all your organization"s critical assets are, where they"re located, who owns them, and who has access to them.
Additional controls can maximize your ransomware readiness: having communication templates (to ensure the team knows what, how, and whom to contact during an incident), performing mandatory event analysis, and deploying Security Orchestration, Automation, and Response (SOAR) technology as either a separate product or a native part of an XDR solution.According to the Microsoft Defender Report 2022, following 98% of basic security hygiene such as Multi-Factor Authentication (MFA), applying zero-trust principles, keeping software updated, and using extended detection and response anti-malware still protects against 98% of attacks.
"
Rackspace confirms outage was caused by ransomware attack
exploits
ransomware
2022-12-06
https://www.bleepingcomputer.com/news/security/rackspace-confirms-outage-was-caused-by-ransomware-attack/
Texas-based cloud computing provider Rackspace has confirmed today that a ransomware attack is behind an ongoing Hosted Exchange outage described as an "isolated disruption." [...]
"
Autosummary:
"
"As you know, on Friday, December 2nd, 2022, we became aware of suspicious activity and immediately took proactive measures to isolate the Hosted Exchange environment to contain the incident," the company said in an update to the initial incident report.
"
Rackspace Hosted Exchange outage was caused by ransomware
exploits
ransomware
2022-12-06
https://www.helpnetsecurity.com/2022/12/06/rackspace-ransomware/
Rackspace has finally confirmed the cause of the ongoing outage of its Hosted Exchange service: it’s ransomware. “As you know, on Friday, December 2nd, 2022, we became aware of suspicious activity and immediately took proactive measures to isolate the Hosted Exchange environment to contain the incident. We have since determined this suspicious activity was the result of a ransomware incident,” the company stated in the newest released service announcement. “Alongside our internal security team, we … More →
The post Rackspace Hosted Exchange outage was caused by ransomware appeared first on Help Net Security.
"
Autosummary:
The confirmation came just a few hours after the publication of a press release on the situation, in which Rackspace said the security incident “may result in a loss of revenue for the Hosted Exchange business, which generates approximately $30 million of annual revenue in the Apps & Cross Platform segment,” and that they expect to have “incremental costs associated with its response to the incident.”
"
Russian Courts Targeted by New CryWiper Data Wiper Malware Posing as Ransomware
exploits
ransomware
2022-12-05
https://thehackernews.com/2022/12/russian-courts-targeted-by-new-crywiper.html
A new data wiper malware called CryWiper has been found targeting Russian government agencies, including mayor"s offices and courts.
"Although it disguises itself as a ransomware and extorts money from the victim for "decrypting" data, [it] does not actually encrypt, but purposefully destroys data in the affected system," Kaspersky researchers Fedor Sinitsyn and Janis Zinchenko said in a
"
Autosummary:
"
French hospital cancels operations after a ransomware attack
exploits
ransomware
2022-12-05
https://securityaffairs.co/wordpress/139316/cyber-crime/french-hospital-ransomware-attack-2.html
A French hospital near Paris canceled operations and transfer some patients due to a cyber attack suffered over the weekend. France’s health ministry announced that the Hospital Centre of Versailles was hit by a cyber attack over the weekend. Hospital Centre of Versailles, which includes Andre-Mignot Hospital, Richaud Hospital and the Despagne Retirement Home, canceled […]
The post French hospital cancels operations after a ransomware attack appeared first on Security Affairs.
"
Autosummary:
Linkedin Whatsapp
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Russian courts attacked by CryWiper malware that poses as ransomware
exploits
ransomware
2022-12-05
https://www.bitdefender.com/blog/hotforsecurity/russian-courts-attacked-by-crywiper-malware-that-poses-as-ransomware/
Russian courts and government agencies have been hit by a previously-undocumented strain of data-wiping malware known as CryWiper.
It poses as ransomware, but isn"t interested in making money out of its victims...
Read more in my article on the Hot for Security blog.
"
Autosummary:
"
New CryWiper wiper targets Russian entities masquerading as a ransomware
exploits
ransomware
2022-12-04
https://securityaffairs.co/wordpress/139237/malware/crywiper-wiper.html
Experts spotted a new data wiper, dubbed CryWiper, that was employed in destructive attacks against Russian mayor’s offices and courts. Researchers from Kaspersky discovered a previously unknown data wiper, dubbed CryWiper, that was employed in destructive attacks against Russian mayor’s offices and courts. The malware masquerades as ransomware, but the analysis of the code demonstrates that it […]
The post New CryWiper wiper targets Russian entities masquerading as a ransomware appeared first on Security Affairs.
"
Autosummary:
Linkedin Whatsapp
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Cuba Ransomware Extorted Over $60 Million in Ransom Fees from More than 100 Entities
exploits
ransomware
2022-12-02
https://thehackernews.com/2022/12/cuba-ransomware-extorted-over-60.html
The threat actors behind Cuba (aka COLDDRAW) ransomware have received more than $60 million in ransom payments and compromised over 100 entities across the world as of August 2022.
In a new advisory shared by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of...
"
Autosummary:
"
Cuba Ransomware received over $60M in Ransom payments as of August 2022
exploits
ransomware
2022-12-02
https://securityaffairs.co/wordpress/139183/cyber-crime/cuba-ransomware-alert-cisa-fbi.html
Cuba ransomware gang received more than $60 million in ransom payments related to attacks against 100 entities worldwide as of August 2022. The threat actors behind the Cuba ransomware (aka COLDDRAW, Tropical Scorpius) have demanded over 145 million U.S. Dollars (USD) and received more than $60 million in ransom payments from over 100 victims worldwide […]
The post Cuba Ransomware received over $60M in Ransom payments as of August 2022 appeared first on Security Affairs.
"
Autosummary:
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) published a joint advisory that provides technical details about the gang’s operations, including tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) associated with Cuba ransomware.
"
The Week in Ransomware - December 2nd 2022 - Disrupting Health Care
exploits
ransomware
2022-12-02
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-december-2nd-2022-disrupting-health-care/
This week"s big news was the Colombia health system being severely disrupted by a ransomware attack on Keralty, one of the country"s largest healthcare providers. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include: @BleepinComputer, @LawrenceAbrams, @FourOctets, @demonslay335, @struppigel, @PolarToffee, @serghei, @fwosar, @DanielGallagher, @jorntvdw, @billtoulas, @Seifreed, @VK_Intel, @malwareforme, @malwrhunterteam, @Ionut_Ilascu, @kaspersky, @xfalexx,@hyperconectado, @kennethdee, @pcrisk, @pushecx, and @BrettCallow.
"
CISA and the FBI issue alert about Cuba ransomware
exploits
ransomware
2022-12-02
https://www.malwarebytes.com/blog/news/2022/12/cisa-and-fbi-issue-alert-about-cuba-ransomware
Categories: News Categories: Ransomware Tags: Cuba ransomware
Tags: ransomware
Tags: double extortion
Tags: Cybersecurity Advisory
Tags: CSA
Tags: CISA
Tags: FBI
Cuba ransomware is spotlighted in a recent cybersecurity advisory (CSA) in the ongoing #StopRansomware campaign spearheaded by CISA and the FBI.
|
The post CISA and the FBI issue alert about Cuba ransomware appeared first on Malwarebytes Labs.
"
Autosummary:
Like other ransomware groups, its threat actors use double extortion tactics, predominantly targeting organizations in the US in five critical infrastructure sectors: critical manufacturing, financial services, government facilities, healthcare and public health, and information technology.Various IOCs (associated files, email addresses, a Jabber address, IP addresses, Bitcoin wallets, and ransom notes) and MITRE ATT&CK techniques are also found on that page.
"
FBI: Cuba ransomware raked in $60 million from over 100 victims
exploits
ransomware
2022-12-01
https://www.bleepingcomputer.com/news/security/fbi-cuba-ransomware-raked-in-60-million-from-over-100-victims/
The FBI and CISA revealed in a new joint security advisory that the Cuba ransomware gang raked in over $60 million in ransoms as of August 2022 after breaching more than 100 victims worldwide. [...]
"
Autosummary:
Useful information that could help identify the ransomware gang"s members and the cybercriminals they work with includes "boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with ransomware actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.
"
AA22-335A: #StopRansomware: Cuba Ransomware
exploits
ransomware
2022-12-01
https://us-cert.cisa.gov/ncas/alerts/aa22-335a
Original release date: December 1, 2022
Summary
Actions to take today to mitigate cyber threats from ransomware:
• Prioritize remediating known exploited vulnerabilities.
• Train users to recognize and report phishing attempts.
• Enable and enforce phishing-resistant multifactor authentication.
Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.
The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint CSA to disseminate known Cuba ransomware IOCs and TTPs associated with Cuba ransomware actors identified through FBI investigations, third-party reporting, and open-source reporting. This advisory updates the December 2021 FBI Flash: Indicators of Compromise Associated with Cuba Ransomware.
Note: While this ransomware is known by industry as “Cuba ransomware,” there is no indication Cuba ransomware actors have any connection or affiliation with the Republic of Cuba.
Since the release of the December 2021 FBI Flash, the number of U.S. entities compromised by Cuba ransomware has doubled, with ransoms demanded and paid on the increase.
This year, Cuba ransomware actors have added to their TTPs, and third-party and open-source reports have identified
"
Autosummary:
Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by FBI or CISA.
Technical Details
Mitigations
FBI and CISA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques and to reduce the risk of compromise by Cuba ransomware: Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (i.e., hard drive, storage device, the cloud).REPORTING FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with ransomware actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.This year, Cuba ransomware actors have added to their TTPs, and third-party and open-source reports have identified a possible link between Cuba ransomware actors, RomCom Remote Access Trojan (RAT) actors, and Industrial Spy ransomware actors.
to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (i.e., hard drive, storage device, the cloud).
with password logins (e.g., service account, admin accounts, and domain admin accounts) with National Institute for Standards and Technology (NIST) standards for developing and managing password policies.
"
Keralty ransomware attack impacts Colombia"s health care system
exploits
latam
ransomware
2022-11-30
https://www.bleepingcomputer.com/news/security/keralty-ransomware-attack-impacts-colombias-health-care-system/
The Keralty multinational healthcare organization suffered a RansomHouse ransomware attack on Sunday, disrupting the websites and operations of the company and its subsidiaries. [...]
"
Autosummary:
Cyberattack disrupts Keralty"s operations
Over the past few days, Keralty and its subsidiaries, EPS Sanitas and Colsanitas, have suffered disruption to their IT operations, the scheduling of medical appointments, and its websites.
"
Trigona ransomware spotted in increasing attacks worldwide
exploits
ransomware
2022-11-29
https://www.bleepingcomputer.com/news/security/trigona-ransomware-spotted-in-increasing-attacks-worldwide/
A previously unnamed ransomware has rebranded under the name "Trigona," launching a new Tor negotiation site where they accept Monero as ransom payments. [...]
"
Autosummary:
Files encrypted by Trigona
Source: BleepingComputer
The ransomware will also embed the encrypted decryption key, the campaign ID, and the victim ID (company name) in the encrypted files.
"
RansomBoggs Ransomware hit several Ukrainian entities, experts attribute it to Russia
exploits
ransomware
2022-11-28
https://securityaffairs.co/wordpress/139028/cyber-warfare-2/ransomboggs-ransomware-targeted-ukraine.html
Several Ukrainian organizations were hit by Russia-based RansomBoggs Ransomware in the last week, ESET reports. Researchers from ESET observed multiple attacks involving a new family of ransomware, tracked as RansomBoggs ransomware, against Ukrainian organizations. The security firm first detected the attacks on November 21 and immediately alerted the CERT US. The ransomware is written in […]
The post RansomBoggs Ransomware hit several Ukrainian entities, experts attribute it to Russia appeared first on Security Affairs.
"
Autosummary:
A
9/9 — ESET research (@ESETresearch) November 25, 2022
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, RansomBoggs ransomware)
"
RansomBoggs: New ransomware targeting Ukraine
exploits
ransomware
2022-11-28
https://www.welivesecurity.com/2022/11/28/ransomboggs-new-ransomware-ukraine/
ESET researchers spot a new ransomware campaign that goes after Ukrainian organizations and has Sandworm"s fingerprints all over it
The post RansomBoggs: New ransomware targeting Ukraine appeared first on WeLiveSecurity
"
Autosummary:
RansomBoggs.A.
RansomBoggs at a glance
In the ransom note seen above (SullivanDecryptsYourFiles.txt), the authors of RansomBoggs make multiple references to the Monsters Inc. movie, including by impersonating James P. Sullivan, the movie’s main protagonist.
"
Russia-based RansomBoggs Ransomware Targeted Several Ukrainian Organizations
exploits
ransomware
2022-11-26
https://thehackernews.com/2022/11/russia-based-ransomboggs-ransomware.html
Ukraine has come under a fresh onslaught of ransomware attacks that mirror previous intrusions attributed to the Russia-based Sandworm nation-state group.
Slovak cybersecurity company ESET, which dubbed the new ransomware strain RansomBoggs, said the attacks against several Ukrainian entities were first detected on November 21, 2022.
"While the malware written in .NET is new, its deployment is
"
Autosummary:
"
New ransomware attacks in Ukraine linked to Russian Sandworm hackers
exploits
ransomware
2022-11-25
https://www.bleepingcomputer.com/news/security/new-ransomware-attacks-in-ukraine-linked-to-russian-sandworm-hackers/
New ransomware attacks targeting organizations in Ukraine first detected this Monday have been linked to the notorious Russian military threat group known as Sandworm. [...]
"
Autosummary:
Once pushed across a victim"s network, RansomBoggs encrypts files using AES-256 in CBC mode using a random key (randomly generated, RSA encrypted, and written to aes.bin), and it appends a .chsch extension to all encrypted files extension.
"
Vice Society ransomware claims attack on Cincinnati State college
exploits
government
ransomware
2022-11-25
https://www.bleepingcomputer.com/news/security/vice-society-ransomware-claims-attack-on-cincinnati-state-college/
The Vice Society ransomware operation has claimed responsibility for a cyberattack on Cincinnati State Technical and Community College, with the threat actors now leaking data allegedly stolen during the attack. [...]
"
Autosummary:
However, voicemail, network printing, VPN access, network and intranet shared drives are all unavailable, while a range of online application and registration portals are also offline.
"
How cloud PCs act as an insurance plan for ransomware recovery
exploits
ransomware
2022-11-24
https://www.helpnetsecurity.com/2022/11/24/cloud-pcs-business-recovery-video/
Although companies are spending billions on preventative security measures, attacks are a common occurrence. Business continuity requires enterprises to go beyond prevention and prioritize a strategic recovery plan. In this Help Net Security video, Matt Davidson, CTO at Workspot, discusses how cloud PCs are serving as a modern insurance plan for business recovery, enabling safe access for employees from anywhere in the world at a moment’s notice while IT leaders investigate and mitigate the damage.
The post How cloud PCs act as an insurance plan for ransomware recovery appeared first on Help Net Security.
"
Autosummary:
"
Black Basta Ransomware Gang Actively Infiltrating U.S. Companies with Qakbot Malware
exploits
ransomware
2022-11-24
https://thehackernews.com/2022/11/black-basta-ransomware-gang-actively.html
Companies based in the U.S. have been at the receiving end of an "aggressive" Qakbot malware campaign that leads to Black Basta ransomware infections on compromised networks.
"In this latest campaign, the Black Basta ransomware gang is using QakBot malware to create an initial point of entry and move laterally within an organization"s network," Cybereason researchers Joakim Kandefelt and
"
Autosummary:
"
An aggressive malware campaign targets US-based companies with Qakbot to deliver Black Basta Ransomware
exploits
ransomware
2022-11-24
https://securityaffairs.co/wordpress/138924/cyber-crime/qakbot-campaign-black-basta-ransomware.html
Researchers warn of an ongoing aggressive Qakbot malware campaign that leads to Black Basta ransomware infections in the US. Experts at the Cybereason Global SOC (GSOC) team have observed a surge in Qakbot infections as part of an ongoing aggressive Qakbot malware campaign that leads to Black Basta ransomware infections in the US. In the last two […]
The post An aggressive malware campaign targets US-based companies with Qakbot to deliver Black Basta Ransomware appeared first on Security Affairs.
"
Autosummary:
QakBot, also known as QBot or Pinkslipbot, is a banking trojan primarily used to steal victims’ financial data, including browser information, keystrokes, and credentials.”
"
New RansomExx Ransomware Variant Rewritten in the Rust Programming Language
exploits
ransomware
2022-11-24
https://thehackernews.com/2022/11/new-ransomexx-ransomware-variant.html
The operators of the RansomExx ransomware have become the latest to develop a new variant fully rewritten in the Rust programming language, following other strains like BlackCat, Hive, and Luna.
The latest version, dubbed RansomExx2 by the threat actor known as Hive0091 (aka DefrayX), is primarily designed to run on the Linux operating system, although it"s expected that a Windows version will
"
Autosummary:
"
RansomExx Ransomware upgrades to Rust programming language
exploits
ransomware
2022-11-24
https://securityaffairs.co/wordpress/138933/malware/ransomexx-ransomware-rust-language.html
RansomExx ransomware is the last ransomware in order of time to have a version totally written in the Rust programming language. The operators of the RansomExx ransomware (aka Defray777 and Ransom X) have developed a new variant of their malware, tracked as RansomExx2, that was ported into the Rust programming language. The move follows the […]
The post RansomExx Ransomware upgrades to Rust programming language appeared first on Security Affairs.
"
Autosummary:
The move follows the decision of other ransomware gangs, like Hive, Blackcat, and Luna, of rewriting their ransomware into Rust programming language.
"
For two years security experts kept secret that they were helping Zeppelin ransomware victims decrypt their files
exploits
ransomware
2022-11-23
https://grahamcluley.com/for-two-years-security-experts-kept-secret-that-they-were-helping-zeppelin-ransomware-victims-decrypt-their-files/
Researchers at cybersecurity firm Unit 221B have revealed that they have been secretly helping victims of the Zeppelin ransomware decrypt their computer systems since 2020.
"
Autosummary:
We have also dumped all of your documents relating to accounting, administration, legal, HR, NDA, SQL, passwords and more!
"
Hive ransomware has extorted $100 million in 18 months, FBI warns
exploits
ransomware
2022-11-23
https://www.bitdefender.com/blog/hotforsecurity/hive-ransomware-has-extorted-100-million-in-18-months-fbi-warns/
$100 million.
That"s the amount of money that the Hive ransomware is thought to have extorted from over 1300 companies around the world, according to a joint report from the FBI, CISA, and HHS.
Read more in my article on the Hot for Security blog.
"
Autosummary:
First seen in mid 2021, Hive is a ransomware-as-a-service (RaaS) operation, which different cybercriminals have used in attacks launched against healthcare institutions, non-profit organisations, energy providers, and retailers, amongst other sectors.
"
Ducktail information stealer continues to evolve
ransomware
2022-11-23
https://securityaffairs.co/wordpress/138894/cyber-crime/ducktail-information-stealer-evolution.html
The operators behind the Ducktail information stealer continue to improve their malicious code, operators experts warn. In late July 2022, researchers from WithSecure (formerly F-Secure Business) discovered an ongoing operation, named DUCKTAIL, that was targeting individuals and organizations that operate on Facebook’s Business and Ads platform. Experts attribute the campaign to a Vietnamese financially motivated […]
The post Ducktail information stealer continues to evolve appeared first on Security Affairs.
"
Autosummary:
Linkedin Whatsapp
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Ouch! Ransomware gang says it won’t attack AirAsia again due to the “chaotic organisation” and sloppy security of hacked company’s network
exploits
ransomware
2022-11-22
https://grahamcluley.com/ouch-ransomware-gang-says-it-wont-attack-airasia-again-due-to-the-chaotic-organisation-and-sloppy-security-of-hacked-companys-network/
The Daixin ransomware gang has given a humiliating slap in the face to Air Asia, which lost the personal data of five million passengers and all of its employees earlier this month.
"
Autosummary:
"
Donut extortion group also targets victims with ransomware
exploits
ransomware
2022-11-22
https://www.bleepingcomputer.com/news/security/donut-extortion-group-also-targets-victims-with-ransomware/
The Donut (D0nut) extortion group has been confirmed to deploy ransomware in double-extortion attacks on the enterprise. [...]
"
Autosummary:
Files encrypted by the Donut Ransomware
Source: BleepingComputer
The Donut Leaks operation has a flair for theatrics, using interesting graphics, a bit of humor, and even offering a builder for an executable that acts as a gateway to their Tor data leak site (see below).
"
Octocrypt, Alice, and AXLocker Ransomware, new threats in the wild
exploits
ransomware
2022-11-21
https://securityaffairs.co/wordpress/138783/malware/octocrypt-alice-axlocker-ransomware.html
Experts from Cyble Research and Intelligence Labs (CRIL) discovered three new ransomware families: AXLocker, Octocrypt, and Alice Ransomware. Threat intelligence firm Cyble announced the discovery of three new ransomware families named AXLocker, Octocrypt, and Alice Ransomware. The AXLocker ransomware encrypts victims’ files and steals Discord tokens from the infected machine. The analysis of the code […]
The post Octocrypt, Alice, and AXLocker Ransomware, new threats in the wild appeared first on Security Affairs.
"
Autosummary:
“After encrypting the victim’s files, the ransomware collects and sends sensitive information such as Computer name, Username, Machine IP address, System UUID, and Discord tokens to TA.” reads the analysis published by Cyble.
"
Daixin Ransomware Gang Steals 5 Million AirAsia Passengers" and Employees" Data
exploits
ransomware
2022-11-21
https://thehackernews.com/2022/11/daixin-ransomware-gang-steals-5-million.html
The cybercrime group called Daixin Team has leaked sample data belonging to AirAsia, a Malaysian low-cost airline, on its data leak portal.
The development comes a little over a week after the company fell victim to a ransomware attack on November 11 and 12, per DataBreaches.net.
The threat actors allegedly claim to have obtained the personal data associated with five million
"
Autosummary:
"
New ransomware encrypts files, then steals your Discord account
exploits
ransomware
2022-11-20
https://www.bleepingcomputer.com/news/security/new-ransomware-encrypts-files-then-steals-your-discord-account/
The new "AXLocker" ransomware family is not only encrypting victims" files and demanding a ransom payment but also stealing the Discord accounts of infected users. [...]
"
Autosummary:
To steal the Discord token, AxLocker will scan the following directories for and extract tokens using regular expressions:
Discord\Local Storage\leveldb
discordcanary\Local Storage\leveldb
discordptb\leveldb
Opera Software\Opera Stable\Local Storage\leveldb
Google\Chrome\User Data\\Default\Local Storage\leveldb
BraveSoftware\Brave-Browser\User Data\Default\Local Storage\leveldb
Yandex\YandexBrowser\User Data\Default\Local Storage\leveldb
AXLocker"s grab function (Cyble)
Eventually, victims are served a pop-up window containing the ransom note, informing them that their data was encrypted and how they contact the threat actor to purchase a decryptor.
"
Microsoft Warns of Hackers Using Google Ads to Distribute Royal Ransomware
exploits
ransomware
2022-11-19
https://thehackernews.com/2022/11/microsoft-warns-of-hackers-using-google.html
A developing threat activity cluster has been found using Google Ads in one of its campaigns to distribute various post-compromise payloads, including the recently discovered Royal ransomware.
Microsoft, which spotted the updated malware delivery method in late October 2022, is tracking the group under the name DEV-0569.
"Observed DEV-0569 attacks show a pattern of continuous innovation, with
"
Autosummary:
"
DEV-0569 group uses Google Ads to distribute Royal Ransomware
exploits
ransomware
2022-11-19
https://securityaffairs.co/wordpress/138750/malware/dev-0569-google-ads-royal-ransomware.html
Microsoft warns that a threat actor, tracked as DEV-0569, is using Google Ads to distribute the recently discovered Royal ransomware. Researchers from the Microsoft Security Threat Intelligence team warned that a threat actor, tracked as DEV-0569, is using Google Ads to distribute various payloads, including the recently discovered Royal ransomware. The DEV-0569 group carries out […]
The post DEV-0569 group uses Google Ads to distribute Royal Ransomware appeared first on Security Affairs.
"
Autosummary:
From August to October 2022, DEV-0569 attempted to spread the BATLOADER via malicious links in phishing emails, posed as legitimate installers for multiple popular applications, including TeamViewer, Adobe Flash Player, Zoom, and AnyDesk.
"
Transportation sector targeted by both ransomware and APTs
exploits
ransomware
2022-11-18
https://www.helpnetsecurity.com/2022/11/18/cybersecurity-trends-q3-2022/
Trellix released The Threat Report: Fall 2022 from its Advanced Research Center, which analyzes cybersecurity trends from the third quarter (Q3) of 2022. The report includes evidence of malicious activity linked to ransomware and nation-state backed advanced persistent threat (APT) actors. It examines malicious cyberactivity including threats to email, the malicious use of legitimate third-party security tools, and more. Q3 cybersecurity trends US ransomware activity leads the pack: In the US alone, ransomware activity increased … More →
The post Transportation sector targeted by both ransomware and APTs appeared first on Help Net Security.
"
Autosummary:
Emerging threat actors scaled : The China-linked threat actor, Mustang Panda, had the most detected threat indicators in Q3, followed by Russian-linked APT29 and Pakistan-linked APT36.The China-linked threat actor, Mustang Panda, had the most detected threat indicators in Q3, followed by Russian-linked APT29 and Pakistan-linked APT36.
"
Hive Ransomware Attackers Extorted $100 Million from Over 1,300 Companies Worldwide
exploits
ransomware
2022-11-18
https://thehackernews.com/2022/11/hive-ransomware-attackers-extorted-100.html
The threat actors behind the Hive ransomware-as-a-service (RaaS) scheme have launched attacks against over 1,300 companies across the world, netting the gang $100 million in illicit payments as of November 2022.
"Hive ransomware has targeted a wide range of businesses and critical infrastructure sectors, including government facilities, communications, critical manufacturing, information
"
Autosummary:
"
Hive Ransomware extorted over $100M in ransom payments from over 1,300 companies
exploits
ransomware
2022-11-18
https://securityaffairs.co/wordpress/138702/cyber-crime/hive-ransomware-extorted-100m.html
Hive ransomware operators have extorted over $100 million in ransom payments from over 1,300 companies worldwide as of November 2022. The threat actors behind the Hive ransomware-as-a-service (RaaS) have extorted $100 million in ransom payments from over 1,300 companies worldwide as of November 2022, reported the U.S. cybersecurity and intelligence authorities. “As of November 2022, […]
The post Hive Ransomware extorted over $100M in ransom payments from over 1,300 companies appeared first on Security Affairs.
"
Autosummary:
The authorities reported that from June 2021 through at least November 2022, threat actors employed the Hive ransomware in attacks aimed at a wide range of businesses and critical infrastructure sectors, including Government Facilities, Communications, Critical Manufacturing, Information Technology, and especially Healthcare and Public Health (HPH).
"
Researchers secretly helped decrypt Zeppelin ransomware for 2 years
exploits
ransomware
2022-11-18
https://www.bleepingcomputer.com/news/security/researchers-secretly-helped-decrypt-zeppelin-ransomware-for-2-years/
Security researchers found vulnerabilities in the encryption mechanism of the Zeppelin ransomware and exploited them to create a working decryptor they used since 2020 to help victim companies recover files without paying the attackers. [...]
"
Autosummary:
Retrieved public key in obfuscated form (Unit221b)
To overcome this final obstacle, Unit221b used a total of 800 central processing units (CPUs) in 20 servers, each with 40 CPUs.
"
The Week in Ransomware - November 18th 2022 - Rising Operations
exploits
ransomware
2022-11-18
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-november-18th-2022-rising-operations/
There have been some interesting developments in ransomware this week, with the arrest of a cybercrime ring leader and reports shedding light on two new, but up-and-coming, ransomware operations. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include: @struppigel, @Ionut_Ilascu, @malwareforme, @malwrhunterteam, @DanielGallagher, @serghei, @jorntvdw, @fwosar, @LawrenceAbrams, @PolarToffee, @demonslay335, @FourOctets, @billtoulas, @VK_Intel, @BleepinComputer, @pcrisk, @Seifreed, @GeeksCyber, @BlackBerry, @ahnlab, and @MsftSecIntel.
Finally, Ukraine says that a new Somnia ransomware is being used in attacks, CISA/FBI warned Iranian hackers breached a federal agency, and the FBI warned that Hive ransomware had made over $100 million in ransom payments.
"
AA22-321A: #StopRansomware: Hive Ransomware
exploits
ransomware
2022-11-17
https://us-cert.cisa.gov/ncas/alerts/aa22-321a
Original release date: November 17, 2022
Summary
Actions to Take Today to Mitigate Cyber Threats from Ransomware:
• Prioritize remediating known exploited vulnerabilities.
• Enable and enforce multifactor authentication with strong passwords
• Close unused ports and remove any application not deemed necessary for day-to-day operations.
Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.
The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Health and Human Services (HHS) are releasing this joint CSA to disseminate known Hive IOCs and TTPs identified through FBI investigations as recently as November 2022.
FBI, CISA, and HHS encourage organizations to implement the recommendations in the Mitigations section of this CSA to reduce the likelihood and impact of ransomware incidents. Victims of ransomware operations should report the incident to their local FBI field office or CISA.
Download the PDF version of this report: pdf, 852.9 kb.
Technical Details
Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 12. See MITRE ATT&CK
"
Autosummary:
Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by FBI, CISA, or HHS.Hive actors have also gained initial access to victim networks by distributing phishing emails with malicious attachments [T1566.001] and by exploiting the following vulnerabilities against Microsoft Exchange servers [T1190]: CVE-2021-31207 - Microsoft Exchange Server Security Feature Bypass Vulnerability
CVE-2021-34473 - Microsoft Exchange Server Remote Code Execution Vulnerability
CVE-2021-34523 - Microsoft Exchange Server Privilege Escalation Vulnerability After gaining access, Hive ransomware attempts to evade detention by executing processes to: Identify processes related to backups, antivirus/anti-spyware, and file copying and then terminating those processes to facilitate file encryption [T1562].From June 2021 through at least November 2022, threat actors have used Hive ransomware to target a wide range of businesses and critical infrastructure sectors, including Government Facilities, Communications, Critical Manufacturing, Information Technology, and especially Healthcare and Public Health (HPH).However, the FBI, CISA, and HHS understand that when businesses are faced with an inability to function, executives will evaluate all options to protect their shareholders, employees, and customers.
Mitigations
FBI, CISA, and HHS recommend organizations, particularly in the HPH sector, implement the following to limit potential adversarial use of common system and network discovery techniques and to reduce the risk of compromise by Hive ransomware: Verify Hive actors no longer have access to the network.Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (i.e., hard drive, storage device, the cloud).In addition, FBI, CISA, and HHS urge all organizations to apply the following recommendations to prepare for, mitigate/prevent, and respond to ransomware incidents.Exploit Public-Facing Application T1190 Hive actors gain access to victim network by exploiting the following Microsoft Exchange vulnerabilities: CVE-2021-34473, CVE-2021-34523, CVE-2021-31207, CVE-2021-42321.Regardless of whether you or your organization decide to pay the ransom, the FBI, CISA, and HHS urge you to promptly report ransomware incidents to your local FBI field office, or to CISA at report@cisa.gov or (888) 282-0870.Hive ransomware follows the ransomware-as-a-service (RaaS) model in which developers create, maintain, and update the malware, and affiliates conduct the ransomware attacks.The FBI may seek the following information that you determine you can legally share, including: Recovered executable files
Live random access memory (RAM) capture
Images of infected systems
Malware samples
IP addresses identified as malicious or suspicious
Email addresses of the attackers
A copy of the ransom note
Ransom amount
Bitcoin wallets used by the attackers
Bitcoin wallets used to pay the ransom
Post-incident forensic reports DISCLAIMER
with password logins (e.g., service account, admin accounts, and domain admin accounts) to comply with National Institute of Standards and Technology (NIST) standards for developing and managing password policies.
"
Previously unidentified ARCrypter ransomware expands worldwide
exploits
ransomware
2022-11-17
https://www.bleepingcomputer.com/news/security/previously-unidentified-arcrypter-ransomware-expands-worldwide/
A previously unknown "ARCrypter" ransomware that compromised key organizations in Latin America is now expanding its attacks worldwide. [...]
"
Autosummary:
The randomly-named payload dropped on a newly created folder (BlackBerry)
The ARCrypter payload then creates persistence by adding the following registry key:
“HKLM\Software\Microsoft\Windows\CurrentVersion\Run\SecurityUpdate”
Next, the malware deletes all Shadow Volume Copies to prevent easy data restoration, modifies network settings to secure stable connectivity, and then encrypts all files except for the types shown below.
"
FBI: Hive ransomware extorted $100M from over 1,300 victims
exploits
ransomware
2022-11-17
https://www.bleepingcomputer.com/news/security/fbi-hive-ransomware-extorted-100m-from-over-1-300-victims/
The Federal Bureau of Investigation (FBI) said today that the notorious Hive ransomware gang has successfully extorted roughly $100 million from over a thousand companies since June 2021. [...]
"
Autosummary:
"
Two public schools in Michigan hit by a ransomware attack
exploits
ransomware
2022-11-17
https://securityaffairs.co/wordpress/138677/cyber-crime/public-schools-michigan-ransomware.html
Public schools in two Michigan counties were forced to halt their activities, including the lessons, after a ransomware attack. Public schools in Jackson and Hillsdale counties, Michigan, reopen after a closure of two days caused by a ransomware attack that hit its systems. The public schools started experiencing a systems outage affecting critical operating […]
The post Two public schools in Michigan hit by a ransomware attack appeared first on Security Affairs.
"
Autosummary:
"
Creating a holistic ransomware strategy
exploits
ransomware
2022-11-15
https://www.helpnetsecurity.com/2022/11/15/ransomware-recovery-strategies-video/
Recent scientific research into the psychological effects of a ransomware crisis on both organizations and individuals revealed the deep marks that a ransomware crisis leaves on all those affected. It also shows how their IT and security teams can turn into disarray long after the crisis itself has passed. Zerto’s 2022 Ransomware Strategy Survey revealed gaps in companies’ data protection and ransomware strategies that they will want to address to reduce their risk of interrupting … More →
The post Creating a holistic ransomware strategy appeared first on Help Net Security.
"
Autosummary:
"
Healthcare sector warned of Venus ransomware attacks
exploits
ransomware
2022-11-15
https://www.tripwire.com/state-of-security/healthcare-sector-warned-venus-ransomware-attacks
Healthcare organisations in the United States are being warned to be on their guard once again, this time against a family of ransomware known as Venus.
Read more in my article on the Tripwire State of Security blog.
"
Autosummary:
The Venus ransomware attempts to terminate 39 processes associated with database servers and Microsoft office applications:
taskkill
msftesql.exe
sqlagent.exe
sqlbrowser.exe
sqlservr.exe
sqlwriter.exe
oracle.exe
ocssd.exe
dbsnmp.exe
synctime.exe
mydesktopqos.exe
agntsvc.exe
isqlplussvc.exe
xfssvccon.exe
mydesktopservice.exe
ocautoupds.exe
agntsvc.exe
agntsvc.exe
agntsvc.exe
encsvc.exe
firefoxconfig.exe
tbirdconfig.exe
ocomm.exe
mysqld.exe
mysqld-nt.exe
mysqld-opt.exe
dbeng50.exe
sqbcoreservice.exe
excel.exe
infopath.exe
msaccess.exe
mspub.exe
onenote.exe
outlook.exe
powerpnt.exe
sqlservr.exe
thebat64.exe
thunderbird.exe
winword.exe
wordpad.exe
Initial ransom payments demanded in Venus ransomware attacks appear to currently start around 1 BTC (at initial ransom demands may start around 1 BTC (which presently is worth less than US $17,000.)
"
The psychological fallout of a ransomware crisis
exploits
ransomware
2022-11-14
https://www.helpnetsecurity.com/2022/11/14/psychological-impact-ransomware-attacks-video/
Northwave has conducted scientific research into the psychological fallout of a ransomware crisis on both organizations and individuals. The findings reveal the deep marks that a ransomware crisis leaves on all those affected. It also shows how their IT and security teams can turn into disarray long after the problem has passed. In this Help Net Security video, Inge van der Beijl, Director Behaviour & Resilience at Northwave, talks about the research findings and illustrates … More →
The post The psychological fallout of a ransomware crisis appeared first on Help Net Security.
"
Autosummary:
"
CERT-UA warns of multiple Somnia ransomware attacks against organizations in Ukraine
exploits
ransomware
2022-11-14
https://securityaffairs.co/wordpress/138496/hacking/somnia-ransomware-attacks-ukraine.html
Russian threat actors employed a new ransomware family called Somnia in attacks against multiple organizations in Ukraine. The Government Computer Emergency Response Team of Ukraine CERT-UA is investigating multiple attacks against organizations in Ukraine that involved a new piece of ransomware called Somnia. Government experts attribute the attacks to the group ‘From Russia with Love’ […]
The post CERT-UA warns of multiple Somnia ransomware attacks against organizations in Ukraine appeared first on Security Affairs.
"
Autosummary:
In the second version, the AES algorithm is implemented; at the same time, taking into account the dynamics of the key and the initialization vector, this version of Somnia, according to the attackers’ theoretical plan, does not provide for the possibility of data decryption.”
"
Russian hacktivists hit Ukrainian orgs with ransomware – but no ransom demands
exploits
ransomware
2022-11-14
https://www.helpnetsecurity.com/2022/11/14/somnia-ransomware-ukrainian/
The Ukrainian CERT (CERT-UA) has uncovered an attack campaign aimed at compromising Ukrainian organizations and irretrievably encrypting their files. To do that, they are leveraging a specific version of the Somnia ransomware that, “according to the attackers’ theoretical plan, does not provide for the possibility of data decryption.” How the attacks unfolded The Ukrainian cyber experts believe that the attack was effected by Russian hacktivists that go by FRwL (From Russia with Love), with help … More →
The post Russian hacktivists hit Ukrainian orgs with ransomware – but no ransom demands appeared first on Help Net Security.
"
Autosummary:
"
Lockbit gang leaked data stolen from global high-tech giant Thales
ransomware
2022-11-13
https://securityaffairs.co/wordpress/138471/data-breach/lockbit-leaked-thales-files.html
The Lockbit 3.0 ransomware gang started leaking the information allegedly stolen from the global high-tech company Thales. Thales is a global high-tech leader with more than 81,000 employees worldwide. The Group invests in digital and deep tech innovations – big data, artificial intelligence, connectivity, cybersecurity and quantum – to build a future of trust, essential […]
The post Lockbit gang leaked data stolen from global high-tech giant Thales appeared first on Security Affairs.
"
Autosummary:
The Group invests in digital and deep tech innovations – big data, artificial intelligence, connectivity, cybersecurity and quantum – to build a future of trust, essential to the development of our societies, by placing people at the heart of decision-making.
"
Ukraine says Russian hacktivists use new Somnia ransomware
exploits
ransomware
2022-11-13
https://www.bleepingcomputer.com/news/security/ukraine-says-russian-hacktivists-use-new-somnia-ransomware/
Russian hacktivists have infected multiple organizations in Ukraine with a new ransomware strain called "Somnia," encrypting their systems and causing operational problems. [...]
"
Autosummary:
The file types (extensions) targeted by Somnia ransomware are shown below, including documents, images, databases, archives, video files, and more, reflecting the destruction this strain aims to cause.
"
Canadian supermarket chain giant Sobeys suffered a ransomware attack
exploits
ransomware
2022-11-12
https://securityaffairs.co/wordpress/138424/cyber-crime/sobeys-ransomware-attack.html
Sobeys, the second-largest supermarket chain in Canada, was he victim of a ransomware attack conducted by the Black Basta gang. Sobeys Inc. is the second largest supermarket chain in Canada, the company operates over 1,500 stores operating across Canada under a variety of banners. It is a wholly-owned subsidiary of Empire Company Limited, a Canadian business conglomerate. During […]
The post Canadian supermarket chain giant Sobeys suffered a ransomware attack appeared first on Security Affairs.
"
Autosummary:
“Both Quebec’s access to information commission and Alberta’s privacy commission have both been notified by the grocer about a “confidentiality incident.”” reported the website Toronto Star..
source Imgur Images shared by an employee
Bleeping Computer first reported that the systems of the company were infected with the Black Basta, the attribution of the attack is based on ransom notes and negotiation chats Bleeping Computer has observed.
"
Flashpoint’s ransomware prediction model enables security teams to remediate vulnerabilities
exploits
ransomware
2022-11-11
https://www.helpnetsecurity.com/2022/11/11/flashpoint-ransomware-prediction-model/
Flashpoint announced a ransomware prediction model that allows vulnerability management teams to improve remediation efforts that could prevent cyber extortion events with VulnDB. According to the U.S. Treasury Department, financial institutions filed $1.2B in ransomware-related costs in 2021, nearly double the amount reported by banks in 2020. In order to help organizations proactively prevent a ransomware attack, Flashpoint’s latest capability enables vulnerability management teams to identify the likelihood that a particular vulnerability could be used … More →
The post Flashpoint’s ransomware prediction model enables security teams to remediate vulnerabilities appeared first on Help Net Security.
"
Autosummary:
"
Microsoft Blames Russian Hackers for Prestige Ransomware Attacks on Ukraine and Poland
exploits
ransomware
2022-11-11
https://thehackernews.com/2022/11/microsoft-blames-russian-hackers-for.html
Microsoft on Thursday attributed the recent spate of ransomware incidents targeting transportation and logistics sectors in Ukraine and Poland to a threat cluster that shares overlaps with the Russian state-sponsored Sandworm group.
The attacks, which were disclosed by the tech giant last month, involved a strain of previously undocumented malware called Prestige and is said to have taken place
"
Autosummary:
"
Russian-Canadian National Charged Over Involvement in LockBit Ransomware Attacks
exploits
ransomware
2022-11-11
https://thehackernews.com/2022/11/russian-canadian-national-charged-over.html
The U.S. Department of Justice (DoJ) has announced charges against a dual Russian and Canadian national for his alleged participation in LockBit ransomware attacks across the world.
The 33-year-old Ontario resident, Mikhail Vasiliev, has been taken into custody and is awaiting extradition to the U.S., where is likely to be sentenced for a maximum of five years in prison.
Vasiliev has been
"
Autosummary:
"
Russia-linked IRIDIUM APT linked to Prestige ransomware attacks against Ukraine
exploits
ransomware
2022-11-11
https://securityaffairs.co/wordpress/138362/apt/prestige-ransomware-linked-iridium.html
Microsoft linked Prestige ransomware attacks against organizations in Ukraine and Poland to Russia-linked threat actors. In Mid-October, Microsoft Threat Intelligence Center (MSTIC) researchers uncovered previously undetected ransomware, tracked as Prestige ransomware, employed in attacks targeting organizations in the transportation and related logistics industries in Ukraine and Poland. The Prestige ransomware first appeared in the threat […]
The post Russia-linked IRIDIUM APT linked to Prestige ransomware attacks against Ukraine appeared first on Security Affairs.
"
Autosummary:
MSTIC researchers observed threat actors using three methods to deploy the Prestige ransomware:
Method 1: The ransomware payload is copied to the ADMIN$ share of a remote system, and Impacket is used to remotely create a Windows Scheduled Task on target systems to execute the payload
Method 2: The ransomware payload is copied to the ADMIN$ share of a remote system, and Impacket is used to remotely invoke an encoded PowerShell command on target systems to execute the payload
Method 3: The ransomware payload is copied to an Active Directory Domain Controller and deployed to systems using the Default Domain Group Policy Object
Microsoft published a list of indicators of compromise (IOCs) and advanced hunting queries detect Prestige ransomware infections.
"
Alleged LockBit ransomware operator arrested in Canada
exploits
ransomware
2022-11-11
https://www.bitdefender.com/blog/hotforsecurity/alleged-lockbit-ransomware-operator-arrested-in-canada/
A man with dual Russian and Canadian nationality has been arrested in connection with his alleged part in the LockBit ransomware conspiracy that has demanded more than $100 million from its victims.
Read more in my article on the Hot for Security blog.
"
Autosummary:
In addition, the criminal complaint against Vasiliev says that screenshots of end-to-end encrypted conversations with the Tux username "LockBitSupp" (assumed to be shorthand for "LockBitSupport") were uncovered, which contained multiple discussions related to the ransomware operation and communication with victims.
"
Man charged for role in LockBit ransomware operation
exploits
ransomware
2022-11-11
https://securityaffairs.co/wordpress/138381/cyber-crime/man-charged-lockbit-ransomware-attacks.html
The U.S. DoJ charged a Russian-Canadian national for his alleged role in LockBit ransomware attacks against organizations worldwide. The U.S. Department of Justice (DoJ) charged Mikhail Vasiliev, a dual Russian and Canadian national, for his alleged participation in the LockBit ransomware operation. According to the press release published by DoJ, the man is currently in custody in […]
The post Man charged for role in LockBit ransomware operation appeared first on Security Affairs.
"
Autosummary:
“This arrest is the result of over two-and-a-half-years of investigation into the LockBit ransomware group, which has harmed victims in the United States and around the world,” said Deputy Attorney General Lisa O. Monaco.
"
Canadian food retail giant Sobeys hit by Black Basta ransomware
exploits
ransomware
2022-11-11
https://www.bleepingcomputer.com/news/security/canadian-food-retail-giant-sobeys-hit-by-black-basta-ransomware/
Grocery stores and pharmacies belonging to Canadian food retail giant Sobeys have been experiencing IT systems issues since last weekend. [...]
"
Autosummary:
Sobeys is one of two national grocery retailers in Canada, with 134,000 employees servicing a network of 1,500 stores in all ten provinces under multiple retail banners, including Sobeys, Safeway, IGA, Foodland, FreshCo, Thrifty Foods, and Lawtons Drugs.
"
The Week in Ransomware - November 11th 2022 - LockBit feeling the heat
exploits
ransomware
2022-11-11
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-november-11th-2022-lockbit-feeling-the-heat/
This "Week in Ransomware" covers the last two weeks of ransomware news, with new information on attacks, arrests, data wipers, and reports shared by cybersecurity firms and researchers. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include @jorntvdw, @DanielGallagher, @Seifreed, @LawrenceAbrams, @struppigel, @malwareforme, @demonslay335, @Ionut_Ilascu, @fwosar, @FourOctets, @VK_Intel, @malwrhunterteam, @serghei, @PolarToffee, @BleepinComputer, @billtoulas, @LabsSentinel, @vinopaljiri, @_CPResearch_, @ahnlab.
"
How ransomware gangs and malware campaigns are changing
exploits
ransomware
2022-11-10
https://www.helpnetsecurity.com/2022/11/10/malware-ransomware-trends/
Deep Instinct released its 2022 Bi-Annual Cyber Threat Report which focuses on the top malware and ransomware trends and tactics from the first half of 2022 and provides key takeaways and predictions for the ever-evolving cybersecurity threat landscape. “2022 has been another record year for cyber criminals and ransomware gangs. It’s no secret that these threat actors are constantly upping their game with new and improved tactics designed to evade traditional cyber defenses,” said Mark … More →
The post How ransomware gangs and malware campaigns are changing appeared first on Help Net Security.
"
Autosummary:
Not surprisingly, ransomware attacks remain a serious threat to organizations, as there are currently 17 leaked databases operated by threat actors who are leveraging the data for attacks on third-party companies, most notably social engineering, credential theft, and triple-extortion attacks.
"
Russian LockBit ransomware operator arrested in Canada
exploits
ransomware
2022-11-10
https://www.bleepingcomputer.com/news/security/russian-lockbit-ransomware-operator-arrested-in-canada/
Europol has announced today the arrest of a Russian national linked to LockBit ransomware attacks targeting critical infrastructure organizations and high-profile companies worldwide. [...]
"
Autosummary:
"
Law enforcement agents also seized eight computers and 32 external hard drives, two firearms, and €400,000 worth of cryptocurrency from the suspect"s home,
Europol added that this LockBit operator "was one of Europol"s high-value targets due to his involvement in numerous high-profile ransomware cases," and he is known for trying to extort victims with ransom demands between €5 to €70 million.
"
US Health Dept warns of Venus ransomware targeting healthcare orgs
exploits
ransomware
2022-11-10
https://www.bleepingcomputer.com/news/security/us-health-dept-warns-of-venus-ransomware-targeting-healthcare-orgs/
The U.S. Department of Health and Human Services (HHS) warned today that Venus ransomware attacks are also targeting the country"s healthcare organizations. [...]
"
Autosummary:
"
Russian military hackers linked to ransomware attacks in Ukraine
exploits
ransomware
2022-11-10
https://www.bleepingcomputer.com/news/security/russian-military-hackers-linked-to-ransomware-attacks-in-ukraine/
A series of attacks targeting transportation and logistics organizations in Ukraine and Poland with Prestige ransomware since October have been linked to an elite Russian military cyberespionage group. [...]
"
Autosummary:
"
Experts observed Amadey malware deploying LockBit 3.0 Ransomware
exploits
ransomware
2022-11-09
https://securityaffairs.co/wordpress/138292/malware/amadey-malware-deploying-lockbit-3-0.html
Experts noticed that the Amadey malware is being used to deploy LockBit 3.0 ransomware on compromised systems. Researchers from AhnLab Security Emergency Response Center (ASEC) reported that the Amadey malware is being used to deploy LockBit 3.0 ransomware on compromised systems, researchers have warned. Amadey Bot is a data-stealing malware that was first spotted in 2018, it also allows […]
The post Experts observed Amadey malware deploying LockBit 3.0 Ransomware appeared first on Security Affairs.
"
Autosummary:
Linkedin
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Medibank warns customers their data was leaked by ransomware gang
financial
exploits
ransomware
2022-11-09
https://www.bleepingcomputer.com/news/security/medibank-warns-customers-their-data-was-leaked-by-ransomware-gang/
Australian health insurance giant Medibank has warned customers that the ransomware group behind last month"s breach has started to leak data stolen from its systems. [...]
"
Autosummary:
The data Medibank believes was exposed in last month"s breach includes the following:
Name, date of birth, address, phone number, and email address for approximately 9.7 million current and former customers and authorized representatives
Medicare numbers (but not expiry dates) for ahm health insurance (ahm) customers
Passport numbers (but not expiry dates) and visa details for international student customers
Health claims data for roughly 480,000 Medibank, ahm, and international customers
Health provider details, including names, provider numbers, and addresses
However, according to Medibank "given the nature of this crime, unfortunately we now believe that all of the customer data accessed could have been taken by the criminal.
"
Medibank confirms ransomware attack impacting 9.7M customers, but doesn’t pay the ransom
financial
exploits
ransomware
2022-11-08
https://securityaffairs.co/wordpress/138243/cyber-crime/medibank-confirms-ransomware-attack.html
Australian health insurer Medibank confirmed that personal data belonging to around 9.7 million current and former customers were exposed as a result of a ransomware attack. Medibank announced that personal data belonging to around 9.7M of current and former customers were exposed as a result of a recent ransomware attack. Medibank is one of the […]
The post Medibank confirms ransomware attack impacting 9.7M customers, but doesn’t pay the ransom appeared first on Security Affairs.
"
Autosummary:
This figure represents around 5.1 million Medibank customers, around 2.8 million ahm customers and around 1.8 million international customers
Medicare numbers (but not expiry dates) for ahm customers
Passport numbers (but not expiry dates) and visa details for international student customers
Health claims data for around 160,000 Medibank customers, around 300,000 ahm customers and around 20,000 international customers.
"
Amadey Bot Spotted Deploying LockBit 3.0 Ransomware on Hacked Machines
exploits
ransomware
2022-11-08
https://thehackernews.com/2022/11/amadey-bot-spotted-deploying-lockbit-30.html
The Amadey malware is being used to deploy LockBit 3.0 ransomware on compromised systems, researchers have warned.
"Amadey bot, the malware that is used to install LockBit, is being distributed through two methods: one using a malicious Word document file, and the other using an executable that takes the disguise of the Word file icon," AhnLab Security Emergency Response Center (ASEC) said in a
"
Autosummary:
"
LockBit affiliate uses Amadey Bot malware to deploy ransomware
exploits
ransomware
2022-11-08
https://www.bleepingcomputer.com/news/security/lockbit-affiliate-uses-amadey-bot-malware-to-deploy-ransomware/
A LockBit 3.0 ransomware affiliate is using phishing emails that install the Amadey Bot to take control of a device and encrypt devices. [...]
"
Autosummary:
The payloads are again dropped in TEMP as one of the following three:
%TEMP%\1000018041\dd.ps1
%TEMP%\1000019041\cc.ps1
%TEMP%\1000020001\LBB.exe
From there, LockBit encrypts the user"s files and generates ransom notes demanding payment, threatening to publish stolen files on the group"s extortion site.
"
Medibank Refuses to Pay Ransom After 9.7 Million Customers Exposed in Ransomware Hack
financial
exploits
ransomware
2022-11-07
https://thehackernews.com/2022/11/medibank-refuses-to-pay-ransom-after-97.html
Australian health insurer Medibank today confirmed that personal data belonging to around 9.7 million of its current and former customers were accessed following a ransomware incident.
The attack, according to the company, was detected in its IT network on October 12 in a manner that it said was "consistent with the precursors to a ransomware event," prompting it to isolate its systems, but not
"
Autosummary:
"
Robin Banks phishing-as-a-service platform continues to evolve
financial
ransomware
2022-11-07
https://securityaffairs.co/wordpress/138199/cyber-crime/robin-banks-phaas.html
The phishing-as-a-service (PhaaS) platform Robin Banks migrated its infrastructure to DDoS-Guard, a Russian bulletproof hosting service. The phishing-as-a-service (PhaaS) platform Robin Banks was originally hosted by Cloudflare provider, but the company in July disassociated Robin Banks phishing infrastructure from its services after being informed. The move caused a multi-day disruption to PhaaS operations, then the administrators […]
The post Robin Banks phishing-as-a-service platform continues to evolve appeared first on Security Affairs.
"
Autosummary:
“Robin Banks’ heavy reliance on open-source code and off-the-shelf tooling showcases just how low the barrier-to-entry is to not only conducting phishing attacks, but also to becoming a service provider and creating a PhaaS platform for others to use.
Linkedin
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Azov Ransomware is a wiper, destroying data 666 bytes at a time
exploits
ransomware
2022-11-07
https://www.bleepingcomputer.com/news/security/azov-ransomware-is-a-wiper-destroying-data-666-bytes-at-a-time/
The Azov Ransomware continues to be heavily distributed worldwide, now proven to be a data wiper that intentionally destroys victims" data and infects other programs. [...]
"
Autosummary:
"This works in a loop, so wiped file structure would look like this: 666 bytes of garbage, 666 bytes original, 666bytes of garbage, 666 bytes original, etc…"
Corrupting data in alternating 666 bytes of data
Source: Jiří Vinopal
To make matters even worse, the data wiper will infect, or "backdoor," other 64-bit executables on the Windows device whose file path does not contain the following strings:
:\Windows \ProgramData\ \cache2\entries \Low\Content.
"
LockBit 3.0 gang claims to have stolen data from Kearney & Company
ransomware
2022-11-06
https://securityaffairs.co/wordpress/138136/cyber-crime/lockbit-ransomware-kearney-company.html
The ransomware group LockBit claimed to have stolen data from consulting and IT services provider Kearney & Company. Kearney is the premier CPA firm that services across the financial management spectrum to government entities. The company provides audit, consulting and IT services to the United States government. It has helped the Federal Government improve its […]
The post LockBit 3.0 gang claims to have stolen data from Kearney & Company appeared first on Security Affairs.
"
Autosummary:
"
Black Basta ransomware gang linked to the FIN7 hacking group
exploits
ransomware
2022-11-03
https://www.bleepingcomputer.com/news/security/black-basta-ransomware-gang-linked-to-the-fin7-hacking-group/
Security researchers at Sentinel Labs have uncovered evidence that links the Black Basta ransomware gang to the financially motivated hacking group FIN7, also known as "Carbanak." [...]
"
Autosummary:
A 2022 Mandiant report explained that FIN7 was working with various ransomware gangs, including Maze, Ryuk, Darkside, and BlackCat/ALPHV, apparently carrying out the initial compromise.
"
Experts link the Black Basta ransomware operation to FIN7 cybercrime gang
exploits
ransomware
2022-11-03
https://securityaffairs.co/wordpress/138037/cyber-crime/black-basta-linked-fin7.html
Sentinel Labs found evidence that links the Black Basta ransomware gang to the financially motivated hacking group FIN7. Security researchers at Sentinel Labs shared details about Black Basta‘s TTPs and assess it is highly likely the ransomware operation has ties with FIN7. The experts analyzed tools used by the ransomware gang in attacks, some of […]
The post Experts link the Black Basta ransomware operation to FIN7 cybercrime gang appeared first on Security Affairs.
"
Autosummary:
The report details Black Basta’s initial access activity, manual reconnaissance, lateral movements, privilege escalation techniques, and remote admin tools.Furthermore, we assess it is likely that the developer(s) behind their tools to impair victim defenses is, or was, a developer for FIN7.” concludes the report.
"
LockBit ransomware claims attack on Continental automotive giant
exploits
ransomware
industry
2022-11-03
https://www.bleepingcomputer.com/news/security/lockbit-ransomware-claims-attack-on-continental-automotive-giant/
The LockBit ransomware gang has claimed responsibility for a cyberattack against the German multinational automotive group Continental. [...]
"
Autosummary:
Continental entry on Lockbit"s data leak site (BleepingComputer)
Breached in an August cyberattack
Continental"s VP of Communications & Marketing, Kathryn Blackwell, didn"t confirm LockBit"s claims and would not share any details regarding the attack when BleepingComputer reached out but, instead, linked to a press release from August 24 regarding a cyberattack that led to a breach of Continental"s systems.
"
Researchers Find Links b/w Black Basta Ransomware and FIN7 Hackers
exploits
ransomware
2022-11-03
https://thehackernews.com/2022/11/researchers-find-links-bw-black-basta.html
A new analysis of tools put to use by the Black Basta ransomware operation has identified ties between the threat actor and the FIN7 (aka Carbanak) group.
This link "could suggest either that Black Basta and FIN7 maintain a special relationship or that one or more individuals belong to both groups," cybersecurity firm SentinelOne said in a technical write-up shared with The Hacker News.
Black
"
Autosummary:
Once Qakbot obtains a persistent foothold in the target environment, the Black Basta operator enters the scene to conduct reconnaissance by connecting to the victim through the backdoor, followed by exploiting known vulnerabilities (e.g., ZeroLogon, PrintNightmare, and NoPac) to escalate privileges.
"
LockBit ransomware gang claims the hack of Continental automotive group
exploits
ransomware
industry
2022-11-03
https://securityaffairs.co/wordpress/138062/cyber-crime/lockbit-gang-claims-continental-hack.html
The LockBit ransomware group claimed to have hacked the multinational automotive group Continental and threatens to leak stolen data. LockBit ransomware gang announced to have hacked the German multinational automotive parts manufacturing company Continental. The group added the name of the company to its Tor leak site and is threatening to publish alleged stolen data if the […]
The post LockBit ransomware gang claims the hack of Continental automotive group appeared first on Security Affairs.
"
Autosummary:
"
Forescout Continuum Timeline accelerates threat detection for cybersecurity teams
ransomware
ciber
2022-11-02
https://www.helpnetsecurity.com/2022/11/02/forescout-continuum-timeline/
Forescout Technologies has released its latest Continuum platform update which includes Forescout Continuum Timeline, a new cloud-native solution that provides long-term retention, search, and analytics of asset data. Timeline enables enterprises to meet compliance and audit requirements, better support incident investigations, and to identify risks and gaps to help prioritize preventative measures. Today, all organizations need an automated way of maintaining real-time asset intelligence for every connected device. Cybersecurity teams overwhelmed with rapid asset growth … More →
The post Forescout Continuum Timeline accelerates threat detection for cybersecurity teams appeared first on Help Net Security.
"
Autosummary:
This Continuum platform update expands asset discovery, assessment, and management capabilities to reduce high manual labor costs, performance issues, challenges with keeping asset databases current, business disruptions, and the risk of security breaches due to asset intelligence gaps.
"
LockBit 3.0 gang claims to have stolen data from Thales
ransomware
2022-11-01
https://securityaffairs.co/wordpress/137955/cyber-crime/lockbit-3-0-thales.html
The ransomware group LockBit 3.0 claimed to have stolen data from the French defence and technology group Thales. Thales is a global high-tech leader with more than 81,000 employees worldwide. The Group invests in digital and deep tech innovations – big data, artificial intelligence, connectivity, cybersecurity and quantum – to build a future of trust, […]
The post LockBit 3.0 gang claims to have stolen data from Thales appeared first on Security Affairs.
"
Autosummary:
"
Raspberry Robin worm used as ransomware prelude
exploits
ransomware
2022-10-31
https://www.malwarebytes.com/blog/news/2022/10/raspberry-robin-worm-used-as-ransomware-prelude
Categories: News Categories: Ransomware Tags: Raspberry Robin
Tags: FakeUpdates
Tags: LockBit
Tags: Clop
Tags: ransomware
Microsoft warns that the Raspberry Robin worm has triggered payload alerts on devices of almost 1,000 organizations in the past 30 days and is used to introduce ransomware.
|
The post Raspberry Robin worm used as ransomware prelude appeared first on Malwarebytes Labs.
"
Autosummary:
Microsoft found that Raspberry Robin has been used to facilitate FakeUpdates (SocGholish), Fauppod, IcedID, Bumblebee, TrueBot, LockBit, and human-operated intrusions.
"
The Week in Ransomware - October 28th 2022 - Healthcare leaks
exploits
ransomware
2022-10-28
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-october-28th-2022-healthcare-leaks/
This week, we learned of healthcare data leaks out of Australia, information about existing attacks, and reports on how ransomware gangs operate and partner with malware developers for initial access. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include: @LawrenceAbrams, @BleepinComputer, @struppigel, @malwrhunterteam, @serghei, @fwosar, @Ionut_Ilascu, @DanielGallagher, @VK_Intel, @jorntvdw, @demonslay335, @billtoulas, @FourOctets, @Seifreed, @PolarToffee, @malwareforme, @AlvieriD, @_CERT_UA, @Jeremy_Kirk, @MsftSecIntel, @pcrisk, @TrendMicro, @DragosInc, and @BrettCallow.
We also learned more information about new and existing ransomware attacks, such as an alleged 60 million LockBit ransomware demand on Pendragon, Hive claiming the attack on Tata Power, Medibank warning that the hackers accessed all customers" personal data, a ransomware attack on the Indianapolis Housing Agency, and Australian Clinical Labs disclosing that patient data was stolen.
"
Microsoft links Raspberry Robin worm to Clop ransomware attacks
exploits
ransomware
2022-10-27
https://www.bleepingcomputer.com/news/security/microsoft-links-raspberry-robin-worm-to-clop-ransomware-attacks/
Microsoft says a threat group tracked as DEV-0950 used Clop ransomware to encrypt the network of a victim previously infected with the Raspberry Robin worm. [...]
"
Autosummary:
Besides ransomware, Raspberry Robin has also been used to drop other second-stage payloads onto compromised devices, including IcedID, Bumblebee, and Truebot.
"
Australian Clinical Labs says patient data stolen in ransomware attack
exploits
ransomware
2022-10-27
https://www.bleepingcomputer.com/news/security/australian-clinical-labs-says-patient-data-stolen-in-ransomware-attack/
Australian Clinical Labs (ACL) has disclosed a February 2022 data breach that impacted its Medlab Pathology business, exposing the medical records and other sensitive information of 223,000 people. [...]
"
Autosummary:
The threat actors leaked 86GB of data, including patient and employee details, financial reports, invoices, contracts, forms, subpoenas, and other private documents.
"
Raspberry Robin operators are selling initial access to compromised enterprise networks to ransomware gangs
exploits
ransomware
2022-10-27
https://securityaffairs.co/wordpress/137722/malware/raspberry-robin-clop-ransomware.html
DEV-0950 group used Clop ransomware to encrypt the network of organizations previously infected with the Raspberry Robin worm. Microsoft has discovered recent activity that links the Raspberry Robin worm to human-operated ransomware attacks. Data collected by Microsoft Defender for Endpoint shows that nearly 3,000 devices in almost 1,000 organizations have seen at least one RaspberryRobin […]
The post Raspberry Robin operators are selling initial access to compromised enterprise networks to ransomware gangs appeared first on Security Affairs.
"
Autosummary:
“Given the previously documented relationship between RaspberryRobin and DEV-0206/DEV-0243 (EvilCorp), this behavioral similarity in the initial vector for Raspberry Robin infections adds another piece of evidence to the connection between the development and propagation of Fauppod/Raspberry Robin and DEV-0206/DEV-0243.” concludes the report.
"
What is ransomware-as-a-service and how is it evolving?
exploits
ransomware
2022-10-27
https://www.malwarebytes.com/blog/business/2022/10/what-is-ransomware-as-a-service-and-how-is-it-evolving
Categories: Business Diving into how RaaS works, why it poses a unique threat to businesses, and how small-and-medium-sized (SMBs) businesses can prepare for the next generation of RaaS attacks.
|
The post What is ransomware-as-a-service and how is it evolving? appeared first on Malwarebytes Labs.
"
Autosummary:
RaaS is not much different, in theory, from the software-as-a-service (SaaS) business model, where cloud providers “rent out” their technology to you on a subscription basis—just swap out ‘cloud providers’ with ‘ransomware gangs’ and ‘technology’ with ransomware (and the related crimes involved).
Why ransomware-as-a-service attacks are so dangerous
The fact that RaaS attacks are human-operated means that ransomware attacks are more targeted than they used to be—and targeted attacks are far more dangerous than un-targeted ones.
At the forefront of this evolution from automated ransomware to human-operated ransomware attacks are ransomware-as-a-service gangs—and their new business model seems to be paying off: in 2021, ransomware gangs made at least $350 million in ransom payments.
How ransomware-as-a-service changed the game
Why ransomware-as-a-service attacks are so dangerous
Is ransomware here to stay?
"
Vice Society Hackers Are Behind Several Ransomware Attacks Against Education Sector
exploits
ransomware
2022-10-26
https://thehackernews.com/2022/10/vice-society-hackers-are-behind-several.html
A cybercrime group known as Vice Society has been linked to multiple ransomware strains in its malicious campaigns aimed at the education, government, and retail sectors.
The Microsoft Security Threat Intelligence team, which is tracking the threat cluster under the moniker DEV-0832, said the group avoids deploying ransomware in some cases and rather likely carries out extortion using
"
Autosummary:
"Shifting ransomware payloads over time from BlackCat, Quantum Locker, and Zeppelin, DEV-0832"s latest payload is a Zeppelin variant that includes Vice Society-specific file extensions, such as .v-s0ciety, .v-society, and, most recently, .locked," the tech giant"s cybersecurity division said.
"
US agencies issue warning about DAIXIN Team ransomware
exploits
ransomware
2022-10-26
https://www.malwarebytes.com/blog/news/2022/10/fbi-cisa-hhs-issue-joint-alert-about-daixin-ransomware-team
Categories: News Categories: Ransomware Tags: DAIXIN
Tags: FBI
Tags: CISA
Tags: HHS
Tags: ransomware team
Tags: DAIXIN Team
Tags: ransomware
The FBI, CISA, and HSH have issued a joint advisory about a new threat to healthcare organizations
|
The post US agencies issue warning about DAIXIN Team ransomware appeared first on Malwarebytes Labs.
"
Autosummary:
Posted: October 26, 2022 by
The FBI, CISA, and HSH have issued a joint advisory about a new threat to healthcare organizations
The FBI, Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Health and Human Services (HHS) have issued a joint advisory about DAIXIN Team, a fledgling ransomware and data exfiltration group that has been targeting US healthcare.
"
The long-term psychological effects of ransomware attacks
exploits
ransomware
2022-10-25
https://www.helpnetsecurity.com/2022/10/25/psychological-effects-ransomware/
Northwave has conducted scientific research into the psychological effects of a ransomware crisis on both organizations and individuals. The findings reveal the deep marks that a ransomware crisis leaves on all those affected. It also shows how their IT and security teams can turn in disarray long after the crisis itself has passed. Key findings on psychological effects of ransomware “The research reveals how the psychological impact of ransomware attacks can persist on people in … More →
The post The long-term psychological effects of ransomware attacks appeared first on Help Net Security.
"
Autosummary:
Key findings on psychological effects of ransomware
“The research reveals how the psychological impact of ransomware attacks can persist on people in affected organizations for a very long time,” explains Organizational Psychologist Inge van der Beijl, Director Behaviour & Resilience at Northwave.
One of every seven employees involved in the attack, either directly or indirectly, exhibits severe enough symptoms several months later, at a level considered to be above the clinical threshold at which professional trauma treatment help is needed.
These long-term effects impact staff turnover:
One in five directly affected by the attack has considered, or is still considering, changing jobs.
"
Hive claims ransomware attack on Tata Power, begins leaking data
exploits
ransomware
2022-10-25
https://www.bleepingcomputer.com/news/security/hive-claims-ransomware-attack-on-tata-power-begins-leaking-data/
Hive ransomware group has claimed responsibility for a cyber attack disclosed by Tata Power this month. In data leak screenshots seen by BleepingComputer, Hive operators are seen leaking data it claims to have stolen from Tata Power, indicating the ransom negotiations failed. [...]
"
Autosummary:
Hive ransomware starts leaking data it claims to have stolen from Tata Power
Another researcher Rakesh Krishnan shared screenshots of the stolen data—which appears to include Tata Power employees" personally identifiable information (PII), National ID (Aadhar) card numbers, PAN (tax account) numbers, salary information, etc.
"
Hive ransomware gang starts leaking data allegedly stolen from Tata Power
exploits
ransomware
2022-10-25
https://securityaffairs.co/wordpress/137601/malware/hive-ransomware-tata-power.html
The Hive ransomware gang, which claimed the responsibility for the Tata Power data breach, started leaking data. On October 14, Tata Power, India’s largest power generation company, announced that was hit by a cyber attack. Threat actors hit the Information Technology (IT) infrastructure of the company. The company confirmed that the security breach impacted “some of […]
The post Hive ransomware gang starts leaking data allegedly stolen from Tata Power appeared first on Security Affairs.
"
Autosummary:
The porting to Rust language provides the following advantages:
It offers memory, data type, and thread safety
It has deep control over low-level resources
It has a user-friendly syntax
It has several mechanisms for concurrency and parallelism, thus enabling fast and safe file encryption
It has a good variety of cryptographic libraries
It’s relatively more difficult to reverse-engineer
The most important change in the latest Hive variant is the encryption mechanism it adopts.
"
Hive Ransomware Hackers Begin Leaking Data Stolen from Tata Power Energy Company
exploits
ransomware
industry
2022-10-25
https://thehackernews.com/2022/10/hive-ransomware-hackers-begin-leaking.html
The Hive ransomware-as-a-service (RaaS) group has claimed responsibility for a cyber attack against Tata Power that was disclosed by the company less than two weeks ago.
The incident is said to have occurred on October 3, 2022. The threat actor has also been observed leaking stolen data exfiltrated prior to encrypting the network as part of its double extortion scheme.
This allegedly comprises
"
Autosummary:
"
Microsoft: Vice Society targets schools with multiple ransomware families
exploits
ransomware
2022-10-25
https://www.bleepingcomputer.com/news/security/microsoft-vice-society-targets-schools-with-multiple-ransomware-families/
A threat group known as Vice Society has been switching ransomware payloads in attacks targeting the education sector across the United States and worldwide. [...]
"
Autosummary:
"
Targets set on U.S. schools
Vice Society is a threat group active since at least early June 2021, known for deploying multiple ransomware strains on their victims" networks, such as Hello Kitty/Five Hands and Zeppelin ransomware.
"
CISA Warns of Daixin Team Hackers Targeting Health Organizations With Ransomware
exploits
ransomware
2022-10-24
https://thehackernews.com/2022/10/cisa-warns-of-daixin-team-hackers.html
U.S. cybersecurity and intelligence agencies have published a joint advisory warning of attacks perpetrated by a cybercrime gang known as the Daixin Team primarily targeting the healthcare sector in the country.
"The Daixin Team is a ransomware and data extortion group that has targeted the HPH Sector with ransomware and data extortion operations since at least June 2022," the agencies said.
The
"
Autosummary:
"
Why Ransomware in Education on the Rise and What That Means for 2023
exploits
ransomware
2022-10-24
https://thehackernews.com/2022/10/why-ransomware-in-education-on-rise-and.html
The breach of LA Unified School District (LAUSD) highlights the prevalence of password vulnerabilities, as criminal hackers continue to use breached credentials in increasingly frequent ransomware attacks on education.
The Labor Day weekend breach of LAUSD brought significant districtwide disruptions to access to email, computers, and applications. It"s unclear what student or employee data the
"
Autosummary:
"
Beefing up security for 2023
Attackers buy and sell breached passwords on the dark web by the millions, knowing that, due to password reuse, the average credential grants access to many accounts.
The FBI and CISA had observed the Vice Society ransomware group, which took credit for the attack, using TTPs including "escalating privileges, then gaining access to domain administrator accounts."
"
Cuba ransomware affiliate targets Ukrainian govt agencies
exploits
ransomware
2022-10-24
https://www.bleepingcomputer.com/news/security/cuba-ransomware-affiliate-targets-ukrainian-govt-agencies/
The Computer Emergency Response Team of Ukraine (CERT-UA) has issued an alert about potential Cuba Ransomware attacks against critical networks in the country. [...]
"
Autosummary:
"
Pendragon car dealer refuses $60 million LockBit ransomware demand
exploits
ransomware
2022-10-24
https://www.bleepingcomputer.com/news/security/pendragon-car-dealer-refuses-60-million-lockbit-ransomware-demand/
Pendragon Group, with more than 200 car dealerships in the U.K., was breached in a cyberattack from the LockBit ransomware gang, who allegedly demanded $60 million to decrypt files and not leak them. [...]
"
Autosummary:
"
Car dealer group Pendragon refuses to pay $60 million to ransomware extortionists
exploits
ransomware
2022-10-24
https://grahamcluley.com/car-dealer-group-pendragon-refuses-to-pay-60-million-to-ransomware-extortionists/
Pendragon - the car dealership group which owns Evans Halshaw, CarStore, and Stratstone, and operates around 160 showrooms across the UK - has confirmed that its IT servers have been hacked by cybercriminals who claim to have stolen five per cent of its data.
"
Autosummary:
Furthermore, if those responsible are ever identified, the existence of the injunction may help to seek recompense one day, perhaps through seizing their assets.
"
Cuba ransomware affiliate targets Ukraine, CERT-UA warns
exploits
ransomware
2022-10-24
https://securityaffairs.co/wordpress/137567/cyber-warfare-2/cuba-ransomware-cert-ua.html
The Ukraine Computer Emergency Response Team (CERT-UA) warns of Cuba Ransomware attacks against critical networks in the country. The Ukraine Computer Emergency Response Team (CERT-UA) warns of potential Cuba Ransomware attacks against local critical infrastructure. On October 21, 2022, the Ukraine CERT-UA uncovered a phishing campaign impersonating the Press Service of the General Staff of […]
The post Cuba ransomware affiliate targets Ukraine, CERT-UA warns appeared first on Security Affairs.
"
Autosummary:
"
Trilio’s Continuous Restore enables users to stage data in multiple heterogeneous clouds
ransomware
2022-10-22
https://www.helpnetsecurity.com/2022/10/22/continuous-restore-trilio/
Trilio‘s Continuous Restore offers faster levels of replication, restoration and migration of Kubernetes data and metadata from any cloud or storage platform to another, providing near-instantaneous recovery times for cloud-native applications. Entirely distribution-, cloud- and storage-agnostic, Trilio’s Continuous Restore enables users to continuously stage data in multiple heterogeneous clouds. This means that applications—regardless of where they reside—can tap into that data and be brought online in seconds, achieving exceptional levels of Recovery Time Objectives (RTO). … More →
The post Trilio’s Continuous Restore enables users to stage data in multiple heterogeneous clouds appeared first on Help Net Security.
"
Autosummary:
“Trilio’s Continuous Restore capability is a revolution in data protection because it moves the industry beyond ‘back-up your data anywhere, anytime’ to ‘your data is available everywhere, all the time,’” said David Safaii, CEO of Trilio.
“Trilio’s Continuous Restore capability enables migration and replication of stateful applications in seconds or minutes so that all companies can protect and use their data anywhere, from core to edge—regardless of what the application runs on or where the data is stored,” said Murali Balcha, founder and CTO of Trilio.
"
TommyLeaks and SchoolBoys: Two sides of the same ransomware gang
exploits
ransomware
2022-10-22
https://www.bleepingcomputer.com/news/security/tommyleaks-and-schoolboys-two-sides-of-the-same-ransomware-gang/
Two new extortion gangs named "TommyLeaks" and "SchoolBoys" are targeting companies worldwide. However, there is a catch — they are both the same ransomware gang. [...]
"
Autosummary:
SchoolBoy"s Ransomware Gang negotiation site
Source: BleepingComputer.com TommyLeaks negotiation site
Source: BleepingComputer.com
Even more curious, this same chat system has only been used before by the Karakurt extortion group.
"
Threat actors exploit critical flaw in VMware Workspace ONE Access to drop ransomware, miners
exploits
ransomware
2022-10-22
https://securityaffairs.co/wordpress/137483/hacking/vmware-workspace-one-access-flaw.html
Threat actors are exploiting a now-patched vulnerability, tracked as CVE-2022-22954, in VMware Workspace ONE Access in attacks in the wild. Threat actors are actively exploiting a now-patched vulnerability, tracked as CVE-2022-22954, in VMware Workspace ONE Access to deliver cryptocurrency miners and ransomware. The issue causes server-side template injection due to because of the lack of […]
The post Threat actors exploit critical flaw in VMware Workspace ONE Access to drop ransomware, miners appeared first on Security Affairs.
"
Autosummary:
Threat actors are actively exploiting a now-patched vulnerability, tracked as CVE-2022-22954, in VMware Workspace ONE Access to deliver cryptocurrency miners and ransomware.
"
Daixin Team targets health organizations with ransomware, US agencies warn
exploits
ransomware
2022-10-22
https://securityaffairs.co/wordpress/137493/cyber-crime/daixin-team-targets-healthcare.html
US government agencies warned that the Daixin Team cybercrime group is actively targeting the U.S. Healthcare and Public Health sector with ransomware. CISA, the FBI, and the Department of Health and Human Services (HHS) warned that the Daixin Team cybercrime group is actively targeting U.S. businesses, mainly in the Healthcare and Public Health (HPH) Sector, […]
The post Daixin Team targets health organizations with ransomware, US agencies warn appeared first on Security Affairs.
"
Autosummary:
In addition, the FBI, CISA, and HHS urge all organizations, including HPH Sector organizations, to apply the following recommendations to prepare for, mitigate/prevent, and respond to ransomware incidents.
CISA, the FBI, and the Department of Health and Human Services (HHS) warned that the Daixin Team cybercrime group is actively targeting U.S. businesses, mainly in the Healthcare and Public Health (HPH) Sector, with ransomware operations.
"
Presidio Active Response Solution Set strengthens ransomware preparedness for businesses
exploits
ransomware
2022-10-21
https://www.helpnetsecurity.com/2022/10/21/presidio-active-response-solution-set/
To further address the increasing cybersecurity threat landscape, Presidio has revealed a new cybersecurity Active Response Solution Set to help clients be prepared for a ransomware event with assessments, preparedness, active response, and recovery. Ransomware is one of the largest global industries. According to IDC, 37% of global organizations were impacted by some form of ransomware in 2021. Presidio is addressing organizational needs for cyber insurance by meeting stringent minimum compliance requirements in order to … More →
The post Presidio Active Response Solution Set strengthens ransomware preparedness for businesses appeared first on Help Net Security.
"
Autosummary:
“Presidio’s Active Response Solution Set slices through a fragmented approach to cyber defense by joining all aspects into one simple solution,” said Sunil Jain, CEO at Marius, a cyber insurance group partnering with cybersecurity providers to streamline cyber insurance for their clients.
"
BlackByte ransomware uses new data theft tool for double-extortion
exploits
ransomware
2022-10-21
https://www.bleepingcomputer.com/news/security/blackbyte-ransomware-uses-new-data-theft-tool-for-double-extortion/
A BlackByte ransomware affiliate is using a new custom data stealing tool called "ExByte" to steal data from compromised Windows devices quickly. [...]
"
Autosummary:
[CPU]
Also, the malware checks for the presence of the following DLL files:
avghooka.dll
avghookx.dll
sxin.dll
sf2.dll
sbiedll.dll
snxhk.dll
cmdvrt32.dll
cmdvrt64.dll
wpespy.dll
vmcheck.dll
pstorec.dll
dir_watch.dll
api_log.dll
dbghelp.dll
The BlackByte ransomware binary also implements these same tests, but the exfiltration tool needs to run them independently since data exfiltration takes place before file encryption.
"
Multiple Campaigns Exploit VMware Vulnerability to Deploy Crypto Miners and Ransomware
exploits
ransomware
2022-10-21
https://thehackernews.com/2022/10/multiple-campaigns-exploit-vmware.html
A now-patched vulnerability in VMware Workspace ONE Access has been observed being exploited to deliver both cryptocurrency miners and ransomware on affected machines.
"The attacker intends to utilize a victim"s resources as much as possible, not only to install RAR1Ransom for extortion, but also to spread GuardMiner to collect cryptocurrency," Fortinet FortiGuard Labs researcher Cara Lin said
"
Autosummary:
"
US govt warns of Daixin Team targeting health orgs with ransomware
exploits
ransomware
2022-10-21
https://www.bleepingcomputer.com/news/security/us-govt-warns-of-daixin-team-targeting-health-orgs-with-ransomware/
CISA, the FBI, and the Department of Health and Human Services (HHS) warned that a cybercrime group known as Daixin Team is actively targeting the U.S. Healthcare and Public Health (HPH) Sector sector in ransomware attacks. [...]
"
Autosummary:
"This third-party reporting as well as FBI analysis show that the ransomware targets ESXi servers and encrypts files located in /vmfs/volumes/ with the following extensions: .vmdk, .vmem, .vswp, .vmsd, .vmx, and .vmsn.
"
Hackers exploit critical VMware flaw to drop ransomware, miners
exploits
ransomware
2022-10-21
https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-vmware-flaw-to-drop-ransomware-miners/
Security researchers observed malicious campaigns leveraging a critical vulnerability in VMware Workspace One Access to deliver various malware, including the RAR1Ransom tool that locks files in password-protected archives. [...]
"
Autosummary:
The PowerShell script ("init.ps1") downloads the following files from a Cloudflare IPFS gateway:
phpupdate.exe: Xmrig Monero mining software
config.json: Configuration file for mining pools
networkmanager.exe: Executable used to scan and spread infection
phpguard.exe: Executable used for guardian Xmrig miner to keep running
clean.bat: Script file to remove other cryptominers on the compromised host
encrypt.exe: RAR1 ransomware
If the Cloudflare resource is unavailable for any reason, the malware uses a backup link at "crustwebsites[.]net".
"
The Week in Ransomware - October 21st 2022 - Stop the Presses
exploits
ransomware
2022-10-21
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-october-21st-2022-stop-the-presses/
Cybersecurity researchers did not disappoint, with reports linking RansomCartel to REvil, on OldGremlin hackers targeting Russia with ransomware, a new data exfiltration tool used by BlackByte, a warning that ransomware actors are exploiting VMware vulnerabilities, and finally, our own report on the Venus Ransomware. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include: @malwrhunterteam, @PolarToffee, @Ionut_Ilascu, @FourOctets, @jorntvdw, @struppigel, @BleepinComputer, @demonslay335, @billtoulas, @Seifreed, @LawrenceAbrams, @serghei, @fwosar, @DanielGallagher, @VK_Intel, @malwareforme, @Fortinet, @BroadcomSW, @0verfl0w_, @linuxct, @Unit42_Intel, @Amermelsad, @MsftSecIntel, @CrowdStrike, @GroupIB_GIB, @BushidoToken, @JackRhysider, @Intel471Inc, @NCCGroupplc, and @pcrisk.Cybersecurity researchers did not disappoint, with reports linking RansomCartel to REvil, on OldGremlin hackers targeting Russia with ransomware, a new data exfiltration tool used by BlackByte, a warning that ransomware actors are exploiting VMware vulnerabilities, and finally, our own report on the Venus Ransomware.
"
New Ursnif Variant Likely Shifting Focus to Ransomware and Data Theft
exploits
ransomware
2022-10-20
https://thehackernews.com/2022/10/latest-ursnif-variant-shifts-focus-from.html
The Ursnif malware has become the latest malware to shed its roots as a banking trojan to revamp itself into a generic backdoor capable of delivering next-stage payloads, joining the likes of Emotet, Qakbot, and TrickBot.
"This is a significant shift from the malware"s original purpose to enable banking fraud, but is consistent with the broader threat landscape," Mandiant researchers Sandor
"
Autosummary:
"
OldGremlin hackers use Linux ransomware to attack Russian orgs
exploits
ransomware
2022-10-20
https://www.bleepingcomputer.com/news/security/oldgremlin-hackers-use-linux-ransomware-to-attack-russian-orgs/
OldGremlin, one of the few ransomware groups attacking Russian corporate networks, has expanded its toolkit with file-encrypting malware for Linux machines. [...]
"
Autosummary:
The malware executable is wrapped using Ultimate Packer (UPX) and appends the .crypt extension to the encrypted files, among them being .RAW, .ZST, .CSV, .IMG, .ISO, SQL, TAR, TGZ, .DAT, .GZ, .DUMP.
"
OldGremlin Ransomware Targeted Over a Dozen Russian Entities in Multi-Million Scheme
exploits
ransomware
2022-10-20
https://thehackernews.com/2022/10/oldgremlin-ransomware-targeted-over.html
A Russian-speaking ransomware group dubbed OldGremlin has been attributed to 16 malicious campaigns aimed at entities operating in the transcontinental Eurasian nation over the course of two and a half years.
"The group"s victims include companies in sectors such as logistics, industry, insurance, retail, real estate, software development, and banking," Group-IB said in an exhaustive report
"
Autosummary:
"The group"s victims include companies in sectors such as logistics, industry, insurance, retail, real estate, software development, and banking," Group-IB said in an exhaustive report shared with The Hacker News.
"The threat actors often pose as well-known companies, including the media group RBC, the legal assistance system Consultant Plus, the company 1C-Bitrix, the Russian Union of Industrialists and Entrepreneurs, and Minsk Tractor Works," Group-IB said.
"
Venus ransomware targets remote desktop services
exploits
ransomware
2022-10-20
https://www.malwarebytes.com/blog/news/2022/10/venus-ransomware-targets-remote-desktop-services
Categories: News Tags: Venus Ransomware
Tags: RDP
Tags: remote desktop services
Tags: encrypt
Tags: fraud
Tags: ransom
We take a look at reports of Venus ransomware targeting remote desktop services/RDP.
|
The post Venus ransomware targets remote desktop services appeared first on Malwarebytes Labs.
"
Autosummary:
For example samples:
One from July/August: 2e2cef71bf99594b54e00d459480e1932e0230fb1cbee24700fbc2f5f631bf12
And one from September: 6d8e2d8f6aeb0f4512a53fe83b2ef7699513ebaff31735675f46d1beea3a8e05 — MalwareHunterTeam (@malwrhunterteam) October 6, 2022
Venus brings bad remote tidings
It seems these attacks very much follow the typical Remote Services/Remote Desktop Protocol (RDP) gameplan.
The incredibly overt ransom note, which is somewhat difficult to read given it sports white text on a bright orange background, reads as follows:
"We downloaded and encrypted your data.
"
DirectDefense collaborates with Halcyon to protect users against ransomware
exploits
ransomware
2022-10-20
https://www.helpnetsecurity.com/2022/10/21/directdefense-halcyon/
As a DirectDefense and Halcyon partnership result, DirectDefense will now offer the Halcyon Anti-Ransomware & Endpoint Resilience Platform as part of its Managed Detection and Response (“MDR”) offerings. “Ransomware is on the rise and threat actor groups are becoming increasingly sophisticated. As they evolve, so must your managed security services provider,” said Jim Broome, President, DirectDefense. “The combination of Halcyon’s AI-powered, anti-ransomware engine and our 24/7 MDR security services gives organizations peace of mind that … More →
The post DirectDefense collaborates with Halcyon to protect users against ransomware appeared first on Help Net Security.
"
Autosummary:
"
The missed link between Ransom Cartel and REvil ransomware gangs
exploits
ransomware
2022-10-19
https://securityaffairs.co/wordpress/137328/cyber-crime/ransom-cartel-links-revil.html
Researchers at Palo Alto Network’s Unit 42 linked the Ransom Cartel ransomware operation to the REvil ransomware operations. Researchers at Palo Alto Network’s Unit 42 have linked the relatively new Ransom Cartel ransomware operation with the notorious REvil cybercrime gang. The REvil group was one of the most active ransomware gangs in the first half […]
The post The missed link between Ransom Cartel and REvil ransomware gangs appeared first on Security Affairs.
"
Autosummary:
“This method of generating session secrets was documented by researchers at Amossys back in 2020; however, their analysis focused on an updated version of Sodinokibi/REvil ransomware, indicating a direct overlap between the REvil source code and the latest Ransom Cartel samples.” continues the report.£Based on the fact that the Ransom Cartel operators clearly have access to the original REvil ransomware source code, yet likely do not possess the obfuscation engine used to encrypt strings and hide API calls, we speculate that the operators of Ransom Cartel had a relationship with the REvil group at one point, before starting their own operation.”
"
DeadBolt ransomware gang tricked into giving victims free decryption keys
exploits
ransomware
2022-10-19
https://www.malwarebytes.com/blog/news/2022/10/deadbolt-ransomware-gang-tricked-into-giving-victims-free-decryption-keys
Categories: News Categories: Ransomware Tags: Dutch
Tags: law enforcement
Tags: DeadBolt
Tags: ransomware
Tags: decryption keys
Tags: responders.nu
With the idea provided by an incident response company, Dutch police used a clever trick to get 150 DeadBolt ransomware decryption keys for free.
|
The post DeadBolt ransomware gang tricked into giving victims free decryption keys appeared first on Malwarebytes Labs.
"
Autosummary:
Posted: October 19, 2022 by
With the idea provided by an incident response company, Dutch police used a clever trick to get 150 DeadBolt ransomware decryption keys for free.As a countermeasure, QNAP pushed out an automatic, forced, update with firmware containing the latest security updates to protect against the attackers" DeadBolt ransomware, which annoyed part of its userbase.
"
Сryptocurrency and Ransomware — The Ultimate Friendship
exploits
ransomware
2022-10-18
https://thehackernews.com/2022/10/ryptocurrency-and-ransomware-ultimate.html
Both cryptocurrency and ransomware are nothing new in the digital world; both have been there for a very long time, which was enough for them to find common pieces for starting their relationship.
Ransomware can be like a virtual car that works on all types of fuels, and crypto is the one that is currently most recommended. No one can argue that 2020 was the year of ransomware in the cyber world
"
Autosummary:
Ransomware is a malware type that encrypts the victim"s files, whether it"s a random user or an organization, leading to denying them access to those files on their personal devices.
Starting with taking cybersecurity awareness training courses which we call the ultimate layer of protection, followed by multilayers such as the first and most valuable layer that works on the DNS level, which is the first gate between you and the cybercriminal.
SafeDNS has updated categories having DGA, Cryptojacking and others as part of the Security group, and we definitely recommend trying out threat protection & giving a free 15-day trial of web filtering a go.
"
Ransom Cartel linked to notorious REvil ransomware operation
exploits
ransomware
2022-10-18
https://www.bleepingcomputer.com/news/security/ransom-cartel-linked-to-notorious-revil-ransomware-operation/
Threat analysts have connected the pieces that link the Ransom Cartel RaaS (ransomware-as-a-service) to the REvil gang, one of the most notorious and prolific ransomware groups in recent years. [...]
"
Autosummary:
Ransom Cartel operations
There are also similarities in the tactics, techniques, and procedures (TTPs) used by REvil and Ransom Cartel, such as double-extortion attacks, large ransom demands, and a data leak site to pressure victims into paying a ransom.
Finally, the threat actors shut down VMs, terminate all related processes, and encrypt Vmware-related files (.log, .vmdk, .vmem, .vswp and .vmsn).
"
Black Basta Ransomware Hackers Infiltrates Networks via Qakbot to Deploy Brute Ratel C4
exploits
ransomware
2022-10-17
https://thehackernews.com/2022/10/black-basta-ransomware-hackers.html
The threat actors behind the Black Basta ransomware family have been observed using the Qakbot trojan to deploy the Brute Ratel C4 framework as a second-stage payload in recent attacks.
The development marks the first time the nascent adversary simulation software is being delivered via a Qakbot infection, cybersecurity firm Trend Micro said in a technical analysis released last week.
The
"
Autosummary:
According to Trend Micro, the ZIP file in the email contains an ISO file, which, in turn, includes a LNK file that fetches the Qakbot payload, illustrating attempts on part of threat actors to adapt to other tactics in the aftermath of Microsoft"s decision to block macros by default for documents downloaded from the web.
"
New Prestige Ransomware Targeting Polish and Ukrainian Organizations
exploits
ransomware
2022-10-17
https://thehackernews.com/2022/10/new-prestige-ransomware-targeting.html
A new ransomware campaign targeted the transportation and logistics sectors in Ukraine and Poland on October 11 with a previously unknown payload dubbed Prestige.
"The activity shares victimology with recent Russian state-aligned activity, specifically on affected geographies and countries, and overlaps with previous victims of the FoxBlade malware (also known as HermeticWiper)," the Microsoft
"
Autosummary:
It"s suspected that "Ransom Cartel operators had access to earlier versions of REvil ransomware source code," Palo Alto Networks Unit 42 observed on October 14, stating that "there was a relationship between the groups at some point, though it may not have been recent."
REvil, earlier this January, suffered further setback when Russian authorities arrested multiple members, but there are indications that the notorious cybercrime cartel may have staged a return in some form.
"
Japanese tech firm Oomiya hit by LockBit 3.0. Multiple supply chains potentially impacted
ransomware
2022-10-17
https://securityaffairs.co/wordpress/137243/cyber-crime/oomiya-lockbit-3-0-ransomware.html
The IT infrastructure of the Japanese tech company Oomiya was infected with the LockBit 3.0 ransomware. One of the affiliates for the LockBit 3.0 RaaS hit the Japanese tech company Oomiya. Oomiya is focused on designing and manufacturing microelectronics and facility system equipment. The business of Omiya Kasei is divided into four major areas, manufacturing and designing […]
The post Japanese tech firm Oomiya hit by LockBit 3.0. Multiple supply chains potentially impacted appeared first on Security Affairs.
"
Autosummary:
"
Australian insurance firm Medibank confirms ransomware attack
financial
exploits
ransomware
2022-10-17
https://www.bleepingcomputer.com/news/security/australian-insurance-firm-medibank-confirms-ransomware-attack/
Health insurance provider Medibank has confirmed that a ransomware attack is responsible for last week"s cyberattack and disruption of online services. [...]
"
Autosummary:
The company first detected unusual activity on its network on Wednesday, October 12, and immediately shut down parts of its systems, including customer-facing services, to reduce the chances of data loss.
"
Mysterious Prestige ransomware targets organizations in Ukraine and Poland
exploits
ransomware
2022-10-16
https://securityaffairs.co/wordpress/137203/apt/prestige-ransomware-targets-ukraine.html
Microsoft warns that new Prestige ransomware is targeting transportation and logistics organizations in Ukraine and Poland. Microsoft reported that new Prestige ransomware is being used in attacks aimed at transportation and logistics organizations in Ukraine and Poland. The Prestige ransomware first appeared in the threat landscape on October 11 in attacks occurring within an hour […]
The post Mysterious Prestige ransomware targets organizations in Ukraine and Poland appeared first on Security Affairs.
"
Autosummary:
Before deploying ransomware in the target networks, the threat actors were observed using the following two remote execution utilities:
RemoteExec – a commercially available tool for agentless remote code execution
Impacket WMIexec – an open-source script-based solution for remote code execution
Then DEV-0960 used the following tools in some attacks to access to highly privileged credentials:
winPEAS – an open-source collection of scripts to perform privilege escalation on Windows
comsvcs.dll – used to dump the memory of the LSASS process and steal credentials
ntdsutil.exe – used to back up the Active Directory database, likely for later use credentials
“In all observed deployments, the attacker had already gained access to highly privileged credentials, like Domain Admin, to facilitate the ransomware deployment.” continues the report.
"
Venus Ransomware targets publicly exposed Remote Desktop services
exploits
ransomware
2022-10-16
https://www.bleepingcomputer.com/news/security/venus-ransomware-targets-publicly-exposed-remote-desktop-services/
Threat actors behind the relatively new Venus Ransomware are hacking into publicly-exposed Remote Desktop services to encrypt Windows devices. [...]
"
Autosummary:
taskkill, msftesql.exe, sqlagent.exe, sqlbrowser.exe, sqlservr.exe, sqlwriter.exe, oracle.exe, ocssd.exe, dbsnmp.exe, synctime.exe, mydesktopqos.exe, agntsvc.exe, isqlplussvc.exe, xfssvccon.exe, mydesktopservice.exe, ocautoupds.exe, agntsvc.exe, agntsvc.exe, agntsvc.exe, encsvc.exe, firefoxconfig.exe, tbirdconfig.exe, ocomm.exe, mysqld.exe, mysqld-nt.exe, mysqld-opt.exe, dbeng50.exe, sqbcoreservice.exe, excel.exe, infopath.exe, msaccess.exe, mspub.exe, onenote.exe, outlook.exe, powerpnt.exe, sqlservr.exe, thebat64.exe, thunderbird.exe, winword.exe, wordpad.exe
The ransomware will also delete event logs, Shadow Copy Volumes, and disable Data Execution Prevention using the following command:
wbadmin delete catalog -quiet && vssadmin.exe delete shadows /all /quiet && bcdedit.exe /set {current} nx AlwaysOff && wmic SHADOWCOPY DELETE
When encrypting files, the ransomware will append the .venus extension, as shown below.
"
Microsoft: New Prestige ransomware targets orgs in Ukraine, Poland
exploits
ransomware
2022-10-14
https://www.bleepingcomputer.com/news/security/microsoft-new-prestige-ransomware-targets-orgs-in-ukraine-poland/
Microsoft says new Prestige ransomware is being used to target transportation and logistics organizations in Ukraine and Poland in ongoing attacks. [...]
"
Autosummary:
"
The Week in Ransomware - October 14th 2022 - Bitcoin Trickery
exploits
ransomware
2022-10-14
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-october-14th-2022-bitcoin-trickery/
This week"s news is action-packed, with police tricking ransomware into releasing keys to victims calling ransomware operations liars. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include: @struppigel, @VK_Intel, @serghei, @BleepinComputer, @billtoulas, @LawrenceAbrams, @malwareforme, @demonslay335, @FourOctets, @jorntvdw, @PolarToffee, @Ionut_Ilascu, @Seifreed, @fwosar, @malwrhunterteam, @DanielGallagher, @AuCyble, @UID_, @linuxct, @MsftSecIntel, @ahnlab, @Amermelsad, @TrendMicro, and @pcrisk.
October 12th 2022
As previously shared, upon discovering the ransomware attack, we took immediate steps to protect our systems, contain the incident, begin an investigation, and ensure continuity of care.
"
Police tricks DeadBolt ransomware out of 155 decryption keys
exploits
ransomware
2022-10-14
https://www.bleepingcomputer.com/news/security/police-tricks-deadbolt-ransomware-out-of-155-decryption-keys/
The Dutch National Police, in collaboration with cybersecurity firm Responders.NU, tricked the DeadBolt ransomware gang into handing over 155 decryption keys by faking ransom payments. [...]
"
Autosummary:
Heavy congestion combined with a low fee caused the Bitcoin blockchain to take much longer to confirm a transaction, allowing the Police to make a transaction, receive the key, and immediately cancel their bitcoin transaction.
"
Magniber ransomware now infects Windows users via JavaScript files
exploits
ransomware
2022-10-13
https://www.bleepingcomputer.com/news/security/magniber-ransomware-now-infects-windows-users-via-javascript-files/
A recent malicious campaign delivering Magniber ransomware has been targeting Windows home users with fake security updates. [...]
"
Autosummary:
For the recent on, it switched to JavaScript files that had the following names:
SYSTEM.Critical.Upgrade.Win10.0.ba45bd8ee89b1.js
SYSTEM.Security.Database.Upgrade.Win10.0.jse
Antivirus_Upgrade_Cloud.29229c7696d2d84.jse
ALERT.System.Software.Upgrade.392fdad9ebab262cc97f832c40e6ad2c.js
These files are obfuscated and use a variation of the "DotNetToJScript" technique to execute a .NET file in the system memory, lowering the risk of detection by antivirus products available on the host.
"
For most companies ransomware is the scariest of all cyberattacks
exploits
ransomware
ciber
2022-10-12
https://www.helpnetsecurity.com/2022/10/12/customers-concerned-ransomware/
SonicWall released the 2022 SonicWall Threat Mindset Survey which found that 66% of customers are more concerned about cyberattacks in 2022, with the main threat being focused on financially motivated attacks like ransomware. “No one is safe from cyberattacks — businesses or individuals,” said SonicWall Executive Chairman of the Board Bill Conner. “Today’s business landscape requires persistent digital trust to exist. Supply-chain attacks have dramatically changed the attack surface of the typical enterprise in the … More →
The post For most companies ransomware is the scariest of all cyberattacks appeared first on Help Net Security.
"
Autosummary:
Additional findings:
Rising concerns about escalating cyberattacks : There is growing concern regarding cyberattacks amongst 66% of organizations surveyed; ransomware leads the distress as 91% of all customers cited it as their biggest concern.
"
LockBit affiliates compromise Microsoft Exchange servers to deploy ransomware
exploits
ransomware
2022-10-12
https://securityaffairs.co/wordpress/136968/cyber-crime/microsoft-exchange-lockbit-ransomware.html
Lockbit ransomware affiliates are compromising Microsoft Exchange servers to deploy their ransomware, experts warn. South-Korean cybersecurity firm AhnLab reported that Lockbit ransomware affiliates are distributing their malware via compromised Microsoft Exchange servers. In July 2022, two servers operated by a customer of the security firm were infected with LockBit 3.0 ransomware. Threat actors initially deployed […]
The post LockBit affiliates compromise Microsoft Exchange servers to deploy ransomware appeared first on Security Affairs.
"
Autosummary:
So far I"ve only skimmed a translated version of the page, but what evidence is provided that it"s a different vulnerability? — Will Dormann (@wdormann) October 11, 2022
Bleeping Computer pointed out that at least three vulnerabilities in Microsoft Exchange, discovered by Zero Day Initiative vulnerability researcher Piotr Bazydlo, have yet to be patched.
"
Top 5 ransomware detection techniques: Pros and cons of each
exploits
ransomware
2022-10-12
https://www.malwarebytes.com/blog/business/2022/10/top-5-ransomware-detection-techniques-pros-and-cons-of-each
Categories: Business Detecting ransomware can be tricky. Attackers use obfuscation and evasion techniques to avoid detection, and new ransomware variants are produced every day. In this post, we look at five ransomware detection techniques and their pros and cons.
|
The post Top 5 ransomware detection techniques: Pros and cons of each appeared first on Malwarebytes Labs.
"
Autosummary:
Pros:
Can detect ransomware that static engines do not catch
Fewer false positives than previously mentioned dynamic techniques
Cons:
High CPU utilization on the endpoint
Files will be encrypted until a level of confidence is reached, so not all damage is blocked
Bypass by encrypting only part of the file, or by encrypting in chunks.
Pros:
Low false positive rate
Effective against common ransomware
No damage is done
Cons:
Trivial to bypass; ransomware with a new extension will manage to encrypt
It can be difficult to find a file-monitoring solution that has a extension blacklist feature
3.
Pros:
Low false positive rate
Effective against known ransomware
Can stop attacks before execution so no files are encrypted
Cons:
Time consuming if conducted manually
Can be bypassed easily using Packers / Crypters or by simply replacing characters with digits or special characters
2.
Cons:
Some false positives, as programs and users may touch the bait files
Files will be encrypted until ransomware touches the decoy files
Bypass by skipping hidden files/folders, or by targeting specific folders
4.
"
Microsoft Exchange servers hacked to deploy LockBit ransomware
exploits
ransomware
2022-10-11
https://www.bleepingcomputer.com/news/security/microsoft-exchange-servers-hacked-to-deploy-lockbit-ransomware/
Lockbit ransomware affiliates are encrypting victims via Microsoft Exchange servers hacked using exploits targeting unpatched vulnerabilities. [...]
"
Autosummary:
"There is a possibility that the vulnerabilities of Microsoft Exchange Server (CVE-2022-41040, CVE-2022-41082) disclosed by GTSC, a Vietnamese security company, on September 28 were used, but the attack method, the generated WebShell file name, and subsequent attacks after WebShell creation," AhnLab says.
"
Harvard Business Publishing licensee hit by ransomware
exploits
ransomware
2022-10-10
https://securityaffairs.co/wordpress/136860/cyber-crime/harvard-business-publishing-licensee-hit-by-ransomware.html
Threat actors got to a database with over 152,000 customer records before its owner, the Turkish branch of Harvard Business Review, closed it. Crooks left a ransom note, threatening to leak the data and inform authorities of the EU’s General Data Protection Regulation (GDPR) violations. Original Post published on CyberNews A recent discovery by the […]
The post Harvard Business Publishing licensee hit by ransomware appeared first on Security Affairs.
"
Autosummary:
In total, the database leaked over 152,000 pieces of information pertaining to customers, such as emails, names, links to LinkedIn, Twitter, and Facebook profiles, and hashed passwords.
“Exposing sensitive data or allowing it to get into the wrong hands can have a cascading effect, leading to regulatory and compliance fines, potential lawsuits and legal fines, reputational damage including lost customer confidence, and a financial impact including lost business,” Neclerio said.
The database index marked “Users” contained over 152,000 entries: names, emails, links to social media profiles, and passwords, some of which were hashed using a very weak MD5 algorithm.
"
CommonSpirit hospital chains hit by ransomware, patients are facing problems
exploits
ransomware
2022-10-09
https://securityaffairs.co/wordpress/136843/cyber-crime/commonspirit-ransomware-attack.html
CommonSpirit, one of the largest hospital chains in the US, suffered a ransomware cyberattack that impacted its operations. Common Spirit, one of the largest hospital chains in the US, this week suffered a ransomware cyberattack that caused severe inconvenience to the facilities and to patients The alleged security breach led to delayed surgeries, hold-ups in […]
The post CommonSpirit hospital chains hit by ransomware, patients are facing problems appeared first on Security Affairs.
"
Autosummary:
Common Spirit, one of the largest hospital chains in the US, this week suffered a ransomware cyberattack that caused severe inconvenience to the facilities and to patients
The alleged security breach led to delayed surgeries, hold-ups in patient care and forced the chain to reschedule doctor appointments across the country.
"
Fake adult sites push data wipers disguised as ransomware
exploits
ransomware
2022-10-09
https://www.bleepingcomputer.com/news/security/fake-adult-sites-push-data-wipers-disguised-as-ransomware/
Malicious adult websites push fake ransomware which, in reality, acts as a wiper that quietly tries to delete almost all of the data on your device. [...]
"
Autosummary:
The drive wiper"s code (Cyble)
Finally, the malware executes "open.exe," which drops and runs "open.bat," which, in turn, connects to the URL "hxxps[:]//lllllllllll.loseyourip[.]com/downloads" and then opens the ransom note.
"
BlackByte Ransomware abuses vulnerable driver to bypass security solutions
exploits
ransomware
2022-10-08
https://securityaffairs.co/wordpress/136816/malware/blackbyte-ransomware-byovd-attack.html
The BlackByte ransomware operators are leveraging a flaw in a legitimate Windows driver to bypass security solutions. Researchers from Sophos warn that BlackByte ransomware operators are using a bring your own vulnerable driver (BYOVD) attack to bypass security products. In BYOVD attacks, threat actors abuse vulnerabilities in legitimate, signed drivers, on which security products rely, […]
The post BlackByte Ransomware abuses vulnerable driver to bypass security solutions appeared first on Security Affairs.
"
Autosummary:
“Bring Your Own Driver” is the name given to this technique [1, 2, 3, 4, 5, 6] — exploiting a targeted system by abusing a legitimate signed driver with an exploitable vulnerability.”
"
BlackByte Ransomware Abuses Vulnerable Windows Driver to Disable Security Solutions
exploits
ransomware
2022-10-07
https://thehackernews.com/2022/10/blackbyte-ransomware-abuses-vulnerable.html
In yet another case of bring your own vulnerable driver (BYOVD) attack, the operators of the BlackByte ransomware are leveraging a flaw in a legitimate Windows driver to bypass security solutions.
"The evasion technique supports disabling a whopping list of over 1,000 drivers on which security products rely to provide protection," Sophos threat researcher Andreas Klopsch said in a new technical
"
Autosummary:
"
The Week in Ransomware - October 7th 2022 - A 20 year sentence
exploits
ransomware
2022-10-07
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-october-7th-2022-a-20-year-sentence/
It was a very quiet week regarding ransomware news, with the most significant news being the sentencing of a Netwalker affiliate to 20-years in prison. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include: @DanielGallagher, @malwrhunterteam, @demonslay335, @malwareforme, @Seifreed, @billtoulas, @jorntvdw, @serghei, @fwosar, @FourOctets, @BleepinComputer, @struppigel, @Ionut_Ilascu, @VK_Intel, @LawrenceAbrams, @PolarToffee, @Avast, @Sophos, @sygnia_labs, @BrettCallow, @pcrisk, @jgreigj, @lorenzofb, and @elhackernet.
"
Canadian Netwalker Ransomware Affiliate Sentenced to 20 Years in U.S. Prison
exploits
ransomware
2022-10-05
https://thehackernews.com/2022/10/canadian-netwalker-ransomware-affiliate.html
A former affiliate of the Netwalker ransomware has been sentenced to 20 years in prison in the U.S., a little over three months after the Canadian national pleaded guilty to his role in the crimes.
Sebastien Vachon-Desjardins, 35, has also been ordered to forfeit $21,500,000 that was illicitly obtained from dozens of victims globally, including companies, municipalities, hospitals, law
"
Autosummary:
"
Avast releases free decryptor for Hades ransomware variants
exploits
ransomware
2022-10-05
https://www.bleepingcomputer.com/news/security/avast-releases-free-decryptor-for-hades-ransomware-variants/
Avast has released a decryptor for variants of the Hades ransomware known as "MafiaWare666", "Jcrypt", "RIP Lmao", and "BrutusptCrypt," allowing victims to recover their files for free. [...]
"
Autosummary:
These variants include the following extensions and strings appended/prepended to an encrypted file"s name:
.MafiaWare666
.jcrypt
.brutusptCrypt
.bmcrypt
.cyberone
.l33ch
If you were affected by one of these variants, you can download the free decryptor from here, run the executable, select the drive that holds the encrypted files, and point the tool to a sample pair of encrypted and original files.
"
BlackByte ransomware abuses legit driver to disable security products
exploits
ransomware
2022-10-05
https://www.bleepingcomputer.com/news/security/blackbyte-ransomware-abuses-legit-driver-to-disable-security-products/
The BlackByte ransomware gang is using a new technique that researchers are calling "Bring Your Own Driver," which enables bypassing protections by disabling more than 1,000 drivers used by various security solutions. [...]
"
Autosummary:
Attack details
Security researchers at cybersecurity company Sophos explain that the abused MSI graphics driver offers I/O control codes directly accessible by user-mode processes, which violates Microsoft’s security guidelines on kernel memory access.
"
Avast releases a free decryptor for some Hades ransomware variants
exploits
ransomware
2022-10-05
https://securityaffairs.co/wordpress/136710/malware/hades-ransomware-decryptor.html
Avast released a free decryptor for variants of the Hades ransomware tracked as ‘MafiaWare666’, ‘Jcrypt’, ‘RIP Lmao’, and ‘BrutusptCrypt,’ . Avast has released a decryptor for variants of the Hades ransomware known as ‘MafiaWare666’, ‘Jcrypt’, ‘RIP Lmao’, and ‘BrutusptCrypt,’ which can allow the victims of these ransomware strains to recover their files without paying the […]
The post Avast releases a free decryptor for some Hades ransomware variants appeared first on Security Affairs.
"
Autosummary:
The malware samples analyzed by the researchers append the following extensions the the filename of the encrypted files:
.MafiaWare666
.jcrypt
.brutusptCrypt
.bmcrypt
.cyberone
.l33ch
Once the MafiaWare666 variant completes the encrypted process, it displays a window that provides payment instructions to the victims.
"
Avast releases free decryptor for MafiaWare666 ransomware variants
exploits
ransomware
2022-10-05
https://www.bleepingcomputer.com/news/security/avast-releases-free-decryptor-for-mafiaware666-ransomware-variants/
Avast has released a decryptor for variants of the MafiaWare666 ransomware known as "Jcrypt", "RIP Lmao", and "BrutusptCrypt," allowing victims to recover their files for free. [...]
"
Autosummary:
These variants include the following extensions and strings appended/prepended to an encrypted file"s name:
.MafiaWare666
.jcrypt
.brutusptCrypt
.bmcrypt
.cyberone
.l33ch
If you were affected by one of these variants, you can download the free decryptor from here, run the executable, select the drive that holds the encrypted files, and point the tool to a sample pair of encrypted and original files.
"
Linux Cheerscrypt ransomware is linked to Chinese DEV-0401 APT group
exploits
ransomware
2022-10-04
https://securityaffairs.co/wordpress/136611/malware/apt10-cheerscrypt-ransomware.html
Researchers link recently discovered Linux ransomware Cheerscrypt to the China-linked cyberespionage group DEV-0401. Researchers at cybersecurity firm Sygnia attributed the recently discovered Linux ransomware Cheerscrypt to the China-linked cyber espionage group Bronze Starlight (aka DEV-0401, APT10) Bronze Starlight, has been active since mid-2021, in June researchers from Secureworks reported that the APT group is deploying […]
The post Linux Cheerscrypt ransomware is linked to Chinese DEV-0401 APT group appeared first on Security Affairs.
"
Autosummary:
Researchers at cybersecurity firm Sygnia attributed the recently discovered Linux ransomware Cheerscrypt to the China-linked cyber espionage group Bronze Starlight (aka DEV-0401, APT10)
Bronze Starlight, has been active since mid-2021, in June researchers from Secureworks reported that the APT group is deploying post-intrusion ransomware families to cover up the cyber espionage operations.
"
Cheerscrypt ransomware linked to a Chinese hacking group
exploits
ransomware
2022-10-04
https://www.bleepingcomputer.com/news/security/cheerscrypt-ransomware-linked-to-a-chinese-hacking-group/
The Cheerscrypt ransomware has been linked to a Chinese hacking group named "Emperor Dragonfly," known to frequently switch between ransomware families to evade attribution. [...]
"
Autosummary:
"Differing from the other RaaS developers, affiliates, and access brokers profiled here, DEV-0401 appears to be an activity group involved in all stages of their attack lifecycle, from initial access to ransomware development," explained the Microsoft threat intelligence researchers.
"
Netwalker ransomware affiliate sentenced to 20 years in prison
exploits
ransomware
2022-10-04
https://www.bleepingcomputer.com/news/security/netwalker-ransomware-affiliate-sentenced-to-20-years-in-prison/
Former Netwalker ransomware affiliate Sebastien Vachon-Desjardins has been sentenced to 20 years in prison and demanded to forfeit $21.5 million for his attacks on a Tampa company and other entities. [...]
"
Autosummary:
Vachon-Desjardins, a 34 Canadian man extradited from Quebec, was sentenced today in a Florida court after pleading guilty to "Conspiracy to commit Computer Fraud", "Conspiracy to Commit Wire Fraud", "Intentional Damage to Protected Computer," and "Transmitting a Demand in Relation to Damaging a Protected Computer."
"
Many IT pros don’t think a ransomware attack can impact Microsoft 365 data
exploits
ransomware
2022-10-03
https://www.helpnetsecurity.com/2022/10/03/ransomware-attack-impact-microsoft-365-data/
Nearly a quarter of businesses have suffered a ransomware attack, with a fifth occurring in the past 12 months, according to Hornetsecurity. The 2022 Ransomware Report, which surveyed over 2,000 IT leaders, revealed that 24% have been victims of a ransomware attack, with 20% of attacks happening in the last year. Cyberattacks are happening more frequently. Last year’s ransomware survey revealed that 21% of companies experienced an attack. This year it rose by three percent … More →
The post Many IT pros don’t think a ransomware attack can impact Microsoft 365 data appeared first on Help Net Security.
"
Autosummary:
The 2022 Ransomware Report, which surveyed over 2,000 IT leaders, revealed that 24% have been victims of a ransomware attack, with 20% of attacks happening in the last year.
"
Researchers Link Cheerscrypt Linux-Based Ransomware to Chinese Hackers
exploits
ransomware
2022-10-03
https://thehackernews.com/2022/10/researchers-link-cheerscrypt-linux.html
The recently discovered Linux-Based ransomware strain known as Cheerscrypt has been attributed to a Chinese cyber espionage group known for operating short-lived ransomware schemes.
Cybersecurity firm Sygnia attributed the attacks to a threat actor it tracks under the name Emperor Dragonfly, which is also known as Bronze Starlight (Secureworks) and DEV-0401 (Microsoft).
"Emperor Dragonfly
"
Autosummary:
"
The use of Cheerscrypt is the latest addition to a long list of ransomware families previously deployed by the group in little over a year, including LockFile, Atom Silo, Rook, Night Sky, Pandora, and LockBit 2.0.
"
BlackCat ransomware gang claims to have hacked US defense contractor NJVC
exploits
ransomware
2022-10-02
https://securityaffairs.co/wordpress/136537/cyber-crime/njvc-data-breach.html
Another US defense contractor suffered a data breach, the BlackCat ransomware gang claims to have hacked NJVC. The ALPHV/BlackCat ransomware gang claims to have breached the IT firm NJVC, which supports the federal government and the United States Department of Defense. The company supports intelligence, defense, and geospatial organizations. The company has more than 1,200 employees in locations worldwide. BlackCat added NJVC to […]
The post BlackCat ransomware gang claims to have hacked US defense contractor NJVC appeared first on Security Affairs.
"
Autosummary:
🌐 BlackCat (ALPHV) #Ransomware team added NJVC to the victims" list 🚨
NJVC is an information technology (IT) company supporting the federal government and the United States Department of Defense, with $290 Million in revenue from The United States 🇺🇸#Blackcat pic.twitter.com/RnsJPUUMLw — DarkFeed (@ido_cohen2) September 29, 2022
BlackCat added NJVC to the list of victims on its Tor leak site and is threatening to release the allegedly stolen data if the company will not pay the ransom.
"
The Week in Ransomware - September 30th 2022 - Emerging from the Shadows
exploits
ransomware
2022-09-30
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-september-30th-2022-emerging-from-the-shadows/
This week"s news primarily revolves around LockBit, BlackMatter, and the rising enterprise-targeting Royal ransomware operation. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include: @Seifreed, @serghei, @VK_Intel, @billtoulas, @DanielGallagher, @jorntvdw, @PolarToffee, @BleepinComputer, @fwosar, @struppigel, @demonslay335, @LawrenceAbrams, @Ionut_Ilascu, @FourOctets, @malwrhunterteam, @malwareforme, @swascan, @y_advintel, @AdvIntel, @angel11VR, @InsideStairwell, @aejleslie, @Cyderes, @ahnlab, and @pcrisk.
"
Office exploits continue to spread more than any other category of malware
exploits
ransomware
2022-09-29
https://www.helpnetsecurity.com/2022/09/29/office-exploits-continue-to-spread/
The latest Internet Security Report from the WatchGuard Threat Lab shows a reduction in overall malware detections from the peaks seen in the first half of 2021, along with an increase in threats for Chrome and Microsoft Office and the ongoing Emotet botnet resurgence. Office exploits on the rise “While overall malware attacks in Q2 fell off from the all-time highs seen in previous quarters, over 81% of detections came via TLS encrypted connections, continuing … More →
The post Office exploits continue to spread more than any other category of malware appeared first on Help Net Security.
"
Autosummary:
Office exploits on the rise
“While overall malware attacks in Q2 fell off from the all-time highs seen in previous quarters, over 81% of detections came via TLS encrypted connections, continuing a worrisome upward trend,” said Corey Nachreiner, CSO at WatchGuard.
"
New Royal Ransomware emerges in multi-million dollar attacks
exploits
ransomware
2022-09-29
https://www.bleepingcomputer.com/news/security/new-royal-ransomware-emerges-in-multi-million-dollar-attacks/
A new ransomware operation named Royal is quickly ramping up, targeting corporations with ransom demands ranging from $250,000 to over $2 million. [...]
"
Autosummary:
Example of a Royal callback phishing email
Source: AdvIntel
When a victim calls the number, the threat actors use social engineering to convince the victim to install remote access software, which is used to gain initial access to the corporate network.
However, it is strongly advised that network, windows, and security admins keep an eye out for this group, as they are quickly ramping up operations and will likely become one of the more significant enterprise-targeting ransomware operations.
"
How to protect your Mac against ransomware and other cyberthreats
exploits
ransomware
2022-09-29
https://www.bleepingcomputer.com/news/security/how-to-protect-your-mac-against-ransomware-and-other-cyberthreats/
A popular myth says that "Mac"s don"t get viruses," but that"s never quite been true — and today"s Mac users face more cyberthreats than ever before. If you"ve got a friend or family member who thinks they don"t have to worry at all about cybersecurity, pass along this article. [...]
"
Autosummary:
For instance:
Attacks on webbased apps and services (like Microsoft 365) could lead to data loss
Phishing emails can impact anyone, anytime, causing you to download a malicious attachment or inadvertently reveal sensitive information — no matter whether you’re on a Windows computer, a Mac or even your smartphone.They are the ones you spend hours reminding everyone else to follow:
Avoiding clicking on email attachments or links from unknown senders
Installing the latest software updates as soon as they’re available
Never bypassing security settings to install apps if you’re not 100% certain of their safety
Still, even the tech-savviest among us can make mistakes or otherwise fall victim to ransomware and other cyberthreats.
Even offline events, like hardware damage or having your laptop stolen, can cause you to lose valuable files, photos and other data if they’re not safely backed up.
"
Leaked LockBit 3.0 builder used by ‘Bl00dy’ ransomware gang in attacks
exploits
ransomware
2022-09-28
https://www.bleepingcomputer.com/news/security/leaked-lockbit-30-builder-used-by-bl00dy-ransomware-gang-in-attacks/
The relatively new Bl00Dy Ransomware Gang has started to use a recently leaked LockBit ransomware builder in attacks against companies. [...]
"
Autosummary:
LockBit 3.0 ransomware builder configuration file
Source: BleepingComputer
Unfortunately, our predictions have come true, and a relatively new ransomware group named "Bl00Dy Ransomware Gang" has already utilized the builder in an attack on a Ukrainian entity.
"
Bl00dy ransomware gang started using leaked LockBit 3.0 builder in attacks
exploits
ransomware
2022-09-28
https://securityaffairs.co/wordpress/136345/cyber-crime/bl00dy-ransomware-lockbit-3-encryptor.html
The recently born Bl00Dy Ransomware gang has started using the recently leaked LockBit ransomware builder in attacks in the wild. The Bl00Dy Ransomware gang is the first group that started using the recently leaked LockBit ransomware builder in attacks in the wild. Last week, an alleged disgruntled developer leaked the builder for the latest encryptor […]
The post Bl00dy ransomware gang started using leaked LockBit 3.0 builder in attacks appeared first on Security Affairs.
"
Autosummary:
Linkedin
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
The various ways ransomware impacts your organization
exploits
ransomware
2022-09-27
https://www.helpnetsecurity.com/2022/09/27/various-ways-ransomware-impacts-your-organization/
Despite increased investment in tools to fight ransomware, 90% of organizations were affected by ransomware in some capacity over the past 12 months, according to SpyCloud’s 2022 Ransomware Defense Report. Allocation of security budgets Respondents ranked the risk of attack through third-party vendors as the main factor driving the allocation of security budgets, followed by the rise in frequency and sophistication of ransomware attacks. As a result, organizations’ ransomware mitigation solutions focus increasingly on the … More →
The post The various ways ransomware impacts your organization appeared first on Help Net Security.
"
Autosummary:
We have heard warnings recently against using SMS authentication for MFA since texts can be intercepted by motivated cybercriminals, but even push notifications and authentication applications are not completely foolproof or secure, which these malware and compromised cookies trends are showing,” Darren Siegel, Cyber Security Expert at Specops Software, told Help Net Security.
Cybercriminals deploy malware to steal data including credentials to workforce applications, browser fingerprints, and device or web session cookies, enabling them to impersonate an employee and access and encrypt data while bypassing MFA and other security controls.
"
The key differences between a business continuity plan and a disaster recovery plan
ransomware
2022-09-27
https://www.helpnetsecurity.com/2022/09/27/differences-between-business-continuity-plan-disaster-recovery-plan-video/
In this Help Net Security video, Chip Gibbons, CISO at Thrive, illustrates the differences between a business continuity plan and a disaster recovery plan. While these terms are often used interchangeably, there are important differences and it’s critical to have both plans in place to help mitigate the impact on business operations: A business continuity plan refers to how a business continues to operate when key systems are down or an outage occurs. A business … More →
The post The key differences between a business continuity plan and a disaster recovery plan appeared first on Help Net Security.
"
Autosummary:
"
MS SQL servers are getting hacked to deliver ransomware to orgs
exploits
ransomware
2022-09-27
https://www.helpnetsecurity.com/2022/09/27/ms-sql-servers-hacked-ransomware/
Cybercriminals wielding the FARGO (aka Mallox, aka TargetCompany) ransomware are targeting Microsoft SQL (MS SQL) servers, AhnLab’s ASEC analysis team has warned. They haven’t pinpointed how the attackers are getting access to the targeted servers, but noted that typical attacks targeting database servers include brute force and dictionary attacks aimed at ferreting out the passwords of existing, poorly secured accounts. “And there may be vulnerability attacks on systems that do not have a vulnerability patch … More →
The post MS SQL servers are getting hacked to deliver ransomware to orgs appeared first on Help Net Security.
"
Autosummary:
"
Why Continuous Security Testing is a Must for Organizations Today
ransomware
2022-09-27
https://thehackernews.com/2022/09/why-continuous-security-testing-is-must.html
The global cybersecurity market is flourishing. Experts at Gartner predict that the end-user spending for the information security and risk management market will grow from $172.5 billion in 2022 to $267.3 billion in 2026.
One big area of spending includes the art of putting cybersecurity defenses under pressure, commonly known as security testing. MarketsandMarkets forecasts the global
"
Autosummary:
The impact of bug bounty program on cybersecurity
By launching a bug bounty program, organizations experience:
More robust protection: Company data, brand, and reputation have additional protection through continuous security testing.
How bug bounty programs support continuous security testing structures
While you"ll receive a certificate to say you"re secure at the end of a penetration test, it won"t necessarily mean that"s still the case the next time you make an update.
5 — Poor-fitting security testing solutions for agile environments
Continuous development lifecycles don"t align with penetration testing cycles (often performed annually.)
"
North Korea-linked Lazarus continues to target job seekers with macOS malware
exploits
ransomware
2022-09-27
https://securityaffairs.co/wordpress/136297/apt/lazarus-apt-targeting-macos.html
North Korea-linked Lazarus APT group is targeting macOS Users searching for jobs in the cryptocurrency industry. North Korea-linked Lazarus APT group continues to target macOS with a malware campaign using job opportunities as a lure. The attackers aimed at stealing credentials for the victims’ wallets. Last week, SentinelOne researchers discovered a decoy documents advertising positions […]
The post North Korea-linked Lazarus continues to target job seekers with macOS malware appeared first on Security Affairs.
"
Autosummary:
Linkedin
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
To encrypt or to destroy? Ransomware affiliates plan to try the latter
exploits
ransomware
2022-09-26
https://www.helpnetsecurity.com/2022/09/26/ransomware-data-destruction/
Ransomware gangs are planning on trying out a new tactic, and it involves the destruction of the victims’ data. Targeting the data Researchers from Symantec, Cyderes and Stairwell have recently analyzed a new version of the Exmatter data exfiltration tool and have spotted a new capability: data corruption. Used in conjunction with multi-platform ALPHV (aka BlackCat, aka Noberus) ransomware, this Exmatter sample takes specific file types from selected directories and uploads them to attacker-controlled servers. … More →
The post To encrypt or to destroy? Ransomware affiliates plan to try the latter appeared first on Help Net Security.
"
Autosummary:
Triple extortion (encryption + data exfiltration and the threat of data leaking + DDoS attack aimed at disrupting targets’ services)
The no-encryption approach + offer to share information on how the target was breached
This latest approach of corrupting data and asking for money to return it to the victim might work in some cases, especially if the victim organization does not have a good plan to recover from data loss or does not follow data backup best practices.
"
BlackCat Ransomware Attackers Spotted Fine-Tuning Their Malware Arsenal
exploits
ransomware
2022-09-26
https://thehackernews.com/2022/09/blackcat-ransomware-attackers-spotted.html
The BlackCat ransomware crew has been spotted fine-tuning their malware arsenal to fly under the radar and expand their reach.
"Among some of the more notable developments has been the use of a new version of the Exmatter data exfiltration tool, and the use of Eamfo, information-stealing malware that is designed to steal credentials stored by Veeam backup software," researchers from Symantec
"
Autosummary:
BlackCat, also known by the names ALPHV and Noberus, is attributed to an adversary tracked as Coreid (aka FIN7, Carbanak, or Carbon Spider) and is said to be a rebranded successor of DarkSide and BlackMatter, both of which shut shop last year following a string of high-profile attacks, including that of Colonial Pipeline.
"
Calling in the ransomware negotiator, with Kurtis Minder: Lock and Code S03E20
exploits
ransomware
2022-09-26
https://www.malwarebytes.com/blog/podcast/2022/09/calling-in-the-ransomware-negotiator-with-kurtis-minder-lock-and-code-s03e20
Categories: Podcast This week on Lock and Code, we speak with Kurtis Minder, CEO of GroupSense, about how a company decides to bring in a ransomware negotiator when it"s hit with the destructive malware.
|
The post Calling in the ransomware negotiator, with Kurtis Minder: Lock and Code S03E20 appeared first on Malwarebytes Labs.
"
Autosummary:
The negotiator, or negotiators, can work closely with a company"s executives, security staff, legal department, and press handlers to accurately and firmly represent the company"s needs during a ransomware attack.
"
HBC selects Veeam to improve data protection and ransomware resilience
exploits
ransomware
2022-09-26
https://www.helpnetsecurity.com/2022/09/27/hbc-veeam/
Veeam Software announced that HBC, a holding company of investments and businesses that operates at the intersection of technology, retail operations and real estate, has chosen Veeam Availability Suite to centralize data protection on premises and across clouds. Veeam helps HBC ensure business continuity, meet internal governance compliance requirements and protect against ransomware. Additionally, HBC saved more than $1 million in a one-time capital expenditure and saves $600,000 in recurring operational expenses annually. From the … More →
The post HBC selects Veeam to improve data protection and ransomware resilience appeared first on Help Net Security.
"
Autosummary:
It’s the majority owner of iconic e-commerce companies such as Saks, a leading online destination for luxury fashion, Saks OFF 5TH, a premier luxury off-price e-commerce company and The Bay, a Canadian e-commerce marketplace.
“To improve upon the customer experience, we began a digital transformation to accelerate our e-commerce business,” said Ope Bakare, Chief Technical Officer, HBC.
"
Microsoft SQL servers hacked in TargetCompany ransomware attacks
exploits
ransomware
2022-09-24
https://www.bleepingcomputer.com/news/security/microsoft-sql-servers-hacked-in-targetcompany-ransomware-attacks/
Security analysts at ASEC have discovered a new wave of attacks targeting vulnerable Microsoft SQL servers, involving the deployment of a ransomware strain named FARGO. [...]
"
Autosummary:
Exempt from encryption are several Microsoft Windows system directories, the boot files, Tor Browser, Internet Explorer, user customizations and settings, the debug log file, or the thumbnail database.
"
The Week in Ransomware - September 23rd 2022 - LockBit leak
exploits
ransomware
2022-09-23
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-september-23rd-2022-lockbit-leak/
This week we saw some embarrassment for the LockBit ransomware operation when their programmer leaked a ransomware builder for the LockBit 3.0 encryptor. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include: @struppigel, @DanielGallagher, @demonslay335, @malwrhunterteam, @Seifreed, @malwareforme, @fwosar, @BleepinComputer, @FourOctets, @billtoulas, @jorntvdw, @PolarToffee, @Ionut_Ilascu, @VK_Intel, @LawrenceAbrams, @serghei, @S2W_Official, @GeeksCyber, @BroadcomSW, @pcrisk, @3xp0rtblog, @vxunderground, @PogoWasRight, @AhnLab_SecuInfo, and @zscaler.
September 20th 2022
The Hive ransomware operation claimed responsibility for an attack on the New York Racing Association (NYRA), which previously disclosed that a cyber attack on June 30, 2022, impacted IT operations and website availability and compromised member data.
"
A first look at the builder for LockBit 3.0 Black
ransomware
2022-09-23
https://www.malwarebytes.com/blog/news/2022/09/lockbit-builder-leaked-by-disgruntled-developer
Categories: News Categories: Ransomware Tags: LockBit
Tags: builder
Tags: leaked
The LockBit gang"s latest ransomware builder has been leaked, and we have a copy
|
The post A first look at the builder for LockBit 3.0 Black appeared first on Malwarebytes Labs.
"
Autosummary:
Posted: September 23, 2022 by
The LockBit gang"s latest ransomware builder has been leaked, and we have a copy
A few months after the LockBit gang released version 3.0 of its ransomware, LockBit 3.0 Black, the builder for it has been leaked by what seems to be a disgruntled developer.
"
A disgruntled developer is the alleged source of the leak of the Lockbit 3.0 builder
ransomware
2022-09-22
https://securityaffairs.co/wordpress/136056/data-breach/lockbit-3-0-builder-leak.html
A disgruntled developer seems to be responsible for the leak of the builder for the latest encryptor of the LockBit ransomware gang. The leak of the builder for the latest encryptor of the LockBit ransomware gang made the headlines, it seems that the person who published it is a disgruntled developer. The latest version of […]
The post A disgruntled developer is the alleged source of the leak of the Lockbit 3.0 builder appeared first on Security Affairs.
"
Autosummary:
Linkedin
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
BlackCat ransomware’s data exfiltration tool gets an upgrade
exploits
ransomware
2022-09-22
https://www.bleepingcomputer.com/news/security/blackcat-ransomware-s-data-exfiltration-tool-gets-an-upgrade/
The BlackCat ransomware (aka ALPHV) isn"t showing any signs of slowing down, and the latest example of its evolution is a new version of the gang"s data exfiltration tool used for double-extortion attacks. [...]
"
Autosummary:
Named "Exmatter," the tool was used since BlackCat"s launch in November 2021 and was heavily updated in August 2022, featuring the following changes:
Limit type of files to exfiltrate to: PDF, DOC, DOCX, XLS, PNG, JPG, JPEG, TXT, BMP, RDP, SQL, MSG, PST, ZIP, RTF, IPT, and DWG.
"
How to have fun negotiating with a ransomware gang
exploits
ransomware
2022-09-22
https://grahamcluley.com/how-to-have-fun-negotiating-with-a-ransomware-gang/
Can negotiating your firm’s ransomware payment actually be fun? Well, if it’s a game rather than the real thing then yes! The inventive bods at the Financial Times have created an imaginative ransomware negotiation simulator which lets you imagine you’re in the hot seat at a hacked company, trying to stop cybercriminals from releasing sensitive … Continue reading "How to have fun negotiating with a ransomware gang"
"
Autosummary:
After a ransomware attack, the company’s day-to-day operations are severely disrupted, meaning that servers are down, products can’t ship, and employees aren’t being paid.
"
LockBit ransomware builder leaked online by “angry developer”
exploits
ransomware
2022-09-21
https://www.bleepingcomputer.com/news/security/lockbit-ransomware-builder-leaked-online-by-angry-developer-/
The LockBit ransomware operation has suffered a breach, with an allegedly disgruntled developer leaking the builder for the gang"s newest encryptor. [...]
"
Autosummary:
LockBit 3.0 builder files
Source: BleepingComputer
The included "config.json" can be used to customize an encryptor, including modifying the ransom note, changing configuration options, deciding what processes and services to terminate, and even specifying the command and control server that the encryptor will send data.
"
Hive ransomware claims attack on New York Racing Association
exploits
ransomware
2022-09-20
https://www.bleepingcomputer.com/news/security/hive-ransomware-claims-attack-on-new-york-racing-association/
The Hive ransomware operation claimed responsibility for an attack on the New York Racing Association (NYRA), which previously disclosed that a cyber attack on June 30, 2022, impacted IT operations and website availability and compromised member data. [...]
"
Autosummary:
"
Crypto giveaway scams continue to escalate
financial
ransomware
2022-09-19
https://www.helpnetsecurity.com/2022/09/19/crypto-giveaway-scams-continue-to-escalate/
Group-IB has noted a fivefold increase in the number of domains used for crypto giveaway scams that involve fake YouTube streams in the first half of 2022. In addition to Vitalik Buterin, Elon Musk, and other crypto celebs, scammers started exploiting the name of Nayib Bukele, the president of Salvador. The evolution of crypto giveaway scams Crypto giveaway scams have evolved into an illicit market segment with multiple services that aim to facilitate fraudulent operations. … More →
The post Crypto giveaway scams continue to escalate appeared first on Help Net Security.
"
Autosummary:
Scammers have the following at their disposal: an exchange platform for hacked YouTube accounts, viewer boosting services, manuals, website editors, admin panel developers, domain names, bulletproof hosting, and tools and people who can create deepfake videos.
After gaining access to a legitimate account, a fake crypto streamer renames the channel, deletes all the previously uploaded videos from the playlist, changes the user pic, adds new design features, and uploads relevant crypto-related content.In addition to Vitalik Buterin, Elon Musk, and other crypto celebs, scammers started exploiting the name of Nayib Bukele, the president of Salvador.
"
Europol and Bitdefender Release Free Decryptor for LockerGoga Ransomware
exploits
ransomware
2022-09-19
https://thehackernews.com/2022/09/europol-and-bitdefender-release-free.html
A decryptor for the LockerGoga ransomware has been made available by Romanian cybersecurity firm Bitdefender in collaboration with Europol, the No More Ransom project, and Zürich law enforcement authorities.
Identified in January 2019, LockerGoga drew headlines for its attacks against the Norwegian aluminum giant Norsk Hydro. It"s said to have infected more than 1,800 victims in 71 countries,
"
Autosummary:
"
Emotet Botnet Started Distributing Quantum and BlackCat Ransomware
exploits
ransomware
2022-09-19
https://thehackernews.com/2022/09/emotet-botnet-started-distributing.html
The Emotet malware is now being leveraged by ransomware-as-a-service (RaaS) groups, including Quantum and BlackCat, after Conti"s official retirement from the threat landscape this year.
Emotet started off as a banking trojan in 2014, but updates added to it over time have transformed the malware into a highly potent threat that"s capable of downloading other payloads onto the victim"s machine,
"
Autosummary:
"
New York ambulance service discloses data breach after ransomware attack
financial
exploits
ransomware
2022-09-17
https://www.bleepingcomputer.com/news/security/new-york-ambulance-service-discloses-data-breach-after-ransomware-attack/
Empress EMS (Emergency Medical Services), a New York-based emergency response and ambulance service provider, has disclosed a data breach that exposed customer information. [...]
"
Autosummary:
“Some of these files contained patient names, dates of service, insurance information, and in some instances, Social Security numbers,” reads the disclosure from Empress EMS.
"
Emotet botnet now pushes Quantum and BlackCat ransomware
exploits
ransomware
2022-09-17
https://www.bleepingcomputer.com/news/security/emotet-botnet-now-pushes-quantum-and-blackcat-ransomware/
While monitoring the Emotet botnet"s current activity, security researchers found that the malware is now being used by the Quantum and BlackCat ransomware gang to deploy their payloads. [...]
"
Autosummary:
The Emotet malware was first deployed in attacks as a banking trojan in 2014 and has evolved into a botnet used by the TA542 threat group (aka Mummy Spider) to steal data, perform reconnaissance, and move laterally throughout victims" networks, as well as to deliver second-stage malicious payloads.
"
Bitdefender releases free decryptor for LockerGoga ransomware
exploits
ransomware
2022-09-16
https://www.bleepingcomputer.com/news/security/bitdefender-releases-free-decryptor-for-lockergoga-ransomware/
Romanian cybersecurity firm Bitdefender has released a free decryptor to help LockerGoga ransomware victims recover their files without paying a ransom. [...]
"
Autosummary:
"Its operator, who has been detained since October 2021 pending trial, is part of a larger cybercrime ring that used LockerGoga and MegaCortext ransomware to infect more than 1,800 persons and institutions in 71 countries to cause an estimated damage of $US 104 million," Bitdefender explains in the decryptor announcement.
"
The Week in Ransomware - September 16th 2022 - Iranian Sanctions
exploits
ransomware
2022-09-16
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-september-16th-2022-iranian-sanctions/
It has been a fairly quiet week on the ransomware front, with the biggest news being US sanctions on Iranians linked to ransomware attacks. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include: @jorntvdw, @demonslay335, @serghei, @malwareforme, @malwrhunterteam, @BleepinComputer, @LawrenceAbrams, @Seifreed, @DanielGallagher, @VK_Intel, @FourOctets, @billtoulas, @struppigel, @PolarToffee, @fwosar, @Ionut_Ilascu, @Bitdefender, @AlvieriD, @AWNetworks, @LabsSentinel, @pcrisk, @CISAgov, and @security_score, @censysio, and @juanbrodersen.
Researchers also released some interesting reports this week:
In ransomware attack-related news, the Yanluowang ransomware gang began leaking data stolen during a cyberattack on Cisco and the Hive ransomware claimed an attack on Bell Technical Solutions (BTS).
"
Bitdefender releases Universal LockerGoga ransomware decryptor
exploits
ransomware
2022-09-16
https://securityaffairs.co/wordpress/135843/malware/lockergoga-ransomware-decryptor.html
Bitdefender has released a free decryptor to allow the victims of the LockerGoga ransomware to recover their files without paying a ransom. The cybersecurity firm Bitdefender has released a free decryptor to allow LockerGoga ransomware victims to recover their encrypted files without paying a ransom. “We’re pleased to announce the availability of a new decryptor […]
The post Bitdefender releases Universal LockerGoga ransomware decryptor appeared first on Security Affairs.
"
Autosummary:
Linkedin
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
SMBs are hardest-hit by ransomware
exploits
ransomware
2022-09-15
https://www.helpnetsecurity.com/2022/09/15/small-businesses-ransomware-targets/
Coalition announced the mid-year update to its 2022 Cyber Claims Report detailing the evolution of cyber trends, revealinig that small businesses have become bigger targets, overall incidents are down, and ransomware attacks are declining as demands go unpaid. During the first half of 2022, the average cost of a claim for a small business owner increased to $139,000, which is 58% higher than levels during the first half of 2021. “Across industries, we continue to … More →
The post SMBs are hardest-hit by ransomware appeared first on Help Net Security.
"
Autosummary:
Other key findings:
Phishing triggers the majority of cyber incidents, accounting for 57.9% of reported claims
Cyber gangs have built a thriving business
Funds transfer fraud (FTF) claims have held steady thanks to phishing, and
Microsoft Exchange has become the vulnerability that persists.
"
U.S. Charges 3 Iranian Hackers and Sanctions Several Others Over Ransomware Attacks
exploits
ransomware
2022-09-15
https://thehackernews.com/2022/09/us-charges-3-iranian-hackers-and.html
The U.S. Treasury Department"s Office of Foreign Assets Control (OFAC) on Wednesday announced sweeping sanctions against ten individuals and two entities backed by Iran"s Islamic Revolutionary Guard Corps (IRGC) for their involvement in ransomware attacks at least since October 2020.
The agency said the cyber activity mounted by the individuals is partially attributable to intrusion sets tracked
"
Autosummary:
Fortinet FortiOS SSL VPN 2FA bypass vulnerability (CVE-2020-12812)
ProxyShell (CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207), and
Log4Shell (CVE-2021-44228, CVE-2021-45046, and/or CVE-2021-45105)
"
Hive ransomware claims cyberattack on Bell Canada subsidiary
exploits
ransomware
ciber
2022-09-15
https://www.bleepingcomputer.com/news/security/hive-ransomware-claims-cyberattack-on-bell-canada-subsidiary/
The Hive ransomware gang claimed responsibility for an attack that hit the systems of Bell Canada subsidiary Bell Technical Solutions (BTS). [...]
"
Autosummary:
"
Hive is a Ransomware-as-a-Service (RaaS) operation active since June 2021 behind attacks against dozens of organizations, counting only those victims who had their data leaked online after refusing to pay the ransom,
The Federal Bureau of Investigation (FBI) released some indicators of compromise and technical details associated with Hive ransomware attacks in August 2021.
"
Salesforce expands its use of Workday to support continued global growth
ransomware
2022-09-14
https://www.helpnetsecurity.com/2022/09/14/workday-salesforce/
Salesforce has expanded its use of Workday to support continued global growth. The organization has selected Workday Financial Management, Workday Accounting Center, Workday Adaptive Planning, and Workday Prism Analytics, building on its existing use of Workday Human Capital Management (HCM), Workday Recruiting, Workday Time Tracking, and Workday Payroll for U.S. and Canada. Technology from Salesforce, which saw revenue growth of 25% in its fiscal year 2022, helps companies digitally transform to grow their relationships with … More →
The post Salesforce expands its use of Workday to support continued global growth appeared first on Help Net Security.
"
Autosummary:
The organization has selected Workday Financial Management, Workday Accounting Center, Workday Adaptive Planning, and Workday Prism Analytics, building on its existing use of Workday Human Capital Management (HCM), Workday Recruiting, Workday Time Tracking, and Workday Payroll for U.S. and Canada.
"
US govt sanctions ten Iranians linked to ransomware attacks
exploits
ransomware
2022-09-14
https://www.bleepingcomputer.com/news/security/us-govt-sanctions-ten-iranians-linked-to-ransomware-attacks/
The Treasury Department"s Office of Foreign Assets Control (OFAC) announced sanctions today against ten individuals and two entities affiliated with Iran"s Islamic Revolutionary Guard Corps (IRGC) for their involvement in ransomware attacks. [...]
"
Autosummary:
"
The IRGC-affiliated group is comprised of employees and associates of Iran-based Najee Technology Hooshmand Fater LLC (Najee Technology) and Afkar System Yazd Company (Afkar System):
Mansour Ahmadi: the owner, managing director, and chairman of the board of Najee Technology
Ahmad Khatibi Aghda: managing director and member of the board of Afkar System
Additional employees and associates: Ali Agha-Ahmadi, Mohammad Agha Ahmadi, Mo"in Mahdavi, Aliakbar Rashidi-Barjini, Amir Hossein Nikaeen Ravari, Mostafa Haji Hosseini, Mojtaba Haji Hosseini, and Mohammad Shakeri-Ashtijeh.
"
Lorenz Ransomware Exploit Mitel VoIP Systems to Breach Business Networks
exploits
ransomware
2022-09-14
https://thehackernews.com/2022/09/lorenz-ransomware-exploit-mitel-voip.html
The operators behind the Lornenz ransomware operation have been observed exploiting a now-patched critical security flaw in Mitel MiVoice Connect to obtain a foothold into target environments for follow-on malicious activities.
"Initial malicious activity originated from a Mitel appliance sitting on the network perimeter," researchers from cybersecurity firm Arctic Wolf said in a report
"
Autosummary:
"
How prepared are organizations to tackle ransomware attacks?
exploits
ransomware
2022-09-13
https://www.helpnetsecurity.com/2022/09/13/ransomware-preparedness-priority/
HYCU has announced its State of Ransomware Preparedness report in partnership with ActualTech Media, which reveals that ransomware is an unavoidable risk for businesses, which is why ransomware preparedness is a top priority. The report captures detailed data intended to help technology, financial and security leaders better prepare for and remediate ransomware attacks, which occur on average every 11 seconds and have risen to more than 236.1 million in the first half of 2022. “Survey … More →
The post How prepared are organizations to tackle ransomware attacks? appeared first on Help Net Security.
"
Autosummary:
According to the report, 63% of surveyed enterprise organizations are increasing spending on detection, prevention and recovery, and respondents are beginning to understand that air-gapped or immutable backups are the only ways to ensure that the backups themselves don’t fall prey to encryption worms when ransomware hits.
"
A closer look at ransomware attack patterns
exploits
ransomware
2022-09-13
https://www.helpnetsecurity.com/2022/09/13/ransomware-attack-patterns-video/
Barracuda released its fourth-annual threat research report which looks at ransomware attack patterns that occurred between August 2021 and July 2022. This Help Net Security video highlights how ransomware attacks continue to be a threat to businesses of all sizes.
The post A closer look at ransomware attack patterns appeared first on Help Net Security.
"
Autosummary:
"
Cisco confirms Yanluowang ransomware leaked stolen company data
exploits
ransomware
2022-09-12
https://www.bleepingcomputer.com/news/security/cisco-confirms-yanluowang-ransomware-leaked-stolen-company-data/
Cisco has confirmed that the data leaked yessterday by the Yanluowang ransomware gang was stolen from the company network during a cyberattack in May. [...]
"
Autosummary:
"
Thousands of QNAP NAS devices hit by DeadBolt ransomware (CVE-2022-27593)
exploits
ransomware
2022-09-12
https://www.helpnetsecurity.com/2022/09/12/cve-2022-27593/
QNAP Systems has provided more information about the latest DeadBolt ransomware campaign targeting users of its network-attached storage (NAS) devices and the vulnerability the attackers are exploiting (CVE-2022-27593). About CVE-2022-27593 CVE-2022-27593 exists because of an externally controlled reference that resolves to a resource that is outside of the intended control sphere, and affects the widely used Photo Station application. The vulnerability allows attackers to modify system files and, ultimately, install and deploy ransomware. According to … More →
The post Thousands of QNAP NAS devices hit by DeadBolt ransomware (CVE-2022-27593) appeared first on Help Net Security.
"
Autosummary:
“No public exploit code exists, although this write up will introduce, what we believe to be, the basis of the exploit,” he wrote, and noted that the published information is likely enough to write signatures and detections against its exploitation.
"
Cisco confirms that data leaked by the Yanluowang ransomware gang were stolen from its systems
exploits
ransomware
2022-09-12
https://securityaffairs.co/wordpress/135625/cyber-crime/cisco-hack-yanluowang-ransomware.html
Cisco confirmed the May attack and that the data leaked by the Yanluowang ransomware group was stolen from its systems. In August, Cisco disclosed a security breach, the Yanluowang ransomware gang breached its corporate network in late May and stole internal data. The investigation conducted by Cisco Security Incident Response (CSIRT) and Cisco Talos revealed […]
The post Cisco confirms that data leaked by the Yanluowang ransomware gang were stolen from its systems appeared first on Security Affairs.
"
Autosummary:
Then threat actors were able to drop multiple tools in the target network, including remote access tools like LogMeIn and TeamViewer, Cobalt Strike, PowerSploit, Mimikatz, and Impacket.
"
Lorenz ransomware breaches corporate network via phone systems
exploits
ransomware
2022-09-12
https://www.bleepingcomputer.com/news/security/lorenz-ransomware-breaches-corporate-network-via-phone-systems/
The Lorenz ransomware gang now uses a critical vulnerability in Mitel MiVoice VOIP appliances to breach enterprises using their phone systems for initial access to their corporate networks. [...]
"
Autosummary:
"
This is an important addition to the gang"s arsenal, given that Mitel Voice-over-IP (VoIP) products are used by organizations in critical sectors worldwide (including government agencies), with over 19,000 devices currently exposed to attacks over the Internet, per security expert Kevin Beaumont.
"
IKOULA and ESET join forces to block ransomware and zero-day threats
exploits
ransomware
2022-09-12
https://www.helpnetsecurity.com/2022/09/13/ikoula-eset/
With the resurgence of cyber-attacks, which are ever more violent and paralyzing for companies, IKOULA has joined forces with ESET to offer companies a professional endpoint protection solution against ransomware and zero-day threats. At a time when cyber-risks must be approached in the same way as all other business risks, IKOULA is strengthening its range of cyber-protection solutions, and now offers to its customers the ESET solution: a solution created to protect all company’s workstations … More →
The post IKOULA and ESET join forces to block ransomware and zero-day threats appeared first on Help Net Security.
"
Autosummary:
"
Vice Society claims LAUSD ransomware attack, theft of 500GB of data
exploits
ransomware
2022-09-09
https://www.bleepingcomputer.com/news/security/vice-society-claims-lausd-ransomware-attack-theft-of-500gb-of-data/
The Vice Society gang has claimed the ransomware attack that hit Los Angeles Unified (LAUSD), the second largest school district in the United States, over the weekend. [...]
"
Autosummary:
The gang has claimed attacks on other school districts, schools, and universities worldwide, including the Austrian Medical University of Innsbruck, the San Luis Coastal Unified School District, the Moon Area School District, the Grand Valley State University, and many others.
"
The Week in Ransomware - September 9th 2022 - Schools under fire
exploits
ransomware
2022-09-09
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-september-9th-2022-schools-under-fire/
Ransomware gangs have been busy this week, launching attacks against NAS devices, one of the largest hotel groups, IHG, and LAUSD, the second largest school district in the USA. [...]
"
Autosummary:
We also saw some new ransomware research released this week:
Contributors and those who provided new ransomware information and stories this week include: @malwareforme, @LawrenceAbrams, @FourOctets, @Ionut_Ilascu, @serghei, @billtoulas, @fwosar, @VK_Intel, @struppigel, @BleepinComputer, @malwrhunterteam, @Seifreed, @DanielGallagher, @demonslay335, @jorntvdw, @PolarToffee, @MsftSecIntel, @CISAgov, @FBI, @pmbureau, @AdvIntel, @pcrisk, @PogoWasRight, @cPeterr, @security_score, and @Intel471Inc.Ransomware gangs have been busy this week, launching attacks against NAS devices, one of the largest hotel groups, IHG, and LAUSD, the second largest school district in the USA.
"
Microsoft Warns of Ransomware Attacks by Iranian Phosphorus Hacker Group
exploits
ransomware
2022-09-08
https://thehackernews.com/2022/09/microsoft-warns-of-ransomware-attacks.html
Microsoft"s threat intelligence division on Wednesday assessed that a subgroup of the Iranian threat actor tracked as Phosphorus is conducting ransomware attacks as a "form of moonlighting" for personal gain.
The tech giant, which is monitoring the activity cluster under the moniker DEV-0270 (aka Nemesis Kitten), said it"s operated by a company that functions under the public aliases Secnerd and
"
Autosummary:
"
Ex-members of the Conti ransomware gang target Ukraine
exploits
ransomware
2022-09-08
https://securityaffairs.co/wordpress/135447/cyber-crime/conti-ransomware-members-target-ukraine.html
Some members of the Conti ransomware gang were involved in financially motivated attacks targeting Ukraine from April to August 2022. Researchers from Google’s Threat Analysis Group (TAG) reported that some former members of the Conti cybercrime group were involved in five different campaigns targeting Ukraine between April and August 2022. The activities overlap with operations […]
The post Ex-members of the Conti ransomware gang target Ukraine appeared first on Security Affairs.
"
Autosummary:
“UAC-0098 activities are representative examples of blurring lines between financially motivated and government backed groups in Eastern Europe, illustrating a trend of threat actors changing their targeting to align with regional geopolitical interests.” concludes TAG.
"
Warning issued about Vice Society ransomware gang after attacks on schools
exploits
ransomware
2022-09-08
https://www.tripwire.com/state-of-security/security-data-protection/warning-issued-vice-society-ransomware-gang/
A ransomware gang that has been increasingly disproportionately targeting the education sector is the subject of a joint warning issued by the FBI, CISA, and MS-ISAC.
Read more in my article on the Tripwire State of Security blog.
"
Autosummary:
As well as strongly discouraging victims from paying any ransom to Vice Society, the FBI is also urging victims to share information that might help disrupt or even dismantle the criminal group:
“The FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with Vice Society actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.”
"
Google: Former Conti cybercrime gang members now targeting Ukraine
ransomware
2022-09-07
https://www.bleepingcomputer.com/news/security/google-former-conti-cybercrime-gang-members-now-targeting-ukraine/
Google says some former Conti ransomware gang members, now part of a threat group tracked as UAC-0098, are targeting Ukrainian organizations and European non-governmental organizations (NGOs). [...]
"
Autosummary:
"
This group"s attacks were observed between mid-April to mid-June, with frequent changes in its tactics, techniques, and procedures (TTPs), tooling, and lures, while targeting Ukrainian orgs (such as hotel chains) and impersonating the National Cyber Police of Ukraine or representatives of Elon Musk and StarLink.
"
Most IT leaders think partners, customers make their business a ransomware target
exploits
ransomware
2022-09-07
https://www.helpnetsecurity.com/2022/09/07/most-it-leaders-think-partners-customers-make-their-business-a-ransomware-target/
Global organizations are increasingly at risk of ransomware compromise via their extensive supply chains. During May and June 2022 Sapio Research polled 2,958 IT decision-makers across 26 countries. The research revealed that 79% of global IT leaders believe their partners and customers are making their own organization a more attractive ransomware target. The challenge is particularly acute considering that potentially less well-secured SMBs make up a “significant” portion of the supply chain 52% of these … More →
The post Most IT leaders think partners, customers make their business a ransomware target appeared first on Help Net Security.
"
Autosummary:
"
QNAP tells NAS users to “take immediate action” after new wave of DeadBolt ransomware attacks
exploits
ransomware
2022-09-07
https://grahamcluley.com/qnap-tells-nas-users-to-take-immediate-action-after-new-wave-of-deadbolt-ransomware-attacks/
Owners of QNAP NAS drives have been advised to "take immediate action" in the wake of a new wave of DeadBolt ransomware attacks.
"
Autosummary:
"
Some Members of Conti Group Targeting Ukraine in Financially Motivated Attacks
financial
ransomware
2022-09-07
https://thehackernews.com/2022/09/some-members-of-conti-group-targeting.html
Former members of the Conti cybercrime cartel have been implicated in five different campaigns targeting Ukraine from April to August 2022.
The findings, which come from Google"s Threat Analysis Group (TAG), builds upon a prior report published in July 2022, detailing the continued cyber activity aimed at the Eastern European nation amid the ongoing Russo-Ukrainian war.
"UAC-0098 is a threat
"
Autosummary:
The findings, which come from Google"s Threat Analysis Group (TAG), builds upon a prior report published in July 2022, detailing the continued cyber activity aimed at the Eastern European nation amid the ongoing Russo-Ukrainian war.
"
Google says former Conti ransomware members now attack Ukraine
exploits
ransomware
2022-09-07
https://www.bleepingcomputer.com/news/security/google-says-former-conti-ransomware-members-now-attack-ukraine/
Google says some former Conti cybercrime gang members, now part of a threat group tracked as UAC-0098, are targeting Ukrainian organizations and European non-governmental organizations (NGOs). [...]
"
Autosummary:
"
This group"s attacks were observed between mid-April to mid-June, with frequent changes in its tactics, techniques, and procedures (TTPs), tooling, and lures, while targeting Ukrainian orgs (such as hotel chains) and impersonating the National Cyber Police of Ukraine or representatives of Elon Musk and StarLink.
"
Warning issued about Vice Society ransomware targeting the education sector
exploits
ransomware
2022-09-07
https://www.malwarebytes.com/blog/news/2022/09/authorities-issue-warning-about-vice-society-ransomware-targeting-the-education-sector
Categories: News Categories: Ransomware Tags: FBI
Tags: CISA
Tags: StopRansomware
Tags: Vice Society
Tags: HelloKitty
Tags: SonicWall
Tags: PrintNightmare
Tags: LAUSD
The FBI, CISA, and the MS-ISAC have released a joint Cybersecurity Advisory after observing Vice Society threat actors disproportionately targeting the education sector with ransomware attacks.
|
The post Warning issued about Vice Society ransomware targeting the education sector appeared first on Malwarebytes Labs.
"
Autosummary:
Authentication
Require all accounts with password logins to meet the required standards for developing and managing password policies:
Require multifactor authentication wherever you can—particularly for webmail, VPNs, and critical systems
Review domain controllers, servers, workstations, and active directories for new and/or unrecognized accounts
Audit user accounts with administrative privileges and configure access controls according to the principle of least privilege
Implement time-based access for accounts set at the admin level and higher
Use long passwords (CISA says 8 characters, we say you can do better than that) and password managers
Store passwords using industry best practice password hashing functions
Implement password rate limits and lockouts
Avoid frequent password resets (once a year is fine)
Avoid reusing passwords
Disable password “hints”
Require administrator credentials to install software
Software
Use anti-malware software, and keep all operating systems, software, and firmware up to date.
Backups
Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (i.e., hard drive, storage device, the cloud).
"
Second largest U.S. school district LAUSD hit by ransomware
exploits
ransomware
2022-09-06
https://www.bleepingcomputer.com/news/security/second-largest-us-school-district-lausd-hit-by-ransomware/
Los Angeles Unified (LAUSD), the second largest school district in the U.S., disclosed that a ransomware attack hit its Information Technology (IT) systems over the weekend. [...]
"
Autosummary:
"After the District contacted officials over the holiday weekend, the White House brought together the Department of Education, the Federal Bureau of Investigation (FBI) and the Department of Homeland Security"s Cybersecurity and Infrastructure Security Agency (CISA) to provide rapid, incident response support to Los Angeles Unified, building on the immediate support by local law enforcement agencies," the district said.
"
QNAP Warns of New DeadBolt Ransomware Attacks Exploiting Photo Station Flaw
exploits
ransomware
2022-09-06
https://thehackernews.com/2022/09/qnap-warns-of-new-deadbolt-ransomware.html
QNAP has issued a new advisory urging users of its network-attached storage (NAS) devices to upgrade to the latest version of Photo Station following yet another wave of DeadBolt ransomware attacks in the wild by exploiting a zero-day flaw in the software.
The Taiwanese company said it detected the attacks on September 3 and that "the campaign appears to target QNAP NAS devices running Photo
"
Autosummary:
"
FBI warns of Vice Society ransomware attacks on school districts
exploits
ransomware
2022-09-06
https://www.bleepingcomputer.com/news/security/fbi-warns-of-vice-society-ransomware-attacks-on-school-districts/
FBI, CISA, and MS-ISAC warned today of U.S. school districts being increasingly targeted by the Vice Society ransomware group, with more attacks expected after the new school year start. [...]
"
Autosummary:
"The FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with Vice Society actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file," the federal law enforcement agency said.
"
The Los Angeles Unified School District hit by a ransomware attack
exploits
ransomware
2022-09-06
https://securityaffairs.co/wordpress/135411/cyber-crime/los-angeles-unified-school-district-ransomware.html
One of the US largest School districts, the Los Angeles Unified School District, suffered a ransomware attack during the weekend. The Los Angeles Unified School District is one of the largest school distinct in the US, it was hit by a ransomware attack during the Labor Day weekend. The security breach took place a few […]
The post The Los Angeles Unified School District hit by a ransomware attack appeared first on Security Affairs.
"
Autosummary:
"
SecureAuth Arculix offers passwordless desktop SSO and continuous authentication
ransomware
2022-09-05
https://www.helpnetsecurity.com/2022/09/05/arculix-secureauth/
SecureAuth has released Arculix, an access management and continuous authentication platform. Driven by SecureAuth’s patented risk-based behavioral modeling engine, Arculix provides end users with a frictionless and passwordless digital journey. The platform takes into account an identity’s level of assurance based on user, device and browser trust that employs artificial intelligence and machine learning (AI/ML) to determine anomalous behavior. Arculix enables organizations to accelerate their Zero Trust initiatives by ensuring the right digital identities have … More →
The post SecureAuth Arculix offers passwordless desktop SSO and continuous authentication appeared first on Help Net Security.
"
Autosummary:
“Identity security remains a top concern and investment area for most enterprise and government organizations especially given that universal adoption of passwordless log-in technology is encouraged by leaders such as Apple, Google, Meta, Microsoft, Twitter, and more,” said Jay Bretzmann, Research Vice President for Security Products, IDC.
"
Windows Defender identified Chromium, Electron apps as Hive Ransomware
exploits
ransomware
2022-09-05
https://securityaffairs.co/wordpress/135326/security/windows-defender-flase-positive.html
Microsoft released a Windows Defender update to fix a problem that caused Defender antivirus to identify Chromium, Electron, as malware Microsoft released a Windows Defender update to fix a problem that caused Defender antivirus software to identify the app based on the Chromium browser engine or the Electron JavaScript framework as malware. Multiple users reported […]
The post Windows Defender identified Chromium, Electron apps as Hive Ransomware appeared first on Security Affairs.
"
Autosummary:
"
QNAP: New DeadBolt ransomware attacks exploit Photo Station bug
exploits
ransomware
2022-09-05
https://www.bleepingcomputer.com/news/security/qnap-new-deadbolt-ransomware-attacks-exploit-photo-station-bug/
QNAP is warning customers of ongoing DeadBolt ransomware attacks that started on Saturday by exploiting a zero-day vulnerability in Photo Station. [...]
"
Autosummary:
QTS 5.0.1: Photo Station 6.1.2 and later
QTS 5.0.0/4.5.x: Photo Station 6.0.22 and later
QTS 4.3.6: Photo Station 5.7.18 and later
QTS 4.3.3: Photo Station 5.4.15 and later
QTS 4.2.6: Photo Station 5.2.14 and later
Alternatively, QNAP suggests users replace Photo Station with QuMagie, a safer photo storage management tool for QNAP NAS devices.
"
QNAP patches zero-day used in new Deadbolt ransomware attacks
exploits
ransomware
2022-09-05
https://www.bleepingcomputer.com/news/security/qnap-patches-zero-day-used-in-new-deadbolt-ransomware-attacks/
QNAP is warning customers of ongoing DeadBolt ransomware attacks that started on Saturday by exploiting a zero-day vulnerability in Photo Station. [...]
"
Autosummary:
QTS 5.0.1: Photo Station 6.1.2 and later
QTS 5.0.0/4.5.x: Photo Station 6.0.22 and later
QTS 4.3.6: Photo Station 5.7.18 and later
QTS 4.3.3: Photo Station 5.4.15 and later
QTS 4.2.6: Photo Station 5.2.14 and later
Alternatively, QNAP suggests users replace Photo Station with QuMagie, a safer photo storage management tool for QNAP NAS devices.
"
QNAP warns new Deadbolt ransomware attacks exploiting zero-day
exploits
ransomware
2022-09-05
https://securityaffairs.co/wordpress/135347/malware/qnap-deadbolt-ransomware-new-attacks.html
QNAP warns customers of ongoing DeadBolt ransomware attacks that are exploiting a zero-day vulnerability in Photo Station. QNAP warns customers of an ongoing wave of DeadBolt ransomware attacks, threat actors are exploiting a zero-day vulnerability in Photo Station. The attacks started on Saturday meantime the Taiwanese vendor has addressed the vulnerability. “QNAP Systems, Inc. today […]
The post QNAP warns new Deadbolt ransomware attacks exploiting zero-day appeared first on Security Affairs.
"
Autosummary:
Linkedin
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
San Francisco 49ers: Blackbyte ransomware gang stole info of 20K people
exploits
ransomware
2022-09-02
https://www.bleepingcomputer.com/news/security/san-francisco-49ers-blackbyte-ransomware-gang-stole-info-of-20k-people/
NFL"s San Francisco 49ers are mailing notification letters confirming a data breach affecting more than 20,000 individuals following a ransomware attack that hit its network earlier this year. [...]
"
Autosummary:
"
Another Ransomware For Linux Likely In Development
exploits
ransomware
2022-09-02
https://securityaffairs.co/wordpress/135218/malware/linux-ransomware-under-development.html
Uptycs researchers recently spotted a new Linux ransomware that appears to be under active development. The Uptycs Threat Research team recently observed an Executable and Linkable Format (ELF) ransomware which encrypts the files inside Linux systems based on the given folder path. We observed that the dropped README note matches exactly with the DarkAngels ransomware […]
The post Another Ransomware For Linux Likely In Development appeared first on Security Affairs.
"
Autosummary:
Figure 3: pthread usage inside the ransomware binary
The start_routine()(FUN_0041cf55) (see Figure 4) function performs the following steps to encrypt target files:
Opens the target file and sets the write lock on it using fcntl().
"
Hive ransomware hits Damart clothing store with $2 million ransom
exploits
ransomware
2022-09-02
https://www.bleepingcomputer.com/news/security/hive-ransomware-hits-damart-clothing-store-with-2-million-ransom/
Damart, a French clothing company with over 130 stores across the world, is being extorted for $2 million after a cyberattack from the Hive ransomware gang. [...]
"
Autosummary:
Damart homepage as seen on August 15, 2022
At that time, following a request for comment from BleepingComputer, Damart stated the following:
"Damart, the mail order clothing brand, based in Bingley, West Yorkshire, has confirmed that there was an attempt to intrude into their IT systems, which they were rapidly able to intercept with strong security protocols.
"
BlackCat ransomware claims attack on Italian energy agency
exploits
ransomware
industry
2022-09-02
https://www.bleepingcomputer.com/news/security/blackcat-ransomware-claims-attack-on-italian-energy-agency/
The BlackCat/ALPHV ransomware gang claimed responsibility for an attack that hit the systems of Italy"s energy agency Gestore dei Servizi Energetici SpA (GSE) over the weekend. [...]
"
Autosummary:
The attackers say that the stolen files contain confidential data, including contracts, reports, project information, accounting documents, and other internal documentation.
"
Damart clothing store hit by Hive ransomware, $2 million demanded
exploits
ransomware
2022-09-02
https://www.bleepingcomputer.com/news/security/damart-clothing-store-hit-by-hive-ransomware-2-million-demanded/
Damart, a French clothing company with over 130 stores across the world, is being extorted for $2 million after a cyberattack from the Hive ransomware gang. [...]
"
Autosummary:
Damart homepage as seen on August 15, 2022
At that time, following a request for comment from BleepingComputer, Damart stated the following:
"Damart, the mail order clothing brand, based in Bingley, West Yorkshire, has confirmed that there was an attempt to intrude into their IT systems, which they were rapidly able to intercept with strong security protocols.
"
Researchers Detail Emerging Cross-Platform BianLian Ransomware Attacks
exploits
ransomware
2022-09-01
https://thehackernews.com/2022/09/researchers-detail-emerging-cross.html
The operators of the emerging cross-platform BianLian ransomware have increased their command-and-control (C2) infrastructure this month, a development that alludes to an increase in the group"s operational tempo.
BianLian, written in the Go programming language, was first discovered in mid-July 2022 and has claimed 15 victim organizations as of September 1, cybersecurity firm [redacted] said in
"
Autosummary:
According to Cyble, which detailed the modus operandi of the ransomware earlier this month, targeted companies span several industry sectors such as media, banking, energy, manufacturing, education, healthcare, and professional services.
"
Ragnar Locker ransomware gang claims to have stolen data from TAP Air Portugal
exploits
ransomware
2022-09-01
https://securityaffairs.co/wordpress/135168/data-breach/ragnar-locker-ransomware-tap-air-portugal.html
The Ragnar Locker ransomware gang claims to have hacked the Portuguese state-owned flag carrier airline TAP Air Portugal and stolen customers’ data. The Ragnar Locker ransomware added the Portuguese state-owned flag carrier airline TAP Air Portugal to its leak site and claims to have stolen customers’ data. On August 26, the Portugues company announced via […]
The post Ragnar Locker ransomware gang claims to have stolen data from TAP Air Portugal appeared first on Security Affairs.
"
Autosummary:
The ransomware group published screenshots of the stolen data, which allegedly includes names, addresses, email addresses, phone numbers, corporate IDs, travel information, nationality, gender, and other personal information.
"
New ransomware hits Windows, Linux servers of Chile govt agency
exploits
latam
ransomware
2022-09-01
https://www.bleepingcomputer.com/news/security/new-ransomware-hits-windows-linux-servers-of-chile-govt-agency/
Chile"s national computer security and incident response team (CSIRT) has announced that a ransomware attack has impacted operations and online services of a government agency in the country. [...]
"
Autosummary:
"The ransomware would use the NTRUEncrypt public key encryption algorithm, targeting log files (.log), executable files (.exe), dynamic library files (.dll), swap files (.vswp), virtual disks (. vmdk), snapshot (.vmsn) files, and virtual machine memory (.vmem) files, among others," - Chile CSIRT
According to CSIRT, the malware used in this attack also had functions for stealing credentials from web browsers, list removable devices for encryption, and evade antivirus detection using execution timeouts.
"
Montenegro hit by ransomware attack, hackers demand $10 million
exploits
ransomware
2022-09-01
https://www.bleepingcomputer.com/news/security/montenegro-hit-by-ransomware-attack-hackers-demand-10-million/
The government of Montenegro has admitted that its previous allegations about Russian threat actors attacking critical infrastructure in the country were false and now blames ransomware for the damage to its IT infrastructure that has caused extensive service disruptions. [...]
"
Autosummary:
"
Should ransomware payments be banned? A few considerations
exploits
ransomware
2022-08-31
https://www.helpnetsecurity.com/2022/08/31/should-ransomware-payments-be-banned-considerations-video/
Several U.S. states have recently moved to ban local and state agencies and organizations funded by taxpayers’ dollars from paying off ransomware gangs, and a few more are gearing up to it. In this Help Net Security video interview, Alex Iftimie, Partner at Morrison & Foerster (MoFo), talks about the possible repercussions of such legislation and, in general, about the evolving nature of ransomware attacks and the current global efforts aimed at fighting the ransomware … More →
The post Should ransomware payments be banned? A few considerations appeared first on Help Net Security.
"
Autosummary:
"
Ragnar Locker ransomware claims attack on Portugal"s flag airline
exploits
ransomware
2022-08-31
https://www.bleepingcomputer.com/news/security/ragnar-locker-ransomware-claims-attack-on-portugals-flag-airline/
The Ragnar Locker ransomware gang has claimed an attack on the flag carrier of Portugal, TAP Air Portugal, disclosed by the airline last Friday. [...]
"
Autosummary:
Ragnar Locker also shared a screenshot of a spreadsheet containing what looks like customer information stolen from TAP"s servers, including names, dates of birth, emails, and addresses.
"
Outdated infrastructure not up to today’s ransomware challenges
exploits
ransomware
2022-08-30
https://www.helpnetsecurity.com/2022/08/30/outdated-infrastructure-manage-data/
A global research commissioned by Cohesity reveals that nearly half of respondents say their company depends on outdated, legacy backup and recovery infrastructure to manage and protect their data. In some cases, this technology is more than 20 years old and was designed long before today’s multicloud era and onslaught of sophisticated cyberattacks plaguing enterprises globally. Challenges pertaining to outdated infrastructure could easily be compounded by the fact that many IT and security teams don’t … More →
The post Outdated infrastructure not up to today’s ransomware challenges appeared first on Help Net Security.
"
Autosummary:
The findings are as follows (respondents were asked to check all that apply):
integration between IT and security systems (41%)
lack of coordination between IT and Security (38%)
lack of an automated disaster recovery system (34%)
antiquated backup and recovery systems (32%)
lack of a recent, clean, immutable copy of data (32%)
lack of and timely detailed alerts (31%)
With respect to the lack of coordination between IT and Security, this coincides with other findings from this survey denoting that a gap often exists between IT and SecOps that puts businesses and security postures at risk.
"
World’s largest distributors of books Baker & Taylor hit by ransomware
exploits
ransomware
2022-08-30
https://securityaffairs.co/wordpress/135026/cyber-crime/baker-taylor-ransomware.html
Baker & Taylor, one of the world’s largest distributors of books, revealed that it was hit by a ransomware attack. Baker & Taylor, one of the world’s largest distributors of books worldwide, suffered a ransomware attack on August 23. The incident impacted the company’s phone systems, offices, and service centers. On August 24, the company […]
The post World’s largest distributors of books Baker & Taylor hit by ransomware appeared first on Security Affairs.
"
Autosummary:
"
Leading library services firm Baker & Taylor hit by ransomware
exploits
ransomware
2022-08-29
https://www.bleepingcomputer.com/news/security/leading-library-services-firm-baker-and-taylor-hit-by-ransomware/
Baker & Taylor, which describes itself as the world"s largest distributor of books to libraries worldwide, today confirmed it"s still working on restoring systems after being hit by ransomware more than a week ago. [...]
"
Autosummary:
"
New Golang-based "Agenda Ransomware" Can Be Customized For Each Victim
exploits
ransomware
2022-08-29
https://thehackernews.com/2022/08/new-golang-based-agenda-ransomware-can.html
A new ransomware strain written in Golang dubbed "Agenda" has been spotted in the wild, targeting healthcare and education entities in Indonesia, Saudi Arabia, South Africa, and Thailand.
"Agenda can reboot systems in safe mode, attempts to stop many server-specific processes and services, and has multiple modes to run," Trend Micro researchers said in an analysis last week.
Qilin, the threat
"
Autosummary:
"
New Agenda Ransomware appears in the threat landscape
exploits
ransomware
2022-08-28
https://securityaffairs.co/wordpress/134911/cyber-crime/agenda-ransomware.html
Trend Micro researchers warn of a new ransomware family called Agenda, which has been used in attacks on organizations in Asia and Africa. Trend Micro researchers recently discovered a new piece of targeted ransomware, tracked as Agenda, that was written in the Go programming language. The ransomware was employed in a targeted attack against one of […]
The post New Agenda Ransomware appears in the threat landscape appeared first on Security Affairs.
"
Autosummary:
Agenda reboots the victim’s machine in safe mode and then encrypt files upon reboot, a technique adopted by other ransomware gangs REvil,
The threat actor gained access via RDP to Active Directory using leaked accounts, then used scanning tools Nmap.exe and Nping.exe for scanning the network.
"
LockBit ransomware gang gets aggressive with triple-extortion tactic
exploits
ransomware
2022-08-28
https://www.bleepingcomputer.com/news/security/lockbit-ransomware-gang-gets-aggressive-with-triple-extortion-tactic/
LockBit ransomware gang announced that it is improving defenses against distributed denial-of-service (DDoS) attacks and working to take the operation to triple extortion level. [...]
"
Autosummary:
LockBit getting into DDoS
Earlier this week, LockBitSupp, the public-facing figure of the LockBit ransomware operation, announced that the group is back in business with a larger infrastructure to give access to leaks unfazed by DDoS attacks.
"
The Week in Ransomware - August 26th 2022 - Fighting back
exploits
ransomware
2022-08-26
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-august-26th-2022-fighting-back/
We saw a bit of ransomware drama this week, mostly centered around LockBit, who saw their data leak sites taken down by a DDoS attack after they started leaking the allegedly stolen Entrust data. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include: @VK_Intel, @LawrenceAbrams, @jorntvdw, @billtoulas, @demonslay335, @PolarToffee, @Ionut_Ilascu, @Seifreed, @fwosar, @DanielGallagher, @struppigel, @BleepinComputer, @malwareforme, @serghei, @FourOctets, @malwrhunterteam, @TrendMicro, @GossiTheDog, @AlvieriD, @ValeryMarchive, @Cyberknow20, @VenezuelaBTH, @S0ufi4n3, @vxunderground, @AShukuhi, @pcrisk, and @ddd1ms.
According to our information, the investigators in charge of the cyberattack that led to the outbreak of the LockBit ransomware, last weekend, at the Sud-Francilien hospital center (CHSF), in Corbeil-Essonnes , currently suspect that the hijacking of a publisher"s support account served as the initial intrusion vector.
"
Avast Ransomware Shield for businesses prevents unauthorised access
exploits
ransomware
2022-08-25
https://www.helpnetsecurity.com/2022/08/25/avast-ransomware-shield/
Avast has launched a Ransomware Shield for businesses, offering organizations an extra layer of protection against ransomware attacks. This will ensure businesses can secure their files and customer data, with proactive protection which prevents unauthorized access. The new feature is available as part of the Avast Essential, Premium, and Ultimate Business Security packages for businesses for both Windows and MacOS. Despite observing a decline in ransomware attacks in Q4 2021 and Q1 2022, ransomware attacks … More →
The post Avast Ransomware Shield for businesses prevents unauthorised access appeared first on Help Net Security.
"
Autosummary:
"
We need to think about ransomware differently
exploits
ransomware
2022-08-25
https://www.helpnetsecurity.com/2022/08/25/think-about-ransomware-differently-video/
In this Help Net Security video, David Mahdi, Chief Strategy Officer & CISO Advisory at Sectigo, talks about how ransomware isn’t solely a malware problem, bad actors want access to your data, so it really is a data security and access problem. When we look at what ransomware does, it leverages users’ access within an organization to encrypt sensitive files (and often also steal). The authentication given to a user defines the level of damage … More →
The post We need to think about ransomware differently appeared first on Help Net Security.
"
Autosummary:
"
CISOs see little need for a point solution to cover ransomware risk
exploits
ransomware
2022-08-24
https://www.helpnetsecurity.com/2022/08/24/point-solution-ransomware-video/
Nearly half of enterprises have fallen victim to a ransomware attack, of which nearly all have had little choice but to heed their attackers, according to the Q2 CISO Circuit report from YL Ventures. The financial disruption, privacy implications and operational failure danger caused by ransomware are often too critical to suffer. This is especially true in cases involving critical infrastructure, including water treatment and hospital networks. For now, CISOs see little need for a … More →
The post CISOs see little need for a point solution to cover ransomware risk appeared first on Help Net Security.
"
Autosummary:
"
France hospital Center Hospitalier Sud Francilien suffered ransomware attack
exploits
ransomware
2022-08-24
https://securityaffairs.co/wordpress/134771/cyber-crime/center-hospitalier-sud-francilien-ransomware.html
A French hospital, the Center Hospitalier Sud Francilien (CHSF), suffered a cyberattack on Sunday and was forced to refer patients to other structures. The Center Hospitalier Sud Francilien (CHSF), a hospital southeast of Paris, has suffered a ransomware attack over the weekend. The attack disrupted the emergency services and surgeries and forced the hospital to refer patients […]
The post France hospital Center Hospitalier Sud Francilien suffered ransomware attack appeared first on Security Affairs.
"
Autosummary:
The announcement states that the attack does not impact the operation and security of the hospital building, and all networks remain in operation (telephone with the exception of fax, automated distribution flows, etc.).
"
RansomEXX claims ransomware attack on Sea-Doo, Ski-Doo maker
exploits
ransomware
2022-08-24
https://www.bleepingcomputer.com/news/security/ransomexx-claims-ransomware-attack-on-sea-doo-ski-doo-maker/
The RansomEXX ransomware gang is claiming responsibility for the cyberattack against Bombardier Recreational Products (BRP), disclosed by the company on August 8, 2022. [...]
"
Autosummary:
On August 15, 2022, BRP provided an update on the situation, saying that four manufacturing sites in Canada, Finland, the U.S., and Austria resumed production, with the rest to follow suit by the end of that week.
"
Quantum ransomware attack disrupts govt agency in Dominican Republic
exploits
ransomware
2022-08-24
https://www.bleepingcomputer.com/news/security/quantum-ransomware-attack-disrupts-govt-agency-in-dominican-republic/
The Dominican Republic"s Instituto Agrario Dominicano has suffered a Quantum ransomware attack that encrypted multiple services and workstations throughout the government agency. [...]
"
Autosummary:
Quantum ransom note
Source: BleepingComputer
Quantum is becoming a major player among enterprise-targeting ransomware operations, linked to an attack on PFC that impacted over 650 healthcare orgs
The ransomware gang is believed to have become an offshoot of the Conti ransomware operation, which took over the previous rebrand of the MountLocker ransomware operation.
"
Lockbit leak sites hit by mysterious DDoS attack after Entrust hack
ransomware
2022-08-23
https://securityaffairs.co/wordpress/134707/cyber-crime/lockbit-hacked-entrust.html
LockBit ransomware gang claims to have hacked the IT giant Entrust and started leaking the stolen files. Entrust Corp., provides software and hardware used to issue financial cards, e-passport production, user authentication for those looking to access secure networks or conduct financial transactions, trust certificated for websites, mobile credentials, and connected devices. The Lockbit ransomware […]
The post Lockbit leak sites hit by mysterious DDoS attack after Entrust hack appeared first on Security Affairs.
"
Autosummary:
Lockbit: "We"re being DDoS"d because of the Entrust hack"
vx-underground: "How do you know it"s because of the Entrust breach?"
Lockbit: pic.twitter.com/HUO2hdTbwz — vx-underground (@vxunderground) August 21, 2022
The news was confirmed by BleepingComputer who reached representatives from the group:
“Ddos attack began immediately after the publication of data and negotiations, of course it was them, who else needs it?
"
What businesses can do to anticipate and mitigate ransomware threats
exploits
ransomware
2022-08-23
https://www.helpnetsecurity.com/2022/08/23/anticipate-mitigate-ransomware-threats-video/
In this Help Net Security video, Kevin Holvoet, Cyber Threat Intelligence Instructor, SANS Institute, discusses ransomware and Ransomware as a Service (Raas) attacks, and illustrates how preparedness with a proper top-down response is critical for business continuity in case of an attack.
The post What businesses can do to anticipate and mitigate ransomware threats appeared first on Help Net Security.
"
Autosummary:
"
The Rise of Data Exfiltration and Why It Is a Greater Risk Than Ransomware
exploits
ransomware
2022-08-23
https://thehackernews.com/2022/08/the-rise-of-data-exfiltration-and-why.html
Ransomware is the de facto threat organizations have faced over the past few years. Threat actors were making easy money by exploiting the high valuation of cryptocurrencies and their victims" lack of adequate preparation.
Think about bad security policies, untested backups, patch management practices not up-to-par, and so forth. It resulted in easy growth for ransomware extortion, a crime that
"
Autosummary:
Earlier this year, incidents at Nvidia, Microsoft, and several other companies have highlighted how big of a problem it"s become – and how, for some organizations, it may be a threat that"s even bigger than ransomware.
After so many years of alarming headlines, most organizations have deployed ransomware protection in the form of better backup strategies, more fine-tuned and granular data access, and better rules and monitoring for detecting unwanted file changes.
Staying quietly, rather than flashing "you"ve been hacked" messages on computer screens, allows attackers to "see" more information flows in the network and to do more in-depth reconnaissance of systems after gaining entry.
"
French hospital hit by $10M ransomware attack, sends patients elsewhere
exploits
ransomware
2022-08-23
https://www.bleepingcomputer.com/news/security/french-hospital-hit-by-10m-ransomware-attack-sends-patients-elsewhere/
The Center Hospitalier Sud Francilien (CHSF), a 1000-bed hospital located 28km from the center of Paris, suffered a cyberattack on Sunday, which has resulted in the medical center referring patients to other establishments and postponing appointments for surgeries. [...]
"
Autosummary:
"
New "Donut Leaks" extortion gang linked to recent ransomware attacks
exploits
ransomware
2022-08-23
https://www.bleepingcomputer.com/news/security/new-donut-leaks-extortion-gang-linked-to-recent-ransomware-attacks/
A new data extortion group named "Donut Leaks" is linked to recent cyberattacks, including those on Greek natural gas company DESFA, UK architectural firm Sheppard Robson, and multinational construction company Sando. [...]
"
Autosummary:
Donut Leaks data leak site
Source: BleepingComputer
The stolen data storage server runs the File Browser application, which allows visitors to browse through all of the stolen data stored on the server, broken down by the victim.
"
Hackers demand $10 million from Paris hospital after ransomware attack
exploits
ransomware
2022-08-23
https://www.bitdefender.com/blog/hotforsecurity/hackers-demand-10-million-from-paris-hospital-after-ransomware-attack/
Malicious hackers are demanding $10 million from a French hospital they hit with ransomware last weekend.
The Hospital Center Sud Francilien (CHSF) in Corbeil-Essonnes, south-east of Paris, was struck late on Saturday night, causing major disruption to health services.
Read more in my article on the Hot for Security blog.
"
Autosummary:
"
Businesses expect the government to increase its financial assistance for all ransomware incidents
financial
exploits
government
ransomware
2022-08-22
https://www.helpnetsecurity.com/2022/08/22/ransomware-demands-videos/
Businesses are increasingly concerned about how they will meet ransomware demands. Only 19 percent of those surveyed have ransomware coverage limits above $600,000, while over half (59 percent) hoped the government would cover damages when future attacks are linked to other nation-states, according to BlackBerry Limited and Corvus Insurance. This Help Net Security video uncovers why businesses look for government help with ransomware demand costs.
The post Businesses expect the government to increase its financial assistance for all ransomware incidents appeared first on Help Net Security.
"
Autosummary:
"
Lockbit ransomware blames Entrust for DDoS attacks on leak sites
exploits
ransomware
2022-08-22
https://www.bleepingcomputer.com/news/security/lockbit-ransomware-blames-entrust-for-ddos-attacks-on-leak-sites/
The LockBit ransomware operation"s data leak sites have been shut down over the weekend due to a DDoS attack telling them to remove Entrust"s allegedly stolen data. [...]
"
Autosummary:
Alleged Entrust data leaked on LockBit"s data leak site
Source: Dominic Alvieri
Soon after they started leaking data, researchers began reporting that the ransomware gang"s Tor data leak sites were unavailable due to a DDoS attack.
So, at this point, it is unclear if Entrust, an affiliated cybersecurity company, or simply a rival threat actor is taking advantage of the situation by conducting the attacks.
"
Greek natural gas operator suffers ransomware-related data breach
financial
exploits
ransomware
2022-08-22
https://www.bleepingcomputer.com/news/security/greek-natural-gas-operator-suffers-ransomware-related-data-breach/
Greece"s largest natural gas distributor DESFA confirmed on Saturday that they suffered a limited scope data breach and IT system outage following a cyberattack. [...]
"
Autosummary:
The upcoming winter is expected to be plagued by shortages, power cuts, rationing, and soaring energy prices, leaving consumers even more vulnerable to ransomware attacks against gas suppliers.
"
The Week in Ransomware - August 19th 2022 - Evolving extortion tactics
exploits
ransomware
industry
2022-08-19
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-august-19th-2022-evolving-extortion-tactics/
Bringing you the latest ransomware news, including new research, tactics, and cyberattacks. We also saw the return of the BlackByte ransomware operation, who has started to use new extortion tactics. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include: @billtoulas, @LawrenceAbrams, @PolarToffee, @BleepinComputer, @Seifreed, @jorntvdw, @fwosar, @serghei, @struppigel, @FourOctets, @demonslay335, @malwrhunterteam, @Ionut_Ilascu, @malwareforme, @VK_Intel, @DanielGallagher, @juanbrodersen, @AlvieriD, @Cyberknow20, @Intel_by_KELA, @MauroEldritch, @luisezegarra, @Cleafy, and @pcrisk.
"
BlackByte ransomware v2 is out with new extortion novelties
exploits
ransomware
2022-08-18
https://securityaffairs.co/wordpress/134531/cyber-crime/blackbyte-ransomware-v2.html
A new version of the BlackByte ransomware appeared in the threat landscape, version 2.0 uses extortion techniques similar to LockBit ones. BlackByte ransomware Version 2.0 appeared in the threat landscape after a short break, the latest version has a new data leak site. It is interesting to note that the group introduced some novelties in the […]
The post BlackByte ransomware v2 is out with new extortion novelties appeared first on Security Affairs.
"
Autosummary:
"
LockBit claims ransomware attack on security giant Entrust
exploits
ransomware
2022-08-18
https://www.bleepingcomputer.com/news/security/lockbit-claims-ransomware-attack-on-security-giant-entrust/
The LockBit ransomware gang has claimed responsibility for the June cyberattack on digital security giant Entrust. [...]
"
Autosummary:
"
LockBit claims ransomware attack on security giant Entrust, leaks data
exploits
ransomware
2022-08-18
https://www.bleepingcomputer.com/news/security/lockbit-claims-ransomware-attack-on-security-giant-entrust-leaks-data/
The LockBit ransomware gang has claimed responsibility for the June cyberattack on digital security giant Entrust. [...]
"
Autosummary:
Update 8/21/22:
LockBit leaks alleged Entrust data
LockBit began leaking Entrust"s data Friday evening, first sharing screenshots of some of the allegedly stolen data, with the threat actors saying they would leak further data later that evening.
"
BlackByte ransomware gang is back with new extortion tactics
exploits
ransomware
industry
2022-08-17
https://www.bleepingcomputer.com/news/security/blackbyte-ransomware-gang-is-back-with-new-extortion-tactics/
The BlackByte ransomware is back with version 2.0 of their operation, including a new data leak site utilizing new extortion techniques borrowed from LockBit. [...]
"
Autosummary:
"
Argentina"s Judiciary of Córdoba hit by PLAY ransomware attack
exploits
latam
ransomware
2022-08-16
https://www.bleepingcomputer.com/news/security/argentinas-judiciary-of-c-rdoba-hit-by-play-ransomware-attack/
Argentina"s Judiciary of Córdoba has shut down its IT systems after suffering a ransomware attack, reportedly at the hands of the new "Play" ransomware operation. [...]
"
Autosummary:
"
Justicia Córdoba"s website is suffering an outage
Source: BleepingComputer
Attack linked to Play ransomware
While the Judiciary has not disclosed details of the attack, journalist Luis Ernest Zegarra tweeted that they were hit by ransomware that appends the ".Play" extension to encrypted files.
"
Russian State Hackers Continue to Attack Ukrainian Entities with Infostealer Malware
exploits
government
ransomware
2022-08-16
https://thehackernews.com/2022/08/russian-state-hackers-continue-to.html
Russian state-sponsored actors are continuing to strike Ukrainian entities with information-stealing malware as part of what"s suspected to be an espionage operation.
Symantec, a division of Broadcom Software, attributed the malicious campaign to a threat actor tracked Shuckworm, also known as Actinium, Armageddon, Gamaredon, Primitive Bear, and Trident Ursa. The findings have been corroborated
"
Autosummary:
Symantec, a division of Broadcom Software, attributed the malicious campaign to a threat actor tracked Shuckworm, also known as Actinium, Armageddon, Gamaredon, Primitive Bear, and Trident Ursa.
"
Russia-linked Gamaredon APT continues to target Ukraine
ransomware
2022-08-16
https://securityaffairs.co/wordpress/134438/apt/gamaredon-continues-target-ukraine.html
Russia-linked Gamaredon APT group targets Ukrainian entities with PowerShell info-stealer malware dubbed GammaLoad. Russia-linked Gamaredon APT group (aka Shuckworm, Actinium, Armageddon, Primitive Bear, and Trident Ursa) targets Ukrainian entities with PowerShell info-stealer malware dubbed GammaLoad, Symantec warns. The Computer Emergency Response Team of Ukraine (CERT-UA) confirmed the ongoing cyber espionage campaign. Symantec and TrendMicro first discovered the Gamaredon […]
The post Russia-linked Gamaredon APT continues to target Ukraine appeared first on Security Affairs.
"
Autosummary:
Russia-linked Gamaredon APT group (aka Shuckworm, Actinium, Armageddon, Primitive Bear, and Trident Ursa) targets Ukrainian entities with PowerShell info-stealer malware dubbed GammaLoad, Symantec warns.
"
U.K. Water Supplier Hit with Clop Ransomware Attack
exploits
ransomware
2022-08-16
https://threatpost.com/water-supplier-hit-clop-ransomware/180422/
The incident disrupted corporate IT systems at one company while attackers misidentified the victim in a post on its website that leaked stolen data.
"
Autosummary:
The breached data, published online after ransom negotiations between Clop and its victim broke down, also includes passports, screenshots from water-treatment SCADA systems, driver’s licenses and more, the report said.
"
CISA and FBI issue alert about Zeppelin ransomware
exploits
ransomware
2022-08-16
https://www.malwarebytes.com/blog/news/2022/08/cisa-and-fbi-issue-alert-about-zeppelin-ransomware
Categories: News Categories: Ransomware Tags: Zeppelin
Tags: ransomware
Tags: RDP
Tags: Sonicwall
Tags: phishing
Tags: malvertising
Tags: backups
Tags: authentication
Tags: mfa
Tags: patching
Tags: EDR
The FBI and CISA have issued a joint Cybersecurity Advisory (CSA) to raise awareness about Zeppelin ransomware
|
The post CISA and FBI issue alert about Zeppelin ransomware appeared first on Malwarebytes Labs.
"
Autosummary:
Backups
Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (i.e., hard drive, storage device, the cloud).
While anyone can fall victim to these threat actors, the FBI noted that this malware has been used to target a wide range of businesses and critical infrastructure organizations, including defense contractors, educational institutions, manufacturers, technology companies, and especially organizations in the healthcare and medical industries.Posted: August 16, 2022 by
The FBI and CISA have issued a joint Cybersecurity Advisory (CSA) to raise awareness about Zeppelin ransomware
The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have released a joint Cybersecurity Advisory (CSA) about Zeppelin ransomware.
"
CISA, FBI shared a joint advisory to warn of Zeppelin ransomware attacks
exploits
ransomware
2022-08-14
https://securityaffairs.co/wordpress/134350/cyber-crime/zeppelin-ransomware-joint-alert.html
The US Cybersecurity and Infrastructure Security Agency (CISA) and the FBI are warning of Zeppelin ransomware attacks. The US Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have published a joint advisory to warn of Zeppelin ransomware attacks. The Zeppelin ransomware first appeared on the threat landscape in November 2019 […]
The post CISA, FBI shared a joint advisory to warn of Zeppelin ransomware attacks appeared first on Security Affairs.
"
Autosummary:
To mitigate the risks of ransomware attacks, organizations are recommended to define a recovery plan, implement multi-factor authentication, keep all operating systems, software, and firmware up to date, enforce a strong passwords policy, segment networks, disable unused ports and services, audit user accounts and domain controllers, implement a least-privilege access policy, review domain controllers, servers, workstations, and active directories, maintain offline backups of data, and identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware with a networking monitoring tool.
"
SOVA malware adds ransomware feature to encrypt Android devices
exploits
ransomware
2022-08-13
https://www.bleepingcomputer.com/news/security/sova-malware-adds-ransomware-feature-to-encrypt-android-devices/
The SOVA Android banking trojan continues to evolve with new features, code improvements, and the addition of a new ransomware feature that encrypts files on mobile devices. [...]
"
Autosummary:
Moreover, it features refactored and improved code that helps it operate more stealthy on the compromised device, while its latest version, 5.0, adds a ransomware module.
"
Organizations would like the government to help with ransomware demand costs
exploits
government
ransomware
2022-08-12
https://www.helpnetsecurity.com/2022/08/12/government-help-ransomware/
Businesses are increasingly concerned about how they will meet ransomware demands. Only 19 percent of those surveyed have ransomware coverage limits above $600,000, while over half (59 percent) hoped the government would cover damages when future attacks are linked to other nation-states, according to BlackBerry Limited and Corvus Insurance. SMBs, who have become a favorite criminal target, are especially feeling the heat. Of businesses with under 1,500 employees, only 14 percent have a coverage limit … More →
The post Organizations would like the government to help with ransomware demand costs appeared first on Help Net Security.
"
Autosummary:
Only 19 percent of those surveyed have ransomware coverage limits above $600,000, while over half (59 percent) hoped the government would cover damages when future attacks are linked to other nation-states, according to BlackBerry Limited and Corvus Insurance.
"
Malicious PyPI packages drop ransomware, fileless malware
exploits
ransomware
2022-08-12
https://www.helpnetsecurity.com/2022/08/12/malicious-pypi-packages-drop-ransomware-fileless-malware-video/
In this Help Net Security video, Ax Sharma, Senior Security Researcher at Sonatype, discusses newly found PyPI packages that pack ransomware, and another package that appears to be safe but silently drops fileless malware to mine cryptocurrency (Monero) on the infected system – all while evading detection.
The post Malicious PyPI packages drop ransomware, fileless malware appeared first on Help Net Security.
"
Autosummary:
"
U.S. Government Offers $10 Million Reward for Information on Conti Ransomware Gang
exploits
government
ransomware
2022-08-12
https://thehackernews.com/2022/08/us-government-offers-10-million-reward.html
The U.S. State Department on Thursday announced a $10 million reward for information related to five individuals associated with the Conti ransomware group.
The reward offer, first reported by WIRED, is also notable for the fact that it marks the first time the face of a Conti associate, known as "Target," has been unmasked. The four other associates have been referred to as "Tramp," "Dandis," "
"
Autosummary:
"
BazarCall attacks have revolutionized ransomware operations
exploits
ransomware
2022-08-12
https://securityaffairs.co/wordpress/134302/cyber-crime/bazarcall-revolutionized-ransomware-operations.html
The Conti ransomware gang is using BazarCall phishing attacks as an initial attack vector to access targeted networks. BazarCall attack, aka call back phishing, is an attack vector that utilizes targeted phishing methodology and was first used by the Ryuk ransomware gang in 2020/2021. The BazarCall attack chain is composed of the following stages: Stage […]
The post BazarCall attacks have revolutionized ransomware operations appeared first on Security Affairs.
"
Autosummary:
The adoption of Callback phishing campaigns has impacted the strategy of ransomware gangs, experts observed targeted attacks aimed at Finance, Technology, Legal, and Insurance industries.
It involved large investments into hiring spammers, OSINT specialists, designers, call center operators, and expanding the number of network intruders.
"
Feds: Zeppelin Ransomware Resurfaces with New Compromise, Encryption Tactics
exploits
ransomware
industry
2022-08-12
https://threatpost.com/zeppelin-ransomware-resurfaces/180405/
The CISA has seen a resurgence of the malware targeting a range of verticals and critical infrastructure organizations by exploiting RDP, firewall vulnerabilities.
"
Autosummary:
Multiple Encryption
Once Zeppelin ransomware is executed on a network, each encrypted file is appended with a randomized nine-digit hexadecimal number as a file extension, e.g., file.txt.txt.C59-E0C-929, according to the CISA.
"
The US offers a $10M rewards for info on the Conti ransomware gang’s members
exploits
ransomware
2022-08-12
https://securityaffairs.co/wordpress/134326/cyber-crime/conti-ransomware-reward.html
The U.S. State Department announced a $10 million reward for information related to five individuals associated with the Conti ransomware gang. The U.S. State Department announced a $10 million reward for information on five prominent members of the Conti ransomware gang. The government will also reward people that will provide details about Conti and its affiliated groups TrickBot and Wizard […]
The post The US offers a $10M rewards for info on the Conti ransomware gang’s members appeared first on Security Affairs.
"
Autosummary:
“That photo is the first time the US government has ever identified a malicious actor associated with Conti,”
The other members of the Conti gang for which the US Government is offering a reward are referred to as “Tramp,” “Dandis,” “Professor,” and “Reshaev.”
"
The Week in Ransomware - August 12th 2022 - Attacking the defenders
exploits
ransomware
2022-08-12
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-august-12th-2022-attacking-the-defenders/
It was a very busy week for ransomware news and attacks, especially with the disclosure that Cisco was breached by a threat actor affiliated with the Yanluowang ransomware gang. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include: @demonslay335, @Ionut_Ilascu, @PolarToffee, @malwareforme, @LawrenceAbrams, @DanielGallagher, @VK_Intel, @fwosar, @struppigel, @Seifreed, @BleepinComputer, @billtoulas, @serghei, @malwrhunterteam, @FourOctets, @jorntvdw, @fiskerlarsen, @Sophos, @y_advintel, @AdvIntel, @Cyberknow20, @kaspersky, @PaloAltoNtwks, @AhnLab_SecuInfo, @ReversingLabs, @pcrisk, @Amigo_A_, @jamiemaccol, @Jarnecki, and @PogoWasRight.
Finally, the US government published a picture of a Conti ransomware member for the first, asking people to provide info on members named "Target," "Tramp," "Dandis," "Professor," and "Reshaev."
"
ActZero Ransomware Readiness Assessment strenghtens ransomware defense for SMEs
exploits
ransomware
2022-08-11
https://www.helpnetsecurity.com/2022/08/11/actzero-ransomware-readiness-assessment/
ActZero has launched a Ransomware Readiness Assessment for small and medium-sized enterprises (SMEs). The program simulates a ransomware attack sequence, which can expose vulnerabilities and lateral pathways left open by existing tools. With this valuable visibility businesses can start reducing risk immediately. Adversaries expect small businesses to lack proper ransomware defenses. With ActZero MDR, they can now prove them wrong. Adversaries are turning up the pressure on their victims, demanding average ransoms nearing $1M, and … More →
The post ActZero Ransomware Readiness Assessment strenghtens ransomware defense for SMEs appeared first on Help Net Security.
"
Autosummary:
Over the past few months of assessment activity, ActZero has discovered that, on average, its MDR service was able to detect and block 89% of all common and recent ransomware events techniques and tactics, including emerging threats.
"
Hackers Behind Cuba Ransomware Attacks Using New RAT Malware
exploits
ransomware
2022-08-11
https://thehackernews.com/2022/08/hackers-behind-cuba-ransomware-attacks.html
Threat actors associated with the Cuba ransomware have been linked to previously undocumented tactics, techniques and procedures (TTPs), including a new remote access trojan called ROMCOM RAT on compromised systems.
The new findings come from Palo Alto Networks" Unit 42 threat intelligence team, which is tracking the double extortion ransomware group under the constellation-themed moniker
"
Autosummary:
"Cuba ransomware is distributed through Hancitor malware, a loader known for dropping or executing stealers, such as Remote Access Trojans (RATs) and other types of ransomware, onto victims" networks," according to a December 2021 alert from the U.S. Federal Bureau of Investigation (FBI)."
In the intervening months, the ransomware operation has received an upgrade with an aim to "optimize its execution, minimize unintended system behavior, and provide technical support to the ransomware victims if they choose to negotiate," per Trend Micro.
"
FBI: Zeppelin ransomware may encrypt devices multiple times in attacks
exploits
ransomware
2022-08-11
https://www.bleepingcomputer.com/news/security/fbi-zeppelin-ransomware-may-encrypt-devices-multiple-times-in-attacks/
The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) warned US organizations today that attackers deploying Zeppelin ransomware might encrypt their files multiple times. [...]
"
Autosummary:
"
UK NHS service recovery may take a month after MSP ransomware attack
exploits
ransomware
2022-08-11
https://www.bleepingcomputer.com/news/security/uk-nhs-service-recovery-may-take-a-month-after-msp-ransomware-attack/
Managed service provider (MSP) Advanced confirmed that a ransomware attack on its systems caused the disruption of emergency services (111) from the United Kingdom"s National Health Service (NHS). [...]
"
Autosummary:
"
AA22-223A: #StopRansomware: Zeppelin Ransomware
exploits
ransomware
2022-08-11
https://us-cert.cisa.gov/ncas/alerts/aa22-223a
Original release date: August 11, 2022
Summary
Actions to take today to mitigate cyber threats from ransomware:
• Prioritize remediating known exploited vulnerabilities.
• Train users to recognize and report phishing attempts.
• Enable and enforce multifactor authentication.
Note: this joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.
The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint CSA to disseminate known Zeppelin ransomware IOCs and TTPs associated with ransomware variants identified through FBI investigations as recently as 21 June 2022.
The FBI and CISA encourage organizations to implement the recommendations in the Mitigations section of this CSA to reduce the likelihood and impact of ransomware incidents.
Download the PDF version of this report: pdf, 999 kb
Download the YARA signature for Zeppelin: YARA Signature, .yar 125 kb
Technical Details
Note: this advisory uses the MITRE ATT&CK® for Enterprise framework, version 11. See MITRE ATT&CK for Enterprise for all referenced tactics and techniques.
Zep
"
Autosummary:
Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA or the FBI.125 kb
Mitigations
The FBI and CISA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques and to reduce the risk of compromise by Zeppelin ransomware: Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (i.e., hard drive, storage device, the cloud).REPORTING The FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with Zeppelin actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.From 2019 through at least June 2022, actors have used this malware to target a wide range of businesses and critical infrastructure organizations, including defense contractors, educational institutions, manufacturers, technology companies, and especially organizations in the healthcare and medical industries.
to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (i.e., hard drive, storage device, the cloud).Once the ransomware is executed, a randomized nine-digit hexadecimal number is appended to each encrypted file as a file extension, e.g., file.txt.txt.C59-E0C-929 [T1486].
with password logins (e.g., service account, admin accounts, and domain admin accounts) with National Institute for Standards and Technology (NIST) standards for developing and managing password policies.
"
Cisco has been hacked by a ransomware gang
exploits
ransomware
2022-08-11
https://www.helpnetsecurity.com/2022/08/11/cisco-hacked/
U.S. networking giant Cisco Systems has been hacked, the company confirmed on Wednesday, after Yanluowang ransomware operators claimed the attack on their leak site. #Yanluowang #ransomware is claiming to have breached #Cisco ! Without any further information, the group released a list of 8110 lines,showing folder names and possibly exfiltrated files.The word #Cisco only appears 94 times. More information in the screenshots below: pic.twitter.com/2c5shCSbF9 — Gitworm (@Gi7w0rm) August 10, 2022 But according to Cisco’s Talos … More →
The post Cisco has been hacked by a ransomware gang appeared first on Help Net Security.
"
Autosummary:
The attackers then:
Escalated their privileges to “admin”, allowing them to log in to various systems (and this is when Cisco Security’s IT team noticed something was amiss)
Dropped remote access and offensive security tools
Added backdoor accounts and persistence mechanisms
“Following initial access to the environment, the threat actor conducted a variety of activities for the purposes of maintaining access, minimizing forensic artifacts, and increasing their level of access to systems within the environment,” the team explained.
"
Cisco Confirms It"s Been Hacked by Yanluowang Ransomware Gang
exploits
ransomware
2022-08-11
https://thehackernews.com/2022/08/cisco-confirms-its-been-hacked-by.html
Networking equipment major Cisco on Wednesday confirmed it was the victim of a cyberattack on May 24, 2022 after the attackers got hold of an employee"s personal Google account that contained passwords synced from their web browser.
"Initial access to the Cisco VPN was achieved via the successful compromise of a Cisco employee"s personal Google account," Cisco Talos said in a detailed write-up.
"
Autosummary:
Furthermore, the actor is said to have deployed a variety of tools, including remote access utilities like LogMeIn and TeamViewer, offensive security tools such as Cobalt Strike, PowerSploit, Mimikatz, and Impacket aimed at increasing their level of access to systems within the network.
"
US govt will pay you $10 million for info on Conti ransomware members
exploits
ransomware
2022-08-11
https://www.bleepingcomputer.com/news/security/us-govt-will-pay-you-10-million-for-info-on-conti-ransomware-members/
The U.S. State Department announced a $10 million reward today for information on five high-ranking Conti ransomware members, including showing the face of one of the members for the first time. [...]
"
Autosummary:
U.S. govt reveals the first face of a Conti member
Today, for the first time, the State Department revealed the face of a known Conti ransomware operator known as "Target," offering rewards of up to $10 million for information on him and four other members known as "Tramp," "Dandis," "Professor," and "Reshaev."
After rebranding from Ryuk to Conti in the summer of 2020, the ransomware gang quickly rose in prominence as they attacked high-profile victims, including City of Tulsa, Broward County Public Schools, Advantech, and Ireland"s Health Service Executive (HSE) and Department of Health (DoH).
"
Experts Uncover Details on Maui Ransomware Attack by North Korean Hackers
exploits
ransomware
2022-08-10
https://thehackernews.com/2022/08/experts-uncover-details-on-maui.html
The first ever incident possibly involving the ransomware family known as Maui occurred on April 15, 2021, aimed at an unnamed Japanese housing company.
The disclosure from Kaspersky arrives a month after U.S. cybersecurity and intelligence agencies issued an advisory about the use of the ransomware strain by North Korean government-backed hackers to target the healthcare sector since at least
"
Autosummary:
"Stonefly specializes in mounting highly selective targeted attacks against targets that could yield intelligence to assist strategically important sectors such as energy, aerospace, and military equipment," Symantec, a division of Broadcom Software, said in April.
"
Cisco hacked by Yanluowang ransomware gang, 2.8GB allegedly stolen
exploits
ransomware
2022-08-10
https://www.bleepingcomputer.com/news/security/cisco-hacked-by-yanluowang-ransomware-gang-28gb-allegedly-stolen/
Cisco confirmed today that the Yanluowang ransomware group breached its corporate network in late May and that the actor tried to extort them under the threat of leaking stolen files online. [...]
"
Autosummary:
"After obtaining initial access, the threat actor conducted a variety of activities to maintain access, minimize forensic artifacts, and increase their level of access to systems within the environment," Cisco Talos said.
"
Hacker uses new RAT malware in Cuba Ransomware attacks
exploits
ransomware
2022-08-10
https://www.bleepingcomputer.com/news/security/hacker-uses-new-rat-malware-in-cuba-ransomware-attacks/
A member of the Cuba ransomware operation is employing previously unseen tactics, techniques, and procedures (TTPs), including a novel RAT (remote access trojan) and a new local privilege escalation tool. [...]
"
Autosummary:
ROMCOM RAT supports ten commands as listed below:
Return connected drive information
Return file listings for a specified directory
Start up a reverse shell under the name svchelper.exe within the %ProgramData% folder
Upload data to C2 as ZIP file, using IShellDispatch to copy files
Download data and write to worker.txt in the %ProgramData% folder
Delete a specified file
Delete a specified directory
Spawn a process with PID
"
7-Eleven Denmark confirms ransomware attack behind store closures
exploits
ransomware
2022-08-10
https://www.bleepingcomputer.com/news/security/7-eleven-denmark-confirms-ransomware-attack-behind-store-closures/
7-Eleven Denmark has confirmed that a ransomware attack was behind the closure of 175 stores in the country on Monday. [...]
"
Autosummary:
"
Automotive supplier breached by 3 ransomware gangs in 2 weeks
exploits
ransomware
industry
2022-08-10
https://www.bleepingcomputer.com/news/security/automotive-supplier-breached-by-3-ransomware-gangs-in-2-weeks/
An automotive supplier had its systems breached and files encrypted by three different ransomware gangs over a two-week span in May, two of the attacks happening within just two hours. [...]
"
Autosummary:
Breached three times within two months
After the initial compromise, LockBit, Hive, and ALPHV/BlackCat affiliates also gained access to the victim"s network on April 20, May 1, and May 15, respectively.
"
Cisco was hacked by the Yanluowang ransomware gang
exploits
ransomware
2022-08-10
https://securityaffairs.co/wordpress/134278/hacking/yanluowang-ransomware-hacked-cisco.html
Cisco discloses a security breach, the Yanluowang ransomware group breached its corporate network in late May and stole internal data. Cisco disclosed a security breach, the Yanluowang ransomware group breached its corporate network in late May and stole internal data. The investigation conducted by Cisco Security Incident Response (CSIRT) and Cisco Talos revealed that threat […]
The post Cisco was hacked by the Yanluowang ransomware gang appeared first on Security Affairs.
"
Autosummary:
“After obtaining the user’s credentials, the attacker attempted to bypass multifactor authentication (MFA) using a variety of techniques, including voice phishing (aka “vishing”) and MFA fatigue, the process of sending a high volume of push requests to the target’s mobile device until the user accepts, either accidentally or simply to attempt to silence the repeated push notifications they are receiving.”
"
NetRise Platform provides continuous monitoring of XIoT firmware vulnerabilities
ransomware
industry
2022-08-09
https://www.helpnetsecurity.com/2022/08/09/netrise-platform/
NetRise released the NetRise Platform, which is providing insights into shared vulnerabilities across XIoT firmware images in an organization. NetRise is a cloud-based SaaS platform that analyzes and monitors the firmware of XIoT devices. The firmware images are then dissected, presenting all of the key data, artifacts, and risk in an easy-to-consume interface. As a result, NetRise reduces the time and cost of firmware security programs allowing organizations to find and remediate previously undetected issues. … More →
The post NetRise Platform provides continuous monitoring of XIoT firmware vulnerabilities appeared first on Help Net Security.
"
Autosummary:
NetRise continuously monitors and analyzes artifacts within firmware to identify and prioritize:
NetRise continuously monitors and analyzes artifacts within firmware to identify and prioritize: Vulnerabilities (known and unknown)
Compliance adherence
Software bill of materials (SBOM)
Misconfigurations
Overall risk
Key features:
Vulnerability identification and Monitoring
Comprehensive SBOM
Risk comparisons of new firmware versions to existing versions
Vulnerability and other risk prioritization
Correlation across all monitored devices
Firmware repository to query when new vulnerabilities are identified
“NetRise provides the perfect solution for mapping XIoT devices to traditional security processes,” said Michael Scott, Co-Founder & CTO of NetRise.
"
Three ransomware gangs consecutively attacked the same network
exploits
ransomware
2022-08-09
https://www.helpnetsecurity.com/2022/08/09/ransomware-gangs-attacks/
Hive, LockBit and BlackCat, three prominent ransomware gangs, consecutively attacked the same network, according to Sophos. The first two attacks took place within two hours, and the third attack took place two weeks later. Each ransomware gang left its own ransom demand, and some of the files were triple encrypted. “It’s bad enough to get one ransomware note, let alone three,” said John Shier, senior security advisor at Sophos. “Multiple attackers create a whole new … More →
The post Three ransomware gangs consecutively attacked the same network appeared first on Help Net Security.
"
Autosummary:
Most of the initial infections for the attacks highlighted in the whitepaper occurred through either an unpatched vulnerability, with some of the most notable being Log4Shell, ProxyLogon, and ProxyShell, or poorly configured, unsecured Remote Desktop Protocol (RDP) servers.
"
Maui ransomware operation linked to North Korean "Andariel" hackers
exploits
ransomware
2022-08-09
https://www.bleepingcomputer.com/news/security/maui-ransomware-operation-linked-to-north-korean-andariel-hackers/
The Maui ransomware operation has been linked to the North Korean state-sponsored hacking group "Andariel," known for using malicious cyber activities to generate revenue and causing discord in South Korea. [...]
"
Autosummary:
Andariel has been linked to ransomware attacks in the recent past, targeting South Korean companies in media, construction, manufacturing, and network services.
"
Experts linked Maui ransomware to North Korean Andariel APT
exploits
ransomware
2022-08-09
https://securityaffairs.co/wordpress/134195/malware/maui-ransomware-andariel-apt.html
Cybersecurity researchers from Kaspersky linked the Maui ransomware to the North Korea-backed Andariel APT group. Kaspersky linked with medium confidence the Maui ransomware operation to the North Korea-backed APT group Andariel, which is considered a division of the Lazarus APT Group, North Korean nation-state actors used Maui ransomware to encrypt servers providing healthcare services, including electronic […]
The post Experts linked Maui ransomware to North Korean Andariel APT appeared first on Security Affairs.
"
Autosummary:
"
Can your EDR handle a ransomware attack? 6-point checklist for an anti-ransomware EDR
exploits
ransomware
2022-08-09
https://www.malwarebytes.com/blog/business/2022/08/can-your-edr-handle-a-ransomware-attack-6-point-checklist-for-an-anti-ransomware-edr
Categories: Business In this post, a cybersecurity expert gives his 6-point checklist of features your EDR should have to stop ransomware.
|
The post Can your EDR handle a ransomware attack? 6-point checklist for an anti-ransomware EDR appeared first on Malwarebytes Labs.
"
Autosummary:
Businesses, especially small-to-medium sized ones with limited budget or IT resources, need to make sure that their EDR is cost-effective, easy-to-use, and able to reliably stop the growing ransomware threat.Robert Zamani, Regional Vice President, Americans Solutions Engineering
To avoid unnecessary complexity in figuring out the origin of a ransomware threat, your EDR solution should have an industry standardized way of describing the attack—such as MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge).
In this post, Robert Zamani, Regional Vice President, Americans Solutions Engineering at Malwarebytes, gives his 6-point checklist of features your EDR should have to stop ransomware.
“Your ransomware rollback should store changes to data files on the system in a local cache for 72 hours (no ransomware actually exceeds 24 hours), which can be used to help revert changes caused by ransomware,” Zamani says.Thorough containment, eradication, and recovery options
Look to an EDR to mitigate unforeseen threats and ultimately a new method of ransomware (exploitation of trust), says Zamani.
"
Could criminalizing ransomware payments put a stop to the current crime wave?
exploits
ransomware
2022-08-08
https://www.helpnetsecurity.com/2022/08/08/criminalizing-ransomware-payments-video/
In this Help Net Security video, Charl van der Walt, Head of Security Research, Orange Cyberdefense, discusses whether criminalizing ransomware payments could quell the current crime wave by cutting off the flow of funds that motivates cybercriminals.
The post Could criminalizing ransomware payments put a stop to the current crime wave? appeared first on Help Net Security.
"
Autosummary:
"
GwisinLocker ransomware exclusively targets South Korea
exploits
ransomware
2022-08-07
https://securityaffairs.co/wordpress/134105/cyber-crime/gwisinlocker-ransowmare-south-korea.html
Researchers spotted a new family of ransomware, named GwisinLocker, that encrypts Windows and Linux ESXi servers. Researchers warn of a new ransomware called GwisinLocker which is able to encrypt Windows and Linux ESXi servers. The ransomware targets South Korean healthcare, industrial, and pharmaceutical companies, its name comes from the name of the author ‘Gwisin’ (ghost […]
The post GwisinLocker ransomware exclusively targets South Korea appeared first on Security Affairs.
"
Autosummary:
Linkedin
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
New GwisinLocker ransomware encrypts Windows and Linux ESXi servers
exploits
ransomware
2022-08-06
https://www.bleepingcomputer.com/news/security/new-gwisinlocker-ransomware-encrypts-windows-and-linux-esxi-servers/
A new ransomware family called "GwisinLocker" targets South Korean healthcare, industrial, and pharmaceutical companies with Windows and Linux encryptors, including support for encrypting VMware ESXi servers and virtual machines. [...]
"
Autosummary:
The command-line arguments for the GwisinLocker Linxu encryptor are listed below:
Usage: Usage -h, --help show this help message and exit Options -p, --vp= Comma-separated list of paths to encrypt -m, --vm= Kills VM processes if 1; Stops services and processes if 2 -s, --vs= Seconds to sleep before execution -z, --sf= Skip encrypting ESXi-related files (those excluded in the configuration)
"
The Week in Ransomware - August 5th 2022 - A look at cyber insurance
exploits
ransomware
2022-08-05
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-august-5th-2022-a-look-at-cyber-insurance/
For the most part, it has been a quiet week on the ransomware front, with a few new reports, product developments, and attacks revealed. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include: @billtoulas, @malwrhunterteam, @DanielGallagher, @FourOctets, @struppigel, @VK_Intel, @Ionut_Ilascu, @demonslay335, @BleepinComputer, @Seifreed, @PolarToffee, @malwareforme, @jorntvdw, @fwosar, @LawrenceAbrams, @serghei, @secuninja, @pcrisk, @siri_urz, @Dschwarcz, @Balgan, and @Mandiant.
"
ActZero releases Blueprint for Ransomware Defense to improve cybersecurity posture for enterprises
exploits
ransomware
ciber
2022-08-05
https://www.helpnetsecurity.com/2022/08/06/actzero-blueprint-for-ransomware-defense/
ActZero has launched the Ransomware Task Force’s (RTF) “Blueprint for Ransomware Defense”. Aimed at small- and medium-sized enterprises (SMEs) that have limited cybersecurity expertise, the Blueprint provides a set of achievable ransomware safeguards to harden their IT environments. ActZero contributed to the development of the Blueprint, and is actively engaging with its clients, partners, and prospects to encourage adoption. The RTF’s 2021 report called for the cybersecurity community to “develop a clear, actionable framework for … More →
The post ActZero releases Blueprint for Ransomware Defense to improve cybersecurity posture for enterprises appeared first on Help Net Security.
"
Autosummary:
The RTF’s 2021 report called for the cybersecurity community to “develop a clear, actionable framework for ransomware mitigation, response, and recovery”.
"
A third of organizations experience a ransomware attack once a week
exploits
ransomware
2022-08-04
https://www.helpnetsecurity.com/2022/08/04/organizations-experience-ransomware-attack/
Ransomware attacks show no sign of slowing. According to new research published by Menlo Security, a third of organizations experience a ransomware attack at least once a week, with one in 10 experiencing them more than once a day. The research, conducted among 500+ IT security decision makers at US and UK organizations with more than 1,000 employees, highlights the impact this is having on security professionals’ own wellbeing. When asked what keeps them awake … More →
The post A third of organizations experience a ransomware attack once a week appeared first on Help Net Security.
"
Autosummary:
According to the report, around half of organizations (61% US and 44% UK) have been the victim of a successful ransomware attack in the last 18 months, with customers and prospects the most likely entry point for an attack.
"
87% of the ransomware found on the dark web has been delivered via malicious macros
exploits
ransomware
2022-08-03
https://www.helpnetsecurity.com/2022/08/03/ransomware-malicious-macros/
Venafi announced the findings of a dark web investigation into ransomware spread via malicious macros. Conducted in partnership with criminal intelligence provider Forensic Pathways between November 2021 and March 2022, the research analyzed 35 million dark web URLs, including marketplaces and forums, using the Forensic Pathways Dark Search Engine. The findings uncovered 475 webpages of sophisticated ransomware products and services, with several high-profile groups aggressively marketing ransomware-as-a-service. 87% of the ransomware found on the dark … More →
The post 87% of the ransomware found on the dark web has been delivered via malicious macros appeared first on Help Net Security.
"
Autosummary:
Many strains of ransomware being sold — such as Babuk, GoldenEye, Darkside/BlackCat, Egregor, HiddenTear and WannaCry — have been successfully used in high-profile attacks.
"
Power semiconductor component manufacturer Semikron suffered a ransomware attack
exploits
ransomware
industry
2022-08-03
https://securityaffairs.co/wordpress/133975/cyber-crime/semikron-cyber-attack.html
Semikron, a German-based independent manufacturer of power semiconductor components, suffered a ransomware cyberattck. Semikron is a German-based independent manufacturer of power semiconductor components, it employs more than 3,000 people in 24 subsidiaries worldwide, with production sites in Germany, Brazil, China, France, India, Italy, Slovakia and the USA. The company confirmed it has suffered a cyberattack conducted by a professional […]
The post Power semiconductor component manufacturer Semikron suffered a ransomware attack appeared first on Security Affairs.
"
Autosummary:
"
Spanish research agency still recovering after ransomware attack
exploits
ransomware
2022-08-03
https://www.bleepingcomputer.com/news/security/spanish-research-agency-still-recovering-after-ransomware-attack/
The Spanish National Research Council (CSIC) last month was hit by a ransomware attack that is now attributed to Russian hackers. [...]
"
Autosummary:
"
How to protect Windows 10 and 11 PCs from ransomware
exploits
ransomware
2022-08-02
https://www.computerworld.com/article/3245585/how-to-protect-windows-10-from-ransomware.html#tk.rss_security
CryptoLocker. WannaCry. DarkSide. Conti. MedusaLocker. The ransomware threat isn’t going away anytime soon; the news brings constant reports of new waves of this pernicious type of malware washing across the world. It’s popular in large part because of the immediate financial payoff for attackers: It works by encrypting the files on your hard disk, then demands that you pay a ransom, frequently in Bitcoin or other cryptocurrency, to decrypt them.
But you needn’t be a victim. There’s plenty that Windows 10 and 11 users can do to protect themselves against it. In this article, I’ll show you how to keep yourself safe, including how to use an anti-ransomware tool built into Windows.
To read this article in full, please click here
"
Autosummary:
Most backup and storage services, including Microsoft OneDrive, Google Drive, Carbonite, Dropbox and many others, use versioning.They can use the Group Policy Management Console, the Windows Security Center, or PowerShell to turn on Controlled Folder Access for users on a network, customize which folders should be protected, and let additional applications access the folders beyond the Microsoft defaults.From the screen that appears, click Add an allowed app, navigate to the executable file of the program you want to add, click Open, and then confirm you want to add the file.
If you decide at any point to remove a folder, get back to the “Protected folders” screen, click the folder you want to remove, and then click Remove.They can only decrypt data that’s been encrypted with certain specific pieces or families of ransomware, including REvil/Sodinokibi, DarkSide, MaMoCrypt, WannaRen and several others.In addition to Documents, Windows system folders include Desktop, Music, Pictures, and Videos.
Hint: If you’re not sure where executable files are located for programs you want to add to the whitelist, look for the folder name with the program’s name in the Windows\Program Files or Windows\Program Files (x86) folders, then look for an executable file in that folder.As with adding folders to the list of protected folders, you can remove the app by getting back to this screen, clicking the application you want to remove, then clicking Remove.
By default, the feature is not turned on, so if you want to protect yourself against ransomware, you’ll have to tell it to get to work.
"
What is ransomware and how can you defend your business from it?
exploits
ransomware
2022-08-02
https://thehackernews.com/2022/08/what-is-ransomware-how-to-defend-your.html
Ransomware is a kind of malware used by cybercriminals to stop users from accessing their systems or files; the cybercriminals then threaten to leak, destroy or withhold sensitive information unless a ransom is paid.
Ransomware attacks can target either the data held on computer systems (known as locker ransomware) or devices (crypto-ransomware). In both instances, once a ransom is paid, threat
"
Autosummary:
Oliver Pinson-Roxburgh, CEO of Defense.com, the all-in-one cybersecurity platform, shares knowledge and advice in this article on how ransomware works, how damaging it can be, and how your business can mitigate ransomware attacks from occurring.
Exploiting vulnerable systems
Ransomware can also be deployed by exploiting unpatched and outdated systems, as was the case in 2017, when a security vulnerability in Microsoft Windows, EternalBlue (MS17-010), led to the global WannaCry ransomware attack that spread to over 150 countries.
In summary
With ransomware groups continually looking for vulnerabilities to exploit, it"s important that businesses develop robust strategies to prevent ransomware threats: ensure your staff takes regular security awareness training, set up threat monitoring tools to detect and alert you of vulnerabilities, and implement endpoint protection to protect your devices across your network.
There are three key elements to a ransomware attack:
Access
In order to deploy malware to encrypt files and gain control, cybercriminals need to initially gain access to an organization"s systems.
"
LockBit Ransomware Abuses Windows Defender to Deploy Cobalt Strike Payload
exploits
ransomware
2022-08-02
https://thehackernews.com/2022/08/lockbit-ransomware-abuses-windows.html
A threat actor associated with the LockBit 3.0 ransomware-as-a-service (RaaS) operation has been observed abusing the Windows Defender command-line tool to decrypt and load Cobalt Strike payloads.
According to a report published by SentinelOne last week, the incident occurred after obtaining initial access via the Log4Shell vulnerability against an unpatched VMware Horizon Server.
"Once initial
"
Autosummary:
"Once initial access had been achieved, the threat actors performed a series of enumeration commands and attempted to run multiple post-exploitation tools, including Meterpreter, PowerShell Empire, and a new way to side-load Cobalt Strike," researchers Julio Dantas, James Haughom, and Julien Reisdorffer said.
"
LockBit 3.0 affiliate sideloads Cobalt Strike through Windows Defender
ransomware
2022-08-02
https://securityaffairs.co/wordpress/133925/cyber-crime/lockbit-3-0-abuse-windows-defender.html
An affiliate of the LockBit 3.0 RaaS operation has been abusing the Windows Defender command-line tool to deploy Cobalt Strike payloads. During a recent investigation, SentinelOne researchers observed threat actors associated with the LockBit 3.0 ransomware-as-a-service (RaaS) operation abusing the Windows Defender command line tool MpCmdRun.exe to decrypt and load Cobalt Strike payloads. The attackers initially compromise the target […]
The post LockBit 3.0 affiliate sideloads Cobalt Strike through Windows Defender appeared first on Security Affairs.
"
Autosummary:
"
Microsoft Defender now better at blocking ransomware on Windows 11
exploits
ransomware
2022-08-02
https://www.bleepingcomputer.com/news/microsoft/microsoft-defender-now-better-at-blocking-ransomware-on-windows-11/
Microsoft has released new Windows 11 builds to the Beta Channel with improved Microsoft Defender for Endpoint ransomware attack blocking capabilities. [...]
"
Autosummary:
"
Semiconductor manufacturer Semikron hit by LV ransomware attack
exploits
ransomware
industry
2022-08-02
https://www.bleepingcomputer.com/news/security/semiconductor-manufacturer-semikron-hit-by-lv-ransomware-attack/
German power electronics manufacturer Semikron has disclosed that it was hit by a ransomware attack that partially encrypted the company"s network. [...]
"
Autosummary:
"
Accenture acquires Tenbu to expand data and AI capabilities across the cloud continuum
ransomware
2022-08-02
https://www.helpnetsecurity.com/2022/08/03/accenture-tenbu/
Accenture has acquired Tenbu. With more than 150 certifications, Tenbu’s team of 170 data specialists will join the Data & AI team within Accenture Cloud First. Terms of the acquisition were not disclosed. “Our goal is to help clients with total enterprise reinvention by building their digital core, optimizing operations and accelerating growth – and cloud data and AI are fundamental to a strong digital core,” said Karthik Narain, global lead for Accenture Cloud First. … More →
The post Accenture acquires Tenbu to expand data and AI capabilities across the cloud continuum appeared first on Help Net Security.
"
Autosummary:
"
BlackCat ransomware claims attack on European gas pipeline
exploits
ransomware
2022-08-01
https://www.bleepingcomputer.com/news/security/blackcat-ransomware-claims-attack-on-european-gas-pipeline/
The ransomware group known as ALPHV (aka BlackCat) has assumed over the weekend responsibility for the cyberattack that hit Creos Luxembourg last week, a natural gas pipeline and electricity network operator in the central European country. [...]
"
Autosummary:
BlackCat strikes gas again
The ALPHV/BlackCat ransomware group added Creos to its extortion site on Saturday, threatening to publish 180,000 stolen files totaling 150 GB in size, including contracts, agreements, passports, bills, and emails.
"
ALPHV/BlackCat ransomware gang claims to have stolen data from Creos Luxembourg S.A.
exploits
ransomware
2022-08-01
https://securityaffairs.co/wordpress/133899/cyber-crime/alphv-blackcat-ransomware-creos-luxembourg.html
The ALPHV/BlackCat ransomware gang claims to have breached the European gas pipeline Creos Luxembourg S.A. The ALPHV/BlackCat ransomware gang claims to have hacked the European gas pipeline Creos Luxembourg S.A. Creos Luxembourg S.A. owns and manages electricity networks and natural gas pipelines in the Grand Duchy of Luxembourg. In this capacity, the company plans, constructs […]
The post ALPHV/BlackCat ransomware gang claims to have stolen data from Creos Luxembourg S.A. appeared first on Security Affairs.
"
Autosummary:
In this capacity, the company plans, constructs and maintains high, medium and low-voltage electricity networks and high, medium and low-pressure natural gas pipelines, which it owns or which it is responsible for managing.
BlackCat has been operating since at least November 2021, and launched major attacks in January to disrupt OilTanking GmbH, a German fuel company, and in February 2022, the attack on an aviation company, Swissport.
"
Reading the “ENISA THREAT LANDSCAPE FOR RANSOMWARE ATTACKS” report
exploits
ransomware
2022-07-30
https://securityaffairs.co/wordpress/133827/malware/enisa-threat-landscape-for-ransomware-attacks.html
I’m proud to announce the release of the “ENISA THREAT LANDSCAPE FOR RANSOMWARE ATTACKS” report, Enjoy it! Ransomware has become one of the most dangerous threats for organizations worldwide. Cybercriminal organizations and ransomware gangs have devised new business models that are attracting a broad range of advanced threat actors. It is quite easy today for […]
The post Reading the “ENISA THREAT LANDSCAPE FOR RANSOMWARE ATTACKS” report appeared first on Security Affairs.
"
Autosummary:
"
LockBit operator abuses Windows Defender to load Cobalt Strike
ransomware
2022-07-29
https://www.bleepingcomputer.com/news/security/lockbit-operator-abuses-windows-defender-to-load-cobalt-strike/
Security analysts have observed an affiliate of the LockBit 3.0 ransomware operation abusing a Windows Defender command line tool to decrypt and load Cobalt Strike beacons on the target systems. [...]
"
Autosummary:
"
The ransomware landscape changes as fewer victims decide to pay
exploits
ransomware
2022-07-29
https://blog.malwarebytes.com/ransomware/2022/07/the-ransomware-landscape-changes-as-less-victims-decide-to-pay/
A considerable drop in the median of ransom payments and several other circumstances are causing the ransomware landscape to change.
The post The ransomware landscape changes as fewer victims decide to pay appeared first on Malwarebytes Labs.
"
Autosummary:
Groups like Conti were absorbed by existing and new Ransomware-as-a-Service (RaaS) groups such as Black Basta, BlackCat, Hive, and Quantum.
Different targets
With the shift from large botnets as the initial foothold to targeted attacks, the affiliates can not only be more picky when it comes to their victims, some can also choose between RaaS providers or decide to proceed on their own.
"
LockBit ransomware abuses Windows Defender to load Cobalt Strike
exploits
ransomware
2022-07-29
https://www.bleepingcomputer.com/news/security/lockbit-ransomware-abuses-windows-defender-to-load-cobalt-strike/
Security analysts have observed an affiliate of the LockBit 3.0 ransomware operation abusing a Windows Defender command line tool to decrypt and load Cobalt Strike beacons on the target systems. [...]
"
Autosummary:
"
Infortrend introduces WORM and MFA features on EonStor GS to keep data safe from ransomware
exploits
ransomware
2022-07-28
https://www.helpnetsecurity.com/2022/07/28/infortrend-eonstor-gs/
Infortrend Technology introduces immutable object storage or write-once-read-many (WORM) and multi-factor authentication (MFA) security features to their EonStor GS unified storage solutions, ensuring the safety of stored data, specifically against ransomware. Ransomware attacks today are still rising, showing that the traditional ways to prevent these threats such as firewalls and antivirus are not full-proof methods. Therefore, enterprises have started utilizing immutable or WORM storage repositories to take advantage of its write-once-read-many characteristics to protect archived … More →
The post Infortrend introduces WORM and MFA features on EonStor GS to keep data safe from ransomware appeared first on Help Net Security.
"
Autosummary:
"
The strange similarities between Lockbit 3.0 and Blackmatter ransomware
exploits
ransomware
2022-07-27
https://securityaffairs.co/wordpress/133697/malware/lockbit-3-0-blackmatter-ransomware.html
Researchers found similarities between LockBit 3.0 ransomware and BlackMatter, which is a rebranded variant of the DarkSide ransomware. Cybersecurity researchers have found similarities between the latest version of the LockBit ransomware, LockBit 3.0, and the BlackMatter ransomware. The Lockbit 3.0 ransomware was released in June with important novelties such as a bug bounty program, Zcash payment, and new extortion […]
The post The strange similarities between Lockbit 3.0 and Blackmatter ransomware appeared first on Security Affairs.
"
Autosummary:
“With the release of this latest variant — and the launch of LockBit’s bug bounty program, which rewards its affiliates — we expect the LockBit ransomware group to be even more active in the coming days.” concludes the report.
"
Simplifying the fight against ransomware: An expert explains
exploits
ransomware
2022-07-27
https://blog.malwarebytes.com/business/2022/07/simplifying-the-fight-against-ransomware-an-expert-explains/
In this post, a security expert breaks down three tips on how businesses can have an easier time dealing with ransomware attacks.
The post Simplifying the fight against ransomware: An expert explains appeared first on Malwarebytes Labs.
"
Autosummary:
Finally, these features are valuable for detecting and thwarting all malware , not just ransomware: Exploit prevention Behavioral detection of never-before-seen malware Malicious website blocking Brute force protection
, not just ransomware:
On the ease-of-use front, Robert Zamani, Regional Vice President, Americans Solutions Engineering at Malwarebytes, also has four suggestions when choosing an EDR platform:
Ask about the time required to set up the management console and whether it’s cloud-based .Choose an effective and easy-to-use Endpoint Detection and Response (EDR) software
When it comes to ransomware, resource-constrained organizations with small-to-non-existent security teams are in greater need of EDR—but many EDR products are designed for large enterprises with large and highly-skilled security teams.Avoid common mistakes in prevention, detection and response
Often, a customer who gets hit with ransomware has security software but they either have it disabled or it’s outdated or limited in its ability, thanks to poor configuration, Kujawa says.
The importance of “knowing thy enemy”
Most ransomware attacks are not sophisticated, state-sponsored cyber operations, Kujawa says.
"
LockBit claims ransomware attack on Italian tax agency
exploits
ransomware
2022-07-26
https://www.bleepingcomputer.com/news/security/lockbit-claims-ransomware-attack-on-italian-tax-agency/
Italian authorities are investigating claims made by the LockBit ransomware gang that they breached the network of the Italian Internal Revenue Service (L"Agenzia delle Entrate). [...]
"
Autosummary:
"
No More Ransom helps millions of ransomware victims in 6 years
exploits
ransomware
2022-07-26
https://www.bleepingcomputer.com/news/security/no-more-ransom-helps-millions-of-ransomware-victims-in-6-years/
The No More Ransom project celebrates its sixth anniversary today after helping millions of ransomware victims recover their files for free. [...]
"
Autosummary:
"
Experts Find Similarities Between New LockBit 3.0 and BlackMatter Ransomware
exploits
ransomware
2022-07-26
https://thehackernews.com/2022/07/experts-find-similarities-between.html
Cybersecurity researchers have reiterated similarities between the latest iteration of the LockBit ransomware and BlackMatter, a rebranded variant of the DarkSide ransomware strain that closed shop in November 2021.
The new version of LockBit, called LockBit 3.0 aka LockBit Black, was released in June 2022, launching a brand new leak site and what"s the very first ransomware bug bounty program,
"
Autosummary:
"Latin America has seen the largest increase in attacks, spotting one out of 23 organizations impacted weekly, a 43% increase YoY, compared to one out of 33 in Q2 2021, followed by Asia region that has seen a 33% increase YoY, reaching one out of 17 organizations impacted weekly," the Israeli cybersecurity firm said.
"
Lockbit ransomware gang claims to have breached the Italian Revenue Agency
exploits
ransomware
2022-07-25
https://securityaffairs.co/wordpress/133640/cyber-crime/lockbit-ransomware-italian-revenue-agency.html
The ransomware group Lockbit claims to have stolen 78 GB of files from the Italian Revenue Agency (Agenzia delle Entrate). The ransomware gang Lockbit claims to have hacked the Italian Revenue Agency (Agenzia delle Entrate) and added the government agency to the list of victims reported on its dark web leak site. “The Revenue Agency, operational since 1 January […]
The post Lockbit ransomware gang claims to have breached the Italian Revenue Agency appeared first on Security Affairs.
"
Autosummary:
The group claims to have stolen 78GB of data, including company documents, scans, financial reports, and contracts, it plans to release screenshots of files and samples very soon.
"
The Week in Ransomware - July 22nd 2022 - Attacks abound
exploits
ransomware
2022-07-23
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-july-22nd-2022-attacks-abound/
New ransomware operations continue to be launched this week, with the new Luna ransomware found to be targeting both Windows and VMware ESXi servers. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include: @serghei, @VK_Intel, @jorntvdw, @DanielGallagher, @struppigel, @PolarToffee, @FourOctets, @Seifreed, @malwrhunterteam, @Ionut_Ilascu, @LawrenceAbrams, @demonslay335, @billtoulas, @BleepinComputer, @fwosar, @malwareforme, @AdvIntel, @AuCyble, @kaspersky, @pcrisk, @corintxt, @Amigo_A_, and @jgreigj.
"
FBI seized $500,000 worth of bitcoin obtained from Maui ransomware attacks
exploits
ransomware
2022-07-23
https://securityaffairs.co/wordpress/133587/cyber-warfare-2/fbi-seized-bitcoin-maui-ransomware.html
The U.S. DoJ seized $500,000 worth of Bitcoin from North Korea-linked threat actors who are behind the Maui ransomware. The U.S. Department of Justice (DoJ) has seized $500,000 worth of Bitcoin from North Korean threat actors who used the Maui ransomware to target several organizations worldwide. “The Justice Department today announced a complaint filed in […]
The post FBI seized $500,000 worth of bitcoin obtained from Maui ransomware attacks appeared first on Security Affairs.
"
Autosummary:
“The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Department of the Treasury (Treasury) are releasing this joint Cybersecurity Advisory (CSA) to provide information on Maui ransomware, which has been used by North Korean state-sponsored cyber actors since at least May 2021 to target Healthcare and Public Health (HPH) Sector organizations.” reads the advisory published by US authorties.
"
Digital security giant Entrust breached by ransomware gang
exploits
ransomware
2022-07-22
https://www.bleepingcomputer.com/news/security/digital-security-giant-entrust-breached-by-ransomware-gang/
Digital security giant Entrust has confirmed that it suffered a cyberattack where threat actors breached their network and stole data from internal systems. [...]
"
Autosummary:
This includes US government agencies, such as the Department of Energy, Department of Homeland Security, the Department of the Treasury, the Department of Health & Human Services, the Department of Veterans Affairs, the Department of Agriculture, and many more.
"
New Redeemer ransomware version promoted on hacker forums
exploits
ransomware
2022-07-21
https://www.bleepingcomputer.com/news/security/new-redeemer-ransomware-version-promoted-on-hacker-forums/
A threat actor is promoting a new version of their free-to-use "Redeemer" ransomware builder on hacker forums, offering unskilled threat actors an easy entry to the world of encryption-backed extortion attacks. [...]
"
Autosummary:
According to its author, the new version 2.0 release was written entirely in C++ and works on Windows Vista, 7, 8, 10, and 11, featuring multi-threaded performance and a medium AV detection rate.
"
FBI Seizes $500,000 Ransomware Payments and Crypto from North Korean Hackers
exploits
ransomware
2022-07-21
https://thehackernews.com/2022/07/fbi-seizes-500000-ransomware-payments.html
The U.S. Department of Justice (DoJ) has announced the seizure of $500,000 worth of Bitcoin from North Korean hackers who extorted digital payments from several organizations by using a new ransomware strain known as Maui.
"The seized funds include ransoms paid by healthcare providers in Kansas and Colorado," the DoJ said in a press release issued Tuesday.
The recovery of the bitcoin ransoms
"
Autosummary:
"
How Conti ransomware hacked and encrypted the Costa Rican government
exploits
latam
government
ransomware
2022-07-21
https://www.bleepingcomputer.com/news/security/how-conti-ransomware-hacked-and-encrypted-the-costa-rican-government/
Details have emerged on how the Conti ransomware gang breached the Costa Rican government, showing the attack"s precision and the speed of moving from initial access to the final stage of encrypting devices. [...]
"
Autosummary:
A diagram of the attack flow:
Conti ransomware attack flow on Costa Rica
source:AdvIntel
Post-attack: national emergency, Conti shut down
According to a note on the Conti leak site, the ransom demand was initially $10 million and then increased to $20 million when Costa Rica refused to pay.
"
The rise and continuing popularity of LinkedIn-themed phishing
financial
ransomware
2022-07-21
https://www.helpnetsecurity.com/2022/07/21/linkedin-phishing/
Phishing emails impersonating LinkedIn continue to make the bulk of all brand phishing attempts; according to Check Point, 45% of all email phishing attempts in Q2 2022 imitated the style of communication of the professional social media platform, with the goal of directing targets to a spoofed LinkedIn login page and collecting their account credentials. The phishers are generally trying to pique the targets’ interest with fake messages claiming that they “have appeared in X … More →
The post The rise and continuing popularity of LinkedIn-themed phishing appeared first on Help Net Security.
"
Autosummary:
As noted before, LinkedIn-themed phishing emails are more likely to come in the form of fake notifications about messages, contacts and searches featuring the target, occasionally even mentioning that people from specific high-profile companies have been looking at the target’s profile.
"
Demo: Your data has been encrypted! Stopping ransomware attacks with Malwarebytes EDR
exploits
ransomware
2022-07-21
https://blog.malwarebytes.com/business/2022/07/demo-your-data-has-been-encrypted-stopping-ransomware-attacks-with-malwarebytes-edr/
Malwarebytes Endpoint Detection and Response can fight—and defeat—advanced ransomware that other security solutions miss. In this post, we’ll walk through what it looks like to deal with a ransomware attack using Malwarebytes EDR.
The post Demo: Your data has been encrypted! Stopping ransomware attacks with Malwarebytes EDR appeared first on Malwarebytes Labs.
"
Autosummary:
What worse, ransomware gangs have increased their attacks on a range of vulnerable industries, with disruptions to business operations, million-dollar ransom demands, data exfiltration, and extortion.
Accelerate and simplify your ransomware defense with Malwarebytes EDR
In this post, we seamlessly looked at the activity that ransomware exhibited, found a recovery plan for it, then implemented that plan.
Part 4: Remediating the ransomware
Below, we see a process here with a large amount of file activity, namely file renames.
Part 3: Isolating the endpoint infected with ransomware
Now, as we’re continuing our investigation, we’re looking at this and deciding it looks pretty suspicious – it’s probably unwanted or a potentially damaging activity.
So for example, if we hover over the disable Windows Firewall behavior that we saw, on the left, you’ll see that we’ve been partnering with the MITRE foundation and using its attack framework to give you context and a common set of terms that you can use to identify and understand these tactics.
"
New Luna ransomware encrypts Windows, Linux, and ESXi systems
exploits
ransomware
2022-07-20
https://www.bleepingcomputer.com/news/security/new-luna-ransomware-encrypts-windows-linux-and-esxi-systems/
A new ransomware family dubbed Luna can be used to encrypt devices running several operating systems, including Windows, Linux, and ESXi systems. [...]
"
Autosummary:
Luna ransomware command-line arguments (Kaspersky)
Rust-based cross-platform ransomware
The group behind this new ransomware developed this new strain in Rust and took advantage of its platform-agnostic nature to port it to multiple platforms with very few changes to the source code.
"
FBI recovers $500,000 healthcare orgs paid to Maui ransomware
exploits
ransomware
2022-07-20
https://www.bleepingcomputer.com/news/security/fbi-recovers-500-000-healthcare-orgs-paid-to-maui-ransomware/
The U.S. Department of Justice has announced the seizure of approximately $500,000 in Bitcoin, paid by American health care providers to the operators of the Maui ransomware strain. [...]
"
Autosummary:
"
Will new EU crypto rules change how ransomware is played?
exploits
ransomware
2022-07-20
https://www.computerworld.com/article/3667281/will-new-eu-crypto-rules-change-how-ransomware-is-played.html#tk.rss_security
Cryptocurrency has always been the payment method of choice for bad guys. Get hit with an enterprise ransomware attack and plan to pay? You’ll need crypto. The key reason cyberthieves love cryptocurrency so much is that it is far harder to trace payments.
That is why a move being attempted by the European Union has so much potential. The EU — in a move that will likely be mimicked by many other regional regulatory forces, including in the United States — is putting in place tracking requirements for all cryptocurrency.
If it is successful, and the EU has an excellent track record on precisely these kinds of changes, cryptocurrency may quickly fade as the thief’s payment of choice.
To read this article in full, please click here
"
Autosummary:
By the way, the EU in this document also listed “non-cooperative jurisdictions for tax purposes,” which include American Samoa, Fiji Guam, Palau, Panama, Samoa, Trinidad, Tobago, the U.S. Virgin Islands, and Vanuatu.
That all said, cryptocurrency exchanges are, sort of, mostly legal operations.
"
New Rust-based Ransomware Family Targets Windows, Linux, and ESXi Systems
exploits
ransomware
2022-07-20
https://thehackernews.com/2022/07/new-rust-based-ransomware-family.html
Kaspersky security researchers have disclosed details of a brand-new ransomware family written in Rust, making it the third strain after BlackCat and Hive to use the programming language.
Luna, as it"s called, is "fairly simple" and can run on Windows, Linux, and ESXi systems, with the malware banking on a combination of Curve25519 and AES for encryption.
"Both the Linux and ESXi
"
Autosummary:
"
Another ransomware payment recovered by the Justice Department
exploits
ransomware
2022-07-20
https://blog.malwarebytes.com/ransomware/2022/07/another-ransomware-payment-recovered-by-the-justice-department/
The Justice Department announced it was able to forfeit ransomware payments made by health care organizations in Kansas and Colorado.
The post Another ransomware payment recovered by the Justice Department appeared first on Malwarebytes Labs.
"
Autosummary:
Maui ransomware
Deputy Attorney General Lisa O. Monaco said at the International Conference on Cyber Security:
“Thanks to rapid reporting and cooperation from a victim, the FBI and Justice Department prosecutors have disrupted the activities of a North Korean state-sponsored group deploying ransomware known as ‘Maui.’”
Malwarebytes recently reported on the North Korean APT that targets US healthcare sector with Maui ransomware.
Although Maui may be a little different from run-of-the-mill ransomware, the steps to protect against it are not:
Maintain offsite, offline backups of data and test them regularly.
"
New Luna ransomware targets Windows, Linux and ESXi systems
exploits
ransomware
2022-07-20
https://securityaffairs.co/wordpress/133454/cyber-crime/luna-ransomware-rust.html
Kaspersky researchers discovered a new ransomware family written in Rust, named Luna, that targets Windows, Linux, and ESXi systems. Researchers from Kaspersky Lab detailed a new ransomware family named Luna, which is written in Rust and is able to target Windows, Linux, and ESXi systems. Luna ransomware is the third ransomware family that is written […]
The post New Luna ransomware targets Windows, Linux and ESXi systems appeared first on Security Affairs.
"
Autosummary:
The move aims at expanding potential targets, the support for VMware ESXi was already implemented by many ransomware families, including LockBit, HelloKitty, BlackMatter, and REvil.
"
82% of global insurers expect the rise in cyber insurance premiums to continue
ransomware
2022-07-19
https://www.helpnetsecurity.com/2022/07/19/rise-cyber-insurance-premiums/
A Panaseer survey of global insurers across the UK and US found that 82% are expecting the rise in premiums to continue, with 74% of insurers agreeing that their inability to accurately understand a customer’s security posture is impacting price increases. Insurers also see the increasing cost of ransomware as a leading factor (78%) affecting premium rises, with largest ransom pay-outs by insurers in the last two years averaging £3.26m in the UK and $3.52m … More →
The post 82% of global insurers expect the rise in cyber insurance premiums to continue appeared first on Help Net Security.
"
Autosummary:
This is closely followed by security awareness (36%), along with application security (32%), vulnerability management (31%), privileged access management (31%) and patch management (30%), highlighting that insurers expect to see evidence of a layered, multi-faceted approach to cybersecurity.
"
Building materials giant Knauf hit by Black Basta ransomware gang
exploits
ransomware
2022-07-19
https://www.bleepingcomputer.com/news/security/building-materials-giant-knauf-hit-by-black-basta-ransomware-gang/
The Knauf Group has announced it has been the target of a cyberattack that has disrupted its business operations, forcing its global IT team to shut down all IT systems to isolate the incident. [...]
"
Autosummary:
Black Basta leaked 20% of the stolen files
Bleeping Computer has seen samples of email communication, user credentials, employee contact information, production documents, and ID scans.
"
Conceal and Carahsoft join forces to protect government customers from ransomware
exploits
government
ransomware
2022-07-19
https://www.helpnetsecurity.com/2022/07/20/conceal-carahsoft/
Conceal announced a partnership with Carahsoft to protect government agencies from ransomware using the Conceal Platform which incorporates intelligence-grade, zero trust technology. “Conceal has developed a powerful new approach to ransomware protection that uses isolation to prevent malware from targeting an organization’s users and infrastructure, and executing on endpoints,” said Craig P. Abod, Carahsoft President. “This partnership allows Carahsoft and our reseller partners to provide our Government customers with unprecedented security for their end users, … More →
The post Conceal and Carahsoft join forces to protect government customers from ransomware appeared first on Help Net Security.
"
Autosummary:
"
North Korean Hackers Targeting Small and Midsize Businesses with H0lyGh0st Ransomware
exploits
ransomware
2022-07-15
https://thehackernews.com/2022/07/north-korean-hackers-targeting-small.html
An emerging threat cluster originating from North Korea has been linked to developing and using ransomware in cyberattacks targeting small businesses since September 2021.
The group, which calls itself H0lyGh0st after the ransomware payload of the same name, is being tracked by the Microsoft Threat Intelligence Center under the moniker DEV-0530, a designation assigned for unknown, emerging, or a
"
Autosummary:
"
The ransomware threat evolves in a post-Conti world
The development also comes as the ransomware landscape is evolving with existing and new ransomware groups, namely LockBit, Hive, Lilith, RedAlert (aka N13V), and 0mega, even as the Conti gang formally shuttered its operations in response to a massive leak of its internal chats.
"
RedAlert, LILITH, and 0mega, 3 new ransomware in the wild
exploits
ransomware
2022-07-15
https://securityaffairs.co/wordpress/133248/cyber-crime/lilith-redalert-0mega-ransomware.html
Cyble researchers warn of three new ransomware operations named Lilith, RedAlert and 0mega targeting organizations worldwide. Researchers from threat intelligence firm Cyble warn of new ransomware gangs that surfaced recently, named Lilith, RedAlert, and 0mega. RedAlert (aka N13V) targets both Windows and Linux VMWare ESXi servers of target organizations. The name RedAlert comes after a string […]
The post RedAlert, LILITH, and 0mega, 3 new ransomware in the wild appeared first on Security Affairs.
"
Autosummary:
The ransomware targets a limited types of files, including log files (.log), swap files(.vswp), virtual disks(.vmdk), snapshot files (.vmsn) and memory files(.vmem) of VMware ESXi virtual machines.
Researchers from threat intelligence firm Cyble warn of new ransomware gangs that surfaced recently, named Lilith, RedAlert, and 0mega.
"
Holy Ghost ransomware operation is linked to North Korea
exploits
ransomware
2022-07-15
https://securityaffairs.co/wordpress/133255/hacking/holy-ghost-ransomware-north-korea.html
Microsoft researchers linked the Holy Ghost ransomware (H0lyGh0st) operation to North Korea-linked threat actors. The Microsoft Threat Intelligence Center (MSTIC) researchers linked the activity of the Holy Ghost ransomware (H0lyGh0st) operation to a North Korea-linked group they tracked as DEV-0530. The Holy Ghost ransomware gang has been active since June 2021 and it conducted ransomware […]
The post Holy Ghost ransomware operation is linked to North Korea appeared first on Security Affairs.
"
Autosummary:
The Microsoft Threat Intelligence Center (MSTIC) researchers linked the activity of the Holy Ghost ransomware (H0lyGh0st) operation to a North Korea-linked group they tracked as DEV-0530.
"
Emerging H0lyGh0st Ransomware Tied to North Korea
exploits
ransomware
2022-07-15
https://threatpost.com/h0lygh0st-ransomware-north-korea/180232/
Microsoft has linked a threat that emerged in June 2021 and targets small-to-mid-sized businesses to state-sponsored actors tracked as DEV-0530.
"
Autosummary:
The group has successfully compromised small-to-mid-sized businesses—including manufacturing organizations, banks, schools, and event and meeting planning companies—in multiple countries starting as early as September, researchers from MTIC and Microsoft Digital Security Unit (MDSU) said in a blog post published Thursday.
Later in the group’s evolution, between October 2021 and May 2022, MSTIC observed a cluster of new DEV-0530 ransomware variants written in Go, which they classify as SiennaBlue variants, they said.
"
Catalogic DPX 4.8.1 strengthens ransomware protection for customers
exploits
ransomware
2022-07-14
https://www.helpnetsecurity.com/2022/07/14/catalogic-dpx-4-8-1/
Catalogic Software released the newest version of Catalogic DPX, the company’s enterprise data protection software. DPX 4.8.1 introduces GuardMode, a feature providing early detection of ransomware and DPX vPlus, cloud data protection for Microsoft 365 and other open virtualization platforms. “Cybercriminals are constantly innovating, costing US victims $49.2 million in losses to ransomware attacks last year alone – and that is just based on incidents reported to the FBI,” said Krista Macomber, Senior Analyst, Evaluator … More →
The post Catalogic DPX 4.8.1 strengthens ransomware protection for customers appeared first on Help Net Security.
"
Autosummary:
With DPX vPlus, Catalogic provides data protection for Microsoft 365, and other open virtualization platforms such as RHV/oVirt, Acropolis, XenServer, Oracle VM and KVM.
"
Elden Ring maker Bandai Namco hit by ransomware and data leaks
exploits
ransomware
2022-07-14
https://blog.malwarebytes.com/ransomware/2022/07/elden-ring-maker-bandai-namco-hit-by-ransomware-and-data-leaks/
We take a look at a major ransomware attack impacting video game giant Bandai Namco, laced with the potential threat of data leakage.
The post Elden Ring maker Bandai Namco hit by ransomware and data leaks appeared first on Malwarebytes Labs.
"
Autosummary:
Eurogamer published a Bandai Namco statement, which reads as follows:
On 3rd July, 2022, Bandai Namco Holdings Inc. confirmed that it experienced an unauthorised access by third party to the internal systems of several Group companies in Asian regions (excluding Japan).In addition, there is a possibility that customer information related to the Toys and Hobby Business in Asian regions (excluding Japan) was included in the servers and PCs, and we are currently identifying the status about existence of leakage, scope of the damage, and investigating the cause.
"
Holy Ghost ransomware operation linked to North Korean hackers
exploits
ransomware
2022-07-14
https://www.bleepingcomputer.com/news/security/holy-ghost-ransomware-operation-linked-to-north-korean-hackers/
For more than a year, North Korean hackers have been running a ransomware operation called HolyGhost, attacking small businesses in various countries. [...]
"
Autosummary:
Microsoft tracks the newer variants as SiennaBlue (HolyRS.exe, HolyLocker.exe, and BTLC.exe) and notes that their functionality expanded over time to include multiple encryption options, string obfuscation, public key management, and internet/intranet support.
"
Microsoft links Holy Ghost ransomware operation to North Korean hackers
exploits
ransomware
2022-07-14
https://www.bleepingcomputer.com/news/security/microsoft-links-holy-ghost-ransomware-operation-to-north-korean-hackers/
For more than a year, North Korean hackers have been running a ransomware operation called HolyGhost, attacking small businesses in various countries. [...]
"
Autosummary:
Microsoft tracks the newer variants as SiennaBlue (HolyRS.exe, HolyLocker.exe, and BTLC.exe) and notes that their functionality expanded over time to include multiple encryption options, string obfuscation, public key management, and internet/intranet support.
"
Rise in ransomware drives IT leaders to implement data encryption
exploits
ransomware
2022-07-13
https://www.helpnetsecurity.com/2022/07/13/implement-data-encryption-video/
The number of UK organizations implementing data encryption as a core part of their cybersecurity strategy has continued to rise, with 32% introducing a policy to encrypt all corporate information as standard in the last year. In total, 47% now require the encryption of all data, whether it’s at rest or in transit, according to Apricorn. This Help Net Security video highlights how remote working and rise in ransomware drive IT leaders to manage risk … More →
The post Rise in ransomware drives IT leaders to implement data encryption appeared first on Help Net Security.
"
Autosummary:
"
Cobalt Strikes again: UAC-0056 continues to target Ukraine in its latest campaign
ransomware
2022-07-13
https://blog.malwarebytes.com/threat-intelligence/2022/07/cobalt-strikes-again-uac-0056-continues-to-target-ukraine-in-its-latest-campaign/
While the war in Ukraine still rages, various threat actors continue to launch cyber attacks against its government entities. In this blog we review the latest campaign from the UAC-0056 threat group.
The post Cobalt Strikes again: UAC-0056 continues to target Ukraine in its latest campaign appeared first on Malwarebytes Labs.
"
Autosummary:
024054ff04e0fd75a4765dd705067a6b336caa751f0a804fefce787382ac45c1
14736be09a7652d206cd6ab35375116ec4fad499bb1b47567e4fd56dcfcd22ea
474a0f0bb5b17a1bb024e08a0bb46277ba03392ee95766870c981658c4c2300d
Payloads
0709a8f18c8436deea0b57deab55afbcea17657cb0186cbf0f6fcbb551661470
aadd8c7c248915c5da49c976f24aeb98ccc426fb31d1d6913519694a7bb9351a
fb2a9dcfcf41c493fb7348ff867bb3cad9962a04c9dfd5b1afa115f7ff737346
501d4741a0aa8784e9feeb9f960f259c09cbceccb206f355209c851b7f094eff
Cobalt Strike beacon and payloads
136.144.41[.]177
syriahr[.]eu/s/Xnk75JwUcIebkrmENtufIiiKEmoqBN/field-keywords/
syriahr[.]eu/nzXlLVas-VALvDh9lopkC/avp/amznussraps/
skreatortemp[.]site
imolaoggi[.]euThis file looked familiar to us and for good reason because the macro is nearly identical to the document we analyzed in our initial blog:
Figure 2: Detail of Vacancies and GoElephant dropper macros
In the most recent attack reported by UA-CERT (Humanitarian catastrophe of Ukraine since February 24, 2022.xls) we see an almost identical macro to the one used in another decoy document called Help Ukraine.xls:
Figure 3: Detail of Help Ukraine and Humanitarian catastrophe macros
The Help Ukraine lure, to our knowledge, has never been publicly documented before:
Figure 4: Help Ukraine lure used in late July
We were able to identify 7 different samples with that theme, including one (258a9665af7120d0d80766c119e48a4035ee3b68676076bf3ed6462c644fe7d0) that has some similarities with a previous attack:
Figure 5: Similarities between different versions
Also, in the past we have found comments regarding to a domain named ExcelVBA[.]ru.This shellcode can be 32 or 64 bit, and is a Cobalt Strike beacon with the following configuration:
BeaconType – HTTPS
Port – 443
SleepTime – 30000
PublicKey_MD5 – defb5d95ce99e1ebbf421a1a38d9cb64
C2Server – skreatortemp.site,/s/08u1XdxChhMrLYdTasfnOMQpbsLkpq3o/field-keywords/
UserAgent – Mozilla/5.0_Frsg_stredf_o21_rutyyyrui_type (Windows NT 10.0; Win64; x64; Trident/7.0; D-M1-200309AC;D-M1-MSSP1; rv:11.0) like Gecko_10984gap
HttpPostUri – /nBz07hg5l3C9wuWVCGV-5xHHu1amjf76F2A8i/avp/amznussraps/
Watermark – 1580103824
By having a Cobalt Strike instance running on the victim’s machine, it is now fully compromised.
"
New Lilith ransomware emerges with extortion site, lists first victim
exploits
ransomware
2022-07-13
https://www.bleepingcomputer.com/news/security/new-lilith-ransomware-emerges-with-extortion-site-lists-first-victim/
A new ransomware operation has been launched under the name "Lilith," and it has already posted its first victim on a data leak site created to support double-extortion attacks. [...]
"
Autosummary:
A look at Lilith
Upon execution, Lilith attempts to terminate processes that match entries on a hardcoded list, including Outlook, SQL, Thunderbird, Steam, PowerPoint, WordPad, Firefox, and more.
"
Bandai Namco confirms hack after ALPHV ransomware data leak threat
exploits
ransomware
2022-07-13
https://www.bleepingcomputer.com/news/security/bandai-namco-confirms-hack-after-alphv-ransomware-data-leak-threat/
Game publishing giant Bandai Namco has confirmed that they suffered a cyberattack that may have resulted in the theft of customers" personal data. [...]
"
Autosummary:
Bandai Namco is a Japanese publisher of numerous popular video games, including Elden Ring, Dark Souls, Pac-Man, Tekken, Gundam, Soulcalibur, and many more.
"
Qakbot operations continue to evolve to avoid detection
ransomware
2022-07-13
https://securityaffairs.co/wordpress/133191/malware/qakbot-continues-to-evolve.html
Experts warn that operators behind the Qakbot malware operation are improving their attack chain in an attempt to avoid detection. Qakbot, also known as QBot, QuackBot and Pinkslipbot, is an info-stealing malware that has been active since 2008. The malware spreads via malspam campaigns, it inserts replies in active email threads. The threat continues to […]
The post Qakbot operations continue to evolve to avoid detection appeared first on Security Affairs.
"
Autosummary:
“Other more subtle techniques are being deployed by threat actors to prevent automated detection and raise the odds that their attack will work, including obfuscating code, leveraging multiple URLs to deliver the payload, using unknown file extension names to deliver the payload, and altering the steps of the process by introducing new layers between initial compromise, delivery, and final execution.”
"
BlackCat (aka ALPHV) ransomware is increasing stakes up to $2.5 million in demands
exploits
ransomware
2022-07-11
https://www.helpnetsecurity.com/2022/07/11/blackcat-alphv-ransomware/
The notorious cybercriminal syndicate competes with Conti and Lockbit 3.0. They introduced an advanced search by stolen victim’s passwords, and confidential documents leaked in the TOR network. Resecurity (USA), a Los Angeles-based cybersecurity company protecting Fortune 500 companies, has detected a significant increase in the value of ransom demand requests by the notorious Blackcat ransomware gang. According to experts, the notorious cybercriminal syndicate actively competes with Conti and the updated Lockbit 3.0, and recently introduced … More →
The post BlackCat (aka ALPHV) ransomware is increasing stakes up to $2.5 million in demands appeared first on Help Net Security.
"
Autosummary:
BlackCat has been operating since at least November 2021, and launched major attacks in January to disrupt OilTanking GmbH, a German fuel company, and in February 2022, the attack on an aviation company, Swissport.
Blackcat ransomware is one of the fastest-growing Ransomware-as-a-Service (RaaS) underground groups practicing so called “quadruple extortion” by pressing victims to pay – leveraging encryption, data theft, denial of service (DoS) and harassment.
"
BlackCat (aka ALPHV) Ransomware is Increasing Stakes up to $2,5M in Demands
exploits
ransomware
2022-07-11
https://securityaffairs.co/wordpress/133107/cyber-crime/blackcat-alphv-ransomware-demands.html
BlackCat (aka ALPHV) Ransomware gang introduced an advanced search by stolen victim’s passwords, and confidential documents. The notorious cybercriminal syndicate BlackCat competes with Conti and Lockbit 3.0. They introduced an advanced search by stolen victim’s passwords, and confidential documents leaked in the TOR network Resecurity (USA), a Los Angeles-based cybersecurity company protecting Fortune 500 companies, […]
The post BlackCat (aka ALPHV) Ransomware is Increasing Stakes up to $2,5M in Demands appeared first on Security Affairs.
"
Autosummary:
BlackCat has been operating since at least November 2021, and launched major attacks in January to disrupt OilTanking GmbH, a German fuel company, and in February 2022, the attack on an aviation company, Swissport.They introduced an advanced search by stolen victim’s passwords, and confidential documents leaked in the TOR network
Resecurity (USA), a Los Angeles-based cybersecurity company protecting Fortune 500 companies, has detected a significant increase in the value of ransom demand requests by the notorious Blackcat ransomware gang.
"
Experts warn of the new 0mega ransomware operation
exploits
ransomware
2022-07-11
https://securityaffairs.co/wordpress/133098/malware/0mega-ransomware.html
BleepingComputer reported a new ransomware operation named 0mega that is targeting organizations worldwide. 0mega is a new ransomware operation that is targeting organizations worldwide using a double-extortion model, BleepingComputer reported. The ransomware operation has been active at least since May 2022 and already claimed to have breached multiple organizations. Victims of the ransomware reported that […]
The post Experts warn of the new 0mega ransomware operation appeared first on Security Affairs.
"
Autosummary:
"
French telephone operator La Poste Mobile suffered a ransomware attack
exploits
ransomware
2022-07-10
https://securityaffairs.co/wordpress/133080/cyber-crime/la-poste-mobile-ransomware.html
French virtual mobile telephone operator La Poste Mobile was hit by a ransomware attack that impacted administrative and management services. The ransomware attack hit the virtual mobile telephone operator La Poste Mobile on July 4 and paralyzed administrative and management services. The company pointed out that threat actors may have accessed data of its customers, […]
The post French telephone operator La Poste Mobile suffered a ransomware attack appeared first on Security Affairs.
"
Autosummary:
La réalité matérielle de l"attaque ne fait pas un doute, même si celle-ci était presque passée inaperçue… #ransomware https://t.co/Ef7u7jOah0 — Valéry Rieß-Marchive (@ValeryMarchive) July 8, 2022
The gang has been active since at least 2019 and today it is one of the most active ransomware gangs.
"
North Korean APT targets US healthcare sector with Maui ransomware
exploits
ransomware
2022-07-10
https://blog.malwarebytes.com/ransomware/2022/07/north-korean-apt-targets-us-healthcare-sector-with-maui-ransomware/
CISA warns of an unusual ransomware.
The post North Korean APT targets US healthcare sector with Maui ransomware appeared first on Malwarebytes Labs.
"
Autosummary:
State-sponsored North Korean threat actors have been targeting the US Healthcare and Public Health (HPH) sector for the past year using the Maui ransomware, according to a joint cybersecurity advisory (CSA) from the FBI, Cybersecurity and Infrastructure Security Agency (CISA), and the Department of the Treasury.
North Korean state-sponsored cyber-actors used Maui ransomware in these incidents to encrypt servers responsible for healthcare services—including electronic health records services, diagnostics services, imaging services, and intranet services.
"
Evolution of the LockBit Ransomware operation relies on new techniques
exploits
ransomware
2022-07-09
https://securityaffairs.co/wordpress/133027/cyber-crime/lockbit-2-0-evolution.html
Experts documented the evolution of the LockBit ransomware that leverages multiple techniques to infect targets and evade detection. The Cybereason Global Security Operations Center (GSOC) Team published the Cybereason Threat Analysis Reports that investigates the threat landscape and provides recommendations to mitigate their attacks. The researchers focused on the evolution of the Lockbit ransomware, they detailed two infections occurring […]
The post Evolution of the LockBit Ransomware operation relies on new techniques appeared first on Security Affairs.
"
Autosummary:
“In other cases, affiliates would use a more traditional phishing email that will allow them to remotely connect to a network via an employee’s computer, or utilize malicious attachments, downloads, application patch exploits or vulnerabilities to gain access to a network.”
"
New Checkmate ransomware target QNAP NAS devices
exploits
ransomware
2022-07-08
https://securityaffairs.co/wordpress/132989/malware/checkmate-ransomware-targets-qnap-nas.html
Taiwanese vendor QNAP wars of a new strain of ransomware, dubbed Checkmate, that is targeting its NAS devices. The Taiwanese vendor QNAP is warning of a new family of ransomware targeting its NAS devices using weak passwords. Threat actors are targeting devices exposed online with the SMB service enabled, they perform brute-force attacks against accounts […]
The post New Checkmate ransomware target QNAP NAS devices appeared first on Security Affairs.
"
Autosummary:
In June, Bleeping Computer and MalwareHunterTeam researchers, citing user reports and sample submissions on the ID Ransomware platform, warned of a new wave of ech0raix ransomware attacks targeting QNAP Network Attached Storage (NAS) devices.
Updating QTS, QuTS hero, or QuTScloud
Log on to QTS, QuTS hero or QuTScloud as administrator.
"
Free decryptor released for AstraLocker, Yashma ransomware victims
exploits
ransomware
2022-07-08
https://www.bleepingcomputer.com/news/security/free-decryptor-released-for-astralocker-yashma-ransomware-victims/
New Zealand-based cybersecurity firm Emsisoft has released a free decryption tool to help AstraLocker and Yashma ransomware victims recover their files without paying a ransom. [...]
"
Autosummary:
The list of previously released decryption tools includes Ragnarok, Avaddon, SynAck, AES-NI, Shade, FilesLocker, TeslaCrypt, Crysis, Ziggy, and FonixLocker.
"
Checkmate ransomware hits QNAP NAS devices
exploits
ransomware
2022-07-08
https://www.helpnetsecurity.com/2022/07/08/checkmate-ransomware-qnap-nas/
QNAP Systems is warning about Checkmate, a new piece of ransomware targeting users of its network-attached storage (NAS) appliances. “Preliminary investigation indicates that Checkmate attacks via SMB services exposed to the internet, and employs a dictionary attack to break accounts with weak passwords,” the company says. “Once the attacker successfully logs in to a device, they encrypt data in shared folders and leave a ransom note with the file name ‘!CHECKMATE_DECRYPTION_README’ in each folder.” About … More →
The post Checkmate ransomware hits QNAP NAS devices appeared first on Help Net Security.
"
Autosummary:
"
Researchers Detail Techniques LockBit Ransomware Using to Infect its Targets
exploits
ransomware
2022-07-08
https://thehackernews.com/2022/07/researchers-detail-techniques-lockbit.html
LockBit ransomware attacks are constantly evolving by making use of a wide range of techniques to infect targets while also taking steps to disable endpoint security solutions.
"The affiliates that use LockBit"s services conduct their attacks according to their preference and use different tools and techniques to achieve their goal," Cybereason security analysts Loïc Castel and Gal Romano said.
"
Autosummary:
"
LockBit, which operates on a ransomware-as-a-service (RaaS) model like most groups, was first observed in September 2019 and has since emerged as the most dominant ransomware strain this year, surpassing other well-known groups like Conti, Hive, and BlackCat.
"
U.S. Healthcare Orgs Targeted with Maui Ransomware
exploits
ransomware
2022-07-08
https://threatpost.com/healthcare-maui-ransomware/180154/
State-sponsored actors are deploying the unique malware--which targets specific files and leaves no ransomware note--in ongoing attacks.
"
Autosummary:
“For truly organizational crippling ransomware attacks, threat actors need to manually identify the important assets and the weak points to truly take down a victim,” observed John Bambenek, principal threat hunter at Netenrich, a security and operations analytics SaaS firm, in an email to Threatpost.
“Cyber criminals want to get paid quickly and effectively, and with little information for the victim the attack is increasingly malicious in nature,” observed James McQuiggan, security awareness advocate at security firm KnowBe4, in an e-mail to Threatpost.
"
Emsisoft: Victims of AstraLocker and Yashma ransomware can recover their files for free
exploits
ransomware
2022-07-08
https://securityaffairs.co/wordpress/133014/malware/emsisoft-astralocker-yashma-decryptor.html
Emsisoft has released a free decryption tool that allows victims of the AstraLocker and Yashma ransomware to recover their files without paying a ransom. Cybersecurity firm Emsisoft released a free decryptor tool that allows victims of the AstraLocker and Yashma ransomware to recover their files without paying a ransom. The security firm states that the […]
The post Emsisoft: Victims of AstraLocker and Yashma ransomware can recover their files for free appeared first on Security Affairs.
"
Autosummary:
The Yashma decryptor released by the company works for the Chaos-based versions using .AstraLocker or a random .[a-z0-9]{4} extension.
"
The Week in Ransomware - July 8th 2022 - One down, many to go
exploits
ransomware
2022-07-08
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-july-8th-2022-one-down-many-to-go/
While we continue to see new ransomware operations launch, we also received some good news this week, with another ransomware shutting down. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include: @BleepinComputer, @LawrenceAbrams, @fwosar, @VK_Intel, @demonslay335, @Seifreed, @struppigel, @FourOctets, @malwareforme, @DanielGallagher, @PolarToffee, @serghei, @jorntvdw, @Ionut_Ilascu, @malwrhunterteam, @billtoulas, @PogoWasRight, @ValeryMarchive, @vxunderground, @emsisoft, @Unit42_Intel, @AdvIntel, @CISecurity, @pcrisk, and @Amigo_A_.
This week, information about attacks also became public, including IT services giant SHI, Quantum ransomware hitting PFC, and the US government warning that the Maui ransomware is targeting healthcare.
"
New 0mega ransomware targets businesses in double-extortion attacks
exploits
ransomware
2022-07-08
https://www.bleepingcomputer.com/news/security/new-0mega-ransomware-targets-businesses-in-double-extortion-attacks/
A new ransomware operation named "0mega" targets organizations worldwide in double-extortion attacks and demands millions of dollars in ransoms. [...]
"
Autosummary:
"
Healthcare organizations targeted with Maui ransomware
exploits
ransomware
2022-07-07
https://www.helpnetsecurity.com/2022/07/07/healthcare-maui-ransomware/
A less known ransomware threat dubbed Maui has been and is likely to continue hitting healthcare organizations, a new CISA alert warns. Maui is unusual in many ways: it does not show a ransom note, it does not rely upon external infrastructure to receive encryption keys, and it does not encrypt files and/or systems indiscriminately. Instead, its operators – believed to be North Korean state-sponsored cyber actors – operate it manually and choose which things … More →
The post Healthcare organizations targeted with Maui ransomware appeared first on Help Net Security.
"
Autosummary:
Maui ransomware encryption
At the inner layer, files are encrypted using AES with a unique 16-byte key for each file, and the AES keys are RSA-encrypted using a key pair generated the first time Maui is run, Silas Cutler, Principal Reverse Engineer at Stairwell, explained.
"
Smashing Security podcast #282: Raising money through ransomware, China’s mega-leak, and hackers for hire
financial
exploits
ransomware
2022-07-07
https://grahamcluley.com/smashing-security-podcast-282/
A hacked university might have made a profit after paying a cryptocurrency ransom, China suffers possibly the biggest data breach in history, and Reuters investigates digital mercenaries. All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, joined this … Continue reading "Smashing Security podcast #282: Raising money through ransomware, China’s mega-leak, and hackers for hire"
"
Autosummary:
"
North Korean Maui Ransomware Actively Targeting U.S. Healthcare Organizations
exploits
ransomware
2022-07-07
https://thehackernews.com/2022/07/north-korean-maui-ransomware-actively.html
In a new joint cybersecurity advisory, U.S. cybersecurity and intelligence agencies have warned about the use of Maui ransomware by North Korean government-backed hackers to target the healthcare sector since at least May 2021.
"North Korean state-sponsored cyber actors used Maui ransomware in these incidents to encrypt servers responsible for healthcare services—including electronic health
"
Autosummary:
"North Korean state-sponsored cyber actors used Maui ransomware in these incidents to encrypt servers responsible for healthcare services—including electronic health records services, diagnostics services, imaging services, and intranet services," the authorities noted.
"
Quantum ransomware attack affects 657 healthcare orgs
exploits
ransomware
2022-07-07
https://www.bleepingcomputer.com/news/security/quantum-ransomware-attack-affects-657-healthcare-orgs/
Professional Finance Company Inc. (PFC), a full-service accounts receivables management company, says that a ransomware attack in late February led to a data breach affecting over 600 healthcare organizations. [...]
"
Autosummary:
This is part of Conti"s new modus operandi where its members have either infiltrated or taken control of other ransomware operations such as Hive, AvosLocker, BlackCat, and Hello Kitty or data extortion gangs like Karakurt, BlackByte, and the Bazarcall collective.
"
QNAP warns of new Checkmate ransomware targeting NAS devices
exploits
ransomware
2022-07-07
https://www.bleepingcomputer.com/news/security/qnap-warns-of-new-checkmate-ransomware-targeting-nas-devices/
Taiwan-based network-attached storage (NAS) vendor QNAP warned customers to secure their devices against attacks using Checkmate ransomware to encrypt data. [...]
"
Autosummary:
You should also disable SMB 1 by logging into QTS, QuTS hero, or QuTScloud, going to Control Panel > Network & File > Win/Mac/NFS/WebDAV > Microsoft Networking, and selecting "SMB 2 or higher" after clicking on Advanced Options.
"
North Korea-linked APTs use Maui Ransomware to target the Healthcare industry
exploits
ransomware
industry
2022-07-07
https://securityaffairs.co/wordpress/132978/malware/maui-ransomware-joint-alert.html
US authorities have issued a joint advisory warning of North Korea-linked APTs using Maui ransomware in attacks against the Healthcare sector. The FBI, CISA, and the U.S. Treasury Department issued a joint advisory that warn of North-Korea-linked threat actors using Maui ransomware in attacks aimed at organizations in the Healthcare sector. “The Federal Bureau of […]
The post North Korea-linked APTs use Maui Ransomware to target the Healthcare industry appeared first on Security Affairs.
"
Autosummary:
"
Atera integrates with Malwarebytes to protect organizations against ransomware attacks
exploits
ransomware
2022-07-07
https://www.helpnetsecurity.com/2022/07/08/atera-malwarebytes/
Atera announced a new integration with Malwarebytes, a provider of real-time cyber protection. Atera is the first remote management company to offer an integration that automates licensing and provisioning of the Malwarebytes OneView platform. This partnership plays an integral role for Atera to provide streamlined and maximized security operations for its community of more than 10,000 customers across 105 countries. “With workplaces continuing to evolve and employees working from anywhere in the world, the risk … More →
The post Atera integrates with Malwarebytes to protect organizations against ransomware attacks appeared first on Help Net Security.
"
Autosummary:
"
Hive Ransomware Upgrades to Rust for More Sophisticated Encryption Method
exploits
ransomware
2022-07-06
https://thehackernews.com/2022/07/hive-ransomware-upgrades-to-rust-for.html
The operators of the Hive ransomware-as-a-service (RaaS) scheme have overhauled their file-encrypting software to fully migrate to Rust and adopt a more sophisticated encryption method.
"With its latest variant carrying several major upgrades, Hive also proves it"s one of the fastest evolving ransomware families, exemplifying the continuously changing ransomware ecosystem," Microsoft Threat
"
Autosummary:
"
Bitter APT Hackers Continue to Target Bangladesh Military Entities
ransomware
2022-07-06
https://thehackernews.com/2022/07/bitter-apt-hackers-continue-to-target.html
Military entities located in Bangladesh continue to be at the receiving end of sustained cyberattacks by an advanced persistent threat tracked as Bitter.
"Through malicious document files and intermediate malware stages the threat actors conduct espionage by deploying Remote Access Trojans," cybersecurity firm SECUINFRA said in a new write-up published on July 5.
The findings from the
"
Autosummary:
"
New Hive ransomware variant is written in Rust and use improved encryption method
exploits
ransomware
2022-07-06
https://securityaffairs.co/wordpress/132914/malware/hive-ransomware-new-variant.html
Hive ransomware operators have improved their file-encrypting module by migrating to Rust language and adopting a more sophisticated encryption method. The operators of the Hive ransomware upgraded their malware by migrating the malware to the Rust language and implementing a more sophisticated encryption method, Microsoft researchers warn. “The upgrades in the latest variant are effectively […]
The post New Hive ransomware variant is written in Rust and use improved encryption method appeared first on Security Affairs.
"
Autosummary:
The porting to Rust language provides the following advantages:
It offers memory, data type, and thread safety
It has deep control over low-level resources
It has a user-friendly syntax
It has several mechanisms for concurrency and parallelism, thus enabling fast and safe file encryption
It has a good variety of cryptographic libraries
It’s relatively more difficult to reverse-engineer
The most important change in the latest Hive variant is the encryption mechanism it adopts.
"
US govt warns of Maui ransomware attacks against healthcare orgs
exploits
ransomware
2022-07-06
https://www.bleepingcomputer.com/news/security/us-govt-warns-of-maui-ransomware-attacks-against-healthcare-orgs/
The FBI, CISA, and the U.S. Treasury Department issued today a joint advisory warning of North-Korean-backed threat actors using Maui ransomware in attacks against Healthcare and Public Health (HPH) organizations. [...]
"
Autosummary:
"
AA22-187A: North Korean State-Sponsored Cyber Actors Use Maui Ransomware to Target the Healthcare and Public Health Sector
exploits
government
ransomware
2022-07-06
https://us-cert.cisa.gov/ncas/alerts/aa22-187a
Original release date: July 6, 2022
Summary
The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Department of the Treasury (Treasury) are releasing this joint Cybersecurity Advisory (CSA) to provide information on Maui ransomware, which has been used by North Korean state-sponsored cyber actors since at least May 2021 to target Healthcare and Public Health (HPH) Sector organizations.
This joint CSA provides information—including tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs)—on Maui ransomware obtained from FBI incident response activities and industry analysis of a Maui sample. The FBI, CISA, and Treasury urge HPH Sector organizations as well as other critical infrastructure organizations to apply the recommendations in the Mitigations section of this CSA to reduce the likelihood of compromise from ransomware operations. Victims of Maui ransomware should report the incident to their local FBI field office or CISA.
The FBI, CISA, and Treasury highly discourage paying ransoms as doing so does not guarantee files and records will be recovered and may pose sanctions risks. Note: in September 2021, Treasury issued an updated advisory highlighting the sanctions risks associated with ransomware payments and the proactive steps companies can take to mitigate such risks. Specifically, the updated advisory encourages U.S. entities to adopt and improve cybersecurity practices and report ransomware attacks to, and fully cooperate with, law enforcement. The updated advisory states that when affected parties take these proactive steps, Treasury’s Office of Foreign Assets Control (OFAC) would be more likely to resolve apparent sanctions violations involving ransomware attacks with a non-public enforcement response.
For more information on state-sponsored North Korean maliciou
"
Autosummary:
Mitigations
The FBI, CISA, and Treasury urge HPH Sector organizations to: Limit access to data by deploying public key infrastructure and digital certificates to authenticate connections with the network, Internet of Things (IoT) medical devices, and the electronic health record system, as well as to ensure data packages are not manipulated while in transit from man-in-the-middle attacks.In addition, the FBI, CISA, and Treasury urge all organizations, including HPH Sector organizations, to apply the following recommendations to prepare for, mitigate/prevent, and respond to ransomware incidents.Summary
The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Department of the Treasury (Treasury) are releasing this joint Cybersecurity Advisory (CSA) to provide information on Maui ransomware, which has been used by North Korean state-sponsored cyber actors since at least May 2021 to target Healthcare and Public Health (HPH) Sector organizations.
Apply incident response best practices found in the joint Cybersecurity Advisory, Technical Approaches to Uncovering and Remediating Malicious Activity, developed by CISA and the cybersecurity authorities of Australia, Canada, New Zealand, and the United Kingdom.Regardless of whether you or your organization have decided to pay the ransom, the FBI, CISA, and Treasury urge you to promptly report ransomware incidents to the FBI at a local FBI Field Office, CISA at us-cert.cisa.gov/report, or the USSS at a USSS Field Office.For breaches involving electronic health information, you may need to notify the Federal Trade Commission (FTC) or the Department of Health and Human Services, and, in some cases, the media.Request for Information The FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, bitcoin wallet information, the decryptor file, and/or benign samples of encrypted files.North Korean state-sponsored cyber actors used Maui ransomware in these incidents to encrypt servers responsible for healthcare services—including electronic health records services, diagnostics services, imaging services, and intranet services.
"
Researchers Share Techniques to Uncover Anonymized Ransomware Sites on Dark Web
exploits
ransomware
2022-07-05
https://thehackernews.com/2022/07/researchers-share-techniques-to-uncover.html
Cybersecurity researchers have detailed the various measures ransomware actors have taken to obscure their true identity online as well as the hosting location of their web server infrastructure.
"Most ransomware operators use hosting providers outside their country of origin (such as Sweden, Germany, and Singapore) to host their ransomware operations sites," Cisco Talos researcher Paul Eubanks
"
Autosummary:
While ransomware groups are known to rely on the dark web to conceal their illicit activities ranging from leaking stolen data to negotiating payments with victims, Talos disclosed that it was able to identify "public IP addresses hosting the same threat actor infrastructure as those on the dark web."
"The methods we used to identify the public internet IPs involved matching threat actors" [self-signed] TLS certificate serial numbers and page elements with those indexed on the public internet," Eubanks said.
"
AstraLocker ransomware operators shut down their operations
exploits
ransomware
2022-07-05
https://securityaffairs.co/wordpress/132871/malware/astralocker-ransomware-shut-down.html
AstraLocker ransomware operators told BleepingComputer they’re shutting down their operations and are releasing decryptors. AstraLocker ransomware operators told BleepingComputer they’re shutting down the operation and provided decryptors to the VirusTotal malware analysis platform. AstraLocker is based on the source code of the Babuk Locker (Babyk) ransomware that was leaked online on June 2021. BleepingComputer tested the […]
The post AstraLocker ransomware operators shut down their operations appeared first on Security Affairs.
"
Autosummary:
"
New RedAlert Ransomware targets Windows, Linux VMware ESXi servers
exploits
ransomware
2022-07-05
https://www.bleepingcomputer.com/news/security/new-redalert-ransomware-targets-windows-linux-vmware-esxi-servers/
A new ransomware operation called RedAlert, or N13V, encrypts both Windows and Linux VMWare ESXi servers in attacks on corporate networks. [...]
"
Autosummary:
DEBUG TESTS -h Show this message
When running the ransomware with the " -w " argument, the Linux encryptor will shut down all running VMware ESXi virtual machines using the following esxcli command:
esxcli --formatter=csv --format-param=fields=="WorldID,DisplayName" vm process list | tail -n +2 | awk -F $"," "{system("esxcli vm process kill --type=force --world-id=" $1)}"
When encrypting files, the ransomware utilizes the NTRUEncrypt public-key encryption algorithm, which support various "Parameter Sets" that offer different levels of security.
"
AstraLocker ransomware shuts down and releases decryptors
exploits
ransomware
2022-07-04
https://www.bleepingcomputer.com/news/security/astralocker-ransomware-shuts-down-and-releases-decryptors/
The threat actor behind the lesser-known AstraLocker ransomware told BleepingComputer they"re shutting down the operation and plan to switch to cryptojacking. [...]
"
Autosummary:
The list of decryption tools released in the past includes Avaddon, Ragnarok, SynAck, TeslaCrypt, Crysis, AES-NI, Shade, FilesLocker, Ziggy, and FonixLocker.
"
A ransomware attack forced publishing giant Macmillan to shuts down its systems
exploits
ransomware
2022-07-02
https://securityaffairs.co/wordpress/132792/cyber-crime/macmillan-ransomware-attack.html
A cyber attack forced the American publishing giant Macmillan to shut down its IT systems. The publishing giant Macmillan has been hit by a cyberattack that forced the company to shut down its IT infrastructure to prevent the threat from spreading within its network. The company spokesman Erin Coffey told different media outlets that attackers have encrypted […]
The post A ransomware attack forced publishing giant Macmillan to shuts down its systems appeared first on Security Affairs.
"
Autosummary:
"
The Week in Ransomware - July 1st 2022 - Bug Bounties
exploits
ransomware
2022-07-01
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-july-1st-2022-bug-bounties/
It has been relatively busy this week with new ransomware attacks unveiled, a bug bounty program introduced, and new tactics used by the threat actors to distribute their encryptors. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include: @PolarToffee, @fwosar, @struppigel, @BleepinComputer, @serghei, @Ionut_Ilascu, @DanielGallagher, @malwrhunterteam, @LawrenceAbrams, @VK_Intel, @billtoulas, @jorntvdw, @malwareforme, @FourOctets, @demonslay335, @Seifreed, @ReversingLabs, @ValeryMarchive, @TrendMicro, @kisa118, @ahnlab, @PogoWasRight, @Amigo_A_, @Kangxiaopao, and @pcrisk.
Finally, we also learned about various attacks this week, including those on Macmillan, Fitzgibbon Hospital, Med.
"
AstraLocker 2.0 ransomware isn’t going to give you your files back
exploits
ransomware
2022-07-01
https://blog.malwarebytes.com/ransomware/2022/07/astralocker-2-0-ransomware-isnt-going-to-give-you-your-files-back/
Through malice or carelessness, AstraLocker breaks the "circle of trust".
The post AstraLocker 2.0 ransomware isn’t going to give you your files back appeared first on Malwarebytes Labs.
"
Autosummary:
Reaffirming (and then breaking) the circle of trust
When decryption doesn’t happen, either because of a poor quality decryptor, or because no decryption process actually exists, the ransomware author’s so-called circle of trust is broken.
In a ransomware attack, criminals typically break into a victim’s network via a trojan that has already infected a computer, by exploiting a software vulnerability on an Internet-facing server, or with stolen Remote Desktop Protocol (RDP) credentials.
In its rush to encrypt, AstraLocker still manages to do some standard ransomware things: It tries to disable security programs; it also stops applications running that might prevent encryption from taking place; and it avoids virtual machines, which might indicate it’s being run by researchers in a lab.
"
EMEA continues to be a hotspot for malware threats
exploits
ransomware
2022-06-30
https://www.helpnetsecurity.com/2022/06/30/emea-malware-threats/
Ransomware detections in the first quarter of this year doubled the total volume reported for 2021, according to the latest quarterly Internet Security Report from the WatchGuard Threat Lab. Researchers also found that the Emotet botnet came back in a big way, the infamous Log4Shell vulnerability tripled its attack efforts and malicious cryptomining activity increased. Although findings from the Threat Lab’s Q4 2021 report showed ransomware attacks trending down year over year, that all changed … More →
The post EMEA continues to be a hotspot for malware threats appeared first on Help Net Security.
"
Autosummary:
Other key findings from this Internet Security Report include:
Log4Shell makes its debut on the top 10 network attacks list
Publicly disclosed in early December 2021, the Apache Log4j2 vulnerability, also known as Log4Shell, debuted on the top 10 network attack list fashionably late this quarter.
“Based on the early spike in ransomware this year and data from previous quarters, we predict 2022 will break our record for annual ransomware detections,” said Corey Nachreiner, chief security officer at WatchGuard.
"
Smashing Security podcast #281: Debug ransomware and win $1,000,000, period-tracking apps, and AI gets emotional
exploits
ransomware
2022-06-30
https://grahamcluley.com/smashing-security-podcast-281/
A new version of the LockBit ransomware offers a bug bounty, women uninstall period-tracking apps in fear of how their data might be used against them, and Microsoft"s facial recognition tech no longer wants to know how you"re feeling.
All this and much more is discussed in the latest edition of the award-winning "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Thom Langford from The Host Unknown podcast.
Plus don"t miss our featured interview with Bitwarden founder and CTO Kyle Spearrin.
"
Autosummary:
Integrating directly into development tools, workflows, and automation pipelines, Snyk makes it easy for teams to find, prioritize, and fix security vulnerabilities in code, dependencies, containers, and infrastructure as code.
"
Ex-Canadian Government Employee Pleads Guilty Over NetWalker Ransomware Attacks
exploits
government
ransomware
2022-06-30
https://thehackernews.com/2022/06/ex-canadian-government-employee-pleads.html
A former Canadian government employee this week agreed to plead guilty in the U.S. to charges related to his involvement with the NetWalker ransomware syndicate.
Sebastien Vachon-Desjardins, who was extradited to the U.S. on March 10, 2022, is accused of conspiracy to commit computer fraud and wire fraud, intentional damage to a protected computer, and transmitting a demand in relation to
"
Autosummary:
"
A Guide to Surviving a Ransomware Attack
exploits
ransomware
2022-06-30
https://threatpost.com/a-guide-to-surviving-a-ransomware-attack/180110/
Oliver Tavakoli, CTO at Vectra AI, gives us hope that surviving a ransomware attack is possible, so long as we apply preparation and intentionality to our defense posture.
"
Autosummary:
Attacker Skill and Persistence
The skills of the attackers and the skills of the defenders – plus some elements of luck – generally determine the possible extent to which an attack could progress:
Low skills: Some attackers may be skilled at attacking organizations with lagging security practices but will often meet their match in organizations that have robust defenses
Some attackers may be skilled at attacking organizations with lagging security practices but will often meet their match in organizations that have robust defenses Wrong skills: Attackers with skills and tooling useful in attacking traditional data centers will have trouble breaking into targets who have moved everything to the cloud
Attackers with skills and tooling useful in attacking traditional data centers will have trouble breaking into targets who have moved everything to the cloud Bad luck: Organizations who are generally locked down but may have a temporary exposure which an attacker happens to stumble across
Organizations who are generally locked down but may have a temporary exposure which an attacker happens to stumble across Good luck: Organizations who have left a persistent opening (e.g., open RDP access to the outside in an AWS enclave) may have a run of good luck as no attacker encounters it
Attacker Goal
Attack groups may also specialize in leak-centered vs. operation-centered goals.
Takeaways
You should tabletop various scenarios covering attackers pursuing both leak-centered and operations-centered goals and consider your reactions to partial and complete success by the attackers:
Know the extent of your cyber insurance policy and what limitations it has.
"
Black Basta ransomware – what you need to know
exploits
ransomware
2022-06-30
https://www.tripwire.com/state-of-security/security-data-protection/black-basta-ransomware-what-you-need-to-know/
Although only active for the past couple of months, the Black Basta ransomware is thought to have already hit almost 50 organisations.
Read more in my article on the Tripwire State of Security blog.
"
Autosummary:
Victims have reportedly been hit in countries around the world including the United States, UK, India, Canada, Australia, New Zealand, and UAE.
"
Macmillan shuts down systems after likely ransomware attack
exploits
ransomware
2022-06-30
https://www.bleepingcomputer.com/news/security/macmillan-shuts-down-systems-after-likely-ransomware-attack/
Publishing giant Macmillan was forced to shut down their network and offices while recovering from a security incident that appears to be a ransomware attack. [...]
"
Autosummary:
"
Korean cybersecurity agency released a free decryptor for Hive ransomware
exploits
ransomware
ciber
2022-06-30
https://securityaffairs.co/wordpress/132770/malware/hive-ransomware-decryptor.html
Good news for the victims of the Hive ransomware, Korean security researchers have released a free decryptor for some versions. Good news for the victims of the Hive ransomware, the South Korean cybersecurity agency KISA has released a free decryptor for versions from v1 till v4. “The Korea Internet & Security Agency (KISA) is distributing […]
The post Korean cybersecurity agency released a free decryptor for Hive ransomware appeared first on Security Affairs.
"
Autosummary:
The results of the tests demonstrated the efficiency of the method, the master key recovered 92% succeeded in decrypting approximately 72% of the files, while the master key restored 96% succeeded in decrypting approximately 82% of the files, and the master key restored 98% succeeded in decrypting approximately 98% of the files.
"
Codenotary SBOM Operator for Kubernetes provides continuously updated info on software supply chain
ransomware
2022-06-29
https://www.helpnetsecurity.com/2022/06/29/codenotary-sbom-operator-for-kubernetes/
Codenotary launched SBOM Operator for Kubernetes in both its open source Community Attestation Service, as well as Codenotary’s Trustcenter, the company’s flagship product, that mitigates the risk of software supply chain attacks by tracking all software and software dependencies running in Kubernetes. Codenotary provides the easiest way to generate SBOMs (Software Bill of Materials) of running container images and maintaining up-to-date records of all builds, and dependencies. This allows for immediate risk mitigation in the … More →
The post Codenotary SBOM Operator for Kubernetes provides continuously updated info on software supply chain appeared first on Help Net Security.
"
Autosummary:
"
Walmart denies being hit by Yanluowang ransomware attack
exploits
ransomware
2022-06-29
https://www.bleepingcomputer.com/news/security/walmart-denies-being-hit-by-yanluowang-ransomware-attack/
American retailer Walmart has denied being hit with a ransomware attack by the Yanluowang gang after the hackers claimed to encrypt thousands of computers. [...]
"
Autosummary:
"
Peer Software partners with Pulsar Security to help enterprise customers combat ransomware attacks
exploits
ransomware
2022-06-28
https://www.helpnetsecurity.com/2022/06/28/peer-software-pulsar-security/
Peer Software announced the formation of a strategic alliance with Pulsar Security. Through the alliance, Peer Software will leverage Pulsar Security’s team of cyber security experts to continuously monitor and analyze emerging and evolving ransomware and malware attack patterns on unstructured data. PeerGFS, an enterprise-class software solution that eases the deployment of a modern distributed file system across multi-site, on-premises and cloud storage, will utilize these attack patterns to enable an additional layer of cyber … More →
The post Peer Software partners with Pulsar Security to help enterprise customers combat ransomware attacks appeared first on Help Net Security.
"
Autosummary:
"
Detection, isolation, and negotiation: Improving your ransomware preparedness and response
exploits
ransomware
2022-06-28
https://www.helpnetsecurity.com/2022/06/28/improving-ransomware-preparedness/
The risks presented by ransomware and cyber extortion events have likely found a place in your own security team’s discussions, and rightfully so. Ransomware attacks have proliferated in the last decade. The numbers are staggering if not overwhelming, and make it abundantly clear that ransomware attacks are not a threat that any organization, however big or small and across industries, can afford to ignore. It follows, then, that proactively protecting company assets and mitigating cyber … More →
The post Detection, isolation, and negotiation: Improving your ransomware preparedness and response appeared first on Help Net Security.
"
Autosummary:
Further pressure
There are other means threat actors use to add pressure to negotiations outside of the ransomware attack itself, including:
Implementing DDoS attacks
Emailing employees directly about the attack
Claiming to have data they have not actually exfiltrated to make the situation seem more dire
Contacting executives or clients of the victims to make them aware of the attack
Posting sensitive PII on public-facing forums or social media
Leaving backdoors that make it possible for the ransomware attackers to carry out a second attack against the same organization
Being the victim of a cyber extortion attack is stressful and challenging.Without a threat readiness and response plan in place, the damage of a ransomware or cyber extortion event could reverberate across your organizations, resulting in data loss, service inaccessibility, operational interruptions, loss of trust and competitive market advantage, and other costly and lasting repercussions.It is always advisable to use a professional who is familiar with threat actor engagement, ransomware attacks, and the legal obligations of ransomware victims; knowledge of current cyber extortion trends, threat actor TTPs, and threat actor groups is also important.
"
Mitel VoIP Bug Exploited in Ransomware Attacks
exploits
ransomware
2022-06-28
https://threatpost.com/mitel-voip-bug-exploited/180079/
Researchers warn threat actors are using a novel remote code execution exploit to gain initial access to victim’s environments.
"
Autosummary:
This included the initial undocumented exploit used to compromise the device, the tools subsequently downloaded by the threat actor to the device, and even evidence of specific anti-forensic measures taken by the threat actor,” said Bennett.
“The device was taken offline and imaged for further analysis, leading to the discovery of a novel remote code execution exploit used by the threat actor to gain initial access to the environment,” Patrick Bennet wrote in a blog post.
"
LockBit 3.0 introduces important novelties, including a bug bounty program
exploits
ransomware
2022-06-28
https://securityaffairs.co/wordpress/132701/cyber-crime/lockbit-3-0.html
The LockBit ransomware operators released LockBit 3.0 with important novelties, including a bug bounty program and Zcash payments. The Lockbit ransomware operation has released LockBit 3.0, which has important noveòties such as a bug bounty program, Zcash payment, and new extortion tactics. The gang has been active since at least 2019 and today it is […]
The post LockBit 3.0 introduces important novelties, including a bug bounty program appeared first on Security Affairs.
"
Autosummary:
Linkedin
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
LockBit 3.0 introduces the first ransomware bug bounty program
exploits
ransomware
2022-06-27
https://www.bleepingcomputer.com/news/security/lockbit-30-introduces-the-first-ransomware-bug-bounty-program/
The LockBit ransomware operation has released "LockBit 3.0," introducing the first ransomware bug bounty program and leaking new extortion tactics and Zcash cryptocurrency payment options. [...]
"
Autosummary:
The following are the various bug bounty categories offered by the LockBit 3.0 operation:
Web Site Bugs: XSS vulnerabilities, mysql injections, getting a shell to the site and more, will be paid depending on the severity of the bug, the main direction is to get a decryptor through bugs web site, as well as access to the history of correspondence with encrypted companies.
XSS vulnerabilities, mysql injections, getting a shell to the site and more, will be paid depending on the severity of the bug, the main direction is to get a decryptor through bugs web site, as well as access to the history of correspondence with encrypted companies.BleepingComputer
LockBit 3.0 bug bounty program
With the release of LockBit 3.0, the operation has introduced the first bug bounty program offered by a ransomware gang, asking security researchers to submit bug reports in return for rewards ranging between $1,000 and $1 million.
"
Cybersecurity Experts Warn of Emerging Threat of "Black Basta" Ransomware
exploits
ransomware
ciber
2022-06-27
https://thehackernews.com/2022/06/cybersecurity-experts-warn-of-emerging.html
The Black Basta ransomware-as-a-service (RaaS) syndicate has amassed nearly 50 victims in the U.S., Canada, the U.K., Australia, and New Zealand within two months of its emergence in the wild, making it a prominent threat in a short window.
"Black Basta has been observed targeting a range of industries, including manufacturing, construction, transportation, telcos, pharmaceuticals, cosmetics,
"
Autosummary:
The top five sectors historically targeted by Conti have been manufacturing (14%), real estate (11.1%), logistics (8.2%), professional services (7.1%), and trade (5.5%), with the operators specifically singling out companies in the U.S. (58.4%), Canada (7%), the U.K. (6.6%), Germany (5.8%), France (3.9%), and Italy (3.1%).
"
Vice Society claims ransomware attack on Med. University of Innsbruck
exploits
ransomware
2022-06-27
https://www.bleepingcomputer.com/news/security/vice-society-claims-ransomware-attack-on-med-university-of-innsbruck/
The Vice Society ransomware gang has claimed responsibility for last week"s cyberattack against the Medical University of Innsbruck, which caused severe IT service disruption and the alleged theft of data. [...]
"
Autosummary:
If a ransomware attack is indeed the reason behind last week"s disruption, the fact that the hackers posted all data and not just a sample, a full week after the attack occurred, could mean that the negotiations for a ransom payment have reached a dead end, or never took place.
"
China-linked APT Bronze Starlight deploys ransomware as a smokescreen
exploits
ransomware
2022-06-26
https://securityaffairs.co/wordpress/132624/apt/bronze-starlight-deploy-ransomware.html
China-linked APT Bronze Starlight is deploying post-intrusion ransomware families as a diversionary action to its cyber espionage operations. Researchers from Secureworks reported that a China-linked APT group, tracked as Bronze Starlight (APT10), is deploying post-intrusion ransomware families to cover up the cyber espionage operations. The experts observed an activity cluster involving post-intrusion ransomware such as […]
The post China-linked APT Bronze Starlight deploys ransomware as a smokescreen appeared first on Security Affairs.
"
Autosummary:
The experts observed an activity cluster involving post-intrusion ransomware such as LockFile, Atom Silo, Rook, Night Sky, Pandora, and LockBit 2.0.
"
Fake copyright infringement emails install LockBit ransomware
exploits
ransomware
2022-06-26
https://www.bleepingcomputer.com/news/security/fake-copyright-infringement-emails-install-lockbit-ransomware/
LockBit ransomware affiliates are using an interesting trick to get people into infecting their devices by disguising their malware as copyright claims. [...]
"
Autosummary:
Victims listed by each ransomware operation in May 2022 (NCC Group)
The notorious ransomware operation recorded a whopping 95 victims in May alone, whereas Conti, BlackBasta, Hive, and BlackCat collectively had 65.
"
Despite known security issues, VPN usage continues to thrive
ransomware
2022-06-24
https://www.helpnetsecurity.com/2022/06/24/vpn-usage-continues-to-thrive/
VPN usage is still prevalent among 90% of security teams who have highlighted cost, time, and difficulty as reasons to not move forward with ZTNA adoption, according to a new survey conducted by Sapio Research. Furthermore, 97% say that adopting a zero trust model is a priority, with 93% of organizations having committed a budget to enhance their VPN or move toward ZTNA within the next year or two. The last two years have shifted … More →
The post Despite known security issues, VPN usage continues to thrive appeared first on Help Net Security.
"
Autosummary:
Key drivers for ZTNA
A majority of the respondents (97%) stated that adopting a zero trust model is a priority for their organization, where 44% said they have plans to roll out zero trust but are in the early stages, while 53% said they have already begun to roll out zero trust solutions.
"
State-Backed Hackers Using Ransomware as a Decoy for Cyber Espionage Attacks
exploits
government
ransomware
2022-06-24
https://thehackernews.com/2022/06/state-backed-hackers-using-ransomware.html
A China-based advanced persistent threat (APT) group is possibly deploying short-lived ransomware families as a decoy to cover up the true operational and tactical objectives behind its campaigns.
The activity cluster, attributed to a hacking group dubbed Bronze Starlight by Secureworks, involves the deployment of post-intrusion ransomware such as LockFile, Atom Silo, Rook, Night Sky, Pandora,
"
Autosummary:
In less than a year, the group is said to have cycled through as many as six different ransomware strains such as LockFile (August 2021), Atom Silo (October), Rook (November), Night Sky (December), Pandora (February 2022), and most recently LockBit 2.0 (April).
"
Conti ransomware finally shuts down data leak, negotiation sites
exploits
ransomware
2022-06-24
https://www.bleepingcomputer.com/news/security/conti-ransomware-finally-shuts-down-data-leak-negotiation-sites/
The Conti ransomware operation has finally shut down its last public-facing infrastructure, consisting of two Tor servers used to leak data and negotiate with victims, closing the final chapter of the notorious cybercrime brand. [...]
"
Autosummary:
To make matters worse for the gang, other security researchers, and some suspect Ukrainian law enforcement, began doxing Conti/TrickBot members on Twitter and conversations, addresses, social media accounts, and more.
"
Hackers Exploit Mitel VoIP Zero-Day in Likely Ransomware Attack
exploits
ransomware
2022-06-24
https://thehackernews.com/2022/06/hackers-exploit-mitel-voip-zero-day-bug.html
A suspected ransomware intrusion against an unnamed target leveraged a Mitel VoIP appliance as an entry point to achieve remote code execution and gain initial access to the environment.
The findings come from cybersecurity firm CrowdStrike, which traced the source of the attack to a Linux-based Mitel VoIP device sitting on the network perimeter, while also identifying a previously unknown
"
Autosummary:
"
Threat actors continue to exploit Log4Shell in VMware Horizon Systems
exploits
ransomware
2022-06-24
https://securityaffairs.co/wordpress/132569/security/log4shell-ongoing-exploitation.html
The U.S. CISA and the Coast Guard Cyber Command (CGCYBER) warn of attacks exploiting the Log4Shell flaw in VMware Horizon servers. The U.S. Cybersecurity and Infrastructure Security Agency (CISA), along with the Coast Guard Cyber Command (CGCYBER), published a joint advisory to warn of hacking attempts exploiting the Log4Shell flaw in VMware Horizon servers to […]
The post Threat actors continue to exploit Log4Shell in VMware Horizon Systems appeared first on Security Affairs.
"
Autosummary:
“CISA and the United States Coast Guard Cyber Command (CGCYBER) have released a joint Cybersecurity Advisory (CSA) to warn network defenders that cyber threat actors, including state-sponsored advanced persistent threat (APT) actors, have continued to exploit CVE-2021-44228 (Log4Shell) in VMware Horizon® and Unified Access Gateway (UAG) servers to obtain initial access to organizations that did not apply available patches.” reads the advisory.
"
Mitel zero-day used by hackers in suspected ransomware attack
exploits
ransomware
2022-06-24
https://www.bleepingcomputer.com/news/security/mitel-zero-day-used-by-hackers-in-suspected-ransomware-attack/
Hackers used a zero-day exploit on Linux-based Mitel MiVoice VOIP appliances for initial access in what is believed to be the beginning of a ransomware attack. [...]
"
Autosummary:
A Mitel zero-day RCE vulnerability
The vulnerability lies in the Mitel Service Appliance component of MiVoice Connect, used in SA 100, SA 400, and Virtual SA, allowing an attacker to perform remote code execution (RCE) in the context of the Service Appliance.
"
The Week in Ransomware - June 24th 2022 - Splinter Cells
exploits
ransomware
2022-06-24
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-june-24th-2022-splinter-cells/
The Conti ransomware gang has finally ended their charade and turned off their Tor data leak and negotiation sites, effectively shutting down the operation. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include: @serghei, @jorntvdw, @struppigel, @Seifreed, @PolarToffee, @malwareforme, @VK_Intel, @BleepinComputer, @malwrhunterteam, @Ionut_Ilascu, @LawrenceAbrams, @DanielGallagher, @fwosar, @FourOctets, @billtoulas, @demonslay335, @CrowdStrike, @felipepayao, @y_advintel, @AdvIntel, @Secureworks, @GroupIB, @GossiTheDog, @juanbrodersen, @PogoWasRight, @pcrisk, @BrettCallow, and @Amigo_A_.
"
Conti ransomware hacking spree breaches over 40 orgs in a month
exploits
ransomware
2022-06-23
https://www.bleepingcomputer.com/news/security/conti-ransomware-hacking-spree-breaches-over-40-orgs-in-a-month/
The Conti cybercrime syndicate runs one of the most aggressive ransomware operations and has grown highly organized, to the point that affiliates were able to hack more than 40 companies in a little over a month. [...]
"
Autosummary:
“Conti’s increased activity and the data leak suggest that ransomware is no longer a game between average malware developers, but an illicit RaaS industry that gives jobs to thousands of cybercriminals worldwide with various specializations” - Ivan Pisarev, Head of Dynamic Malware Analysis Team at Group-IB’s Threat Intelligence team
At the top of the ransomware game
Conti is currently one of the top three ransomware gangs in terms of attack frequency, falling second after LockBit this year, as per data collected from the first quarter of 2022.
"
Automotive hose manufacturer hit by ransomware, shuts down production control system
exploits
ransomware
2022-06-23
https://www.helpnetsecurity.com/2022/06/23/nichirin-ransomware/
A US subsidiary of Nichirin Co., a Japan-based company manufacturing and selling automotive hoses and hose parts, has been hit with ransomware, which resulted in the shut down of the subsidiary’s network and production control system. What happened? According to a press release published by Nichirin Co. on Wednesday, the affected subsidiary is Texas-based NICHIRIN-FLEX U.S.A., which experienced “unauthorized access from the outside” on June 14, 2022, and resulted in their server(s?) getting infected with … More →
The post Automotive hose manufacturer hit by ransomware, shuts down production control system appeared first on Help Net Security.
"
Autosummary:
According to a press release published by Nichirin Co. on Wednesday, the affected subsidiary is Texas-based NICHIRIN-FLEX U.S.A., which experienced “unauthorized access from the outside” on June 14, 2022, and resulted in their server(s?) getting infected with ransomware.
"
Automotive hose maker Nichirin hit by ransomware attack
exploits
ransomware
2022-06-23
https://www.bleepingcomputer.com/news/security/automotive-hose-maker-nichirin-hit-by-ransomware-attack/
Nichirin-Flex U.S.A, a subsidiary of the Japanese car and motorcycle hose maker Nichirin, has been hit by a ransomware attack causing the company to take the network offline. [...]
"
Autosummary:
"
Chinese hackers use ransomware as decoy for cyber espionage
exploits
ransomware
2022-06-23
https://www.bleepingcomputer.com/news/security/chinese-hackers-use-ransomware-as-decoy-for-cyber-espionage/
Two Chinese hacking groups conducting cyber espionage and stealing intellectual property from Japanese and western companies are deploying ransomware as a decoy to cover up their malicious activities. [...]
"
Autosummary:
C2 domain configured in the observed beacons (Secureworks)
The activity and victimology of LockFile, AtomSilo, Rook, Night Sky, and Pandora are unsual compared to financially motivated ransomware operations, targeting a small number of victims over a brief period and then abandon the project altogether.
"
Conti ransomware group’s pulse stops, but did it fake its own death?
exploits
ransomware
2022-06-23
https://blog.malwarebytes.com/ransomware/2022/06/conti-ransomware-disappears-did-it-fake-its-own-death/
The leak site essential to the operation of Conti ransomware has disappeared, but everything may not be as it appears.
The post Conti ransomware group’s pulse stops, but did it fake its own death? appeared first on Malwarebytes Labs.
"
Autosummary:
However, while anything that stops Conti from terrorising businesses, schools, and hospitals is welcome, the disappearance of its leak site is unlikely to make potential ransomware victims any safer, sadly.As our May ransomware report revealed, despite the noise it generated from its attacks on Costa Rica, Conti’s activity was significantly depressed in May, while the activity of gangs with alleged links to Conti increased, driven largely by the rise of BlackBasta.
"
AA22-174A: Malicious Cyber Actors Continue to Exploit Log4Shell in VMware Horizon Systems
exploits
ransomware
2022-06-23
https://us-cert.cisa.gov/ncas/alerts/aa22-174a
Original release date: June 23, 2022
Summary
Actions to take today:
• Install fixed builds, updating all affected VMware Horizon and UAG systems to the latest versions. If updates or workarounds were not promptly applied following VMware’s release of updates for Log4Shell in December 2021, treat all affected VMware systems as compromised.
• Minimize the internet-facing attack surface by hosting essential services on a segregated demilitarized (DMZ) zone, ensuring strict network perimeter access controls, and implementing regularly updated web application firewalls (WAFs) in front of public-facing services
The Cybersecurity and Infrastructure Security Agency (CISA) and United States Coast Guard Cyber Command (CGCYBER) are releasing this joint Cybersecurity Advisory (CSA) to warn network defenders that cyber threat actors, including state-sponsored advanced persistent threat (APT) actors, have continued to exploit CVE-2021-44228 (Log4Shell) in VMware Horizon® and Unified Access Gateway (UAG) servers to obtain initial access to organizations that did not apply available patches or workarounds.
Since December 2021, multiple threat actor groups have exploited Log4Shell on unpatched, public-facing VMware Horizon and UAG servers. As part of this exploitation, suspected APT actors implanted loader malware on compromised systems with embedded executables enabling remote command and control (C2). In one confirmed compromise, these APT actors were able to move laterally inside the network, gain access to a disaster recovery network, and collect and exfiltrate sensitive data.
This CSA provides the suspected APT actors’ tactics, techniques, and procedures (TTPs), information on the loader malware, and indicators of compromise (IOCs). The information is derived from two related incident response engagements and malware analysis of samples discovered on the victims’ networks.
CI
"
Autosummary:
The Cybersecurity and Infrastructure Security Agency (CISA) and United States Coast Guard Cyber Command (CGCYBER) are releasing this joint Cybersecurity Advisory (CSA) to warn network defenders that cyber threat actors, including state-sponsored advanced persistent threat (APT) actors, have continued to exploit CVE-2021-44228 (Log4Shell) in VMware Horizon® and Unified Access Gateway (UAG) servers to obtain initial access to organizations that did not apply available patches or workarounds.
This CSA provides the suspected APT actors’ tactics, techniques, and procedures (TTPs), information on the loader malware, and indicators of compromise (IOCs).
Log4Shell is a remote code execution vulnerability affecting the Apache® Log4j library and a variety of products using Log4j, such as consumer and enterprise services, websites, applications, and other products, including certain versions of VMware Horizon and UAG.Minimize the internet-facing attack surface by hosting essential services on a segregated demilitarized (DMZ) zone, ensuring strict network perimeter access controls, and implementing regularly updated web application firewalls (WAFs) in front of public-facing services
Note: this advisory uses the MITRE ATT&CK for Enterprise framework, version 11.[T1021.001] to multiple other hosts in the production environment, including a security management server, a certificate server, a database containing sensitive law enforcement data, and a mail relay server.
Note: the second threat actor group had access to the organization"s test and production environments, and on or around April 13, 2022, leveraged CVE-2022-22954 to implant the Dingo J-spy webshell.
VMware made fixes available in December 2021 and confirmed exploitation in the wild on December 10, 2021.[1] Since December 2021, multiple cyber threat actor groups have exploited [T1190] Log4Shell on unpatched, public-facing VMware Horizon and UAG servers to obtain initial accessWhen executed, two randomly named *.tmp files are written to the disk at the location C:\Users\<USER>\AppData\Local\Temp\ and the embedded executable attempts to connect to hard-coded C2 server 192.95.20[.]8 over port 4443 , a non-standard port [TT571].
"
Cato Networks detects and interrupts ransomware with network-based ransomware protection
exploits
ransomware
2022-06-22
https://www.helpnetsecurity.com/2022/06/22/cato-sase-cloud/
Cato Networks introduced network-based ransomware protection for the Cato SASE Cloud. Using heuristic algorithms and deep network insight, Cato detects and prevents the spread of ransomware across the enterprise without having to deploy endpoint agents. Infected machines are identified and immediately isolated for remediation. “Ransomware protection has become job one for every CISO and CIO, but too often enterprise defense strategies remain vulnerable whether by threat actors bypassing endpoint defenses or by manipulating insiders to … More →
The post Cato Networks detects and interrupts ransomware with network-based ransomware protection appeared first on Help Net Security.
"
Autosummary:
"
Mitigate Ransomware in a Remote-First World
exploits
ransomware
2022-06-21
https://thehackernews.com/2022/06/mitigate-ransomware-in-remote-first.html
Ransomware has been a thorn in the side of cybersecurity teams for years. With the move to remote and hybrid work, this insidious threat has become even more of a challenge for organizations everywhere.
2021 was a case study in ransomware due to the wide variety of attacks, significant financial and economic impact, and diverse ways that organizations responded. These attacks should be seen as a
"
Autosummary:
If anything, these threat actors have made their operations an enterprise, creating scalable, repeatable, and profitable campaigns.Hybrid work has forced organizations to introduce a bring-your-own-device (BYOD) model, which means unmanaged personal devices have access to sensitive data.Because smartphones and tablets are used for both work and personal reasons, employees can be targeted through multiple apps such as SMS, social media platforms, and third party messaging apps.
"
Office 365 Config Loophole Opens OneDrive, SharePoint Data to Ransomware Attack
exploits
ransomware
2022-06-21
https://threatpost.com/office-365-opens-ransomware-attacks-on-onedrive-sharepoint/180010/
A reported a "potentially dangerous piece of functionality" allows an attacker to launch an attack on cloud infrastructure and ransom files stored in SharePoint and OneDrive.
"
Autosummary:
“In some cases, the attacker may exfiltrate the unencrypted files as part of a double extortion tactic, ” said researchers
Microsoft Responds
When asked, Microsoft commented “the configuration functionality for versioning settings within lists is working as intended,” according to Proofpoint.
Those files, stored via “auto-save” and backed-up in the cloud, typically leave end users with the impression data is shielded from a ransomware attack.
"
QNAP NAS devices hit by DeadBolt and ech0raix ransomware
exploits
ransomware
2022-06-20
https://www.helpnetsecurity.com/2022/06/20/qnap-nas-deadbolt-ech0raix/
Taiwan-based QNAP Systems is warning consumers and organizations using their network-attached storage (NAS) appliances of a new DeadBolt ransomware campaign. There also appears to be a new ech0raix/QNAPCrypt campaign in progress, according to various sources, though QNAP is yet to comment on that. NAS devices are ideal targets NAS devices are mostly used by consumers and small-to-medium businesses to store, manage and share files and backups. This makes them a tempting target for criminals wielding … More →
The post QNAP NAS devices hit by DeadBolt and ech0raix ransomware appeared first on Help Net Security.
"
Autosummary:
Attackers generally focus on hitting QNAP and Synology NAS devices, but those by other manufacturers (Western Digital, Seagate, Zyxel, etc.) are also occasionally targeted.
"
Do You Have Ransomware Insurance? Look at the Fine Print
exploits
ransomware
2022-06-20
https://thehackernews.com/2022/06/do-you-have-ransomware-insurance-look.html
Insurance exists to protect the insured party against catastrophe, but the insurer needs protection so that its policies are not abused – and that"s where the fine print comes in. However, in the case of ransomware insurance, the fine print is becoming contentious and arguably undermining the usefulness of ransomware insurance.
In this article, we"ll outline why, particularly given the current
"
Autosummary:
The claim ended up on court a short while later, but it took over three years for the court to come to a decision – ruling in Merck"s favor on this occasion, stating that Ace American, like many other insurers, has not sufficiently changed the wording in its policy exclusions to ensure that the insured – Merck – fully understood that a cyberattack launched in the context of an act of war would mean that the policy coverage is not valid.
However, when the company tried to claim on its USD 1.75bn "all-risk" insurance policy, Ace American initially refused to pay the claim, arguing that it was subject to an "Acts of War" exclusion clause.
When an organization suffers from a ransomware attack, how does the insurer – or the claimant – prove that a specific organization was behind an attack, and by consequence, what the motivation for the attack was – e.g. war?
In this article, we"ll outline why, particularly given the current climate, war exclusion clauses are increasingly rendering ransomware insurance of reduced value – and why your organization should focus on protecting itself instead.
"
Experts warn of a new eCh0raix ransomware campaign targeting QNAP NAS
exploits
ransomware
2022-06-19
https://securityaffairs.co/wordpress/132410/cyber-crime/ech0raix-ransomware-attacks.html
Experts warn of a new ech0raix ransomware campaign targeting QNAP Network Attached Storage (NAS) devices. Bleeping Computer and MalwareHunterTeam researchers, citing user reports and sample submissions on the ID Ransomware platform, warn of a new wave of ech0raix ransomware attacks targeting QNAP Network Attached Storage (NAS) devices. The ransomware, tracked by Intezer as “QNAPCrypt” and “eCh0raix” by Anomali, is […]
The post Experts warn of a new eCh0raix ransomware campaign targeting QNAP NAS appeared first on Security Affairs.
"
Autosummary:
Please vote for Security Affairs and Pierluigi Paganini in every category that includes them (e.g. sections “The Underdogs – Best Personal (non-commercial) Security Blog” and “The Tech Whizz – Best Technical Blog”)
To nominate, please visit:
https://docs.google.com/forms/d/e/1FAIpQLSdNDzjvToMSq36YkIHQWwhma90SR0E9rLndflZ3Cu_gVI2Axw/viewform
Follow me on Twitter: @securityaffairs and Facebook
Pierluigi Paganini
(SecurityAffairs – hacking, QNAP)
"
Atlassian Confluence Flaw Being Used to Deploy Ransomware and Crypto Miners
exploits
ransomware
2022-06-18
https://thehackernews.com/2022/06/atlassian-confluence-flaw-being-used-to.html
A recently patched critical security flaw in Atlassian Confluence Server and Data Center products is being actively weaponized in real-world attacks to drop cryptocurrency miners and ransomware payloads.
In at least two of the Windows-related incidents observed by cybersecurity vendor Sophos, adversaries exploited the vulnerability to deliver Cerber ransomware and a crypto miner called z0miner
"
Autosummary:
"
QNAP NAS devices targeted by surge of eCh0raix ransomware attacks
exploits
ransomware
2022-06-18
https://www.bleepingcomputer.com/news/security/qnap-nas-devices-targeted-by-surge-of-ech0raix-ransomware-attacks/
This week a new series of ech0raix ransomware has started targeting vulnerable QNAP Network Attached Storage (NAS) devices according to user reports and sample submissions on the ID-Ransomware platform. [...]
"
Autosummary:
"
Cyber criminals continue to target and exploit people
exploits
ransomware
2022-06-17
https://www.helpnetsecurity.com/2022/06/17/user-risk/
Proofpoint unveiled its annual Human Factor report, which provides a comprehensive examination of the three main facets of user risk — vulnerability, attacks, and privilege — and how threat actors continue their ceaseless creativity as they exploit the many opportunities presented by people. The report dives deep into user risk, drawing on data and insight from a year’s worth of research, covering threats detected, mitigated, and resolved across one of the largest datasets in cybersecurity. … More →
The post Cyber criminals continue to target and exploit people appeared first on Help Net Security.
"
Autosummary:
The report dives deep into user risk, drawing on data and insight from a year’s worth of research, covering threats detected, mitigated, and resolved across one of the largest datasets in cybersecurity.
"
QNAP "thoroughly investigating" new DeadBolt ransomware attacks
exploits
ransomware
2022-06-17
https://www.bleepingcomputer.com/news/security/qnap-thoroughly-investigating-new-deadbolt-ransomware-attacks/
Network-attached storage (NAS) vendor QNAP once again warned customers on Friday to secure their devices against a new campaign of attacks pushing DeadBolt ransomware. [...]
"
Autosummary:
DeadBolt ransomware
As seen during previous attacks targeting QNAP NAS devices in late January and hitting thousands of victims, DeadBolt ransomware hijacks the device"s login page to display a screen stating, "WARNING:
"
QNAP warns of new DeadBolt ransomware attack locking up NAS devices
exploits
ransomware
2022-06-17
https://www.bitdefender.com/blog/hotforsecurity/qnap-warns-of-new-deadbolt-ransomware-attack-locking-up-nas-devices/
Owners of NAS drives manufactured by QNAP have been advised that the company is "thoroughly investigating" reports that a new variant of the DeadBolt ransomware is targeting devices, locking up data and demanding victims pay a fee to extortionists.
Read more in my article on the Hot for Security blog.
"
Autosummary:
"
Which stolen data are ransomware gangs most likely to disclose?
exploits
ransomware
2022-06-17
https://www.helpnetsecurity.com/2022/06/17/ransomware-data-disclosed/
If your organization gets hit by a ransomware gang that has also managed to steal company data before hitting the “encrypt” button, which types of data are more likely to end up being disclosed as you debate internally on whether you should pay the ransomware gang off? Rapid7 analysts analyzed 161 data disclosures performed by ransomware gangs using the double extortion approach between April 2020 and February 2022, and found that: The most commonly leaked … More →
The post Which stolen data are ransomware gangs most likely to disclose? appeared first on Help Net Security.
"
Autosummary:
Files containing intellectual property (e.g., trade secrets, research data, etc.) are rarely disclosed (12%) by ransomware gangs, but if the organization is part of the pharmaceutical industry, the risk of IP data being disclosed is considerably higher (43%), “likely due to the high value placed on research and development within this industry.”
"
The Week in Ransomware - June 17th 2022 - Have I Been Ransomed?
exploits
ransomware
2022-06-17
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-june-17th-2022-have-i-been-ransomed/
Ransomware operations are constantly evolving their tactics to pressure victims to pay. For example, this week, we saw a new extortion tactic come into play with the creation of dedicated websites to extort victims with searchable data. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include: @serghei, @jorntvdw, @malwareforme, @VK_Intel, @struppigel, @DanielGallagher, @PolarToffee, @LawrenceAbrams, @Ionut_Ilascu, @fwosar, @billtoulas, @BleepinComputer, @Seifreed, @malwrhunterteam, @FourOctets, @demonslay335, @pcrisk, @proofpoint, @PogoWasRight, @BrettCallow, @Unit42_Intel, and @Amigo_A_.
"
Microsoft Office 365 feature can help cloud ransomware attacks
exploits
ransomware
2022-06-16
https://www.bleepingcomputer.com/news/security/microsoft-office-365-feature-can-help-cloud-ransomware-attacks/
Security researchers are warning that threat actors could hijack Office 365 accounts to encrypt for a ransom the files stored in SharePoint and OneDrive services that companies use for cloud-based collaboration, document management and storage. [...]
"
Autosummary:
Versioning setting on document lists (Microsoft)
With a file version limit set to “1,” when the attacker encrypts or edits the file twice, the original document will no longer be available through OneDrive and cannot be restored.
"
Malicious apps continue to spread through the Google Play Store
ransomware
2022-06-16
https://securityaffairs.co/wordpress/132305/malware/malware-google-play-store.html
Researchers at antivirus firm Dr. Web discovered malware in the Google Play Store that was downloaded two million times. An investigation conducted by the antivirus firm Dr. Web in May resulted in the discovery of multiple adware and information-stealing malware on the official Google Play Store. However, the experts warn that info-stealing Trojans are the […]
The post Malicious apps continue to spread through the Google Play Store appeared first on Security Affairs.
"
Autosummary:
Please vote for Security Affairs and Pierluigi Paganini in every category that includes them (e.g. sections “The Underdogs – Best Personal (non-commercial) Security Blog” and “The Tech Whizz – Best Technical Blog”)
To nominate, please visit:
https://docs.google.com/forms/d/e/1FAIpQLSdNDzjvToMSq36YkIHQWwhma90SR0E9rLndflZ3Cu_gVI2Axw/viewform
Follow me on Twitter: @securityaffairs and Facebook
Pierluigi Paganini
(SecurityAffairs – hacking, malware)
"
BlackCat Ransomware Gang Targeting Unpatched Microsoft Exchange Servers
exploits
ransomware
2022-06-16
https://thehackernews.com/2022/06/blackcat-ransomware-gang-targeting.html
Microsoft is warning that the BlackCat ransomware crew is leveraging exploits for unpatched Exchange server vulnerabilities to gain access to targeted networks.
Upon gaining an entry point, the attackers swiftly moved to gather information about the compromised machines, followed by carrying out credential theft and lateral movement activities, before harvesting intellectual property and
"
Autosummary:
"
A Microsoft Office 365 Feature Could Help Ransomware Hackers Hold Cloud Files Hostage
exploits
ransomware
2022-06-16
https://thehackernews.com/2022/06/a-microsoft-office-365-feature-could.html
A "dangerous piece of functionality" has been discovered in Microsoft 365 suite that could be potentially abused by a malicious actor to ransom files stored on SharePoint and OneDrive and launch attacks on cloud infrastructure.
The cloud ransomware attack makes it possible to launch file-encrypting malware to "encrypt files stored on SharePoint and OneDrive in a way that makes them unrecoverable
"
Autosummary:
To mitigate such attacks, it"s recommended to enforce a strong password policy, mandate multi-factor authentication (MFA), prevent large-scale data downloads to unmanaged devices, and maintain periodic external backups of cloud files with sensitive data.
"
BlackCat Ransomware affiliates target unpatched Microsoft Exchange servers
exploits
ransomware
2022-06-16
https://securityaffairs.co/wordpress/132343/hacking/blackcat-ransomware-targets-unpatched-microsoft-exchange.html
The BlackCat ransomware gang is targeting unpatched Exchange servers to compromise target networks, Microsoft warns. Microsoft researchers have observed BlackCat ransomware gang targeting unpatched Exchange servers to compromise organizations worldwide. The compromise of Exchange servers allows threat actors to access the target networks, perform internal reconnaissance and lateral movement activities, and steal sensitive documents before encrypting them. “For example, […]
The post BlackCat Ransomware affiliates target unpatched Microsoft Exchange servers appeared first on Security Affairs.
"
Autosummary:
In addition, at least two known affiliates are now adopting BlackCat: DEV-0237 (known for previously deploying Ryuk, Conti, and Hive) and DEV-0504 (previously deployed Ryuk, REvil, BlackMatter, and Conti).”
“For discovered devices, the attackers attempted to navigate to various network shares and used the Remote Desktop client (mstsc.exe) to sign into these devices, once again using the compromised account credentials.” continues the analysis.
"
Why do organizations need to prioritize ransomware preparedness?
exploits
ransomware
2022-06-14
https://www.helpnetsecurity.com/2022/06/14/reported-ransomware-attack/
Hitachi Vantara and Enterprise Strategy Group (ESG) announced the findings of a survey of more than 600 IT and cybersecurity professionals, which revealed that 79% respondents reported a ransomware attack at their company within the last year. More troubling for organizations is the degree with which these attacks are successful. The survey found that 73% report that they have been financially or operationally impacted by these attacks. As noted in the report, “Every lost bit … More →
The post Why do organizations need to prioritize ransomware preparedness? appeared first on Help Net Security.
"
Autosummary:
"
Once is never enough: The need for continuous penetration testing
ransomware
2022-06-14
https://www.helpnetsecurity.com/2022/06/14/need-for-continuous-penetration-testing/
If you Google “How often should I do penetration testing?”, the first answer that pops up is “once a year.” Indeed, even industry-leading standards like PCI-DSS dictate that external penetration testing be conducted annually (or after significant changes to infrastructure or applications), while internal penetration testing takes place annually, with segmentation testing occurring every six months. Yet today’s cybercriminals don’t work on annual schedules. They don’t wait until pen testing time rolls around and the … More →
The post Once is never enough: The need for continuous penetration testing appeared first on Help Net Security.
"
Autosummary:
Indeed, even industry-leading standards like PCI-DSS dictate that external penetration testing be conducted annually (or after significant changes to infrastructure or applications), while internal penetration testing takes place annually, with segmentation testing occurring every six months.When a new API is connected, a new server added, or a new version released – that snapshot is no longer valid, even if the next round of pen testing is a year away.
"
Hello XD Ransomware Installing Backdoor on Targeted Windows and Linux Systems
exploits
ransomware
2022-06-13
https://thehackernews.com/2022/06/hello-xd-ransomware-installing-backdoor.html
Windows and Linux systems are being targeted by a ransomware variant called HelloXD, with the infections also involving the deployment of a backdoor to facilitate persistent remote access to infected hosts.
"Unlike other ransomware groups, this ransomware family doesn"t have an active leak site; instead it prefers to direct the impacted victim to negotiations through Tox chat and onion-based
"
Autosummary:
"
Unit 42 said it linked the likely Russian developer behind HelloXD — who goes by the online aliases x4k, L4ckyguy, unKn0wn, unk0w, _unkn0wn, and x4kme — to further malicious activities such as selling proof-of-concept (PoC) exploits and custom Kali Linux distributions by piecing together the actor"s digital trail.
"
HelloXD Ransomware operators install MicroBackdoor on target systems
exploits
ransomware
2022-06-13
https://securityaffairs.co/wordpress/132207/malware/helloxd-ransomware-installs-microbackdoor.html
Experts observed the HelloXD ransomware deploying a backdoor to facilitate persistent remote access to infected hosts. The HelloXD ransomware first appeared in the threat landscape on November 30, 2021, it borrows the code from Babuk ransomware, which is available in Russian-speaking hacking forums since September 2021. Unlike other ransomware operations, this ransomware gang doesn’t use a […]
The post HelloXD Ransomware operators install MicroBackdoor on target systems appeared first on Security Affairs.
"
Autosummary:
The analysis of the MicroBackdoor sample revealed an embedded IP address in the configuration, the IP belongs to a threat actor that is likely the developer: x4k (aka L4ckyguy, unKn0wn, unk0w, _unkn0wn, and x4kme).
"
Microsoft: Exchange servers hacked to deploy BlackCat ransomware
exploits
ransomware
2022-06-13
https://www.bleepingcomputer.com/news/security/microsoft-exchange-servers-hacked-to-deploy-blackcat-ransomware/
Microsoft says BlackCat ransomware affiliates are now attacking Microsoft Exchange servers using exploits targeting unpatched vulnerabilities. [...]
"
Autosummary:
Two weeks after the initial compromise using an unpatched Exchange server as an entry vector, the threat actor deployed BlackCat ransomware payloads across the network via PsExec.
"While the common entry vectors for these threat actors include remote desktop applications and compromised credentials, we also saw a threat actor leverage Exchange server vulnerabilities to gain target network access," the Microsoft 365 Defender Threat Intelligence Team said.
"
Hello XD ransomware now drops a backdoor while encrypting
exploits
ransomware
2022-06-12
https://www.bleepingcomputer.com/news/security/hello-xd-ransomware-now-drops-a-backdoor-while-encrypting/
Cybersecurity researchers report increased activity of the Hello XD ransomware, whose operators are now deploying an upgraded sample featuring stronger encryption. [...]
"
Autosummary:
Samples of X4KME online presence (Unit 42)
Additionally, the same hacker has posted on forums to offer proof-of-concept (PoC) exploits, crypter services, custom Kali Linux distributions, and malware-hosting and distribution services.
"
Confluence servers hacked to deploy AvosLocker, Cerber2021 ransomware
exploits
ransomware
2022-06-11
https://www.bleepingcomputer.com/news/security/confluence-servers-hacked-to-deploy-avoslocker-cerber2021-ransomware/
Ransomware gangs are now targeting a recently patched and actively exploited remote code execution (RCE) vulnerability affecting Atlassian Confluence Server and Data Center instances for initial access to corporate networks. [...]
"
Autosummary:
Widely exploited in the wild
Since cybersecurity firm Volexity disclosed CVE-2022-26134 as an actively exploited zero-day bug last week, CISA has also ordered federal agencies to mitigate the flaw by blocking all internet traffic to Confluence servers on their networks.
"
Vice Society ransomware gang adds the Italian City of Palermo to its data leak site
exploits
government
ransomware
2022-06-10
https://securityaffairs.co/wordpress/132122/cyber-crime/city-of-palermo-vice-society-ransomware.html
The Vice Society group has claimed responsibility for the ransomware attack that hit the Italian city of Palermo forcing the IT admins to shut down its infrastructure. The Vice Society ransomware group has claimed responsibility for the recent cyber attack that hit the city of Palermo in the South of Italy. In response to the […]
The post Vice Society ransomware gang adds the Italian City of Palermo to its data leak site appeared first on Security Affairs.
"
Autosummary:
Sispi (Palermo Innovazione System), which is the municipal company that is responsible for the technical management of the municipal IT and telematic system of the Municipality of Palermo, confirmed the ransomware attack a few days later, but at this time it doesn’t confirm the data breach.
"
Experts spotted a new variant of the Cuba Ransomware with optimized infection techniques
exploits
ransomware
2022-06-10
https://securityaffairs.co/wordpress/132134/malware/cuba-ransomware-new-variant.html
The Cuba ransomware operators are back and employed a new version of its malware in recent attacks. Cuba ransomware has been active since at least January 2020. Its operators have a data leak site, where they post exfiltrated data from their victims who refused to pay the ransom. The ransomware encrypts files on the targeted systems […]
The post Experts spotted a new variant of the Cuba Ransomware with optimized infection techniques appeared first on Security Affairs.
"
Autosummary:
Linkedin
Share this: Email
Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
The Week in Ransomware - June 10th 2022 - Targeting Linux
exploits
ransomware
2022-06-10
https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-june-10th-2022-targeting-linux/
It has been relatively quiet this week with many companies and researchers at the RSA conference. However, we still had some interesting ransomware reports released this week. [...]
"
Autosummary:
Contributors and those who provided new ransomware information and stories this week include: @billtoulas, @VK_Intel, @demonslay335, @DanielGallagher, @Ionut_Ilascu, @LawrenceAbrams, @fwosar, @malwrhunterteam, @jorntvdw, @malwareforme, @FourOctets, @serghei, @PolarToffee, @Seifreed, @struppigel, @BleepinComputer, @TrendMicro, @uptycs, @NCCGroupInfosec, @Intel_by_KELA, @y_advintel, @Avast, @BrettCallow, @ValeryMarchive, and @pcrisk.
"
BlackBasta is the latest ransomware to target ESXi virtual machines on Linux
exploits
ransomware
2022-06-09
https://blog.malwarebytes.com/ransomware/2022/06/blackbasta-is-the-latest-ransomware-to-target-esxi-virtual-machines-on-linux/
BlackBasta, a newish ransomware group that is somehow linked to Conti, has a new Linux variant of its malware that targets VMware ESXi virtual machines.
The post BlackBasta is the latest ransomware to target ESXi virtual machines on Linux appeared first on Malwarebytes Labs.
"
Autosummary:
(Source: Uptycs)
A section of the ransom note reads:
Your data are stolen and encrypted The data will be published on TOR website if you do not pay the ransom You can contact us and decrypt one file for free on this TOR site (you should download and install TOR browser first https://torproject.org) {URL redacted}
Protect your Linux ESXi VM against ransomware attacks
Vincent Bariteau, Threat Intelligence Support Analyst at Malwarebytes, recommends organizations follow these best practices to protect their Linux servers against ransomware attacks if they’re using ESXi VM:
Harden the SSH (Secure Shell) access to allow only a specific user to use it.
"
Vice Society ransomware claims attack on Italian city of Palermo
exploits
government
ransomware
2022-06-09
https://www.bleepingcomputer.com/news/security/vice-society-ransomware-claims-attack-on-italian-city-of-palermo/
The Vice Society ransomware group has claimed responsibility for the recent cyber attack on the city of Palermo in Italy, which has caused a large-scale service outage. [...]
"
Autosummary:
"
Bizarre ransomware sells decryptor on Roblox Game Pass store
exploits
ransomware
2022-06-09
https://www.bleepingcomputer.com/news/security/bizarre-ransomware-sells-decryptor-on-roblox-game-pass-store/
A new ransomware is taking the unusual approach of selling its decryptor on the Roblox gaming platform using the service"s in-game Robux currency. [...]
"
Autosummary:
Files encrypted by the Chaos ransomware variant
Source: BleepingComputer
What makes the new WannaFriendMe ransomware stand out is that instead of demanding cryptocurrency as a ransom payment, it requires victims to purchase a decryptor from Roblox"s Game Pass store using Robux, as can be read in the ransom note below:
-----
"
Roblox Game Pass store used to sell ransomware decryptor
exploits
ransomware
2022-06-09
https://www.bleepingcomputer.com/news/security/roblox-game-pass-store-used-to-sell-ransomware-decryptor/
A new ransomware is taking the unusual approach of selling its decryptor on the Roblox gaming platform using the service"s in-game Robux currency. [...]
"
Autosummary:
Files encrypted by the Chaos ransomware variant
Source: BleepingComputer
What makes the new WannaFriendMe ransomware stand out is that instead of demanding cryptocurrency as a ransom payment, it requires victims to purchase a decryptor from Roblox"s Game Pass store using Robux, as can be read in the ransom note below:
-----
"
Qbot – known channel for ransomware – delivered via phishing and Follina exploit
financial
exploits
ransomware
2022-06-08
https://www.helpnetsecurity.com/2022/06/08/qbot-follina-exploit/
More than a week has passed since Microsoft acknowledged the existence of the “Follina” vulnerability (CVE-2022-30190), after reports of it being exploited in the wild began to crop up here and there. Since then, other state-backed threat actors have started exploiting it, but now one of the most active Qbot (QakBot) malware affiliates has also been spotted leveraging Follina. Archive contains an IMG with a Word doc, shortcut file, and DLL. The LNK will execute … More →
The post Qbot – known channel for ransomware – delivered via phishing and Follina exploit appeared first on Help Net Security.
"
Autosummary:
Match following filename pattern
[0-9]{8}\_[0-9]{6}.htmlhttps://t.co/xaKa60O3hW pic.twitter.com/L2MQ8vMfyQ — Ankit Anubhav (@ankit_anubhav) June 8, 2022
Follina exploitation leads to Qbot installation
Setting aside for a moment the fact that Qbot is an effective information stealer and backdoor in its own right, this latest development should worry most organizations, as a variety of Ransomware-as-a-Service (RaaS) operators use Qbot to secure a foothold into corporate networks before deploying ransomware.
"
Paying Ransomware Paints Bigger Bullseye on Target’s Back
exploits
ransomware
2022-06-08
https://threatpost.com/paying-ransomware-bullseye-back/179915/
Ransomware attackers often strike targets twice, regardless of whether the ransom was paid.
"
Autosummary:
“The fact that ransomware gangs strike so quickly a second and third time isn’t surprising, because they will try to profit in any possible way,” wrote Bill Keeler, senior director of global public relations at Cybereason, in a written exchange with Threatpost.
"
Black Basta Ransomware Teams Up with Malware Stalwart Qbot
exploits
ransomware
2022-06-08
https://threatpost.com/black-basta-ransomware-qbot/179909/
The novel cybercriminal group tapped the ever-evolving info-stealing trojan to move laterally on a network in a recent attack, researchers have found.
"
Autosummary:
Black Basta, a ransomware group that emerged in April, leveraged Qbot, (a.k.a. Quakbot), to move laterally on a compromised network, researchers from security consulting firm NCC Group wrote in a blog post published this week.
Once it’s deployed, Black Basta ransomware itself, like many ransomware variants, doesn’t encrypt the entire file, researchers found.
"
Black Basta ransomware now supports encrypting VMware ESXi servers
exploits
ransomware
2022-06-08
https://securityaffairs.co/wordpress/132037/hacking/black-basta-ransomware-vmware-esxi.html
Black Basta ransomware gang implemented a new feature to encrypt VMware ESXi virtual machines (VMs) running on Linux servers. The Black Basta ransomware gang now supports encryption of VMware ESXi virtual machines (VMs) running on Linux servers. Researchers from Uptycs first reported the discovery of the new Black Basta ransomware variant that supports encryption of […]
The post Black Basta ransomware now supports encrypting VMware ESXi servers appeared first on Security Affairs.
"
Autosummary:
"
Cuba ransomware returns to extorting victims with updated encryptor
exploits
ransomware
2022-06-08
https://www.bleepingcomputer.com/news/security/cuba-ransomware-returns-to-extorting-victims-with-updated-encryptor/
The Cuba ransomware operation has returned to regular operations with a new version of its malware found used in recent attacks. [...]
"
Autosummary:
While the updates to Cuba ransomware did not change much in terms of overall functionality, we have reason to believe that the updates aim to optimize its execution, minimize unintended system behavior, and provide technical support to the ransomware victims if they choose to negotiate.
"
Linux version of Black Basta ransomware targets VMware ESXi servers
exploits
ransomware
2022-06-07
https://www.bleepingcomputer.com/news/security/linux-version-of-black-basta-ransomware-targets-vmware-esxi-servers/
Black Basta is the latest ransomware gang to add support for encrypting VMware ESXi virtual machines running on enterprise Linux servers. [...]
"
Autosummary:
Emsisoft CTO Fabian Wosar has previously told BleepingComputer that other ransomware gangs (besides the ones we reported on), including Babuk, RansomExx/Defray, Mespinoza, GoGoogle, Snatch, PureLocker, and DarkSide, have also developed and used their own Linux encryptors.
"
Evil Corp Cybercrime Group Shifts to LockBit Ransomware to Evade Sanctions
exploits
ransomware
2022-06-07
https://thehackernews.com/2022/06/evil-corp-cybercrime-group-shifts-to.html
The threat cluster dubbed UNC2165, which shares numerous overlaps with a Russia-based cybercrime group known as Evil Corp, has been linked to multiple LockBit ransomware intrusions in an attempt to get around sanctions imposed by the U.S. Treasury in December 2019.
"These actors have shifted away from using exclusive ransomware variants to LockBit — a well-known ransomware as a service (RaaS) —
"
Autosummary:
Mandiant said it noted further similarities between UNC2165 and an Evil Corp-connected cyber espionage activity tracked by Swiss cybersecurity firm PRODAFT under the name SilverFish aimed at government entities and Fortune 500 companies in the E.U and the U.S.
A successful initial compromise is followed by a string of actions as part of the attack lifecycle, including privilege escalation, internal reconnaissance, lateral movement, and maintaining long-term remote access, before delivering the ransomware payloads.
"
Evil Corp gang starts using LockBit Ransomware to evade sanctions
exploits
ransomware
2022-06-07
https://securityaffairs.co/wordpress/132031/cyber-crime/evil-corp-lockbit-ransomware.html
Mandiant researchers associate multiple LockBit ransomware attacks with the notorious Evil Corp Cybercrime Group. Mandiant researchers have investigated multiple LOCKBIT ransomware attacks that have been attributed to the financially motivated threat actor UNC2165. The researchers also noticed that the group shares numerous overlaps with the cybercrime gang Evil Corp. The UNC2165 group has been active since at […]
The post Evil Corp gang starts using LockBit Ransomware to evade sanctions appeared first on Security Affairs.
"
Autosummary:
Linkedin
Share this: Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
Black Basta ransomware operators leverage QBot for lateral movements
exploits
ransomware
2022-06-07
https://securityaffairs.co/wordpress/132018/hacking/black-basta-ransomware-qbot.html
The QBot malware operation has partnered with Black Basta ransomware group to target organizations worldwide. Researchers from NCC Group spotted a new partnership in the threat landscape between the Black Basta ransomware group and the QBot malware operation. Black Basta has been active since April 2022, like other ransomware operations, it implements a double-extortion attack […]
The post Black Basta ransomware operators leverage QBot for lateral movements appeared first on Security Affairs.
"
Autosummary:
Linkedin
Share this: Twitter
Print
LinkedIn
Facebook
More
Tumblr
Pocket
Share On
"
RSA 2022: Prometheus ransomware’s flaws inspired researchers to try to build a near-universal decryption tool
exploits
ransomware
2022-06-06
https://blog.malwarebytes.com/security-world/2022/06/rsa-2022-prometheus-ransomwares-flaws-inspired-researchers-to-try-to-build-a-near-universal-decryption-tool/
Prometheus ransomware contained a weak random number generator that inspired researchers to try and build a one-size-fits-all decryptor.
The post RSA 2022: Prometheus ransomware’s flaws inspired researchers to try to build a near-universal decryption tool appeared first on Malwarebytes Labs.
"
Autosummary:
Prometheus—a ransomware build based on Thanos that locked up victims’ computers in the summer of 2021—included a major “vulnerability” that led security researchers at IBM to try and build a one-size-fits-all ransomware decryptor that could work against multiple ransomware variants, including Prometheus, AtomSilo, LockFile, Bandana, Chaos, and PartyTicket.
"
Lockbit ransomware gang claims to have hacked cybersecurity giant Mandiant
exploits
ransomware
2022-06-06
https://securityaffairs.co/wordpress/132011/cyber-crime/lockbit-claims-mandiant-hack.html
LockBit ransomware gang claims to have hacked the cybersecurity firm Mandiant, which is investigating the alleged security breach. Today the LockBit ransomware gang has added the cybersecurity firm Mandiant to the list of victims published on its darkweb leak site. Mandiant is investigating the claims of the ransomware gang, the cybercrime group declared to have […]
The post Lockbit ransomware gang claims to have hacked cybersecurity giant Mandiant appeared first on Security Affairs.
"
Autosummary:
"
Conti Leaks Reveal Ransomware Gang"s Interest in Firmware-based Attacks
exploits
ransomware
2022-06-03
https://thehackernews.com/2022/06/conti-leaks-reveal-ransomware-gangs.html
An analysis of leaked chats from the notorious Conti ransomware group earlier this year has revealed that the syndicate has been working on a set of firmware attack techniques that could offer a path to accessing privileged code on compromised devices.
"Control over firmware gives attackers virtually unmatched powers both to directly cause damage and to enable other long-term strategic goals,"
"
Autosummary:
"
Old Hacks Die Hard: Ransomware, Social Engineering Top Verizon DBIR Threats – Again
exploits
ransomware
2022-06-03
https://threatpost.com/old-hacks-die-hard-ransomware-social-engineering-top-verizon-dbir-threats-again/179864/
Deja-Vu data from this year"s DBIR report feels like we are stuck in the movie "Groundhog Day."
"
Autosummary:
According to Verizon, 82% of this year’s data breaches involved the “human element” – “the Use of stolen credentials, Phishing, Misuse, or simply an Error.”
In general, the results of DBIR merely confirm well-established trends, such as the growing threats of ransomware – up 13% this year – and the inescapability of the “human element”, which was tied to 82% of all breaches.
"
Evil Corp Pivots LockBit to Dodge U.S. Sanctions
ransomware
2022-06-03
https://threatpost.com/evil-corp-pivots-to-lockbit-to-dodge-u-s-sanctions/179858/
The cybercriminal group is distancing itself from its previous branding by shifting tactics and tools once again in an aim to continue to profit from its nefarious activity.
"
Autosummary:
“For cybercriminals, it’s a similar concept,” observed James McQuiggan, security awareness advocate at security firm KnowBe4, said in an email to Threatpost.
"
Researchers Demonstrate Ransomware for IoT Devices That Targets IT and OT Networks
exploits
ransomware
2022-06-02
https://thehackernews.com/2022/06/researchers-demonstrate-ransomware-for.html
As ransomware infections have evolved from purely encrypting data to schemes such as double and triple extortion, a new attack vector is likely to set the stage for future campaigns.
Called Ransomware for IoT or R4IoT by Forescout, it"s a "novel, proof-of-concept ransomware that exploits an IoT device to gain access and move laterally in an IT [information technology] network and impact the OT [
"
Autosummary:
"
Cybercriminals Expand Attack Radius and Ransomware Pain Points
exploits
ransomware
2022-06-02
https://threatpost.com/criminals-expand-attack-radius/179832/
Melissa Bischoping, security researcher with Tanium and Infosec Insiders columnist, urges firms to consider the upstream and downstream impact of "triple extortion" ransomware attacks.
"
Autosummary:
Diligence & Awareness
The most important takeaway from this ransomware evolution is that organizations with business connections to a breached organization, such as the ADA in this scenario, should be closely monitoring official update channels, identifying what (if any) of their own data may be at risk, and focus on threat-informed defensive measures.When a compromise takes place, the opportunity for “pay-for-decrypt” profits, as well as data or credential/access resale, leads to double- or triple-extortion ransomware.
Facing the Future
With the evolution of the strategy and tactics used by ransomware actors, it is essential that organizations have a big-picture perspective for defense, detection, and response and recovery.
In May of 2021, Ireland’s public health system, the Health Service Executive, was victimized by a ransomware attack that had significant reverberations.”
"
Airline passengers left stranded after ransomware attack
exploits
ransomware
2022-05-25
https://www.bitdefender.com/blog/hotforsecurity/airline-passengers-left-stranded-after-ransomware-attack/
An Indian airline says that an "attempted ransomware attack" against its IT infrastructure caused flights to be delayed or canceled, and left passengers stranded.
Read more in my article on the Hot for Security blog.
"
Autosummary:
"
The downside of ‘debugging’ ransomware
exploits
ransomware
2022-05-16
https://www.welivesecurity.com/2022/05/16/downside-debugging-ransomware/
The decision to release a ransomware decryptor involves a delicate balancing act between helping victims recover their data and alerting criminals to errors in their code
The post The downside of ‘debugging’ ransomware appeared first on WeLiveSecurity
"
Autosummary:
These decisions are based on a careful assessment of many factors, such as how prolific the ransomware is, its severity, how quickly the ransomware authors patch coding bugs and flaws in their own software, and so forth.
Dealing with ransomware, both its operators and the ransomware code itself, is a tricky process, and it is often a game of chess that can take weeks or months or even years to play out as the good guys battle the bad guys.They can recommend, assist with the process of incident response, and perhaps, send their support, but that is also reactive and offers little comfort to a freshly gutted business.
"
US college set to permanently close after 157 years, following ransomware attack
exploits
ransomware
2022-05-11
https://www.bitdefender.com/blog/hotforsecurity/us-college-set-to-permanently-close-after-157-years-following-ransomware-attack/
A predominantly Black college, based in Illinois, USA, is closing its doors after 157 years - citing the challenges it faced due to the Coronavirus pandemic, and the aftermath of a ransomware attack.
Read more in my article on the Hot for Security blog.
"
Autosummary:
Lincoln College explained that it had managed to survive multiple catastrophes and challenges, including economic crises, a major campus fire, the Spanish flu epidemic of 1918, the Great Depression, World War II, the 2008 global financial crisis, but this time it was different.
"