News

Anubis ransomware adds wiper to destroy files beyond recovery

exploits ransomware
2025-06-14 https://www.bleepingcomputer.com/news/security/anubis-ransomware-adds-wiper-to-destroy-files-beyond-recovery/

Autosummary: Files before encryption (top) and after (bottom) Source: Trend Micro Trend Micro’s analysis reveals that Anubis supports several commands at launch, including for privilege elevation, directory exclusion, and target paths for encryption. "


Unusual toolset used in recent Fog Ransomware attack

exploits ransomware
2025-06-14 https://securityaffairs.com/178969/malware/unusual-toolset-used-in-recent-fog-ransomware-attack.html
Fog ransomware operators used in a May 2025 attack unusual pentesting and monitoring tools, Symantec researchers warn. In May 2025, attackers hit an Asian financial firm with Fog ransomware, using rare tools like Syteca monitoring software and pentesting tools GC2, Adaptix, and Stowaway. Symantec researchers pointed out that the use of these tools is unusual […] "

Autosummary: Unusual toolset used in recent Fog Ransomware attack Pierluigi Paganini June 14, 2025 June 14, 2025 Fog ransomware operators used in a May 2025 attack unusual pentesting and monitoring tools, Symantec researchers warn. "


Bert ransomware: what you need to know

exploits ransomware
2025-06-13 https://www.fortra.com/blog/bert-ransomware-what-you-need-know
Bert is a recently-discovered strain of ransomware that encrypts victims" files and demands a payment for the decryption key. Read more in my article on the Fortra blog. "

Autosummary: Image As Cybernews describes, data exfiltrated from S5 Agency World includes details of invoices, email correspondence, inspection reports, employees" COVID-19 vaccinations, copies of passports, and internal corporate documents. In recent weeks Bert has claimed to have stolen information from organisations around the world including a ticket company, a Turkish hospital, an American electronics firm, a Malaysian construction firm, a Columbian IT solutions business, and a Taiwanese company producing equipment for semiconductors. "


Fog ransomware attack uses unusual mix of legitimate and open-source tools

exploits ransomware
2025-06-12 https://www.bleepingcomputer.com/news/security/fog-ransomware-attack-uses-unusual-mix-of-legitimate-and-open-source-tools/
Fog ransomware hackers are using an uncommon toolset, which includes open-source pentesting utilities and a legitimate employee monitoring software called Syteca. [...] "

Autosummary: Apart from these tools, Symantec also lists the following as part of Fog ransomware’s latest arsenal: Adapt2x C2 – open-source alternative to Cobalt Strike supporting post-exploitation actions Process Watchdog – system monitoring utility that can restart key processes PsExec – Microsoft Sysinternals tool for remote execution across networked machines Impacket SMB – Python library with low-level programmatic access to SMB, likely used for deploying the ransomware payload on the victim’s machine. "


LockBit panel data leak shows Chinese orgs among the most targeted

ransomware
2025-06-12 https://www.helpnetsecurity.com/2025/06/12/lockbit-data-leak-targets-ransoms/

The LockBit ransomware-as-a-service (RaaS) operation has netted around $2.3 million USD within 5 months, the data leak stemming from the May 2025 hack of a LockBit affiliate panel has revealed. From that sum, the operators took their 20% cut (approximately USD 456,000), and they additionally “earned” some $10,000-$11,000 USD from affiliates that registered through the panel. “What this leak truly shows is the complex and ultimately less glamorous reality of their illicit ransomware activities. While … More

The post LockBit panel data leak shows Chinese orgs among the most targeted appeared first on Help Net Security.

"

Autosummary: Insights from the LockBit data leak The data leak, which Trellix researchers believe comes from the database behind LockBit’s “Lite” affiliates admin panel, encompasses data from December 18, 2024 to April 29, 2025, and contains details on LockBit ransomware affiliates, victim organizations, chat logs, cryptocurrency wallets and ransomware build configurations. "


Sensata Technologies says personal data stolen by ransomware gang

exploits ransomware
2025-06-09 https://www.bleepingcomputer.com/news/security/sensata-technologies-says-personal-data-stolen-by-ransomware-gang/
Sensata Technologies is warning former and current employees it suffered a data breach after concluding an investigation into an April ransomware attack. [...] "

Autosummary: "


AI becomes key player in enterprise ransomware defense

exploits ransomware
2025-06-06 https://www.helpnetsecurity.com/2025/06/06/ransomware-threats-concern/

Ransomware breaches continue to rise even as fewer victims pay, according to a Delinea report. 69% of organizations globally have fallen victim to ransomware, with 27% being hit more than once. While only 57% of organizations paid ransoms, down from 76% in 2024, the frequency and impact of attacks continued to grow as threat actors turned to other tactics like extortion, with 85% of ransomware victims threatened with exposure. Paying the ransom doesn’t always bring … More

The post AI becomes key player in enterprise ransomware defense appeared first on Help Net Security.

"

Autosummary: At the same time, defenders are increasingly relying on AI to detect and respond to threats faster, with 90% of organizations now using AI in their ransomware defense strategies – primarily within Security Operations Centres (64%), for analysing Indicators of Compromise (62%), and to prevent phishing (51%). "


Play ransomware group hit 900 organizations since 2022

exploits ransomware
2025-06-06 https://securityaffairs.com/178702/cyber-crime/play-ransomware-group-hit-900-organizations-since-2022.html
A joint advisory from the US and Australian authorities states that Play ransomware has hit approximately 900 organizations over the past three years. A joint advisory from the Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) states that Play ransomware has hit […] "

Autosummary: “The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) are releasing this joint advisory to disseminate the Play ransomware group’s IOCs and TTPs identified through FBI investigations as recently as January 2025.” reads the advisory. "


Kettering Health confirms Interlock ransomware behind cyberattack

exploits ransomware ciber
2025-06-06 https://www.bleepingcomputer.com/news/security/kettering-health-confirms-interlock-ransomware-behind-cyberattack/
Healthcare giant Kettering Health, which manages 14 medical centers in Ohio, confirmed that the Interlock ransomware group breached its network and stole data in a May cyberattack. [...] "

Autosummary: "


Critical Fortinet flaws now exploited in Qilin ransomware attacks

exploits ransomware
2025-06-06 https://www.bleepingcomputer.com/news/security/critical-fortinet-flaws-now-exploited-in-qilin-ransomware-attacks/
The Qilin ransomware operation has recently joined attacks exploiting two Fortinet vulnerabilities that allow bypassing authentication on vulnerable devices and executing malicious code remotely. [...] "

Autosummary: For instance, in February, Fortinet disclosed that the Chinese Volt Typhoon hacking group used two FortiOS SSL VPN flaws (CVE-2022-42475 and CVE-2023-27997) to deploy the Coathanger custom remote access trojan (RAT) malware, which had been previously used to backdoor a Dutch Ministry of Defence military network. "


Marks & Spencer’s ransomware nightmare – more details emerge

exploits ransomware
2025-06-06 https://www.bitdefender.com/en-us/blog/hotforsecurity/marks-spencers-ransomware-nightmare-more-details-emerge
Over Easter, retail giant Marks & Spencer (M&S) discovered that it had suffered a highly damaging ransomware attack that left some shop shelves empty, shut down online ordering, some staff unable to clock in and out, and caused some of its major suppliers to resort to pen and paper. In a gloating abuse-filled email to M&S CEO Stuart Machin, the DragonForce hacker group claimed responsibility for the attack. Read more in my article on the Hot for Security blog. "

Autosummary: "


Tax resolution firm Optima Tax Relief hit by ransomware, data leaked

exploits ransomware
2025-06-06 https://www.bleepingcomputer.com/news/security/tax-resolution-firm-optima-tax-relief-hit-by-ransomware-data-leaked/
U.S. tax resolution firm Optima Tax Relief suffered a Chaos ransomware attack, with the threat actors now leaking data stolen from the company. [...] "

Autosummary: "


Attackers exploit Fortinet flaws to deploy Qilin ransomware

exploits ransomware
2025-06-06 https://securityaffairs.com/178736/hacking/attackers-exploit-fortinet-flaws-to-deploy-qilin-ransomware.html
Qilin ransomware now exploits Fortinet vulnerabilities to achieve remote code execution on impacted devices. Threat intelligence firm PRODAFT warned that Qilin ransomware (aka Phantom Mantis) group targeted multiple organizations between May and June 2025 by exploiting multiple FortiGate vulnerabilities, including CVE-2024-21762, and CVE-2024-55591. “Phantom Mantis recently launched a coordinated intrusion campaign targeting multiple organizations between […] "

Autosummary: However, Mora_001 is tracked as an independent threat actor, it exhibits consistent post-exploitation tactics, including identical usernames across victims, overlapping IPs, and rapid ransomware deployment within 48 hours. "


Interlock ransomware claims Kettering Health breach, leaks stolen data

exploits ransomware
2025-06-05 https://www.bleepingcomputer.com/news/security/interlock-ransomware-claims-kettering-health-breach-leaks-stolen-data/
The Interlock ransomware gang has claimed a recent cyberattack on the Kettering Health healthcare network and leaked data allegedly stolen from breached systems. [...] "

Autosummary: "


How to build a robust Windows service to block malware and ransomware

exploits ransomware
2025-06-05 https://www.bleepingcomputer.com/news/security/how-to-build-a-robust-windows-service-to-block-malware-and-ransomware/
Designing a security-focused Windows Service? Learn more from ThreatLocker about the core components for real-time monitoring, threat detection, and system hardening to defend against malware and ransomware. [...] "

Autosummary: Process and File System Monitoring This component focuses on monitoring the system’s processes and file system activities: Process Monitoring: Tracks the creation, modification, and termination of processes. Architectural Overview of a Robust Security Service A robust security service typically comprises several components working together: Monitoring Engine: Continuously observes system activities such as process execution, file access, and network connections. Key Design Principles for Security Services When designing a security-focused Windows Service, several principles are essential to ensure effectiveness and reliability: Minimal Attack Surface: Design the service with the least privilege principle, granting it only the permissions necessary to perform its tasks. By integrating real-time monitoring, process and file system analysis, and network activity monitoring, the Windows Service can provide comprehensive protection against various threats. Network Activity Analysis Monitoring network activity is essential for identifying potential threats that rely on communication with external servers or other infected devices: Outbound Connections: Watches for unauthorized or unusual outbound connections, which could indicate data exfiltration or communication with a command-and-control server. "


FBI: Play ransomware breached 900 victims, including critical orgs

exploits ransomware
2025-06-04 https://www.bleepingcomputer.com/news/security/fbi-play-ransomware-breached-900-victims-including-critical-orgs/
In an update to a joint advisory with CISA and the Australian Cyber Security Centre, the FBI said that the Play ransomware gang had breached roughly 900 organizations as of May 2025, three times the number of victims reported in October 2023. [...] "

Autosummary: Previous high-profile Play ransomware victims include cloud computing company Rackspace, the City of Oakland in California, Dallas County, car retailer giant Arnold Clark, the Belgian city of Antwerp, and, more recently, doughnut chain Krispy Kreme and American semiconductor supplier Microchip Technology. "


The AI copyright standoff continues - with no solution in sight

ransomware government
2025-06-02 https://www.bbc.com/news/articles/clyrgv2n190o
The bitter row over how to protect artists in the artificial intelligence age returns to the Lords. "

Autosummary: She says ministers would be "knowingly throwing UK designers, artists, authors, musicians, media and nascent AI companies under the bus" if they don"t move to protect their output from what she describes as "state sanctioned theft" from a UK industry worth £124bn.Sir Nick Clegg, former president of global affairs at Meta, is among those broadly supportive of the bill, arguing that asking permission from all copyright holders would "kill the AI industry in this country". "


Interlock ransomware: what you need to know

exploits ransomware
2025-05-30 https://www.tripwire.com/state-of-security/interlock-ransomware-what-you-need-know
"We don’t just want payment; we want accountability." The malicious hackers behind the Interlock ransomware try to justify their attacks. Learn more about what you need to know about Interlock in my article on the Tripwire State of Security blog. "

Autosummary: In October last year, the US Government warned internet users to be vigilant of the ClickFix threat, giving the example of websites that impersonated Google, Facebook, reCAPTCHA, and others.Yes, as is so normal with cyber attacks these days, the malicious hackers will leave an extortion note on your system - telling you that you will need to pay a ransom for the decryption key that will unlock the encrypted files, and also to prevent the files from being published on the dark web. using hard-to-crack unique passwords to protect sensitive data and accounts, as well as enabling multi-factor authentication. "


Germany doxxes Conti ransomware and TrickBot ring leader

exploits ransomware
2025-05-30 https://www.bleepingcomputer.com/news/security/germany-doxxes-conti-ransomware-and-trickbot-ring-leader/
The Federal Criminal Police Office of Germany (Bundeskriminalamt or BKA) claims that Stern, the leader of the Trickbot and Conti cybercrime gangs, is a 36-year-old Russian named Vitaly Nikolaevich Kovalev. [...] "

Autosummary: The leaks ultimately expedited Conti"s shutdown, with the cybercrime members moving to other operations or starting new gangs, including Royal, Black Basta, BlackCat, AvosLocker, Karakurt, LockBit, Silent Ransom, DagonLocker, and ZEON. "


Elon Musk leaves White House but says Doge will continue

ransomware
2025-05-29 https://www.bbc.com/news/articles/cz9y4exj822o
Musk"s exit comes after he criticised the legislative centrepiece of the president"s agenda. "

Autosummary: Elon Musk leaves White House but says Doge will continue 54 minutes ago Share Save Christal Hayes and Brandon Drenon BBC News Share Save Watch: Elon Musk says he is "disappointed" with Trump"s "big, beautiful bill", in interview with CBS Sunday Morning Elon Musk has said he is leaving the Trump administration after helping lead a tumultuous drive to shrink the size of US government that saw thousands of federal jobs axed. "


DragonForce Exploits SimpleHelp Flaws to Deploy Ransomware Across Customer Endpoints

exploits ransomware
2025-05-29 https://thehackernews.com/2025/05/dragonforce-exploits-simplehelp-flaws.html
The threat actors behind the DragonForce ransomware gained access to an unnamed Managed Service Provider"s (MSP) SimpleHelp remote monitoring and management (RMM) tool, and then leveraged it to exfiltrate data and drop the locker on multiple endpoints. It"s believed that the attackers exploited a trio of security flaws in SimpleHelp (CVE-2024-57727, CVE-2024-57728, and CVE-2024-57726) that were "

Autosummary: Sophos said while the ransomware attack was ultimately thwarted, the attackers managed to steal data and dwell on the network for nine days before attempting to launch the locker, "The combination of vishing and email bombing continues to be a potent, effective combination for ransomware attackers – and the 3AM ransomware group has now found a way to take advantage of remote encryption to stay out of sight of traditional security software," Sean Gallagher, principal threat researcher at Sophos, said. "DragonForce is not just another ransomware brand – it"s a destabilizing force trying to reshape the ransomware landscape," Aiden Sinnott, senior threat researcher at Sophos Counter Threat Unit, said. "


Cybercriminals exploit AI hype to spread ransomware, malware

exploits ransomware ciber
2025-05-29 https://www.bleepingcomputer.com/news/security/cybercriminals-exploit-ai-hype-to-spread-ransomware-malware/
Threat actors linked to lesser-known ransomware and malware projects now use AI tools as lures to infect unsuspecting victims with malicious payloads. [...] "

Autosummary: The ransom note demands a $50,000 ransom to be paid in the hard-to-trace Monero cryptocurrency, claiming that the funds will support humanitarian causes in Palestine, Ukraine, Africa, and Asia. "


Attackers hit MSP, use its RMM software to deliver ransomware to clients

exploits ransomware
2025-05-28 https://www.helpnetsecurity.com/2025/05/28/attackers-hit-msp-use-its-rmm-software-to-deliver-ransomware-to-clients/

A threat actor wielding the DragonForce ransomware has compromised an unnamed managed service provider (MSP) and pushed the malware onto its client organizations via SimpleHelp, a legitimate remote monitoring and management (RMM) tool. “Sophos MDR has medium confidence the threat actor exploited a chain of vulnerabilities that were released in January 2025,” the company’s incident responders shared on Tuesday. The vulnerabilities in question are CVE-2024-57727, CVE-2024-57728 and CVE-2024-57726, which can be used to compromise SimpleHelp … More

The post Attackers hit MSP, use its RMM software to deliver ransomware to clients appeared first on Help Net Security.

"

Autosummary: The vulnerabilities in question are CVE-2024-57727, CVE-2024-57728 and CVE-2024-57726, which can be used to compromise SimpleHelp server instances and, through them, push malicious payloads to machines with the client software installed. "


Iranian Man pleaded guilty to role in Robbinhood Ransomware attacks

exploits ransomware
2025-05-28 https://securityaffairs.com/178358/breaking-news/iranian-man-pleaded-guilty-to-role-in-robbinhood-ransomware-attacks.html
Iranian man pleads guilty to role in Baltimore ransomware attack tied to Robbinhood, admitting to computer and wire fraud conspiracy. Iranian national Sina Gholinejad pleaded guilty to his role in a Robbinhood ransomware scheme that hit U.S. cities, including Baltimore and Greenville. The attacks caused major disruptions and over $19 million in damages to Baltimore […] "

Autosummary: “Gholinejad and his co-conspirators — all of whom were overseas — caused tens of millions of dollars in losses and disrupted essential public services by deploying the Robbinhood ransomware against U. S. cities, health care organizations, and businesses,” said Matthew R. Galeotti, Head of the Justice Department’s Criminal Division. "


Interlock ransomware gang deploys new NodeSnake RAT on universities

exploits ransomware
2025-05-28 https://www.bleepingcomputer.com/news/security/interlock-ransomware-gang-deploys-new-nodesnake-rat-on-universities/
The Interlock ransomware gang is deploying a previously undocumented remote access trojan (RAT) named NodeSnake against educational institutes for persistent access to corporate networks. [...] "

Autosummary: Gathering system data Source: QuorumCyber The malware can kill active processes or load additional EXE, DLL, or JavaScript payloads on the device. "


Iranian Hacker Pleads Guilty in $19 Million Robbinhood Ransomware Attack on Baltimore

exploits ransomware
2025-05-28 https://thehackernews.com/2025/05/iranian-hacker-pleads-guilty-in-19.html
An Iranian national has pleaded guilty in the U.S. over his involvement in an international ransomware and extortion scheme involving the Robbinhood ransomware. Sina Gholinejad (aka Sina Ghaaf), 37, and his co-conspirators are said to have breached the computer networks of various organizations in the United States and encrypted files with Robbinhood ransomware to demand Bitcoin ransom payments. "

Autosummary: "


Nova Scotia Power confirms it was hit by ransomware attack but hasn’t paid the ransom

exploits ransomware
2025-05-27 https://securityaffairs.com/178323/data-breach/nova-scotia-power-confirms-it-was-hit-by-ransomware-but-hasnt-paid-the-ransom.html
Nova Scotia Power confirms it was hit by a ransomware attack but hasn’t paid the ransom, nearly a month after first disclosing the cyberattack. Nova Scotia Power confirmed it was hit by a ransomware attack nearly a month after disclosing a cyber incident. The company revealed it hasn’t paid the ransom. Nova Scotia Power Inc. is […] "

Autosummary: “ The impacted personal information varies by customer and could include different types depending on what each customer provided, including name, phone number, email address, mailing and service addresses, Nova Scotia Power program participation information, date of birth, and customer account history (such as power consumption, service requests, customer payment, billing, and credit history, and customer correspondence), driver’s license number, and Social Insurance Number.Its operations encompass generation, transmission, and distribution of electricity, utilizing a diverse mix of energy sources including coal, natural gas, hydroelectric, wind, tidal, oil, and biomass. "


MATLAB dev confirms ransomware attack behind service outage

exploits ransomware
2025-05-27 https://www.bleepingcomputer.com/news/security/mathworks-blames-ransomware-attack-for-ongoing-outages/
MathWorks, a leading developer of mathematical computing and simulation software, has revealed that a recent ransomware attack is behind an ongoing service outage. [...] "

Autosummary: "


Iranian pleads guilty to RobbinHood ransomware attacks, faces 30 years

exploits ransomware
2025-05-27 https://www.bleepingcomputer.com/news/security/iranian-pleads-guilty-to-robbinhood-ransomware-attacks-faces-30-years/
An Iranian national has pleaded guilty to participating in the Robbinhood ransomware operation, which was used to breach the networks, steal data, and encrypt devices of U.S. cities and organizations in an attempt to extort millions of dollars over a five-year span. [...] "

Autosummary: "


DragonForce ransomware abuses SimpleHelp in MSP supply chain attack

exploits ransomware
2025-05-27 https://www.bleepingcomputer.com/news/security/dragonforce-ransomware-abuses-simplehelp-in-msp-supply-chain-attack/
The DragonForce ransomware operation successfully breached a managed service provider and used its SimpleHelp remote monitoring and management (RMM) platform to steal data and deploy encryptors on downstream customers" systems. [...] "

Autosummary: The report by Sophos says that the threat actors first used SimpleHelp to perform reconnaissance on customer systems, such as collecting information about the MSP"s customers, including device names and configuration, users, and network connections. "


Week in review: Trojanized KeePass allows ransomware attacks, cyber risks of AI hallucinations

exploits ransomware
2025-05-25 https://www.helpnetsecurity.com/2025/05/25/week-in-review-trojanized-keepass-allows-ransomware-attacks-cyber-risks-of-ai-hallucinations/

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Trojanized KeePass opens doors for ransomware attackers A suspected initial access broker has been leveraging trojanized versions of the open-source KeePass password manager to set the stage for ransomware attacks, WithSecure researchers have discovered. AI hallucinations and their risk to cybersecurity operations AI systems can sometimes produce outputs that are incorrect or misleading, a phenomenon known as hallucinations. These errors … More

The post Week in review: Trojanized KeePass allows ransomware attacks, cyber risks of AI hallucinations appeared first on Help Net Security.

"

Autosummary: Why legal must lead on AI governance before it’s too late In this Help Net Security interview, Brooke Johnson, Chief Legal Counsel and SVP of HR and Security, Ivanti, explores the legal responsibilities in AI governance, highlighting how cross-functional collaboration enables safe, ethical AI use while mitigating risk and ensuring compliance. Closing security gaps in multi-cloud and SaaS environments In this Help Net Security interview, Kunal Modasiya, SVP, Product Management, GTM, and Growth at Qualys, discusses recent Qualys research on the state of cloud and SaaS security. The hidden gaps in your asset inventory, and how to close them In this Help Net Security interview, Tim Grieveson, CSO at ThingsRecon, breaks down the first steps security teams should take to regain visibility, the most common blind spots in asset discovery, and why context should drive risk prioritization. "


Operation ENDGAME disrupted global ransomware infrastructure

exploits ransomware
2025-05-25 https://securityaffairs.com/178245/cyber-crime/operation-endgame-disrupted-global-ransomware-infrastructure.html
Operation ENDGAME dismantled key ransomware infrastructure, taking down 300 servers, 650 domains, and seizing €21.2M in crypto. From May 19 to 22, 2025, Operation ENDGAME, coordinated by Europol and Eurojust, disrupted global ransomware infrastructure. Law enforcement took down down 300 servers and 650 domains, and issuing 20 international arrest warrants. “A Command Post was set […] "

Autosummary: Neutralized strains include Bumblebee, Lactrodectus, Qakbot, Hijackloader, DanaBot, Trickbot, and Warmcookie, all commonly used in ransomware-as-a-service schemes. "


Police takes down 300 servers in ransomware supply-chain crackdown

exploits ransomware
2025-05-23 https://www.bleepingcomputer.com/news/security/police-takes-down-300-servers-in-ransomware-supply-chain-crackdown/
In the latest phase of Operation Endgame, an international law enforcement operation, national authorities from seven countries seized 300 servers and 650 domains used to launch ransomware attacks. [...] "

Autosummary: " ​Previous Operation Endgame actions This week"s action follows multiple other Operation Endgame phases, including the seizure of over 100 servers hosting over 2,000 domains used by multiple malware loader operations, including IcedID, Pikabot, Trickbot, Bumblebee, Smokeloader, and SystemBC. "


3AM ransomware attack poses as a call from IT support to compromise networks

exploits ransomware
2025-05-23 https://www.tripwire.com/state-of-security/3am-ransomware-attackers-pose-it-support-compromise-networks
Cybercriminals are getting smarter. Not by developing new types of malware or exploiting zero-day vulnerabilities, but by simply pretending to be helpful IT support desk workers. Find out how they do it in my article on the Tripwire State of Security blog. "

Autosummary: As security firm Sophos explains, a virtual machine is deployed on the compromised computer, in an attempt to evade detection from security software, and the attackers roll out a series of commands to create new user accounts and gain admin privileges. "


300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide

exploits ransomware
2025-05-23 https://thehackernews.com/2025/05/300-servers-and-35m-seized-as-europol.html
As part of the latest "season" of Operation Endgame, a coalition of law enforcement agencies have taken down about 300 servers worldwide, neutralized 650 domains, and issued arrest warrants against 20 targets. Operation Endgame, first launched in May 2024, is an ongoing law enforcement operation targeting services and infrastructures assisting in or directly providing initial or consolidating "

Autosummary: Iskander Rifkatovich Sharafetdinov (aka alik, gucci), 32, a member of the TrickBot group Mikhail Mikhailovich Tsarev (aka mango), 36, a member of the TrickBot group Maksim Sergeevich Galochkin (aka bentley, manuel, Max17, volhvb, crypt), 43, a member of the TrickBot group Vitalii Nikolaevich Kovalev (aka stern, ben, Grave, Vincent, Bentley, Bergen, Alex Konor), 36, a member of the TrickBot group The disclosure comes as Europol took the wraps off a large-scale law enforcement operation that resulted in 270 arrests of dark web vendors and buyers across 10 countries: the United States (130), Germany (42), the United Kingdom (37), France (29), South Korea (19), Austria (4), the Netherlands (4), Brazil (3), Switzerland (1), and Spain (1). "


CTM360 report: Ransomware exploits trust more than tech

exploits ransomware
2025-05-22 https://www.helpnetsecurity.com/2025/05/22/ctm360-report-ransomware-attacks/

A recent wave of ransomware attacks has disrupted major retailers across the UK. According to a new report from CTM360, the attackers didn’t need to break down the door, they were invited in through misplaced trust and weak identity safeguards. This wasn’t about advanced malware or zero-day vulnerabilities. The attackers used common tactics: impersonating IT staff, tricking employees into handing over credentials, and intercepting multi-factor authentication codes. From there, they moved across networks. What went … More

The post CTM360 report: Ransomware exploits trust more than tech appeared first on Help Net Security.

"

Autosummary: What CISOs should focus on The report recommends: Seeing the organization from an attacker’s perspective Reducing digital exposure across identity and supply chain systems Reviewing remote access practices Applying focused hardening policies that are easy to enforce Auditing how internal trust boundaries are managed Download CTM360’s How To Harden Against Ransomware report and discover how ransomware groups are exploiting identity systems instead of technical flaws.These attacks succeeded not because defences failed, but because basic trust was abused: trust in employees to recognize phishing attempts, trust in identity systems to block unauthorised access, and trust in remote access tools that attackers easily repurposed. "


US indicts leader of Qakbot botnet linked to ransomware attacks

exploits ransomware
2025-05-22 https://www.bleepingcomputer.com/news/security/us-indicts-leader-of-qakbot-botnet-linked-to-ransomware-attacks/
The U.S. government has indicted Russian national Rustam Rafailevich Gallyamov, the leader of the Qakbot botnet malware operation that compromised over 700,000 computers and enabled ransomware attacks. [...] "

Autosummary: Starting in 2019, Qakbot became the initial infection vector in many ransomware attacks from infamous gangs such as Conti, ProLock, Egregor, REvil, RansomExx, MegaCortex, Doppelpaymer, Black Basta, and Cactus. "


Kettering Health hit by system-wide outage after ransomware attack

exploits ransomware
2025-05-21 https://www.bleepingcomputer.com/news/security/kettering-health-hit-by-system-wide-outage-after-ransomware-attack/
Kettering Health, a healthcare network that operates 14 medical centers in Ohio, was forced to cancel inpatient and outpatient procedures following a cyberattack that caused a system-wide technology outage. [...] "

Autosummary: "While it is customary for Kettering Health to contact patients by phone to discuss payment options for medical bills, out of an abundance of caution, we will not be making calls to ask for or receive payment over the phone until further notice," it added. "


3AM ransomware uses spoofed IT calls, email bombing to breach networks

exploits ransomware
2025-05-21 https://www.bleepingcomputer.com/news/security/3am-ransomware-uses-spoofed-it-calls-email-bombing-to-breach-networks/
A 3AM ransomware affiliate is conducting highly targeted attacks using email bombing and spoofed IT support calls to socially engineer employees into giving credentials for remote access to corporate systems. [...] "

Autosummary: Next, the attacker downloaded and extracted a malicious archive from a spoofed domain, containing a VBS script, a QEMU emulator, and a Windows 7 image pre-loaded with QDoor backdoor. "


Sarcoma Ransomware Unveiled: Anatomy of a Double Extortion Gang

exploits ransomware
2025-05-20 https://securityaffairs.com/178072/malware/sarcoma-ransomware-unveiled-anatomy-of-a-double-extortion-gang.html
Cybersecurity Observatory of the Unipegaso’s malware lab published a detailed analysis of the Sarcoma ransomware. It is with great pleasure and honor that I present the first report produced by the Malware Analysis Lab, led by Luigi Martire. The lab was established within the Cybersecurity Observatory of the Unipegaso University, which I have the privilege […] "

Autosummary: "


Trojanized KeePass opens doors for ransomware attackers

exploits ransomware
2025-05-20 https://www.helpnetsecurity.com/2025/05/20/trojanized-keepass-keeloader-ransomware/

A suspected initial access broker has been leveraging trojanized versions of the open-source KeePass password manager to set the stage for ransomware attacks, WithSecure researchers have discovered. KeeLoader: Passoword manager that acts as data stealer and malware loader In February 2025, WithSecure’s inicident responders were hired by an European IT service provider to help with response and remediation after a ransomware gang encrypted their VMware ESXi servers’ datastores. While the attack itself was relatively typical, … More

The post Trojanized KeePass opens doors for ransomware attackers appeared first on Help Net Security.

"

Autosummary: During this engagement, WithSecure’s Threat intelligence analysts have also uncovered a slew of malvertising campaigns, typosquatted domains, and subdomains that served KeeLoader, the Nitrogen loader posing as legitimate software (WinSCP, TreeSize Free), and phishing pages impersonating financial institutions and services, as well as evidence of active, 8-month-long development of KeeLoader. "


VanHelsing ransomware builder leaked on hacking forum

exploits ransomware
2025-05-20 https://www.bleepingcomputer.com/news/security/vanhelsing-ransomware-builder-leaked-on-hacking-forum/
The VanHelsing ransomware-as-a-service operation published the source code for its affiliate panel, data leak blog, and Windows encryptor builder after an old developer tried to sell it on the RAMP cybercrime forum. [...] "

Autosummary: common.h header file used by the builder Source: BleepingComputer However, the leak also includes the source code for the affiliate panel, which hosts the api.php endpoint, so threat actors could modify the code or run their own version of this panel to get the builder to work. "


Fake KeePass password manager leads to ESXi ransomware attack

exploits ransomware
2025-05-19 https://www.bleepingcomputer.com/news/security/fake-keepass-password-manager-leads-to-esxi-ransomware-attack/
Threat actors have been distributing trojanized versions of the KeePass password manager for at least eight months to install Cobalt Strike beacons, steal credentials, and ultimately, deploy ransomware on the breached network. [...] "

Autosummary: The aenys[.]com domain was used to host additional subdomains that impersonated well-known companies and services, such as WinSCP, PumpFun, Phantom Wallet, Sallie Mae, Woodforest Bank, and DEX Screener. "


5 BCDR Essentials for Effective Ransomware Defense

exploits ransomware
2025-05-15 https://thehackernews.com/2025/05/top-5-bcdr-capabilities-for-ransomware-defense.html
Ransomware has evolved into a deceptive, highly coordinated and dangerously sophisticated threat capable of crippling organizations of any size. Cybercriminals now exploit even legitimate IT tools to infiltrate networks and launch ransomware attacks. In a chilling example, Microsoft recently disclosed how threat actors misused its Quick Assist remote assistance tool to deploy the destructive "

Autosummary: Follow the 3-2-1 (and then some!) backup rule The 3-2-1 backup rule has long been the gold standard: keep three copies of your data, store them on two different media and keep one copy off-site. No organization is immune to ransomware, and building a strong recovery strategy is equally, if not even more, important than attempting to prevent all attacks in the first place. Review regularly for: Security-related events like failed logins, privilege escalations, deletion of backups and device removal.According to Microsoft Digital Defense Report 2024, threat actors are trying to access user credentials through various methods, such as phishing, malware and brute-force/password spray attacks.Innovations like Ransomware-as-a-Service (RaaS) are lowering the bar for entry, making ransomware attacks more frequent and far-reaching than ever before. Protect your backup infrastructure from ransomware and internal threats Your backup infrastructure must be isolated, hardened and tightly controlled to prevent unauthorized access or tampering. "


Moldovan Police Arrest Suspect in €4.5M Ransomware Attack on Dutch Research Agency

exploits ransomware
2025-05-13 https://thehackernews.com/2025/05/moldovan-police-arrest-suspect-in-45m.html
Moldovan law enforcement authorities have arrested a 45-year-old foreign man suspected of involvement in a series of ransomware attacks targeting Dutch companies in 2021. "He is wanted internationally for committing several cybercrimes (ransomware attacks, blackmail, and money laundering) against companies based in the Netherlands," officials said in a statement Monday. In conjunction with the "

Autosummary: "


Moldovan Police arrested a 45-year-old foreign man participating in ransomware attacks on Dutch companies

exploits ransomware
2025-05-13 https://securityaffairs.com/177772/cyber-crime/moldovan-police-arrested-a-45-year-old-foreign-man-participating-in-ransomware-attacks-on-dutch-companies.html
A 45-year-old foreign man has been arrested in Moldova for allegedly participating in ransomware attacks on Dutch companies in 2021. Moldovan police arrested a 45-year-old foreign man as a result of a joint international operation involving Moldovan and Dutch authorities. He is internationally wanted for multiple cybercrime, including ransomware attacks, blackmail, and money laundering, targeting […] "

Autosummary: On May 6, 2025, the Moldovan law enforcement searched the suspect’s home and car, seizing key evidence linked to cybercrimes, including €84,800 in cash, an e-wallet, laptops, a phone, a tablet, six bank cards, and multiple storage devices. "


Two years’ jail for down-on-his-luck man who sold ransomware online

exploits ransomware
2025-05-13 https://www.bitdefender.com/en-us/blog/hotforsecurity/two-years-jail-for-down-on-his-luck-man-who-sold-ransomware-online
A man has been jailed in Ireland for two years after pleading guilty to offences related to his illegal online business that sold ransomware and other malware, as well as stolen credit card details, and false bank accounts. Read more in my article on the Hot for Security blog. "

Autosummary: But he was found to be in possession of materials designed to create fake payment cards, and a substantial amount of Bitcoin, Ethereum, Litecoin, Dogecoin, Monero, XLM, Dash, and Cardano cryptocurrency. Mazhar, of Douglas, Cork, has been jailed for two years after pleading guilty to offences related to his illegal online business that sold ransomware and other malware, as well as stolen credit card details, and false bank accounts. "


How Interlock Ransomware Affects the Defense Industrial Base Supply Chain

exploits ransomware industry
2025-05-13 https://securityaffairs.com/177792/malware/how-interlock-ransomware-affects-the-defense-industrial-base-supply-chain.html
Interlock Ransomware ‘s attack on a defense contractor exposed global defense supply chain details, risking operations of top contractors and their clients. Resecurity envisions the cascading effects on the defense supply chain due to ransomware activity. In the recent incident, by attacking a defense contractor, Interlock Ransomware uncovered details about the supply chains and operations […] "

Autosummary: "


Moldova arrests suspect linked to DoppelPaymer ransomware attacks

exploits ransomware
2025-05-12 https://www.bleepingcomputer.com/news/security/moldova-arrests-suspect-linked-to-doppelpaymer-ransomware-attacks/
Moldovan authorities have detained a 45-year-old suspect linked to DoppelPaymer ransomware attacks targeting Dutch organizations in 2021. [...] "

Autosummary: "


LockBit hacked: What does the leaked data show?

ransomware
2025-05-09 https://www.helpnetsecurity.com/2025/05/09/lockbit-hacked-data-leaked/

The affiliate panel of the infamous LockBit Ransomware-as-a-Service (RaaS) group has been hacked and defaced, showing a link to a MySQL database dump ostensibly containing leaked data relating to the group’s operations: The defaced dark web affiliate panel (Source: Help Net Security) The breach has been confirmed by LockBitSupp – the creator, developer and administator of the LockBit ransomware group – who downplayed the attack by saying that decryptors, stolen company data, and the ransomware … More

The post LockBit hacked: What does the leaked data show? appeared first on Help Net Security.

"

Autosummary: The dump of the backend MySQL database was apparently generated on April 29, 2025, and contains: Nearly 60,000 unique bitcoin addresses / wallets Custom versions of the ransomware created for specific attacks and the associated public keys Nearly 4,500 negotiation messages exchanged by the ransomware operators and victims A list of 76 affiliates (i.e., users of the affiliate panel) "


LockBit ransomware gang breached, secrets exposed

exploits ransomware
2025-05-09 https://www.tripwire.com/state-of-security/lockbit-ransomware-gang-breached-secrets-exposed
Oh dear, what a shame, never mind. Read more in my article on the Tripwire State of Security blog. "

Autosummary: Image Alongside the link to the leaked database, a message left by the attackers reads: "Don"t do crime CRIME IS BAD xoxo from Prague" The downloadable SQL database contains sensitive information about the criminal gang"s activities, including negotiations between LockBit and its victims, victim profiles (including their estimated revenue), Bitcoin addresses linked to LockBit, possible decryption keys, custom ransomware builds, and a list of 75 admins and affiliates. "


LockBit ransomware gang hacked, victim negotiations exposed

exploits ransomware
2025-05-08 https://www.bleepingcomputer.com/news/security/lockbit-ransomware-gang-hacked-victim-negotiations-exposed/
The LockBit ransomware gang has suffered a data breach after its dark web affiliate panels were defaced and replaced with a message linking to a MySQL database dump. [...] "

Autosummary: In 2024, a law enforcement operation called Operation Cronos took down LockBit"s infrastructure, including 34 servers hosting the data leak website and its mirrors, data stolen from the victims, cryptocurrency addresses, 1,000 decryption keys, and the affiliate panel. "


Kickidler employee monitoring software abused in ransomware attacks

exploits ransomware
2025-05-08 https://www.bleepingcomputer.com/news/security/kickidler-employee-monitoring-software-abused-in-ransomware-attacks/
Ransomware operations are using legitimate Kickidler employee monitoring software for reconnaissance, tracking their victims" activity, and harvesting credentials after breaching their networks. [...] "

Autosummary: Attack flow (Varonis) While these attacks targeted enterprise administrators, whose accounts would typically provide the threat actors with privileged credentials after compromise, Varonis believes they may have maintained access to the victims" systems for days and even weeks to collect credentials needed to access off-site cloud backups without being detected. "


Qilin Ransomware Ranked Highest in April 2025 with Over 45 Data Leak Disclosures

exploits ransomware
2025-05-08 https://thehackernews.com/2025/05/qilin-leads-april-2025-ransomware-spike.html
Threat actors with ties to the Qilin ransomware family have leveraged malware known as SmokeLoader along with a previously undocumented .NET compiled loader codenamed NETXLOADER as part of a campaign observed in November 2024. "NETXLOADER is a new .NET-based loader that plays a critical role in cyber attacks," Trend Micro researchers Jacob Santos, Raymart Yambot, John Rainier Navato, Sarah Pearl "

Autosummary: "Agenda ransomware activity was primarily observed in healthcare, technology, financial services, and telecommunications sectors across the U.S., the Netherlands, Brazil, India, and the Philippines," according to Trend Micro"s data from the first quarter of 2025. "


The LockBit ransomware site was breached, database dump was leaked online

exploits ransomware
2025-05-08 https://securityaffairs.com/177619/cyber-crime/the-lockbit-ransomware-site-was-breached-database-dump-was-leaked-online.html
Lockbit ransomware group has been compromised, attackers stole and leaked data contained in the backend infrastructure of their dark web site. Hackers compromised the dark web leak site of the LockBit ransomware gang and defaced it, posting a message and a link to the dump of the MySQL database of its backend affiliate panel. “Don’t […] "

Autosummary: (Colombia) .jp (Japan) .br (Brazil) .tw (Taiwan) .ph (Philippines) .fr (France) “Finally, this is a rich source of operational and technical intelligence. "


BlueVoyant introduces Continuous Optimization for Microsoft Security

ransomware
2025-05-07 https://www.helpnetsecurity.com/2025/05/07/bluevoyant-continuous-optimization-for-microsoft-security/

BlueVoyant launched its Continuous Optimization for Microsoft Security (COMS) offering. COMS improves security outcomes, helps customers stay ahead of cyber threats, and minimizes technology costs by drawing on BlueVoyant’s expertise with the Microsoft Security stack. The Microsoft Security suite provides maximum cyber defense when it is properly configured, supplied with threat-responsive detections, and continuously optimized. However, many enterprises struggle to manage these solutions well at scale. BlueVoyant’s Continuous Optimization for Microsoft Security is designed to … More

The post BlueVoyant introduces Continuous Optimization for Microsoft Security appeared first on Help Net Security.

"

Autosummary: Adrian Grigorof, BlueVoyant SVP Microsoft professional services, added, “Enterprises are now seeing the need for technology management, including access to advanced technology, threat intelligence, and expertise.Threat detection engineering: Access to threat-centric and targeted threat detection analytics, with BlueVoyant’s threat detection engineering team creating custom detection analytics for each enterprise. "


Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day to Breach U.S. Organization

exploits ransomware
2025-05-07 https://thehackernews.com/2025/05/play-ransomware-exploited-windows-cve.html
Threat actors with links to the Play ransomware family exploited a recently patched security flaw in Microsoft Windows as a zero-day as part of an attack targeting an unnamed organization in the United States. The attack, per the Symantec Threat Hunter Team, part of Broadcom, leveraged CVE-2025-29824, a privilege escalation flaw in the Common Log File System (CLFS) driver. It was patched by "

Autosummary: " One of the batch files, called "servtask.bat," is used to escalate privileges, dump the SAM, SYSTEM, and SECURITY Registry hives, create a new user named "LocalSvc," and it to the Administrator group. The attack is notable for the use of Grixba, a bespoke information stealer previously attributed to Play and an exploit for CVE-2025-29824 that"s dropped in the Music folder, giving it names that masquerade as Palo Alto Networks software (e.g., "paloaltoconfig.exe" and "paloaltoconfig.dll")." Other ransomware attacks detected in recent months have leveraged a new Ransomware-as-a-Service (RaaS) known as PlayBoy Locker, which provides relatively unskilled cybercriminals with a comprehensive toolkit comprising ransomware payloads, management dashboards, and support services. "


Play ransomware exploited Windows logging flaw in zero-day attacks

exploits ransomware
2025-05-07 https://www.bleepingcomputer.com/news/security/play-ransomware-exploited-windows-logging-flaw-in-zero-day-attacks/
The Play ransomware gang has exploited a high-severity Windows Common Log File System flaw in zero-day attacks to gain SYSTEM privileges and deploy malware on compromised systems. [...] "

Autosummary: "


Play ransomware affiliate leveraged zero-day to deploy malware

exploits ransomware
2025-05-07 https://securityaffairs.com/177573/cyber-crime/play-ransomware-affiliate-leveraged-zero-day-to-deploy-malware.html
The Play ransomware gang exploited a high-severity Windows Common Log File System flaw in zero-day attacks to deploy malware. The Play ransomware gang has exploited a Windows Common Log File System flaw, tracked as CVE-2025-29824, in zero-day attacks to gain SYSTEM privileges and deploy malware on compromised systems. The vulnerability CVE-2025-29824, (CVSS score of 7.8) is a Use after […] "

Autosummary: Play ransomware affiliate leveraged zero-day to deploy malware Pierluigi Paganini May 07, 2025 May 07, 2025 The Play ransomware gang exploited a high-severity Windows Common Log File System flaw in zero-day attacks to deploy malware. "


NCSC warns of IT helpdesk impersonation trick being used by ransomware gangs after UK retailers attacked

exploits ransomware
2025-05-07 https://www.exponential-e.com/blog/ncsc-warns-of-it-helpdesk-impersonation-trick-being-used-by-ransomware-gangs-after-uk-retailers-attacked
The UK"s National Cyber Security Centre (NCSC) has warned the IT helpdesks of retailers to be on their guard against bogus support calls they might receive from hackers pretending to be staff locked out of their accounts. Read more in my article on the Exponential-e blog. "

Autosummary: "


Customers complain as empty shelves continue at Co-op after hack

ransomware
2025-05-06 https://www.bbc.com/news/articles/cze1eg3z307o
The retailer says "sustained malicious attempts by hackers" is affecting its IT systems. "

Autosummary: Save Liv McMahon & Tom Gerken Technology reporters Share Save John Walker John Walker took this photo of empty shelves in a Co-op in Llanrwst, Conwy Co-op customers have complained as stores are being left with empty shelves while the retailer battles with a major cyber attack disrupting deliveries of fresh stock. "


US authorities have indicted Black Kingdom ransomware admin

exploits ransomware
2025-05-05 https://securityaffairs.com/177423/cyber-crime/us-authorities-have-indicted-black-kingdom-ransomware-admin.html
A 36-year-old Yemeni man behind Black Kingdom ransomware is indicted in the U.S. for 1,500 attacks on Microsoft Exchange servers. U.S. authorities have indicted Rami Khaled Ahmed (aka “Black Kingdom,” of Sana’a, Yemen), a 36-year-old Yemeni national, suspected of being the administrator of the Black Kingdom ransomware operation. He is believed to have carried out […] "

Autosummary: “According to the indictment, from March 2021 to June 2023, Ahmed and others infected computer networks of several U.S.-based victims, including a medical billing services company in Encino, a ski resort in Oregon, a school district in Pennsylvania, and a health clinic in Wisconsin. "


New "Bring Your Own Installer" EDR bypass used in ransomware attack

exploits ransomware
2025-05-05 https://www.bleepingcomputer.com/news/security/new-bring-your-own-installer-edr-bypass-used-in-ransomware-attack/
A new "Bring Your Own Installer" EDR bypass technique is exploited in attacks to bypass SentinelOne"s tamper protection feature, allowing threat actors to disable endpoint detection and response (EDR) agents to install the Babuk ransomware. [...] "

Autosummary: The mitigation is to enable the "Online Authorization" feature in the Sentinel Policy settings that, when enabled, requires approval from the SentinelOne management console before local upgrades, downgrades, or uninstalls of the agent can occur. "


U.S. Charges Yemeni Hacker Behind Black Kingdom Ransomware Targeting 1,500 Systems

exploits ransomware
2025-05-03 https://thehackernews.com/2025/05/us-charges-yemeni-hacker-behind-black.html
The U.S. Department of Justice (DoJ) on Thursday announced charges against a 36-year-old Yemeni national for allegedly deploying the Black Kingdom ransomware against global targets, including businesses, schools, and hospitals in the United States. Rami Khaled Ahmed of Sana"a, Yemen, has been charged with one count of conspiracy, one count of intentional damage to a protected computer, and one "

Autosummary: The ransomware payment resolution rate for the period has been tallied at 27%, down from 85% in Q1 2019, 73% in Q1 2020, 56% in Q1 2021, 46% in Q1 2022, 45% in Q1 2023, and 28% in Q1 2024. "From March 2021 to June 2023, Ahmed and others infected computer networks of several U.S.-based victims, including a medical billing services company in Encino, a ski resort in Oregon, a school district in Pennsylvania, and a health clinic in Wisconsin," the DoJ said in a statement. Leonidas Varagiannis (aka War), 21, and Prasan Nepal (aka Trippy), 20, the two alleged leaders of a child extortion group 764 have been arrested and charged with directing and distributing child sexual abuse material (CSAM). "


Rhysida Ransomware gang claims the hack of the Government of Peru

exploits latam government ransomware
2025-05-03 https://securityaffairs.com/177388/cyber-crime/rhysida-ransomware-gang-claims-the-hack-of-the-government-of-peru.html
The Rhysida Ransomware gang claims the hack of the Government of Peru, the gang breached Gob.pe, the Single Digital Platform of the Peruvian State. The Rhysida ransomware gang claims responsibility for hacking the Government of Peru, breaching Gob.pe, which is the country’s official digital platform. The group published the images of multiple documents allegedly stolen […] "

Autosummary: "


US indicts Black Kingdom ransomware admin for Microsoft Exchange attacks

exploits ransomware
2025-05-02 https://www.bleepingcomputer.com/news/security/us-indicts-black-kingdom-ransomware-admin-for-microsoft-exchange-attacks/
A 36-year-old Yemeni national, who is believed to be the developer and primary operator of "Black Kingdom" ransomware, has been indicted by the United States for conducting 1,500 attacks on Microsoft Exchange servers. [...] "

Autosummary: "


Co-op confirms data theft after DragonForce ransomware claims attack

exploits ransomware
2025-05-02 https://www.bleepingcomputer.com/news/security/co-op-confirms-data-theft-after-dragonforce-ransomware-claims-attack/
The Co-op cyberattack is far worse than initially reported, with the company now confirming that data was stolen for a significant number of current and past customers. [...] "

Autosummary: " "This data includes Co-op Group members" personal data such as names and contact details, and did not include members" passwords, bank or credit card details, transactions or information relating to any members" or customers" products or services with the Co-op Group. DragonForce ransomware behind attack Today, the BBC first reported that affiliates for the DragonForce ransomware operation, the same hackers who breached M&S, are also behind the attack on Co-op. "


Ukrainian extradited to US for Nefilim ransomware attacks

exploits ransomware
2025-05-01 https://www.bleepingcomputer.com/news/security/ukrainian-extradited-to-us-for-nefilim-ransomware-attacks/
A Ukrainian national has been extradited from Spain to the United States to face charges over allegedly conducting Nefilim ransomware attacks against companies. [...] "

Autosummary: According to the U.S. Department of Justice, Stryzhak allegedly participated in ransomware attacks that targeted high-revenue companies, primarily in the United States, Norway, France, Switzerland, Germany, and the Netherlands. "


Marks & Spencer cyber incident linked to ransomware group

exploits ransomware
2025-04-29 https://www.helpnetsecurity.com/2025/04/29/marks-spencer-ransomware-breach-incident/

The “cyber incident” that British multinational retailer Marks & Spencer has been struggling with for over a week is a ransomware attack, multiple sources have asserted. The Telegraph’s sources say ransomware was deployed by a unnamed criminal gang. Bleeping Computer’s says the attackers were members of the Scattered Spider hacking group, and that M&S’s virtual machines on VMware ESXi hosts have been encrypted with the DragonForce encryptor. The effects of the attack The company publicly … More

The post Marks & Spencer cyber incident linked to ransomware group appeared first on Help Net Security.

"

Autosummary: The effects of the attack have been felt by customers: online orders have been (and are still) suspended, contactless payments and the redeption of gift cards were temporarily impossible, some orders went undelivered, refunds were delayed, and the customer reward scheme was paused. "


M&S customers in limbo as cyber attack chaos continues

ransomware
2025-04-28 https://www.bbc.com/news/articles/cyvq0q14y03o
The retail giant"s online business remains suspended with no indication yet when it will be restored. "

Autosummary: "In situations like this, in-store services are typically prioritised for recovery, which can mean online operations take slightly longer to restore," said Sam Kirkman, a director at cyber-security firm NetSPI.Ms Cunnington said she received a refund and a £10 apology voucher after calling M&S to find out what happened to the flowers, but was "a bit cross" they had allowed her to place the order in the first place, given it was aware of cyber incident. "


Hitachi Vantara takes servers offline after Akira ransomware attack

exploits ransomware
2025-04-28 https://www.bleepingcomputer.com/news/security/hitachi-vantara-takes-servers-offline-after-akira-ransomware-attack/
Hitachi Vantara, a subsidiary of Japanese multinational conglomerate Hitachi, was forced to take servers offline over the weekend to contain an Akira ransomware attack. [...] "

Autosummary: The company provides data storage, infrastructure systems, cloud management, and ransomware recovery services to government entities and some of the world"s biggest brands, including BMW, Telefónica, T-Mobile, and China Telecom. "


Marks & Spencer breach linked to Scattered Spider ransomware attack

exploits ransomware
2025-04-28 https://www.bleepingcomputer.com/news/security/marks-and-spencer-breach-linked-to-scattered-spider-ransomware-attack/
Ongoing outages at British retail giant Marks & Spencer are caused by a ransomware attack believed to be conducted by a hacking collective known as "Scattered Spider" BleepingComputer has learned from multiple sources. [...] "

Autosummary: Scattered Spider, also known as 0ktapus, Starfraud, UNC3944, Scatter Swine, Octo Tempest, and Muddled Libra, is a group of threat actors that are adept at using social engineering attacks, phishing, multi-factor authentication (MFA) bombing (targeted MFA fatigue), and SIM swapping to gain initial network access on large organizations. Researchers commonly associate attacks with the Scattered Spider group based on specific indicators of compromise, including credential-stealing phishing attacks targeting SSO platforms, social engineering attacks impersonating IT help desktop, and other tactics. "


ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion

exploits ransomware
2025-04-26 https://thehackernews.com/2025/04/toymaker-uses-lagtoy-to-sell-access-to.html
Cybersecurity researchers have detailed the activities of an initial access broker (IAB) dubbed ToyMaker that has been observed handing over access to double extortion ransomware gangs like CACTUS. The IAB has been assessed with medium confidence to be a financially motivated threat actor, scanning for vulnerable systems and deploying a custom malware called LAGTOY (aka HOLERUN). "LAGTOY can be "

Autosummary: "ToyMaker is a financially-motivated initial access broker (IAB) who acquires access to high-value organizations and then transfers that access to secondary threat actors who usually monetize the access via double extortion and ransomware deployment," the company said. "


DragonForce expands ransomware model with white-label branding scheme

exploits ransomware
2025-04-26 https://www.bleepingcomputer.com/news/security/dragonforce-expands-ransomware-model-with-white-label-branding-scheme/
The ransomware scene is re-organizing, with one gang known as DragonForce working to gather other operations under a cartel-like structure. [...] "

Autosummary: Under its model, affiliates get access to the infrastructure (negotiation tools, storage for stolen data, malware administration), and use the DragonForce encryptor under their own branding. "


Interlock ransomware gang started leaking data allegedly stolen from leading kidney dialysis firm DaVita

exploits ransomware
2025-04-25 https://securityaffairs.com/176946/cyber-crime/interlock-ransomware-gang-started-leaking-data-allegedly-stolen-from-leading-kidney-dialysis-firm-davita.html
The Interlock ransomware gang claimed responsibility for the attack on the leading kidney dialysis company DaVita and leaked alleged stolen data. DaVita Inc. provides kidney dialysis services through a network of 2,675 outpatient centers in the United States, serving 200,800 patients, and 367 outpatient centers in 11 other countries, serving 49,400 patients. DaVita specializes in treating end-stage renal […] "

Autosummary: Interlock ransomware gang started leaking data allegedly stolen from leading kidney dialysis firm DaVita Pierluigi Paganini April 25, 2025 April 25, 2025 The Interlock ransomware gang claimed responsibility for the attack on the leading kidney dialysis company DaVita and leaked alleged stolen data. "


Interlock ransomware claims DaVita attack, leaks stolen data

exploits ransomware
2025-04-24 https://www.bleepingcomputer.com/news/security/interlock-ransomware-claims-davita-attack-leaks-stolen-data/
The Interlock ransomware gang has claimed the cyberattack on DaVita kidney dialysis firm and leaked data allegedly stolen from the organization. [...] "

Autosummary: According to the gang"s claim, they have around 1.5 terabytes of data from the healthcare company, or nearly 700,000 files of what appear to be sensitive patient records, information on user accounts, insurance, and even financial details. "


When ransomware strikes, what’s your move?

exploits ransomware
2025-04-18 https://www.helpnetsecurity.com/2025/04/18/ciso-ransomware-negotiations/

Should we negotiate? Should we pay? These are the questions every organization faces when cybercriminals lock their data. By the time attackers have encrypted your systems, the focus shifts from prevention to response. It’s no longer about how it happened, it’s about what you’re willing to do next. Ransomware gangs are becoming more organized and aggressive, and many now operate like businesses. They have customer service, payment portals, and negotiation playbooks. No organization is off-limits. … More

The post When ransomware strikes, what’s your move? appeared first on Help Net Security.

"

Autosummary: Tim Morris, Chief Security Advisor at Tanium, said: “If it was just a legal and ethical consideration, as a matter of principle, you should not pay, and law enforcement will agree with that approach. In May 2021, Colonial Pipeline, a major US fuel supplier, was attacked by the DarkSide ransomware group. Tabletop exercises Simulated ransomware attacks, or tabletop exercises, prepare teams for real incidents. “A third-party highly skilled incident response team can offer businesses a plethora of expertise under one roof that may be missing from traditional in-house security teams,” said Azeem Aleem, MD of UK and Northern Europe at Sygnia.These include the dismantling of LockBit’s infrastructure, charges against the Phobos ransomware administrator, the disruption of the Radar/Dispossessor group, and the takedown of ALPHV/BlackCat leak sites. "


Interlock ransomware gang pushes fake IT tools in ClickFix attacks

exploits ransomware
2025-04-18 https://www.bleepingcomputer.com/news/security/interlock-ransomware-gang-pushes-fake-it-tools-in-clickfix-attacks/
The Interlock ransomware gang now uses ClickFix attacks that impersonate IT tools to breach corporate networks and deploy file-encrypting malware on devices. [...] "

Autosummary: The researchers say they detected the malicious captcha on four different sites, mimicking Microsoft or Advanced IP Scanner portals: microsoft-msteams[.]com/additional-check.html microstteams[.]com/additional-check.html ecologilives[.]com/additional-check.html advanceipscaner[.]com/additional-check.html "


Ahold Delhaize confirms data theft after INC ransomware claims attack

exploits ransomware
2025-04-17 https://www.bleepingcomputer.com/news/security/ahold-delhaize-confirms-data-theft-after-inc-ransomware-claims-attack/
Food retail giant Ahold Delhaize confirms that data was stolen from its U.S. business systems during a November 2024 cyberattack. [...] "

Autosummary: The company has reported yearly revenues of approximately $100 billion, and in the American market, it operates under brands such as Food Lion, Stop & Shop, Giant Food, and Hannaford. "


CISA’s 11-Month extension ensures continuity of MITRE’s CVE Program

ransomware
2025-04-16 https://securityaffairs.com/176608/security/cisas-11-month-extension-ensures-continuity-of-mitres-cve-program.html
MITRE’s U.S.-funded CVE program, a core cybersecurity tool for tracking vulnerabilities, faces funding expiry Wednesday, risking disruption to global security. U.S. government funding for MITRE ’s CVE program, a key global cybersecurity resource for cataloging vulnerabilities, is set to expire Wednesday, risking disruption. The 25-year-old program has assigned over 274,000 CVE IDs for public security […] "

Autosummary: CISA’s 11-Month extension ensures continuity of MITRE’s CVE Program Pierluigi Paganini April 16, 2025 April 16, 2025 MITRE’s U.S.-funded CVE program, a core cybersecurity tool for tracking vulnerabilities, faces funding expiry Wednesday, risking disruption to global security. "


Hertz data breach caused by CL0P ransomware attack on vendor

financial exploits ransomware
2025-04-15 https://www.malwarebytes.com/blog/news/2025/04/hertz-data-breach-caused-by-cl0p-ransomware-attack-on-vendor
Car rental giant Hertz data suffered a data breach caused by a CL0P ransomware attack on file sharing vendor Cleo "

Autosummary: The type of stolen data varies per customer, but could include: Name Contact information Driver’s license Social Security Number (in rare cases according to Hertz) “A very small number of individuals may have had their Social Security or other government identification numbers, passport information, Medicare or Medicaid ID (associated with workers’ compensation claims), or injury-related information associated with vehicle accident claims impacted by the event.”The Hertz Corporation, on behalf of Hertz, Dollar, and Thrifty brands, is sending breach notifications to customers who may have had their name, contact information, driver’s license, and—in rare cases—Social Security Number exposed in a data breach. In 2024, CL0P repeated this method using a zero-day exploit against Cleo, a business-to-business (B2B) tech platform provider that specializes in managed file transfer (MFT) solutions, like Cleo Harmony, VLTrader, and LexiCom. "


RansomHouse ransomware: what you need to know

exploits ransomware
2025-04-15 https://www.fortra.com/blog/ransomhouse-ransomware-what-you-need-know
RansomHouse is a cybercrime operation that follows a Ransomware-as-a-Service (RaaS) business model, where affiliates (who do not require technical skills of their own) use the ransomware operator"s infrastructure to extort money from victims. Read more in my article on the Fortra blog. "

Autosummary: RansomHouse has made a name for itself by attacking organisations in education, government, manufacturing, and healthcare, including the likes of AMD, the University of Paris-Saclay, Bulgaria’s Supreme Administrative Court, and South African telecoms operator Cell C. And do these organisations pay up? Image In the example above, RansomHouse has linked to "evidence packs" and even a "full data dump" belonging to one of their victims, meaning that anyone can download the stolen data - without even requiring a password. "


Medusa ransomware gang claims to have hacked NASCAR

exploits ransomware
2025-04-14 https://www.bitdefender.com/en-us/blog/hotforsecurity/medusa-ransomware-hacked-nascar
Read more in my article on the Hot for Security blog. "

Autosummary: In an attempt to verify its claim of having hacked NASCAR, Medusa has published screenshots of what it claims are internal documents - including some purporting to show the names, email addresses, and phone numbers of NASCAR employees and sponsors, as well as invoices, financial reports, and more. "


Kidney dialysis firm DaVita hit by weekend ransomware attack

exploits ransomware
2025-04-14 https://www.bleepingcomputer.com/news/security/kidney-dialysis-firm-davita-hit-by-weekend-ransomware-attack/
Kidney dialysis firm DaVita disclosed Monday it suffered a weekend ransomware attack that encrypted parts of its network and impacted some of its operations. [...] "

Autosummary: "On April 12, 2025, DaVita Inc. became aware of a ransomware incident that has encrypted certain elements of our network," reads the 8-K filing. "


Sensata Technologies hit by ransomware attack impacting operations

exploits ransomware
2025-04-10 https://www.bleepingcomputer.com/news/security/sensata-technologies-hit-by-ransomware-attack-impacting-operations/
Sensata Technologies (known as Sensata) has suffered a ransomware attack last weekend that encrypted parts of the company network and disrupted operations. [...] "

Autosummary: "


PipeMagic Trojan Exploits Windows Zero-Day Vulnerability to Deploy Ransomware

exploits ransomware
2025-04-09 https://thehackernews.com/2025/04/pipemagic-trojan-exploits-windows-clfs.html
Microsoft has revealed that a now-patched security flaw impacting the Windows Common Log File System (CLFS) was exploited as a zero-day in ransomware attacks aimed at a small number of targets. "The targets include organizations in the information technology (IT) and real estate sectors of the United States, the financial sector in Venezuela, a Spanish software company, and the retail sector in "

Autosummary: "In some of the other attacks that we attribute to the same actor, we also observed that, prior to exploiting the CLFS elevation-of-privilege vulnerability, the victim"s machines were infected with a custom modular backdoor named "PipeMagic" that gets launched via an MSBuild script," Kaspersky pointed out in April 2023. "


Everest ransomware group’s Tor leak site offline after a defacement

exploits ransomware
2025-04-08 https://securityaffairs.com/176345/cyber-crime/everest-ransomware-groups-tor-leak-site-offline-after-a-defacement.html
The Tor leak site of the Everest ransomware group went offline after being hacked and defaced over the weekend. The Everest ransomware gang’s darknet site went offline after being hacked and defaced, with victim listings replaced by the following message. “Don’t do crime CRIME IS BAD xoxo from Prague” read the message published on the […] "

Autosummary: "


Microsoft: Windows CLFS zero-day exploited by ransomware gang

exploits ransomware
2025-04-08 https://www.bleepingcomputer.com/news/security/microsoft-windows-clfs-zero-day-exploited-by-ransomware-gang/
Microsoft says the RansomEXX ransomware gang has been exploiting a high-severity zero-day flaw in the Windows Common Log File System to gain SYSTEM privileges on victims" systems. [...] "

Autosummary: This ransomware gang has also targeted high-profile organizations, including computer hardware giant GIGABYTE, Konica Minolta, the Texas Department of Transportation (TxDOT), Brazil"s court system, Montreal"s STM public transport system, and government software provider Tyler Technologies. "


YES3 Scanner: Open-source S3 security scanner for public access, ransomware protection

exploits ransomware
2025-04-07 https://www.helpnetsecurity.com/2025/04/07/yes3-scanner-open-source-s3-security-scanner/

YES3 Scanner is an open-source tool that scans and analyzes 10+ different configuration items for your S3 buckets in AWS. This includes access such as public access via ACLs and bucket policies – including the complex combinations of account and bucket settings that can make a S3 bucket effectively public. “We built this tool after realizing potential users needed a better way to scan their S3 resources for access and ransomware protection. We wanted to … More

The post YES3 Scanner: Open-source S3 security scanner for public access, ransomware protection appeared first on Help Net Security.

"

Autosummary: YES3 Scanner checks for the following S3 configuration items: Bucket Access Control Lists (ACLs) Bucket Policy (Resource-Based Policy) Bucket Website Settings Account Public Access Block Bucket Public Access Block Disabled ACLs (via Ownership Controls) Bucket Encryption Settings Object Lock Configuration Bucket Versioning Settings Bucket Lifecycle Configuration Future plans and download “Our future plans are to include more analysis on S3 and cloud configuration such as logging to help provide holistic security against access and ransomware in the cloud. "


Food giant WK Kellogg discloses data breach linked to Clop ransomware

financial exploits ransomware
2025-04-07 https://www.bleepingcomputer.com/news/security/food-giant-wk-kellogg-discloses-data-breach-linked-to-clop-ransomware/
US food giant WK Kellogg Co is warning employees and vendors that company data was stolen during the 2024 Cleo data theft attacks. [...] "

Autosummary: "WK Kellogg learned on February 27, 2025, that a security incident may have occurred involving Cleo," reads the notice. "


Everest ransomware"s dark web leak site defaced, now offline

exploits ransomware
2025-04-07 https://www.bleepingcomputer.com/news/security/everest-ransomwares-dark-web-leak-site-defaced-now-offline/
The dark web leak site of the Everest ransomware gang has apparently been hacked over the weekend by an unknown attacker and is now offline. [...] "

Autosummary: "


Port of Seattle says ransomware breach impacts 90,000 people

exploits ransomware
2025-04-04 https://www.bleepingcomputer.com/news/security/port-of-seattle-says-ransomware-breach-impacts-90-000-people/
​Port of Seattle, the U.S. government agency overseeing Seattle"s seaport and airport, is notifying roughly 90,000 individuals of a data breach after their personal information was stolen in an August 2024 ransomware attack. [...] "

Autosummary: According to a copy of the breach notification letters, the attackers stole employee, contractor, and parking data in various combinations, including names, dates of birth, Social Security numbers (or last four digits of Social Security number), driver"s license or other government identification card numbers, and some medical information. "


Texas State Bar warns of data breach after INC ransomware claims attack

financial exploits government ransomware
2025-04-03 https://www.bleepingcomputer.com/news/security/texas-state-bar-warns-of-data-breach-after-inc-ransomware-claims-attack/
The State Bar of Texas is warning it suffered a data breach after the INC ransomware gang claimed to have breached the organization and began leaking samples of stolen data. [...] "

Autosummary: "


HellCat ransomware: what you need to know

exploits ransomware
2025-04-03 https://www.tripwire.com/state-of-security/hellcat-ransomware-what-you-need-know
HellCat - the ransomware gang that has been known to demand payment... in baguettes! Are they rolling in the dough? Bread it and weep in my article on the Tripwire State of Security blog. "

Autosummary: Reported victims of the HellCat ransomware have included Israel"s parliament The Knesset (extracting 64GB of sensitive data), Jordan"s Ministry of Education (stealing images of ID cards, divorce papers, and various letters addressed to the Minister), and mobile device provider Transsion. Image The note left by the attackers, promises that paying the ransom will not only deliver you the decryptor, but also "a description of your network vulnerabilities and information security recommendations.Like many other ransomware operations, HellCat breaks into organisations, steals sensitive files, and encrypts computer systems - demanding a ransom payment for a decryption key and to prevent the leaking of stolen files. "


Hunters International shifts from ransomware to pure data extortion

exploits ransomware
2025-04-03 https://www.bleepingcomputer.com/news/security/hunters-international-rebrands-as-world-leaks-in-shift-to-data-extortion/
The Hunters International Ransomware-as-a-Service (RaaS) operation is shutting down and rebranding with plans to switch to date theft and extortion-only attacks. [...] "

Autosummary: "


Sam’s Club Investigates Alleged Cl0p Ransomware Breach

exploits ransomware
2025-03-30 https://securityaffairs.com/175999/cyber-crime/sams-club-investigates-alleged-cl0p-ransomware-breach.html
The Walmart-owned membership warehouse club chain Sam’s Club is investigating claims of a Cl0p ransomware security breach. Sam’s Club is a membership warehouse club chain in the United States, owned by Walmart. Founded in 1983 by Sam Walton, Walmart’s founder, as Sam’s Wholesale Club, it was renamed Sam’s Club in 1990. These stores operate on a bulk […] "

Autosummary: New Clop Ransomware CLEO victim list pic.twitter.com/2Ape3KVuHO — Dominic Alvieri (@AlvieriD) January 15, 2025 In December 2024, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the vulnerability CVE-2024-50623 (CVSS score 8.8), which impacts multiple Cleo products to its Known Exploited Vulnerabilities (KEV) catalog. “On December 3, Huntress identified an emerging threat involving Cleo’s LexiCom, VLTransfer, and Harmony software, commonly used to manage file transfers.” "


BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability

exploits ransomware
2025-03-29 https://thehackernews.com/2025/03/blacklock-ransomware-exposed-after.html
In what"s an instance of hacking the hackers, threat hunters have managed to infiltrate the online infrastructure associated with a ransomware group called BlackLock, uncovering crucial information about their modus operandi in the process. Resecurity said it identified a security vulnerability in the data leak site (DLS) operated by the e-crime group that made it possible to extract "

Autosummary: Some of notable findings are listed below - The use of Rclone to exfiltrate data to the MEGA cloud storage service, in some cases even installing the MEGA client directly on victim systems The threat actors have created at least eight accounts on MEGA using disposable email addresses created via YOPmail (e.g., "zubinnecrouzo-6860@yopmail.com") to store the victim data A reverse engineering of the ransomware has uncovered source code and ransom note similarities with another ransomware strain codenamed DragonForce, which has targeted organizations in Saudi Arabia (While DragonForce is written in Visual C++, BlackLock uses Go) "$$$," one of the main operators of BlackLock, launched a short-lived ransomware project called Mamona on March 11, 2025 In an intriguing twist, BlackLock"s DLS was defaced by DragonForce on March 20 – likely by exploiting the same LFI vulnerability (or something similar) – with configuration files and internal chats leaked on its landing page. "


£3 million fine for healthcare MSP with sloppy security after it was hit by ransomware attack

exploits ransomware
2025-03-29 https://www.exponential-e.com/blog/3-million-fine-for-healthcare-msp-with-sloppy-security-after-it-was-hit-by-ransomware-attack
A UK firm has been hit by a £3.07 million fine after being hit by a ransomware attack that exposed sensitive data related to almost 80,000 people, and disrupted NHS services. Read more in my article on the Exponential-e blog. "

Autosummary: "


Product Walkthrough: How Datto BCDR Delivers Unstoppable Business Continuity

ransomware
2025-03-28 https://thehackernews.com/2025/03/how-to-ensure-business-continuity-with-datto-b.html
Long gone are the days when a simple backup in a data center was enough to keep a business secure. While backups store information, they do not guarantee business continuity during a crisis. With IT disasters far too common and downtime burning through budgets, modern IT environments require solutions that go beyond storage and enable instant recovery to minimize downtime and data loss. This is "

Autosummary: Additional recovery options: Datto BCDR provides granular and full-system recovery capabilities, including file and folder restore, volume restore, virtualization via hypervisor, bare metal restore and ESX upload. Lightning-fast recovery with Datto"s 1-Click Disaster Recovery Datto"s groundbreaking 1-Click Disaster Recovery (1-Click DR) feature makes disaster recovery fast, effortless and reliable — as simple as reordering from your favorite fast-food app. Export backup images, including in RAW format: The Export Image function supports export to VMDK, VHD and VHDX formats and offers native RAW export for Linux-based hypervisors, including Proxmox, SCALE Computing Platform and OpenStack. Seamless local recovery for instant failover Get powerful features for swift local recovery, including: Local virtualization: Datto appliances double as local recovery targets, allowing businesses to host workloads and applications directly on the device. Experience the power of the immutable Datto Cloud The Datto Cloud is purpose-built for cloud backup and DR, offering unmatched flexibility, security, performance and cost-efficiency. Effortless cloud recovery with the Datto Recovery Launchpad What sets Datto apart is its purpose-built disaster recovery cloud, designed for fast, reliable and hassle-free recovery. "


VanHelsing ransomware: what you need to know

exploits ransomware
2025-03-28 https://www.tripwire.com/state-of-security/vanhelsing-ransomware-what-you-need-know
First reported earlier in March 2025, VanHelsing is a new ransomware-as-a-service operation. Read more in my article on the Tripwire State of Security blog. "

Autosummary: CIS member countries are all allied with Russia, and include a number of former Soviet republics: Armenia Azerbaijan Belarus Kazakhstan Kyrgyzstan Moldova Russia Tajikistan Uzbekistan Why would the VanHelsing affiliates banned from attacking these countries? VanHelsing is unusual in targeting a variety of platforms - including Windows, Linux BSD, ARM, and VNWare ESXi - seemingly in an attempt to broaden its capacity to extort a ransom from impacted organisations. First reported earlier in March 2025, VanHelsing is a new ransomware-as-a-service operation. "


Retail giant Sam’s Club investigates Clop ransomware breach claims

exploits ransomware
2025-03-28 https://www.bleepingcomputer.com/news/security/retail-giant-sams-club-investigates-clop-ransomware-breach-claims/
​Sam"s Club, an American warehouse supermarket chain owned by U.S. retail giant Walmart, is investigating claims of a Clop ransomware breach. [...] "

Autosummary: "This was not a breach of our systems, but rather a case of these parties obtaining user names and passwords from phishing campaigns, planting malware or breaches at other companies," a Sam"s Club spokesperson told BleepingComputer at the time. "


UK fines software provider £3.07 million for 2022 ransomware breach

exploits ransomware
2025-03-27 https://www.bleepingcomputer.com/news/security/uk-fines-software-provider-307-million-for-2022-ransomware-breach/
The UK Information Commissioner"s Office (ICO) has fined Advanced Computer Software Group Ltd £3.07 million over a 2022 ransomware attack that exposed the sensitive personal data of 79,404 people, including National Health Service (NHS) patients. [...] "

Autosummary: "


NHS software provider fined £3m over data breach after ransomware attack

financial exploits ransomware
2025-03-27 https://www.bbc.com/news/articles/cp3yv1zxn94o
Security failings by the Advanced Computer Software Group led to a cyberattack in 2022 that impacted NHS services. "

Autosummary: Last year, the regulator criticised Advanced over the incident, which placed "further strain" on a "sector already under pressure". "


RedCurl cyberspies create ransomware to encrypt Hyper-V servers

exploits ransomware
2025-03-26 https://www.bleepingcomputer.com/news/security/redcurl-cyberspies-create-ransomware-to-encrypt-hyper-v-servers/
A threat actor named "RedCurl," known for stealthy corporate espionage operations since 2018, is now using a ransomware encryptor designed to target Hyper-V virtual machines. [...] "

Autosummary: While most ransomware operations focus on targeting VMware ESXi servers, RedCurl"s new "QWCrypt" ransomware specifically targets virtual machines hosted on Hyper-V. QWCrypt attacks The attacks observed by Bitdefender start with phishing emails with ".IMG" attachments disguised as CVs. "


RedCurl Shifts from Espionage to Ransomware with First-Ever QWCrypt Deployment

exploits ransomware
2025-03-26 https://thehackernews.com/2025/03/redcurl-shifts-from-espionage-to.html
The Russian-speaking hacking group called RedCurl has been linked to a ransomware campaign for the first time, marking a departure in the threat actor"s tradecraft. The activity, observed by Romanian cybersecurity company Bitdefender, involves the deployment of a never-before-seen ransomware strain dubbed QWCrypt. RedCurl, also called Earth Kapre and Red Wolf, has a history of orchestrating "

Autosummary: RedCurl, also called Earth Kapre and Red Wolf, has a history of orchestrating corporate espionage attacks aimed at various entities in Canada, Germany, Norway, Russia, Slovenia, Ukraine, the United Kingdom, and the United States. "


BlackLock Ransomware Targeted by Cybersecurity Firm

exploits ransomware ciber
2025-03-26 https://securityaffairs.com/175877/cyber-crime/blacklock-ransomware-targeted-by-cybersecurity-firm.html
Resecurity found an LFI flaw in the leak site of BlackLock ransomware, exposing clearnet IPs and server details. Resecurity has identified a Local File Include (LFI) vulnerability in Data Leak Site (DLS) of BlackLock Ransomware.  Cybersecurity experts were able to exploit misconfiguration in vulnerable web-app used by ransomware operators to publish victims’ data – leading […] "

Autosummary: The impacted organizations were based in Argentina, Aruba, Brazil, Canada, Congo, Croatia, Peru, France, Italy, Spain, the Netherlands, the United States, the United Kingdom, and the UAE. "


Cloak ransomware group hacked the Virginia Attorney General’s Office

exploits ransomware
2025-03-24 https://securityaffairs.com/175751/data-breach/cloak-group-hacked-virginia-attorney-generals-office.html
The Cloak ransomware group claims responsibility for a cyberattack on the Virginia Attorney General’s Office that occurred in February. The ransomware group Cloak has claimed responsibility for a February cyberattack on the Virginia Attorney General Office. A cyberattack on the Virginia Attorney General’s Office forced officials to shut down IT systems, including email and VPN, […] "

Autosummary: The group has extended its operations to countries in Asia and targets various sectors, including healthcare, real estate, construction, IT, food, and manufacturing.” "


VSCode Marketplace Removes Two Extensions Deploying Early-Stage Ransomware

exploits ransomware
2025-03-24 https://thehackernews.com/2025/03/vscode-marketplace-removes-two.html
Cybersecurity researchers have uncovered two malicious extensions in the Visual Studio Code (VSCode) Marketplace that are designed to deploy ransomware that"s under development to its users. The extensions, named "ahban.shiba" and "ahban.cychelloworld," have since been taken down by the marketplace maintainers. Both the extensions, per ReversingLabs, incorporate code that"s designed to invoke a "

Autosummary: Both the extensions, per ReversingLabs, incorporate code that"s designed to invoke a PowerShell command, which then grabs a PowerShell-script payload from a command-and-control (C2) server and executes it. "


Medusa ransomware uses malicious Windows driver ABYSSWORKER to disable security tools

exploits ransomware
2025-03-24 https://securityaffairs.com/175790/security/medusa-ransomware-uses-abyssworker-driver.html
Medusa ransomware uses a malicious Windows driver ABYSSWORKER to disable security tools, making detection and mitigation more difficult. Elastic Security Labs tracked a financially driven MEDUSA ransomware campaign using a HEARTCRYPT-packed loader and a revoked certificate-signed driver, ABYSSWORKER, to disable EDR tools. The attackers used a 64-bit Windows PE driver named smuol.sys, disguised as a […] "

Autosummary: Medusa ransomware uses malicious Windows driver ABYSSWORKER to disable security tools Pierluigi Paganini March 24, 2025 March 24, 2025 Medusa ransomware uses a malicious Windows driver ABYSSWORKER to disable security tools, making detection and mitigation more difficult. "


New VanHelsing ransomware targets Windows, ARM, ESXi systems

exploits ransomware
2025-03-24 https://www.bleepingcomputer.com/news/security/new-vanhelsing-ransomware-targets-windows-arm-esxi-systems/
A new multi-platform ransomware-as-a-service (RaaS) operation named VanHelsing has emerged, targeting Windows, Linux, BSD, ARM, and ESXi systems. [...] "

Autosummary: The malware supports rich CLI customization to tailor attacks per victim, such as targeting specific drives and folders, restricting the scope of encryption, spreading via SMB, skipping shadow copies deletion, and enabling two-phase stealth mode. "


AI will make ransomware even more dangerous

exploits ransomware
2025-03-21 https://www.helpnetsecurity.com/2025/03/21/exposure-management-understanding-among-security-leaders/

Ransomware is the top predicted threat for 2025, which is especially concerning given 38% of security professionals say ransomware will become even more dangerous when powered by AI, according to Ivanti. In comparison to the threat level, only 29% of security professionals say they are very prepared for ransomware attacks – leaving a significant gap in preparedness (29%), highlighting the need for more robust security measures. Strong understanding of exposure management among security leaders A … More

The post AI will make ransomware even more dangerous appeared first on Help Net Security.

"

Autosummary: “However, for exposure management to be successful, organizations should ensure collaboration between security and other departments, conduct risk assessments that align with the organization’s risk appetite, and prioritize mitigation of the most impactful vulnerabilities.” "


Medusa Ransomware Uses Malicious Driver to Disable Anti-Malware with Stolen Certificates

exploits ransomware
2025-03-21 https://thehackernews.com/2025/03/medusa-ransomware-uses-malicious-driver.html
The threat actors behind the Medusa ransomware-as-a-service (RaaS) operation have been observed using a malicious driver dubbed ABYSSWORKER as part of a bring your own vulnerable driver (BYOVD) attack designed to disable anti-malware tools. Elastic Security Labs said it observed a Medusa ransomware attack that delivered the encryptor by means of a loader packed using a packer-as-a-service (PaaS "

Autosummary: The list of some of the I/O control codes is below - 0x222080 - Enable the driver by sending a password "7N6bCAoECbItsUR5-h4Rp2nkQxybfKb0F-wgbJGHGh20pWUuN1-ZxfXdiOYps6HTp0X" 0x2220c0 - Load necessary kernel APIs 0x222184 - Copy file 0x222180 - Delete file 0x222408 - Kill system threads by module name 0x222400 - Remove notification callbacks by module name 0x2220c0 - Load API 0x222144 - Terminate process by their process ID 0x222140 - Terminate thread by their thread ID 0x222084 - Disable malware 0x222664 - Reboot the machine Of particular interest is 0x222400, which can be used to blind security products by searching and removing all registered notification callbacks, an approach also adopted by other EDR-killing tools like EDRSandBlast and RealBlindingEDR. "


53% of security teams lack continuous and up-to-date visibility

ransomware
2025-03-21 https://www.helpnetsecurity.com/2025/03/21/enterprises-data-visibility-security-risks/

Enterprises lack visibility into their own data, creating security risks that are compounding as organizations and their employees increase AI adoption, according to Bedrock Security. The majority of organizations struggle to track sensitive information across sprawling cloud environments, leaving them vulnerable to data breaches and compliance failures. The research also documents a significant shift in security roles, with nine in 10 professionals surveyed reporting their responsibilities have evolved in the past year, most notably in … More

The post 53% of security teams lack continuous and up-to-date visibility appeared first on Help Net Security.

"

Autosummary: Looking ahead, organizations: will focus on AI/ML data usage governance (70%) aim to strengthen policy enforcement across cloud environments (64%) want more accurate data classification (58%) plan to improve security tools with better data awareness (53%) will increase infrastructure security focus (68%) “These priorities show a clear shift toward data-centric security,” said Kurtic. Broken out by role: CISOs/CSOs/CTOs: Almost 70% of these respondents have taken on new data discovery responsibilities, specifically for AI initiatives Security managers/directors: 55% of these respondents added data governance duties for AI training Security engineers/architects: 52% of these respondents have new AI data discovery responsibilities Most organizations can’t track what data feeds their AI systems 48% of organizations express high confidence in controlling sensitive data used for AI/ML training. "


Why Continuous Compliance Monitoring Is Essential For IT Managed Service Providers

ransomware Telcos
2025-03-20 https://thehackernews.com/2025/03/why-continuous-compliance-monitoring-is.html
Regulatory compliance is no longer just a concern for large enterprises. Small and mid-sized businesses (SMBs) are increasingly subject to strict data protection and security regulations, such as HIPAA, PCI-DSS, CMMC, GDPR, and the FTC Safeguards Rule. However, many SMBs struggle to maintain compliance due to limited IT resources, evolving regulatory requirements, and complex security challenges "

Autosummary: By offering proactive compliance monitoring with Compliance Manager GRC, you can: ✅ Help clients avoid fines and security risks ✅ Automate compliance reporting and streamline audits ✅ Expand their service offerings and increase revenue ✅ Build long-term relationships with businesses in need of compliance expertise With compliance regulations only getting stricter, MSPs that invest in continuous compliance solutions today will be well-positioned for long-term success. New Features That Make Compliance Manager GRC Even More Powerful Compliance Monitor: Continuous Compliance Monitoring Compliance Monitor enables automated, ongoing compliance monitoring, ensuring MSPs and their clients stay compliant with minimal manual effort. How MSPs Can Implement Continuous Compliance Monitoring To successfully offer compliance monitoring, you should: Leverage Automated Compliance Tools – Use platforms like Compliance Manager GRC that provide real-time compliance assessments and reporting. Together, Compliance Monitor and Risk Manager make Compliance Manager GRC a no-brainer for MSPs looking to save time, reduce risk, and turn compliance into a high-value service.— Javier Dugarte, VP of Sales and Operations, GoCloud Inc. With Compliance Manager GRC, MSPs can turn compliance into a competitive advantage, securing high-value clients and unlocking new revenue streams. "


Is it time to retire "one-off" pen tests for continuous testing?

ransomware
2025-03-20 https://www.bleepingcomputer.com/news/security/is-it-time-to-retire-one-off-pen-tests-for-continuous-testing/
Annual pentests can leave security gaps that attackers can exploit for months. Learn more from Outpost24 about why continuous penetration testing (PTaaS) offers real-time detection, remediation, and stronger protection. [...] "

Autosummary: But while that may be valuable for compliance purposes, these kinds of point-in-time assessments simply don’t align with modern development practices and cybersecurity requirements: With each code iteration, security snapshots lose relevance Patch verification stalls until the next scheduled assessment window Development teams get large batches of findings rather than actionable, real-time feedback Limited tester and retesting availability creates bottlenecks in security testing Communication barriers between developers and testers slow down remediation to a crawl Continuous testing for modern development Penetration Testing as a Service (PTaaS) offers a more flexible approach that better aligns with rapid development cycles. Real-time vulnerability reporting lets you take immediate action on critical issues Developers and testers can directly communicate, speeding up remediation Unlimited retesting lets you verify fixes without waiting for the next assessment cycle Having access to diverse tester expertise ensures comprehensive security coverage and could even eliminate the need for vendor rotation Hybrid approach combines the best of both automated scanning as well as manual testing expertise to cover all possible vulnerability sources Beyond just finding vulnerabilities Finding vulnerabilities is only half the battle — rapid remediation requires that security teams partner closely with developers. "


RansomHub ransomware uses new Betruger ‘multi-function’ backdoor

exploits ransomware
2025-03-20 https://www.bleepingcomputer.com/news/security/ransomhub-ransomware-uses-new-betruger-multi-function-backdoor/
Security researchers have linked a new backdoor dubbed Betruger, deployed in several recent ransomware attacks, to an affiliate of the RansomHub operation. [...] "

Autosummary: Since it surfaced, the ransomware gang has claimed multiple high-profile victims, including oil services giant Halliburton, the Christie"s auction house, US telecom provider Frontier Communications, the Rite Aid drugstore chain, Kawasaki"s EU division, the Planned Parenthood sexual health nonprofit, and the Bologna Football Club. "


VSCode extensions found downloading early-stage ransomware

exploits ransomware
2025-03-20 https://www.bleepingcomputer.com/news/security/vscode-extensions-found-downloading-early-stage-ransomware/
Two malicious VSCode Marketplace extensions were found deploying in-development ransomware from a remote server, exposing critical gaps in Microsoft"s review process. [...] "

Autosummary: The extensions, named "ahban.shiba" and "ahban.cychelloworld," were downloaded seven and eight times, respectively, before they were eventually removed from the store. "


BlackLock ransomware: What you need to know

exploits ransomware
2025-03-20 https://www.tripwire.com/state-of-security/blacklock-ransomware-what-you-need-know
BlackLock has become a big deal, very quickly. It has been predicted to be one of the biggest ransomware-as-a-service operations of 2025. Read more in my article on the Tripwire State of Security blog. "

Autosummary: In addition, BlackLock has been actively attracting new affiliates on RAMP, a Russian-language ransomware-focused cybercrime forum, as well recruiting developers, initial access brokers and traffers (people who direct victims to malicious content.) BlackLock follows a RaaS (ransomware-as-a-service) business model, leasing its tools and infrastructure to affiliates who launch attacks, sharing a proportion of the proceeds with BlackLock. "


Pay, fight, or stall? The dilemma of ransomware negotiations

exploits ransomware
2025-03-17 https://www.helpnetsecurity.com/2025/03/17/ransomware-negotiations-decision-dilemma-video/

Ransomware negotiations are a high-stakes game where every decision matters. In this Help Net Security video, Kurtis Minder, CEO at GroupSense, takes us inside the world of ransomware negotiations. We learn how attackers communicate, the tough decisions victims face, and the mistakes that can make or break a response. He breaks down the key factors in deciding whether to engage with hackers, the legal and ethical considerations, and why preparation is everything. Learn why logging … More

The post Pay, fight, or stall? The dilemma of ransomware negotiations appeared first on Help Net Security.

"

Autosummary: "


Researcher releases free GPU-Based decryptor for Linux Akira ransomware

exploits ransomware Linux
2025-03-17 https://securityaffairs.com/175494/cyber-crime/free-decryptor-linux-akira-ransomware-brute-force.html
A researcher released a free decryptor for Linux Akira ransomware, using GPU power to recover keys through brute force. Security researcher Yohanes Nugroho created a free decryptor for Linux Akira ransomware, using GPUs to brute force the decryption keys. Initially estimating a week, the project took three weeks and cost $1,200 in GPU resources due […] "

Autosummary: Researcher releases free GPU-Based decryptor for Linux Akira ransomware Pierluigi Paganini March 17, 2025 March 17, 2025 A researcher released a free decryptor for Linux Akira ransomware, using GPU power to recover keys through brute force.The researcher analyzed log files, file metadata, and hardware benchmarks to estimate encryption timestamps, making brute-forcing decryption keys more efficient. "


⚡ THN Weekly Recap: Router Hacks, PyPI Attacks, New Ransomware Decryptor, and More

exploits ransomware
2025-03-17 https://thehackernews.com/2025/03/thn-weekly-recap-router-hacks-pypi.html
From sophisticated nation-state campaigns to stealthy malware lurking in unexpected places, this week’s cybersecurity landscape is a reminder that attackers are always evolving. Advanced threat groups are exploiting outdated hardware, abusing legitimate tools for financial fraud, and finding new ways to bypass security defenses. Meanwhile, supply chain threats are on the rise, with open-source "

Autosummary: This week"s list includes — CVE-2025-24983, CVE-2025-24984, CVE-2025-24985, CVE-2025-24991, CVE-2025-24993, CVE-2025-26633 (Microsoft Windows), CVE-2025-24201 (Apple iOS, iPadOS, macOS Sequoia, Safari, and VisionOS), CVE-2025-25291, CVE-2025-25292 (ruby-saml), CVE-2025-27363 (FreeType), CVE-2024-12297 (Moxa PT switches), CVE-2025-27816 (Arctera InfoScale product), CVE-2025-24813 (Apache Tomcat), CVE-2025-27636 (Apache Camel), CVE-2025-27017 (Apache NiFi), CVE-2024-56336 (Siemens SINAMICS S200), CVE-2024-13871, CVE-2024-13872 (Bitdefender BOX v1), CVE-2025-20115 (Cisco IOS XR), CVE-2025-27593 (SICK DL100-2xxxxxxx), CVE-2025-27407 (graphql), CVE-2024-54085 (AMI), CVE-2025-27509 (Fleet), and CVE-2024-57040 (TP-Link TL-WR845N router).It simplifies vulnerability tracking, device health monitoring, security policies, and license management across macOS, Windows, Linux, cloud platforms, and IoT. Fleet is modular, and lightweight, integrates smoothly with popular tools, and offers a free, flexible solution tailored to your needs. — Five high-severity security flaws have been disclosed in a Supervisory Control and Data Acquisition (SCADA) system named ICONICS Suite – CVE-2024-1182, CVE-2024-7587, CVE-2024-8299, CVE-2024-9852, and CVE-2024-8300 – that allows an authenticated attacker to execute arbitrary code, elevate privileges, and manipulate critical files.Security Flaws in ICONICS Suite Disclosed — Five high-severity security flaws have been disclosed in a Supervisory Control and Data Acquisition (SCADA) system named ICONICS Suite – CVE-2024-1182, CVE-2024-7587, CVE-2024-8299, CVE-2024-9852, and CVE-2024-8300 – that allows an authenticated attacker to execute arbitrary code, elevate privileges, and manipulate critical files.The campaign, ongoing since December 2024, casts a wide geographical net, spanning North America, Oceania, South and Southeast Asia, and Northern, Southern, Eastern, and Western Europe.The campaign, ongoing since December 2024, casts a wide geographical net, spanning North America, Oceania, South and Southeast Asia, and Northern, Southern, Eastern, and Western Europe.The payloads take the form of MSI installers and ELF binaries that are designed to drop the miner that singles out Monero, Sumokoin, ArQma, Graft, Ravencoin, Wownero, Zephyr, Townforge, and YadaCoin.The payloads take the form of MSI installers and ELF binaries that are designed to drop the miner that singles out Monero, Sumokoin, ArQma, Graft, Ravencoin, Wownero, Zephyr, Townforge, and YadaCoin.Leveraging direct syscall execution, memory analysis, and syscall hooking detection, ZeroProbe enables stealthy, forensic-friendly security assessments on Windows 10, 11, and Server 2019, compatible across PowerShell versions." — Threat actors like TA583, TA2725, and UAC-0050 are increasingly using legitimate remote monitoring and management (RMM) tools such as ScreenConnect, Fleetdeck, Atera, and Bluetrait as a first-stage payload in email campaigns.Threat Actors Intensify Abuse of Remote Access Tools — Threat actors like TA583, TA2725, and UAC-0050 are increasingly using legitimate remote monitoring and management (RMM) tools such as ScreenConnect, Fleetdeck, Atera, and Bluetrait as a first-stage payload in email campaigns.While enclave modules have to be signed with a Microsoft-issued certificate to load, a threat actor could rely on an operating system flaw (CVE-2024-49706) to load an unsigned module into an enclave, obtain access to a Trusted Signing entity and sign their own enclaves, or even abuse debuggable and vulnerable enclaves (e.g., CVE-2023-36880) to read and write arbitrary data inside the enclave. — Espressif, the manufacturer of ESP32, a low-cost, low-power microcontroller with integrated Wi-Fi and dual-mode Bluetooth capabilities, has pushed back against claims of a backdoor in its products.ESP32 Chip Backdoor Claims Disputed — Espressif, the manufacturer of ESP32, a low-cost, low-power microcontroller with integrated Wi-Fi and dual-mode Bluetooth capabilities, has pushed back against claims of a backdoor in its products.Three of these packages, acloud-client, enumer-iam, and tcloud-python-test, has been listed as dependencies of a relatively popular GitHub project named accesskey_tools that has been forked 42 times and starred 519 times. "


SANS Institute Warns of Novel Cloud-Native Ransomware Attacks

exploits ransomware
2025-03-17 https://thehackernews.com/2025/03/sans-institute-warns-of-novel-cloud.html
The latest Palo Alto Networks Unit 42 Cloud Threat Report found that sensitive data is found in 66% of cloud storage buckets. This data is vulnerable to ransomware attacks. The SANS Institute recently reported that these attacks can be performed by abusing the cloud provider’s storage security controls and default settings. “In just the past few months, I have witnessed two different methods for "

Autosummary: "In just the past few months, I have witnessed two different methods for executing a ransomware attack using nothing but legitimate cloud security features," warns Brandon Evans, security consultant and SANS Certified Instructor. "


Researcher releases free GPU-Based decryptor for Linux Akira ransomware

exploits ransomware Linux
2025-03-17 https://securityaffairs.com/175494/malware/free-decryptor-linux-akira-ransomware-brute-force.html
A researcher released a free decryptor for Linux Akira ransomware, using GPU power to recover keys through brute force. Security researcher Yohanes Nugroho created a free decryptor for Linux Akira ransomware, using GPUs to brute force the decryption keys. Initially estimating a week, the project took three weeks and cost $1,200 in GPU resources due […] "

Autosummary: Researcher releases free GPU-Based decryptor for Linux Akira ransomware Pierluigi Paganini March 17, 2025 March 17, 2025 A researcher released a free decryptor for Linux Akira ransomware, using GPU power to recover keys through brute force.The researcher analyzed log files, file metadata, and hardware benchmarks to estimate encryption timestamps, making brute-forcing decryption keys more efficient. "


BlackLock ransomware claims nearly 50 attacks in two months

exploits ransomware
2025-03-17 https://www.bleepingcomputer.com/news/security/blacklock-ransomware-claims-nearly-50-attacks-in-two-months/
A ransomware-as-a-service (RaaS) operation called "BlackLock" has emerged as one of the more active ransomware operations of 2025. [...] "

Autosummary: Error. "


Telegram CEO leaves France temporarily as criminal probe continues

ransomware
2025-03-17 https://www.bleepingcomputer.com/news/security/telegram-ceo-leaves-france-temporarily-as-criminal-probe-continues/
French authorities have allowed Pavel Durov, Telegram"s CEO and founder, to temporarily leave the country while criminal activity on the messaging platform is still under investigation. [...] "

Autosummary: "I want to thank the investigative judges for letting this happen, as well as my lawyers and team for their relentless efforts in demonstrating that, when it comes to moderation, cooperation, and fighting crime, for years Telegram not only met but exceeded its legal obligations. "


A ransomware attack hit the Micronesian state of Yap, causing the health system network to go down.

exploits government ransomware
2025-03-16 https://securityaffairs.com/175445/cyber-crime/a-ransomware-attack-hit-the-micronesian-state-of-yap.html
A Micronesian state suffered a ransomware attack and was forced to shut down all computers of its government health agency. A state in Micronesia, the state of Yap, suffered a ransomware attack, forcing the shutdown of all computers in its government health agency. Yap is one of the four states of the Federated States of […] "

Autosummary: On March 11, 2025, Yap’s Health Department detected a ransomware attack, shutting down its network and digital health systems to contain the threat. "


Search continues in Dominican Republic for missing student Sudiksha Konanki

ransomware
2025-03-15 https://www.bbc.com/news/articles/c5y9vlq4dlzo
The search for the missing University of Pittsburgh student, who was on spring break in Punta Cana, is entering its second week. "

Autosummary: The University of Pittsburgh, where Ms Konanki is a student, said in a statement they are working with the Federal Bureau of Investigations, the Drug Enforcement Administration, Department of Homeland Security and local authorities in response to her disappearance.Save Rachel Looker BBC News, Washington DC Share Save Defensa Civil Dominicana Search efforts for a missing University of Pittsburgh student who disappeared on spring break while in the Dominican Republican have entered their second week. "


New Akira ransomware decryptor cracks encryptions keys using GPUs

exploits ransomware
2025-03-15 https://www.bleepingcomputer.com/news/security/gpu-powered-akira-ransomware-decryptor-released-on-github/
Security researcher Yohanes Nugroho has released a decryptor for the Linux variant of Akira ransomware, which utilizes GPU power to retrieve the decryption key and unlock files for free. [...] "

Autosummary: As always, when attempting to decrypt files, make a backup of the original encrypted files, as there"s a possibility that files can be corrupted if the wrong decryption key is used. "


Live Ransomware Demo: See How Hackers Breach Networks and Demand a Ransom

exploits ransomware
2025-03-14 https://thehackernews.com/2025/03/live-ransomware-demo-see-how-hackers.html
Cyber threats evolve daily. In this live webinar, learn exactly how ransomware attacks unfold—from the initial breach to the moment hackers demand payment. Join Joseph Carson, Delinea’s Chief Security Scientist and Advisory CISO, who brings 25 years of enterprise security expertise. Through a live demonstration, he will break down every technical step of a ransomware attack, showing you how "

Autosummary: Through a live demonstration, he will break down every technical step of a ransomware attack, showing you how hackers exploit vulnerabilities and encrypt data—in clear, simple language. "


SuperBlack Ransomware operators exploit Fortinet Firewall flaws in recent attacks

exploits ransomware
2025-03-14 https://securityaffairs.com/175402/cyber-crime/superblack-ransomware-exploited-fortinet-firewall-flaws.html
Operators behind the SuperBlack ransomware exploited two vulnerabilities in Fortinet firewalls for recent attacks. Between January and March, researchers at Forescout Research – Vedere Labs observed a threat actors exploiting two Fortinet vulnerabilities to deploy the SuperBlack ransomware. The experts attribute the attacks to a threat actor named “Mora_001” which using Russian-language artifacts and exhibiting […] "

Autosummary: The activity could be spotted by analyzing logs where it appears as jsconsole(IP), with the IP address often spoofed as 127.0.0.1, 13.73.13.73, 8.8.8.8, 1.1.1.1, or other recognizable addresses : Attackers exploit the WebSocket vulnerability via the jsconsole interface. However Mora_001 is tracked as an independent threat actor, it exhibits consistent post-exploitation tactics, including identical usernames across victims, overlapping IPs, and rapid ransomware deployment within 48 hours. "


Suspected LockBit ransomware dev extradited to United States

exploits government ransomware
2025-03-14 https://www.bleepingcomputer.com/news/security/suspected-lockbit-ransomware-dev-extradited-to-united-states/
A dual Russian-Israeli national, suspected of being a key developer for the LockBit ransomware operation, has been extradited to the United States to face charges. [...] "

Autosummary: Other prominent LockBit members who have been charged in the U.S. include Mikhail Vasiliev (awaiting sentencing), Ruslan Astamirov (awaiting sentencing), Artur Sungatov (wanted), Ivan Kondratyev (wanted), and Mikhail Matveev (wanted). "


Alleged Israeli LockBit Developer Rostislav Panev Extradited to U.S. for Cybercrime Charges

ransomware
2025-03-14 https://thehackernews.com/2025/03/alleged-israeli-lockbit-developer.html
A 51-year-old dual Russian and Israeli national who is alleged to be a developer of the LockBit ransomware group has been extradited to the United States, nearly three months after he was formally charged in connection with the e-crime scheme. Rostislav Panev was previously arrested in Israel in August 2024. He is said to have been working as a developer for the ransomware gang from 2019 "

Autosummary: "


LockBit ransomware developer Rostislav Panev was extradited from Israel to the U.S.

exploits ransomware
2025-03-14 https://securityaffairs.com/175413/cyber-crime/lockbit-ransomware-developer-rostislav-panev-extradited-to-us.html
The US Justice Department announced that the LockBit ransomware developer Rostislav Panev was extradited from Israel to the U.S. The US Justice Department announced that one of the LockBit ransomware developer, Rostislav Panev (51), has been extradited to the United States. The dual Russian-Israeli national was arrested in Israel in 2024 and faces charges related […] "

Autosummary: “As alleged in the superseding complaint, at the time of Panev’s arrest in Israel in August, law enforcement discovered on Panev’s computer administrator credentials for an online repository that was hosted on the dark web and stored source code for multiple versions of the LockBit builder, which allowed LockBit’s affiliates to generate custom builds of the LockBit ransomware malware for particular victims. "


Medusa ransomware hit over 300 critical infrastructure organizations until February 2025

exploits ransomware
2025-03-13 https://securityaffairs.com/175319/cyber-crime/medusa-ransomware-hit-over-300-critical-infrastructure-organizations-until-february-2025.html
The Medusa ransomware operation hit over 300 organizations in critical infrastructure sectors in the United States until February 2025. The FBI, CISA, and MS-ISAC have issued a joint advisory detailing Medusa ransomware tactics, techniques, and indicators of compromise (IOCs) based on FBI investigations as recent as February 2025. This advisory is part of the #StopRansomware […] "

Autosummary: As of February 2025, Medusa developers and affiliates have impacted over 300 victims from a variety of critical infrastructure sectors with affected industries including medical, education, legal, insurance, technology, and manufacturing.” reads the joint advisory. The FBI, CISA, and MS-ISAC have issued a joint advisory detailing Medusa ransomware tactics, techniques, and indicators of compromise (IOCs) based on FBI investigations as recent as February 2025. "


Medusa ransomware: FBI and CISA urge organisations to act now to mitigate threat

exploits ransomware
2025-03-13 https://www.tripwire.com/state-of-security/medusa-ransomware-fbi-and-cisa-urge-organizations-act-now-mitigate-threat
The Medusa ransomware gang continues to present a major threat to the critical infrastructure sector, according to a newly-released - with at least one organisation hit with a "triple-extortion" threat. Read more in my article on the Tripwire State of Security blog. "

Autosummary: As of February 2025, the Medusa ransomware operation, which we have previously detailed on the Tripwire State of Security blog, had hit over 300 organisations from a variety of critical infrastructure sectors with affected industries including education, health, legal, insurance, technology, and manufacturing. "


Future-Proofing Business Continuity: BCDR Trends and Challenges for 2025

ransomware
2025-03-13 https://thehackernews.com/2025/03/bcdr-2025-trends-and-challenges-for-msps-and-it-teams.html
As IT environments grow more complex, IT professionals are facing unprecedented pressure to secure business-critical data. With hybrid work the new standard and cloud adoption on the rise, data is increasingly distributed across different environments, providers and locations, expanding the attack surface for emerging cyberthreats. While the need for a strong data protection strategy has become "

Autosummary: The backup paradox: Essential yet increasingly unreliable Data backup and recovery should be a safety net for businesses, but for many, it has become a source of frustration, complexity and risk. The lessons learned: What IT leaders must prioritize now The State of Backup and Recovery Report 2025 reveals that critical security gaps remain while securing on-premises, cloud, endpoint and SaaS data.Notably, SaaS platforms now serve as the backbone of daily business operations, but without the right backup strategies, this data remains vulnerable. Alarmingly, more than 10% of businesses don"t even know how long it would take to recover their business-critical SaaS data , if they could recover it at all.With hybrid work the new standard and cloud adoption on the rise, data is increasingly distributed across different environments, providers and locations, expanding the attack surface for emerging cyberthreats. To help IT teams and managed service providers (MSPs) understand how their peers are navigating these challenges, the State of Backup and Recovery Report 2025 has gathered insights from more than 3,000 IT professionals, security experts and administrators worldwide. "


New SuperBlack ransomware exploits Fortinet auth bypass flaws

exploits ransomware
2025-03-13 https://www.bleepingcomputer.com/news/security/new-superblack-ransomware-exploits-fortinet-auth-bypass-flaws/
A new ransomware operator named "Mora_001" is exploiting two Fortinet vulnerabilities to gain unauthorized access to firewall appliances and deploy a custom ransomware strain dubbed SuperBlack. [...] "

Autosummary: Mora_001"s attack chain overview Source: Forescout After this, the attacker maps the network and attempts lateral movement using stolen VPN credentials and newly added VPN accounts, Windows Management Instrumentation (WMIC) & SSH, and TACACS+/RADIUS authentication. "


CISA: Medusa ransomware hit over 300 critical infrastructure orgs

exploits ransomware
2025-03-12 https://www.bleepingcomputer.com/news/security/cisa-medusa-ransomware-hit-over-300-critical-infrastructure-orgs/
CISA says the Medusa ransomware operation has impacted over 300 organizations in critical infrastructure sectors in the United States until last month. [...] "

Autosummary: "As of February 2025, Medusa developers and affiliates have impacted over 300 victims from a variety of critical infrastructure sectors with affected industries including medical, education, legal, insurance, technology, and manufacturing," CISA, the FBI, and MS-ISAC warned on Wednesday. "


#StopRansomware: Medusa Ransomware

exploits ransomware
2025-03-11 https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-071a

Summary

Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders detailing various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing this joint advisory to disseminate known Medusa ransomware TTPs and IOCs, identified through FBI investigations as recently as February 2025. 

Medusa is a ransomware-as-a-service (RaaS) variant first identified in June 2021. As of February 2025, Medusa developers and affiliates have impacted over 300 victims from a variety of critical infrastructure sectors with affected industries including medical, education, legal, insurance, technology, and manufacturing. The Medusa ransomware variant is unrelated to the MedusaLocker variant and the Medusa mobile malware variant per the FBI’s investigation.

FBI, CISA, and MS-ISAC encourage organizations to implement the recommendations in the Mitigations section of this advisory to reduce the likelihood and impact of Medusa ransomware incidents.

Download the PDF version of this report:

For a downloadable list of IOCs, see:

AA25-071A STI "

Autosummary: Once a foothold in a victim network is established, commonly scanned ports include: 21 (FTP) (FTP) 22 (SSH) (SSH) 23 (Telnet) (Telnet) 80 (HTTP) (HTTP) 115 (SFTP) (SFTP) 443 (HTTPS) (HTTPS) 1433 (SQL database) (SQL database) 3050 (Firebird database) (Firebird database) 3128 (HTTP web proxy) (HTTP web proxy) 3306 (MySQL database) (MySQL database) 3389 (RDP) Medusa actors primarily use PowerShell [T1059.001] and the Windows Command Prompt (cmd.exe) [T1059.003] for network [T1046] and filesystem enumeration [T1083] and to utilize Ingress Tool Transfer capabilities [T1105]. The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing this joint advisory to disseminate known Medusa ransomware TTPs and IOCs, identified through FBI investigations as recently as February 2025.Medusa IABs (affiliates) are known to make use of common techniques, such as: Discovery Medusa actors use living off the land (LOTL) and legitimate tools Advanced IP Scanner and SoftPerfect Network Scanner for initial user, system, and network enumeration. netsh advfirewall firewall add rule name="rdp" dir=in protocol=tcp localport=3389 action=allow Then, a rule to allow remote WMI connections is created: netsh advfirewall firewall set rule group="windows management instrumentation (wmi)" new enable=yes Finally, the registry is modified to allow Remote Desktop connections: reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /tInvestigations identified Medusa actors using remote access software AnyDesk, Atera, ConnectWise, eHorus, N-able, PDQ Deploy, PDQ Inventory, SimpleHelp, and Splashtop. "


North Korea-linked APT Moonstone used Qilin ransomware in limited attacks

exploits ransomware
2025-03-10 https://securityaffairs.com/175178/apt/north-korea-linked-apt-moonstone-used-qilin-ransomware.html
Microsoft researchers reported that North Korea-linked APT tracked as Moonstone Sleet has employed the Qilin ransomware in limited attacks. Microsoft observed a North Korea-linked APT group, tracked as Moonstone Sleet, deploying Qilin ransomware in limited attacks since February 2025. The APT group uses Qilin ransomware after previously using custom ransomware. “Moonstone Sleet has previously exclusively […] "

Autosummary: Moonstone Sleet threat actors target financial and cyberespionage victims using trojanized software, custom malware, malicious games, and fake companies like StarGlow Ventures and C.C. Waterfall to engage victims on LinkedIn, freelancing sites, Telegram, and email. "


Akira ransomware gang used an unsecured webcam to bypass EDR

exploits ransomware
2025-03-08 https://securityaffairs.com/175103/cyber-crime/akira-ransomware-gang-used-unsecured-webcam-bypass-edr.html
The Akira ransomware gang exploited an unsecured webcam to bypass EDR and launch encryption attacks on a victim’s network. Cybersecurity researchers at S-RM team discovered a novel attack technique used by the Akira ransomware gang. The ransomware group used an unsecured webcam to encrypt systems within a target’s network, bypassing Endpoint Detection and Response (EDR). The […] "

Autosummary: Akira ransomware gang used an unsecured webcam to bypass EDR Pierluigi Paganini March 08, 2025 March 08, 2025 The Akira ransomware gang exploited an unsecured webcam to bypass EDR and launch encryption attacks on a victim’s network. The Akira ransomware has been active since March 2023, the threat actors behind the malware claim to have already hacked multiple organizations in multiple industries, including education, finance, and real estate. "


Qilin Ransomware gang claims the hack of the Ministry of Foreign Affairs of Ukraine

exploits ransomware
2025-03-07 https://securityaffairs.com/175025/cyber-crime/qilin-ransomware-ministry-of-foreign-affairs-of-ukraine.html
Qilin Ransomware group claims to have breached the Ministry of Foreign Affairs of Ukraine, marking a significant cybersecurity attack. The Russian-speaking Qilin Ransomware group claims responsibility for an attack on the Ministry of Foreign Affairs of Ukraine. The group stated that it stole sensitive data such as private correspondence, personal information, and official decrees. The […] "

Autosummary: Qilin Ransomware gang claims the hack of the Ministry of Foreign Affairs of Ukraine Pierluigi Paganini March 07, 2025 March 07, 2025 Qilin Ransomware group claims to have breached the Ministry of Foreign Affairs of Ukraine, marking a significant cybersecurity attack. "


Microsoft: North Korean hackers join Qilin ransomware gang

exploits ransomware
2025-03-07 https://www.bleepingcomputer.com/news/security/microsoft-north-korean-hackers-now-deploying-qilin-ransomware/
Microsoft says a North Korean hacking group tracked as Moonstone Sleet has deployed Qilin ransomware payloads in a limited number of attacks. [...] "

Autosummary: Microsoft says Moonstone Sleet hackers are targeting both financial and cyberespionage targets using trojanized software (e.g., PuTTY), custom malware loaders, malicious games and npm packages, and fake software development companies (e.g., C.C. Waterfall, StarGlow Ventures) set up to interact with potential victims on LinkedIn, various freelancing networks, Telegram, or via email. "


Medusa Ransomware targeted over 40 organizations in 2025

exploits ransomware
2025-03-07 https://securityaffairs.com/175013/malware/medusa-ransomware-targeted-over-40-organizations-in-2025.html
Medusa ransomware has claimed nearly 400 victims since January 2023, with attacks increasing by 42% between 2023 and 2024. The Symantec Threat Hunter Team reported that the Medusa ransomware operators have claimed nearly 400 victims since January 2023. Experts observed a 42% increase in attacks carried out by the group between 2023 and 2024. Experts […] "

Autosummary: Medusa Ransomware targeted over 40 organizations in 2025 Pierluigi Paganini March 07, 2025 March 07, 2025 Medusa ransomware has claimed nearly 400 victims since January 2023, with attacks increasing by 42% between 2023 and 2024. "


FIN7, FIN8, and Others Use Ragnar Loader for Persistent Access and Ransomware Operations

exploits ransomware
2025-03-07 https://thehackernews.com/2025/03/fin7-fin8-and-others-use-ragnar-loader.html
Threat hunters have shed light on a "sophisticated and evolving malware toolkit" called Ragnar Loader that"s used by various cybercrime and ransomware groups like Ragnar Locker (aka Monstrous Mantis), FIN7, FIN8, and Ruthless Mantis (ex-REvil). "Ragnar Loader plays a key role in keeping access to compromised systems, helping attackers stay in networks for long-term operations," Swiss "

Autosummary: "It employs advanced obfuscation, encryption, and anti-analysis techniques, including PowerShell-based payloads, RC4 and Base64 decryption routines, dynamic process injection, token manipulation, and lateral movement capabilities," PRODAFT said. "


EncryptHub Deploys Ransomware and Stealer via Trojanized Apps, PPI Services, and Phishing

financial exploits ransomware
2025-03-06 https://thehackernews.com/2025/03/encrypthub-deploys-ransomware-and.html
The financially motivated threat actor known as EncryptHub has been observed orchestrating sophisticated phishing campaigns to deploy information stealers and ransomware, while also working on a new product called EncryptRAT. "EncryptHub has been observed targeting users of popular applications, by distributing trojanized versions," Outpost24 KrakenLabs said in a new report shared with The "

Autosummary: " These changes underscore active tweaks to EncryptHub"s kill chain, with the threat actor also developing new components like EncryptRAT, a command-and-control (C2) panel to manage active infections, issue remote commands, and access stolen data. "


Medusa Ransomware Hits 40+ Victims in 2025, Demands $100K–$15M Ransom

exploits ransomware
2025-03-06 https://thehackernews.com/2025/03/medusa-ransomware-hits-40-victims-in.html
The threat actors behind the Medusa ransomware have claimed nearly 400 victims since it first emerged in January 2023, with the financially motivated attacks witnessing a 42% increase between 2023 and 2024. In the first two months of 2025 alone, the group has claimed over 40 attacks, according to data from the Symantec Threat Hunter Team said in a report shared with The Hacker News. The "

Autosummary: The development comes as the ransomware landscape continues to be in a state of flux, with a steady stream of new RaaS operations, such as Anubis, CipherLocker, Core, Dange, LCRYX, Loches, Vgod, and Xelera, emerging in the wild in recent months. "


US seizes domain of Garantex crypto exchange used by ransomware gangs

exploits ransomware
2025-03-06 https://www.bleepingcomputer.com/news/security/us-seizes-domain-of-garantex-crypto-exchange-used-by-ransomware-gangs/
The U.S. Secret Service has seized the domain of the sanctioned Russian cryptocurrency exchange Garantex in collaboration with the Department of Justice"s Criminal Division, the FBI, and Europol. [...] "

Autosummary: "


Toronto Zoo shares update on last year"s ransomware attack

exploits ransomware
2025-03-05 https://www.bleepingcomputer.com/news/security/toronto-zoo-shares-update-on-last-years-ransomware-attack/
The Toronto Zoo, the largest zoo in Canada, has provided more information about the data stolen during a ransomware attack in January 2024. [...] "

Autosummary: In a final notification regarding the cyberattack, the Toronto Zoo said the resulting data breach impacts varying combinations of personal and financial information belonging to employees, former employees, volunteers, and donors. "


Cactus ransomware: what you need to know

exploits ransomware
2025-03-05 https://www.tripwire.com/state-of-security/cactus-ransomware-what-you-need-know
Cactus is a ransomware-as-a-service (RaaS) group that encrypts victim"s data and demands a ransom for a decryption key. Read more about it in my article on the Tripwire State of Security blog. "

Autosummary: Once Cactus has infected a PC, it will attempt to uninstall anti-virus software, hunt for potential targets for infection, and use a variety of techniques to steal information and files before they are encrypted. After files have been exfiltrated and encrypted, a ransom note is posted on the victim"s computer with the filename "cAcTuS.readme.txt" Image Encrypted files can be identified easily as their extensions will have been changed to .cts1 "


Hunters International ransomware claims attack on Tata Technologies

exploits ransomware
2025-03-04 https://www.bleepingcomputer.com/news/security/hunters-international-ransomware-claims-attack-on-tata-technologies/
The Hunters International ransomware gang has claimed responsibility for a January cyberattack attack on Tata Technologies, stating they stole 1.4TB of data from the company. [...] "

Autosummary: Founded in 1989 and based in Pune, it operates in 27 countries with over 12,500 employees, specializing in automotive, aerospace, and industrial sectors with product development and digital transformation services. "


Researchers Link CACTUS Ransomware Tactics to Former Black Basta Affiliates

exploits ransomware industry
2025-03-04 https://thehackernews.com/2025/03/researchers-link-cactus-ransomware.html
Threat actors deploying the Black Basta and CACTUS ransomware families have been found to rely on the same BackConnect (BC) module for maintaining persistent control over infected hosts, a sign that affiliates previously associated with Black Basta may have transitioned to CACTUS. "Once infiltrated, it grants attackers a wide range of remote control capabilities, allowing them to execute "

Autosummary: "Threat actors are using these tactics, techniques, and procedures (TTP) — vishing, Quick Assist as a remote tool, and BackConnect — to deploy Black Basta ransomware," Trend Micro said. "


Microsoft Teams tactics, malware connect Black Basta, Cactus ransomware

exploits ransomware industry
2025-03-04 https://www.bleepingcomputer.com/news/security/microsoft-teams-tactics-malware-connect-black-basta-cactus-ransomware/
New research has uncovered further links between the Black Basta and Cactus ransomware gangs, with members of both groups utilizing the same social engineering attacks and the BackConnect proxy malware for post-exploitation access to corporate networks. [...] "

Autosummary: Both Zloader, Qbot, and BackConnect are all believed to be linked to the Black Basta ransomware operation, with members utilizing the malware to breach and spread through corporate networks. "


Qilin ransomware gang claimed responsibility for the Lee Enterprises attack

exploits ransomware
2025-03-03 https://securityaffairs.com/174831/data-breach/qilin-ransomware-group-claims-responsibility-lee-enterprises-attack.html
The Qilin ransomware group claims responsibility for attacking the newspaper Lee Enterprises, stealing 350GB of data. The Qilin ransomware group claimed responsibility for the recent cyberattack on Lee Enterprises, which impacted dozens of local newspapers. Lee Enterprises, Inc. is a publicly traded American media company. It publishes 79 newspapers in 25 states, and more than […] "

Autosummary: The documents we hold about Lee Enterprises reveal details worth noting—investor records, financial arrangements that raise questions, payments to journalists and publishers, funding for tailored news stories, and approaches to obtaining insider information.”Qilin ransomware gang claimed responsibility for the Lee Enterprises attack Pierluigi Paganini March 03, 2025 March 03, 2025 The Qilin ransomware group claims responsibility for attacking the newspaper Lee Enterprises, stealing 350GB of data. "


The New Ransomware Groups Shaking Up 2025

exploits ransomware
2025-03-03 https://thehackernews.com/2025/03/the-new-ransomware-groups-shaking-up.html
In 2024, global ransomware attacks hit 5,414, an 11% increase from 2023.  After a slow start, attacks spiked in Q2 and surged in Q4, with 1,827 incidents (33% of the year"s total). Law enforcement actions against major groups like LockBit caused fragmentation, leading to more competition and a rise in smaller gangs. The number of active ransomware groups jumped 40%, from 68 in 2023 to 95 "

Autosummary: IOCs Type Value Last Observation Date IPv4-Addr 107.161.50.26 Nov 28, 2024 SHA-1 507b26054319ff31f275ba44ddc9d2b5037bd295 Nov 28, 2024 SHA-1 e1fb7d15408988df39a80b8939972f7843f0e785 Nov 28, 2024 SHA-1 83f00af43df650fda2c5b4a04a7b31790a8ad4cf Nov 28, 2024 SHA-1 44a76b9546427627a8d88a650c1bed3f1cc0278c Nov 28, 2024 SHA-1 eeafa71946e81d8fe5ebf6be53e83a84dcca50ba Nov 28, 2024 SHA-1 763499b37aacd317e7d2f512872f9ed719aacae1 Nov 28, 2024 SHA-1 3477a173e2c1005a81d042802ab0f22cc12a4d55 Feb 02, 2025 SHA-1 90be89524b72f330e49017a11e7b8a257f975e9a Nov 28, 2024 Domain-Name gfs302n515.userstorage.mega.co.nz Nov 28, 2024 SHA-256 e67260804526323484f564eebeb6c99ed021b960b899ff788aed85bb7a9d75c3 Aug 20, 2024 Lynx Lynx is a double-extortion ransomware group that has been very active lately, displaying many victimized companies on their website. IOCs Type Value Last Observation Date MD5 e488d51793fec752a64b0834defb9d1d Sep 08, 2024 Domain-Name lynxback.pro Sep 08, 2024 Domain-Name lynxbllrfr5262yvbgtqoyq76s7mpztcqkv6tjjxgpilpma7nyoeohyd.onion Sep 08, 2024 Domain-Name lynxblog.net Sep 08, 2024 IPv4-Addr 185.68.93.122 Sep 08, 2024 IPv4-Addr 185.68.93.233 Sep 08, 2024 MD5 7e851829ee37bc0cf65a268d1d1baa7a Feb 17, 2025 What"s to Come in 2025? "


Hackers Exploit Paragon Partition Manager Driver Vulnerability in Ransomware Attacks

exploits ransomware
2025-03-03 https://thehackernews.com/2025/03/hackers-exploit-paragon-partition.html
Threat actors have been exploiting a security vulnerability in Paragon Partition Manager"s BioNTdrv.sys driver in ransomware attacks to escalate privileges and execute arbitrary code. The zero-day flaw (CVE-2025-0289) is part of a set of five vulnerabilities that was discovered by Microsoft, according to the CERT Coordination Center (CERT/CC). "These include arbitrary kernel memory mapping and "

Autosummary: "These include arbitrary kernel memory mapping and write vulnerabilities, a null pointer dereference, insecure kernel resource access, and an arbitrary memory move vulnerability," CERT/CC said. "


Qilin ransomware claims attack at Lee Enterprises, leaks stolen data

exploits ransomware
2025-02-28 https://www.bleepingcomputer.com/news/security/qilin-ransomware-claims-attack-at-lee-enterprises-leaks-stolen-data/
The Qilin ransomware gang has claimed responsibility for the attack at Lee Enterprises that disrupted operations on February 3, leaking samples of data they claim was stolen from the company. [...] "

Autosummary: "


DragonForce Ransomware group is targeting Saudi Arabia

exploits ransomware
2025-02-27 https://securityaffairs.com/174717/cyber-crime/dragonforce-ransomware-group-is-targeting-saudi-arabia.html
Resecurity researchers reported that DragonForce ransomware targets Saudi organizations rising cyber threats in the region. DragonForce ransomware has recently been reported to target organizations in the Kingdom of Saudi Arabia (KSA). A significant incident identified by Resecurity involved a data leak from a prominent real estate and construction company in Riyadh, which has projects with […] "

Autosummary: DragonForce Ransomware group is targeting Saudi Arabia Pierluigi Paganini February 27, 2025 February 27, 2025 Resecurity researchers reported that DragonForce ransomware targets Saudi organizations rising cyber threats in the region. "


EncryptHub breaches 618 orgs to deploy infostealers, ransomware

exploits ransomware
2025-02-26 https://www.bleepingcomputer.com/news/security/encrypthub-breaches-618-orgs-to-deploy-infostealers-ransomware/
A threat actor tracked as "EncryptHub," aka Larva-208,  has been targeting organizations worldwide with spear-phishing and social engineering attacks to gain access to corporate networks. [...] "

Autosummary: Some of the keywords in file names that are targeted include "pass", "account", "auth", "2fa", "wallet", "seedphrase", "recovery", "keepass", "secret", and many others. In samples of the scripts seen by BleepingComputer, the threat actor attempts to steal a large amount of data from breached systems, including: Data from various cryptocurrency wallets, including MetaMask, Ethereum Wallet, Coinbase Wallet, Trust Wallet, Opera Wallet, Brave Wallet, TronLink, Trezor Wallet, and many others. "


Australian IVF giant Genea breached by Termite ransomware gang

exploits ransomware
2025-02-26 https://www.bleepingcomputer.com/news/security/australian-ivf-giant-genea-breached-by-termite-ransomware-gang/
​The Termite ransomware gang has claimed responsibility for breaching and stealing sensitive healthcare data belonging to Genea patients, one of Australia"s largest fertility services providers. [...] "

Autosummary: The ongoing investigation also discovered that Genea"s compromised patient management systems contained the following types of personal and health data, with the exposed information varying for each affected individual: Full names, emails, addresses, phone numbers, date of birth, emergency contacts, and next of kin, Medicare card numbers, private health insurance details, Defence DA numbers, medical record numbers, patient numbers, Medical history, diagnoses and treatments, medications and prescriptions, patient health questionnaire, pathology and diagnostic test results, notes from doctors and specialists, appointment details, and schedules. "


Leaked Black Basta Ransomware Chat Logs Reveal Inner Workings and Internal Conflicts

exploits ransomware
2025-02-26 https://thehackernews.com/2025/02/leaked-black-basta-chat-logs-reveal.html
More than a year"s worth of internal chat logs from a ransomware gang known as Black Basta have been published online in a leak that provides unprecedented visibility into their tactics and internal conflicts among its members. The Russian-language chats on the Matrix messaging platform between September 18, 2023, and September 28, 2024, were initially leaked on February 11, 2025, by an "

Autosummary: The group has been observed rotating its ransomware executable payloads, switching file extensions for encrypted files, and modifying ransom note text, leading the group called by other names such as Cring, Crypt3r, Phantom, Strike, Hello, Wickrme, HsHarada, and Rapture. YY is another administrator of Black Basta who is involved in support tasks Trump is one of the aliases for "the group"s main boss" Oleg Nefedov, who goes by the names GG and AA Trump and another individual, Bio, worked together in the now-dismantled Conti ransomware scheme One of the Black Basta affiliates is believed to be a minor aged 17 years Black Basta has begun to actively incorporate social engineering into their attacks following the success of Scattered Spider According to Qualys, the Black Basta group leverages known vulnerabilities, misconfigurations, and insufficient security controls to obtain initial access to target networks. "


Southern Water says Black Basta ransomware attack cost £4.5M in expenses

exploits ransomware
2025-02-26 https://www.bleepingcomputer.com/news/security/southern-water-says-black-basta-ransomware-attack-cost-45m-in-expenses/
United Kingdom water supplier Southern Water has disclosed that it incurred costs of £4.5 million ($5.7M) due to a cyberattack it suffered in February 2024. [...] "

Autosummary: "


Halcyon RDR boosts ransomware protection for organizations

exploits ransomware
2025-02-25 https://www.helpnetsecurity.com/2025/02/25/halcyon-rdr-service/

Halcyon announced Halcyon Ransomware Detection and Recovery (RDR), a no-cost integrated service that is now included with every deployment of the Halcyon Anti-Ransomware Platform. Most 24/7 threat monitoring and response services are not included with software platform purchases and are instead only offered at a significant additional cost. Halcyon offers 24/7 ransomware protection from a team of experts who investigate and respond to every single alert triggered in the Halcyon platform at no additional cost. … More

The post Halcyon RDR boosts ransomware protection for organizations appeared first on Help Net Security.

"

Autosummary: Halcyon RDR is powered by Halcyon RISE, an elite team of experts in ransomware TTPs, cryptography, threat intelligence, malware reverse engineering, and ransomware response. "


Firefox continues Manifest V2 support as Chrome disables MV2 ad-blockers

ransomware
2025-02-25 https://www.bleepingcomputer.com/news/security/firefox-continues-manifest-v2-support-as-chrome-disables-mv2-ad-blockers/
Mozilla has renewed its promise to continue supporting Manifest V2 extensions alongside Manifest V3, giving users the freedom to use the extensions they want in their browser. [...] "

Autosummary: Specifically, the internet company said it would continue to support both the "blockingWebRequest" and "declarativeNetRequest" APIs, corresponding to MV3 and MV2, respectively, allowing extensions like uBlock Origin to continue working as usual. "


LockBit taunts FBI Director Kash Patel with alleged “Classified” leak threat

ransomware
2025-02-25 https://securityaffairs.com/174639/cyber-crime/lockbit-taunts-fbi-director-kash-patel.html
LockBit claims to have “classified information” for FBI Director Kash Patel that could “destroy” the agency if leaked. The ransomware gang LockBit sent a strange message to newly appointed FBI Director Kash Patel, they offer alleged “classified information” that could “destroy” this agency if publicly disclosed. The ransomware group published the message on their dark […] "

Autosummary: "My business, from which I have paid so much tax, post-paid pentest, I created only to make us all, in our United States of America, a more secure place to live.LockBit taunts FBI Director Kash Patel with alleged “Classified” leak threat Pierluigi Paganini February 25, 2025 February 25, 2025 LockBit claims to have “classified information” for FBI Director Kash Patel that could “destroy” the agency if leaked. "


Becoming Ransomware Ready: Why Continuous Validation Is Your Best Defense

exploits ransomware
2025-02-24 https://thehackernews.com/2025/02/becoming-ransomware-ready-why.html
Ransomware doesn’t hit all at once—it slowly floods your defenses in stages. Like a ship subsumed with water, the attack starts quietly, below the surface, with subtle warning signs that are easy to miss. By the time encryption starts, it’s too late to stop the flood.  Each stage of a ransomware attack offers a small window to detect and stop the threat before it’s too late. The problem is "

Autosummary: Disabling Security Defenses To ensure uninterrupted encryption and prevent data recovery attempts during the attack, ransomware attempts to shut down security services such as: ✔ Antivirus & EDR (Endpoint Detection and Response) ✔ Backup agents ✔ Database systems 💡 How it works: Attackers use administrative commands or APIs to disable services like Windows Defender and backup solutions. 💡 How it works: Ransomware executes commands like: powershell vssadmin.exe delete shadows By wiping these backups, attackers ensure total data lockdown, increasing pressure on victims to pay the ransom. Indicators of Compromise (IOCs): What to Look Out For If you detect shadow copy deletions, process injections, or security service terminations, you may already be in the pre-encryption phase - but detecting these IOCs is a critical step to prevent the attack from unfolding. Let"s unpack the stages of a ransomware attack, how to stay resilient amidst constantly morphing indicators of compromise (IOCs), and why constant validation of your defense is a must to stay resilient. 💡 Defensive trick: Some security tools preemptively create mutexes associated with known ransomware strains, tricking the malware into thinking it"s already active - causing it to self-terminate. "


New NailaoLocker ransomware used against EU healthcare orgs

exploits ransomware
2025-02-20 https://www.bleepingcomputer.com/news/security/new-nailaolocker-ransomware-used-against-eu-healthcare-orgs/
A previously undocumented ransomware payload named NailaoLocker has been spotted in attacks targeting European healthcare organizations between June and October 2024. [...] "

Autosummary: Orange has shared several hypotheses for the attacks, including false flag operations meant to distract, strategic data theft operations doubled with revenue generation, and, more likely, a Chinese cyberespionage group "moonlighting" on the side to earn some money. "


China-Linked Attackers Exploit Check Point Flaw to Deploy ShadowPad and Ransomware

exploits ransomware
2025-02-20 https://thehackernews.com/2025/02/chinese-linked-attackers-exploit-check.html
A previously unknown threat activity cluster targeted European organizations, particularly those in the healthcare sector, to deploy PlugX and its successor, ShadowPad, with the intrusions ultimately leading to deployment of a ransomware called NailaoLocker in some cases. The campaign, codenamed Green Nailao by Orange Cyberdefense CERT, involved the exploitation of a new-patched security flaw "

Autosummary: The intrusions culminate with the use of Windows Management Instrumentation (WMI) to transmit three files, a legitimate executable signed by Beijing Huorong Network Technology Co., Ltd ("usysdiag.exe"), a loader named NailaoLoader ("sensapi.dll"), and NailaoLocker ("usysdiag.exe.dat"). "


NailaoLocker ransomware targets EU healthcare-related entities

exploits ransomware
2025-02-20 https://securityaffairs.com/174440/malware/nailaolocker-ransomware-targets-eu-healthcare-related-entities.html
NailaoLocker ransomware is a new threat that targeted European healthcare organizations from June to October 2024. Orange Cyberdefense CERT uncovered a malware campaign, tracked as The Green Nailao campaign, that targeted European organizations, including healthcare, in late 2024, using ShadowPad, PlugX, and the previously undocumented NailaoLocker ransomware. The Orange Cyberdefense CERT investigated four attackers with […] "

Autosummary: Orange Cyberdefense CERT uncovered a malware campaign, tracked as The Green Nailao campaign, that targeted European organizations, including healthcare, in late 2024, using ShadowPad, PlugX, and the previously undocumented NailaoLocker ransomware.NailaoLocker ransomware targets EU healthcare-related entities Pierluigi Paganini February 20, 2025 February 20, 2025 NailaoLocker ransomware is a new threat that targeted European healthcare organizations from June to October 2024. "


Black Basta ransomware gang"s internal chat logs leak online

exploits ransomware
2025-02-20 https://www.bleepingcomputer.com/news/security/black-basta-ransomware-gang-s-internal-chat-logs-leak-online/
An unknown leaker has released what they claim to be an archive of internal Matrix chat logs belonging to the Black Basta ransomware operation. [...] "

Autosummary: Some of their victims include German defense contractor Rheinmetall, Hyundai"s European division, BT Group(formerly British Telecom), U.S. healthcare giant Ascension, government contractor ABB, the American Dental Association, U.K. tech outsourcing firm Capita, the Toronto Public Library, and Yellow Pages Canada. "


#StopRansomware: Ghost (Cring) Ransomware

exploits ransomware
2025-02-19 https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-050a

Summary

Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing this joint advisory to disseminate known Ghost (Cring)—(“Ghost”)—ransomware IOCs and TTPs identified through FBI investigation as recently as January 2025.

Beginning early 2021, Ghost actors began attacking victims whose internet facing services ran outdated versions of software and firmware. This indiscriminate targeting of networks containing vulnerabilities has led to the compromise of organizations across more than 70 countries, including organizations in China. Ghost actors, located in China, conduct these widespread attacks for financial gain. Affected victims include critical infrastructure, schools and universities, healthcare, government networks, religious institutions, technology and manufacturing companies, and numerous small- and medium-sized businesses.

Ghost actors rotate their ransomware executable payloads, switch file extensions for encrypted files, modify ransom note text, and use numerous ransom email addresses, which has led to variable attribution of this group over time. Names associated with this group include Ghost, Cring, Crypt3r, Phantom, Strike, Hello, Wickrme, HsHarada, and Rapture. Samples of ransomware files Ghost used during attacks are: Cring.ex "

Autosummary: Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by the FBI, CISA, and the MS-ISAC.Their methodology includes leveraging vulnerabilities in Fortinet FortiOS appliances (CVE-2018-13379), servers running Adobe ColdFusion (CVE-2010-2861 and CVE-2009-3960), Microsoft SharePoint (CVE-2019-0604), and Microsoft Exchange (CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207— commonly referred to as the ProxyShell attack chain).The FBI, CISA, and MS-ISAC do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Additional details of interest include a targeted company point of contact, status and scope of infection, estimated loss, operational impact, date of infection, date detected, initial attack vector, and host and network-based indicators.Names associated with this group include Ghost, Cring, Crypt3r, Phantom, Strike, Hello, Wickrme, HsHarada, and Rapture.Slight variation of github[.]com/BeichenDream/Chunk-Proxy/blob/main/proxy.aspx Table 2: MD5 File Hashes Associated with Ghost Ransomware Activity File name MD5 File Hash Cring.exe c5d712f82d5d37bb284acd4468ab3533 Ghost.exe 34b3009590ec2d361f07cac320671410 d9c019182d88290e5489cdf3b607f982 ElysiumO.exe 29e44e8994197bdb0c2be6fc5dfc15c2 c9e35b5c1dc8856da25965b385a26ec4 d1c5e7b8e937625891707f8b4b594314 Locker.exe ef6a213f59f3fbee2894bd6734bbaed2 iex.txt, pro.txt (IOX) ac58a214ce7deb3a578c10b97f93d9c3 x86.log (IOX) c3b8f6d102393b4542e9f951c9435255 0a5c4ad3ec240fbfd00bdc1d36bd54eb sp.txt (IOX) ff52fdf84448277b1bc121f592f753c5 main.txt (IOX) a2fd181f57548c215ac6891d000ec6b9 isx.txt (IOX) 625bd7275e1892eac50a22f8b4a6355d sock.txt (IOX) db38ef2e3d4d8cb785df48f458b35090 Ransom Email Addresses Table 3 is a subset of ransom email addresses that have been included in Ghost ransom notes. Validate Security Controls In addition to applying mitigations, the FBI, CISA, and MS-ISAC recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory.Affected victims include critical infrastructure, schools and universities, healthcare, government networks, religious institutions, technology and manufacturing companies, and numerous small- and medium-sized businesses. The FBI is interested in any information that can be shared, to include logs showing communication to and from foreign IP addresses, a sample ransom note, communications with threat actors, Bitcoin wallet information, and/or decryptor files.Regardless of whether you or your organization have decided to pay the ransom, the FBI and CISA urge you to promptly report ransomware incidents to FBI’s Internet Crime Complain Center (IC3), a local FBI Field Office, or CISA via the agency’s Incident Reporting System or its 24/7 Operations Center (report@cisa.gov) or by calling 1-844-Say-CISA (1-844-729-2472). Impact and Encryption Ghost actors use Cring.exe, Ghost.exe, ElysiumO.exe, and Locker.exe, which are all ransomware executables that share similar functionality.This includes running scans to discover other network connected devices, running commands to list, add, or alter administrator accounts, using PowerShell to download and execute remote programs, and running scripts not usually seen on a network. Ghost actors rotate their ransomware executable payloads, switch file extensions for encrypted files, modify ransom note text, and use numerous ransom email addresses, which has led to variable attribution of this group over time. "


CISA and FBI: Ghost ransomware breached orgs in 70 countries

exploits ransomware
2025-02-19 https://www.bleepingcomputer.com/news/security/cisa-and-fbi-ghost-ransomware-breached-orgs-in-70-countries/
CISA and the FBI said attackers deploying Ghost ransomware have breached victims from multiple industry sectors across over 70 countries, including critical infrastructure organizations. [...] "

Autosummary: "


Lee Enterprises newspaper disruptions caused by ransomware attack

exploits ransomware
2025-02-18 https://www.bleepingcomputer.com/news/security/lee-enterprises-newspaper-disruptions-caused-by-ransomware-attack/
Newspaper publishing giant Lee Enterprises has confirmed that a ransomware attack is behind ongoing disruptions impacting the group"s operations for over two weeks. [...] "

Autosummary: "The incident impacted the Company"s operations, including distribution of products, billing, collections, and vendor payments. "


BlackLock ransomware onslaught: What to expect and how to fight it

exploits ransomware
2025-02-18 https://www.helpnetsecurity.com/2025/02/18/blacklock-ransomware-what-to-expect-how-to-fight-it/

BlackLock is on track to become the most active ransomware-as-a-service (RaaS) outfit in 2025, according to ReliaQuest. Its success is primarily due to their unusually active presence and good reputation on the ransomware-focused Russian-language forum RAMP, and their aggressive recruiting of traffers (individuals that steer victims to harmful content/software), initial access brokers (IABs), and affiliates. What is BlackLock? BlackLock (aka El Dorado or Eldorado) cropped up in early 2024. It uses custom-built ransomware that can … More

The post BlackLock ransomware onslaught: What to expect and how to fight it appeared first on Help Net Security.

"

Autosummary: BlackLock’s representative on RAMP forum, who goes by “$$$”, is highly active: they are making connections and building trust, engaging in chats in various forum sections, and are often reaching out to developers, initial access brokers, potential affiliates, and rival gangs. "


US charges two Russian men in connection with Phobos ransomware operation

exploits ransomware rusia-ucrania
2025-02-14 https://www.bitdefender.com/en-us/blog/hotforsecurity/us-charges-russian-men-phobos-ransomware-operation
Roman Berezhnoy and Egor Nikolaevich Glebov are alleged to have extorted over US $16 million in ransom payments using the Phobos ransomware, impacting over 1000 organisations in the United States. Read more in my article on the Hot for Security blog. "

Autosummary: "


RansomHub Becomes 2024’s Top Ransomware Group, Hitting 600+ Organizations Globally

exploits ransomware
2025-02-14 https://thehackernews.com/2025/02/ransomhub-becomes-2024s-top-ransomware.html
The threat actors behind the RansomHub ransomware-as-a-service (RaaS) scheme have been observed leveraging now-patched security flaws in Microsoft Active Directory and the Netlogon protocol to escalate privileges and gain unauthorized access to a victim network"s domain controller as part of their post-compromise strategy. "RansomHub has targeted over 600 organizations globally, spanning sectors "

Autosummary: "After gaining access into the environment and performing reconnaissance, these tunneling tools are strategically deployed on critical network devices, including ESXi hosts, Windows hosts, VPN appliances, and network attached storage (NAS) devices," Sygnia researchers said. "RansomHub has targeted over 600 organizations globally, spanning sectors such as healthcare, finance, government, and critical infrastructure, firmly establishing it as the most active ransomware group in 2024," Group-IB analysts said in an exhaustive report published this week. "


Sarcoma ransomware gang claims the theft of sensitive data from PCB maker Unimicron

exploits ransomware
2025-02-13 https://securityaffairs.com/174159/cyber-crime/sarcoma-ransomware-claims-the-theft-of-sensitive-data-from-pcb-maker-unimicron.html
The Sarcoma ransomware group announced a breach of the Taiwanese printed circuit board (PCB) manufacturing giant Unimicron. The Sarcoma ransomware group claims to have breached Taiwanese PCB manufacturer Unimicron, leaked sample files, and threatened a full data release if no ransom is paid by Tuesday, February 20, 2025. Unimicron Technology Corporation is a Taiwanese company […] "

Autosummary: "


RA World Ransomware Attack in South Asia Links to Chinese Espionage Toolset

exploits ransomware
2025-02-13 https://thehackernews.com/2025/02/hackers-exploited-pan-os-flaw-to-deploy.html
An RA World ransomware attack in November 2024 targeting an unnamed Asian software and services company involved the use of a malicious tool exclusively used by China-based cyber espionage groups, raising the possibility that the threat actor may be moonlighting as a ransomware player in an individual capacity. "During the attack in late 2024, the attacker deployed a distinct toolset that had "

Autosummary: The attacks took place between December 4, 2024, and January 23, 2025, Recorded Future"s Insikt Group said, adding the adversary, also tracked as Earth Estries, FamousSparrow, GhostEmperor, RedMike, and UNC2286, attempted to exploit more than 1,000 Cisco devices globally during the timeframe. "


Chinese espionage tools deployed in RA World ransomware attack

exploits ransomware
2025-02-13 https://www.bleepingcomputer.com/news/security/chinese-espionage-tools-deployed-in-ra-world-ransomware-attack/
A China-based threat actor, tracked as Emperor Dragonfly and commonly associated with cybercriminal endeavors, has been observed using in a ransomware attack a toolset previously attributed to espionage actors. [...] "

Autosummary: “During the attack in late 2024, the attacker deployed a distinct toolset that had previously been used by a China-linked actor in classic espionage attacks,” the researchers say, adding that "tools associated with China-based espionage groups are often shared resources" but "many aren’t publicly available and aren’t usually associated with cybercrime activity.” "


China-linked APTs’ tool employed in RA World Ransomware attack

exploits ransomware
2025-02-13 https://securityaffairs.com/174189/apt/ra-world-ransomware-attack-china-apt-possible-link.html
A November 2024 RA World ransomware attack on an Asian software firm used a tool linked to China-linked threat actors. Broadcom researchers reported that threat actors behind an RA World ransomware attack against an Asian software and services firm employed a tool that was explosively associated in the past with China-linked APT groups. “Tools that […] "

Autosummary: China-linked APTs’ tool employed in RA World Ransomware attack Pierluigi Paganini February 13, 2025 February 13, 2025 A November 2024 RA World ransomware attack on an Asian software firm used a tool linked to China-linked threat actors. "


Sarcoma ransomware claims breach at giant PCB maker Unimicron

exploits ransomware
2025-02-12 https://www.bleepingcomputer.com/news/security/sarcoma-ransomware-claims-breach-at-giant-pcb-maker-unimicron/
A relatively new ransomware operation named "Sarcoma" has claimed responsibility for an attack against the Unimicron printed circuit boards (PCB) maker in Taiwan. [...] "

Autosummary: Unimicron added on Sarcoma"s list of victims Source: BleepingComputer Unimicron is a public company manufacturing rigid and flexible PCBs, high-density interconnection (HDI) boards, and integrated circuit (IC) carriers. "


8Base Ransomware Data Leak Sites Seized in International Law Enforcement Operation

exploits ransomware
2025-02-11 https://thehackernews.com/2025/02/8base-ransomware-data-leak-sites-seized.html
Source: The Nation A coordinated law enforcement operation has taken down the dark web data leak and negotiation sites associated with the 8Base ransomware gang. Visitors to the data leak site are now greeted with a seizure banner that says: "This hidden site and the criminal content have been seized by the Bavarian State Criminal Police Office on behalf of the Office of the Public Prosecutor "

Autosummary: "


Operation Phobos Aetor: Police dismantled 8Base ransomware gang

exploits ransomware
2025-02-11 https://securityaffairs.com/174078/cyber-crime/police-dismantled-8base-ransomware-gang.html
Authorities dismantled the 8Base ransomware gang, shutting down its dark web data leak and negotiation sites. An international law enforcement operation, codenamed Operation Phobos Aetor, dismantled the 8Base ransomware gang. The police took down the dark web data leak and negotiation sites. The police has yet to disclose the names of the suspects. Authorities replaced […] "

Autosummary: Police dismantled 8Base ransomware gang Pierluigi Paganini February 11, 2025 February 11, 2025 Authorities dismantled the 8Base ransomware gang, shutting down its dark web data leak and negotiation sites. The 8Base ransomware group has been active since March 2022, it focused on small and medium-size businesses in multiple industries, including finance, manufacturing, business services, and IT. "


8Base ransomware group leaders arrested, leak site seized

exploits ransomware
2025-02-11 https://www.helpnetsecurity.com/2025/02/11/8base-ransomware-group-leaders-arrested-leak-site-seized-phobos/

The Thai police has arrested four individuals suspected of being the leaders of the 8Base ransomware group and of stealing approximately $16 million from 1,000+ victims they targeted with the Phobos ransomware. “Officers from Cyber Crime Investigation Bureau, led by Police Lieutenant General Trairong Phiwphan, conducted ‘Operation PHOBOS AETOR’ in Phuket on February 10, arresting four foreign hackers involved in ransomware attacks. The operation, coordinated with Immigration Police and Region 8 Police, raided four locations … More

The post 8Base ransomware group leaders arrested, leak site seized appeared first on Help Net Security.

"

Autosummary: Still, 8Base group claimed several victims in December 2024, including the Croatian port operating company Luka Rijeka, Canadian company Mint Pharmaceuticals, and Japanese manufacturing company Iseki Agricultural Machinery. "


US indicts 8Base ransomware operators for Phobos encryption attacks

exploits ransomware
2025-02-11 https://www.bleepingcomputer.com/news/security/us-indicts-8base-ransomware-operators-for-phobos-encryption-attacks/
The U.S. Justice Department announced the names of two Phobos ransomware affiliates arrested yesterday in Thailand, charging them on 11 counts due to their involvement in more than a thousand cyberattacks. [...] "

Autosummary: "


US sanctions LockBit ransomware’s bulletproof hosting provider

exploits ransomware
2025-02-11 https://www.bleepingcomputer.com/news/security/us-sanctions-lockbit-ransomwares-bulletproof-hosting-provider/
​The United States, Australia, and the United Kingdom have sanctioned Zservers, a Russia-based bulletproof hosting (BPH) services provider, for supplying essential attack infrastructure for the LockBit ransomware gang. [...] "

Autosummary: In 2022, a Russian hacker acquired IP addresses from Zservers, which were likely used with LockBit chat servers to coordinate ransomware activities, while, in 2023, Zservers provided infrastructure, including a Russian IP address, to a LockBit affiliate. "


Police arrests 4 Phobos ransomware suspects, seizes 8Base sites

exploits ransomware
2025-02-10 https://www.bleepingcomputer.com/news/legal/police-arrests-4-phobos-ransomware-suspects-seizes-8base-sites/
A global law enforcement operation targeting the Phobos ransomware gang has led to the arrest of four suspected hackers in Phuket, Thailand, and the seizure of 8Base"s dark web sites. The suspects are accused of conducting cyberattacks on over 1,000 victims worldwide. [...] "

Autosummary: The seizure message also indicates that "Operation Phobos Aetor" involved Thailand, Romania, Bavaria, Germany, Switzerland, Japan, USA, Europol, Czechia, Spain, France, Belgium, and the United Kingdom. "


Toll booth bandits continue to scam via SMS messages

financial ransomware
2025-02-10 https://www.bitdefender.com/en-us/blog/hotforsecurity/toll-booth-bandits-continue-to-scam-via-sms-messages
North American drivers are continuing to be barraged by waves of scam text messages, telling them that they owe money on unpaid tolls. Do you know what to tell your friends and family to watch out for? Read more in my article on the Hot for Security blog. "

Autosummary: For instance, Texas-based audience producer Gwen Howerton described on Bluesky how she had been duped by an unpaid toll scam after she had driven a rental car on the Dallas North Tollway - and, not being aware of the correct way to pay a toll, had believed the overdue payment demand she received to be genuine. "


Police arrests 2 Phobos ransomware suspects, seizes 8Base sites

exploits ransomware
2025-02-10 https://www.bleepingcomputer.com/news/legal/police-arrests-2-phobos-ransomware-suspects-seizes-8base-sites/
A global law enforcement operation targeting the Phobos ransomware gang has led to the arrest of two suspected hackers in Phuket, Thailand, and the seizure of 8Base"s dark web sites. The suspects are accused of conducting cyberattacks on over 1,000 victims worldwide. [...] "

Autosummary: The seizure message also indicates that "Operation Phobos Aetor" involved Thailand, Romania, Bavaria, Germany, Switzerland, Japan, USA, Europol, Czechia, Spain, France, Belgium, and the United Kingdom. The police operation, codenamed "Phobos Aetor," led to coordinated raids across four locations, where laptops, smartphones, and cryptocurrency wallets were seized for forensic analysis. "


Hackers Exploiting SimpleHelp RMM Flaws for Persistent Access and Ransomware

exploits ransomware
2025-02-07 https://thehackernews.com/2025/02/hackers-exploit-simplehelp-rmm-flaws.html
Threat actors have been observed exploiting recently disclosed security flaws in SimpleHelp"s Remote Monitoring and Management (RMM) software as a precursor for what appears to be a ransomware attack. The intrusion leveraged the now-patched vulnerabilities to gain initial access and maintain persistent remote access to an unspecified target network, cybersecurity company Field Effect said in a "

Autosummary: "The attack involved the quick and deliberate execution of several post-compromise tactics, techniques and procedures (TTPs) including network and system discovery, administrator account creation, and the establishment of persistence mechanisms, which could have led to the deployment of ransomware," security researchers Ryan Slaney and Daniel Albrecht said. "


Smashing Security podcast #403: Coinbase crypto heists, QR codes, and ransomware in the classroom

exploits ransomware
2025-02-06 https://grahamcluley.com/smashing-security-podcast-403/
In episode 403 of "Smashing Security" we dive into the mystery of $65 million vanishing from Coinbase users faster than J-Lo slipped into Graham"s DMs, Geoff gives a poor grade for PowerSchool"s security, and Carole takes a curious look at QR codes. All this and more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by The Lazarus Heist"s Geoff White. "

Autosummary: Hosts: Graham Cluley: @grahamcluley.com @[email protected] Carole Theriault: @caroletheriault Guest: Geoff White Episode links: Sponsored by: Tailscale – Tailscale is perfect for work or personal projects, making networking simple. "


Top 3 Ransomware Threats Active in 2025

exploits ransomware
2025-02-06 https://thehackernews.com/2025/02/top-3-ransomware-threats-active-in-2025.html
You arrive at the office, power up your system, and panic sets in. Every file is locked, and every system is frozen. A ransom demand flashes on your screen: "Pay $2 million in Bitcoin within 48 hours or lose everything." And the worst part is that even after paying, there’s no guarantee you’ll get your data back. Many victims hand over the money, only to receive nothing in return, or worse, get "

Autosummary: Ransom note demanding BitCoin left by Virlock During execution, ANY.RUN detects several malicious activities, revealing how Virlock operates: Behavior of Virlock ransomware analyzed by Interactive Sandbox A Virlock-specific mutex is identified, helping the malware ensure only one instance runs at a time to avoid interference. The ransom note includes .onion links that direct victims to the attackers" communication portal In the MITRE ATT&CK section, we get a clear breakdown of Lynx"s tactics and techniques, revealing how it operates: MITRE ATT&CK tactics and techniques used by Lynx ransomware Encrypting files to lock critical business data. LockBit: Teasing a Comeback in 2025 LockBit is one of the most notorious ransomware groups, known for its highly efficient encryption, double extortion tactics, and ability to evade traditional security measures. The Files Modification tab provides the changes of file system activity Shortly after, a ransom note appears, and the desktop wallpaper is replaced with an extortion message directing victims to a TOR site, where attackers demand payment. Latest Lynx attack: In mid-January 2025, Lynx targeted Lowe Engineers, a prominent civil engineering firm based in Atlanta, Georgia. "


Barclays customers continue to experience issues after major IT outage

ransomware
2025-02-01 https://www.bbc.com/news/articles/cd9qzg92g72o
Online banking, the bank"s app and payments in and out of accounts are all affected. "

Autosummary: "I"ve got my granddaughter here who"s 11 months old, also a one-year-old, two-year-old, 12-year-old, 13-year-old, 15-year-old all at home."Scott, 27, and his wife, who is four months pregnant, said they had sold their house on Friday morning, but the money for their new home had not gone through yet due to the problems at Barclays. "


A ransomware attack forced New York Blood Center to reschedule appointments

exploits ransomware
2025-02-01 https://securityaffairs.com/173702/cyber-crime/new-york-blood-center-faced-ransomware-attack.html
The New York Blood Center faced a ransomware attack on Sunday, forcing the healthcare organization to reschedule appointments. The New York Blood Center suffered a ransomware attack on Sunday, causing appointment rescheduling. The New York Blood Center (NYBC) is a community, nonprofit blood bank based in New York City. The community was established in 1964 […] "

Autosummary: A ransomware attack forced New York Blood Center to reschedule appointments Pierluigi Paganini February 01, 2025 February 01, 2025 The New York Blood Center faced a ransomware attack on Sunday, forcing the healthcare organization to reschedule appointments. "


Indian tech giant Tata Technologies hit by ransomware attack

exploits ransomware
2025-01-31 https://www.bleepingcomputer.com/news/security/indian-tech-giant-tata-technologies-hit-by-ransomware-attack/
Tata Technologies Ltd. had to suspend some of its IT services following a ransomware attack that impacted the company network. [...] "

Autosummary: It is one of India’s key tech developers and state project contractors, employs over 11,000 people, has an annual revenue of $600 million, and operates 18 locations in India, North America, Europe, and Asia-Pacific. "


Only 13% of organizations fully recover data after a ransomware attack

exploits ransomware
2025-01-29 https://www.helpnetsecurity.com/2025/01/29/ransomware-attacks-business-operations-disruption/

Ransomware attacks are disrupting and undermining business operations and draining revenue streams, according to Illumio. Findings from the study reveal that 58% of organizations had to shut down operations following a ransomware attack, up from 45% in 2021. 40% reported a significant loss of revenue (up from 22% in 2021); 41% lost customers; and 40% had to eliminate jobs. Attackers are reaching critical systems to cause maximum disruption Ransomware attacks impacted 25% of critical systems, … More

The post Only 13% of organizations fully recover data after a ransomware attack appeared first on Help Net Security.

"

Autosummary: According to the research, 29% of IT budgets are allocated to staff and technologies meant to prevent, detect, contain, and resolve ransomware attacks, yet attacks are still successful. 40% are confident in the ability of employees to detect social engineering lures (up from 30% in 2021), however, insider negligence is the top challenge when responding to ransomware attacks. "


How Interlock Ransomware Infects Healthcare Organizations

exploits ransomware
2025-01-29 https://thehackernews.com/2025/01/how-interlock-ransomware-infects.html
Ransomware attacks have reached an unprecedented scale in the healthcare sector, exposing vulnerabilities that put millions at risk. Recently, UnitedHealth revealed that 190 million Americans had their personal and healthcare data stolen during the Change Healthcare ransomware attack, a figure that nearly doubles the previously disclosed total.  This breach shows just how deeply ransomware "

Autosummary: Data sent by the RAT to attacker-controlled servers revealed by ANY.RUN Proactive Protection Against Ransomware in Healthcare The healthcare sector is a prime target for ransomware groups like Interlock, with attacks that jeopardize sensitive patient data, disrupt critical services, and put lives at risk. This tactic effectively bypasses the initial layer of user suspicion, but with early detection and analysis, SOC teams can quickly identify malicious domains, block access, and respond faster to emerging threats, reducing the potential impact on business operations. Inside ANY.RUN"s sandbox session, one of the updaters, upd_8816295.exe, is clearly identified within the process tree on the right-hand side, showing its malicious behavior and execution flow. "


ESXi ransomware attacks use SSH tunnels to avoid detection

exploits ransomware
2025-01-27 https://securityaffairs.com/173487/cyber-crime/esxi-ransomware-attacks-use-ssh-tunnels-to-avoid-detection.html
Threat actors behind ESXi ransomware attacks target virtualized environments using SSH tunneling to avoid detection. Researchers at cybersecurity firm Sygnia warn that threat actors behind ESXi ransomware attacks target virtualized environments using SSH tunneling to avoid detection. Ransomware groups are exploiting unmonitored ESXi appliances to persist and access corporate networks. They use “living-off-the-land” techniques, leveraging […] "

Autosummary: “ (VMware observer daemon log) “ /var/log/shell.log (ESXi shell activity log) (ESXi shell activity log) /var/log/hostd.log (Host agent log) (Host agent log) /var/log/auth.log (authentication log) “ The report provided multiple examples of common activities and messages found in ESXi syslog files that might be associated to malicious activity. "


TRIPLESTRENGTH Hits Cloud for Cryptojacking, On-Premises Systems for Ransomware

exploits ransomware
2025-01-23 https://thehackernews.com/2025/01/triplestrength-targets-cloud-platforms.html
Google on Wednesday shed light on a financially motivated threat actor named TRIPLESTRENGTH for its opportunistic targeting of cloud environments for cryptojacking and on-premise ransomware attacks. "This actor engaged in a variety of threat activity, including cryptocurrency mining operations on hijacked cloud resources and ransomware activity," the tech giant"s cloud division said in its 11th "

Autosummary: "


Experts Find Shared Codebase Linking Morpheus and HellCat Ransomware Payloads

exploits ransomware
2025-01-23 https://thehackernews.com/2025/01/experts-find-shared-codebase-linking.html
An analysis of HellCat and Morpheus ransomware operations has revealed that affiliates associated with the respective cybercrime entities are using identical code for their ransomware payloads. The findings come from SentinelOne, which analyzed artifacts uploaded to the VirusTotal malware scanning platform by the same submitter towards the end of December 2024. "These two payload samples are "

Autosummary: They are both configured to exclude the \Windows\System32 folder, as well as a hard-coded list of extensions from the encryption process, namely .dll, .sys, .exe, .drv, .com, and .cat, from the encryption process. "


Cybersecurity books on ransomware you shouldn’t miss

exploits ransomware ciber
2025-01-22 https://www.helpnetsecurity.com/2025/01/22/ransomware-cybersecurity-books/

This list of ransomware-focused cybersecurity books is tailored for professionals seeking practical insights and deeper knowledge. Covering technical strategies, real-world cases, and the evolving tactics of attackers, these books offer valuable perspectives to help strengthen defenses and refine incident response plans. Ransomware and Cyber Extortion: Response and Prevention Authors: Karen Sprenger, Sherri Davidoff, and Matt Durrin This guide offers value to everyone involved in prevention, response, planning, or policy: CIOs, CISOs, incident responders, investigators, negotiators, … More

The post Cybersecurity books on ransomware you shouldn’t miss appeared first on Help Net Security.

"

Autosummary: "


Two ransomware groups abuse Microsoft’s Office 365 platform to gain access to target organizations

exploits ransomware
2025-01-22 https://securityaffairs.com/173328/cyber-crime/ransomware-groups-abuse-microsofts-office-365-platform.html
Two ransomware groups exploiting Microsoft 365 services and default settings to target internal enterprise users. Sophos researchers started investigating two distinct clusters of activity, tracked as STAC5143 and STAC5777, in response to customer ransomware attacks in November and December 2024. Threat actors used their own Microsoft 365 tenants and exploited a default Teams setting allowing […] "

Autosummary: Once access was established, the attacker used a web browser to download a malicious payload, which was split into parts, reassembled, and unpacked to deploy malware.Two ransomware groups abuse Microsoft’s Office 365 platform to gain access to target organizations Pierluigi Paganini January 22, 2025 January 22, 2025 Two ransomware groups exploiting Microsoft 365 services and default settings to target internal enterprise users. "


Medusa ransomware: what you need to know

exploits ransomware
2025-01-21 https://www.tripwire.com/state-of-security/medusa-ransomware-what-you-need-know
Medusa is a ransomware-as-a-service (RaaS) platform that has targeted organisations around the world. Read more about it in my article on the Tripwire State of Security blog. "

Autosummary: The largest proportion of Medusa"s targets appear to be located in the United States, followed by the United Kingdom, Canada, Australia, France, and Italy. Image In addition to the dark web leak site, accessible via Tor, Medusa also publicises hacks and publishes stolen data on its public Telegram channel.It"s noticeable that organisations based in Belarus, Kazakhstan, Kyrgyzstan, Russia, and Tajikistan do not appear in the list of victims. "


Week in review: AWS S3 data encrypted without ransomware, data of 15k Fortinet firewalls leaked

exploits ransomware
2025-01-19 https://www.helpnetsecurity.com/2025/01/19/week-in-review-aws-s3-data-encrypted-without-ransomware-data-of-15k-fortinet-firewalls-leaked/

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Attackers are encrypting AWS S3 data without using ransomware A ransomware gang dubbed Codefinger is encrypting data stored in target organizations’ AWS S3 buckets with AWS’s server-side encryption option with customer-provided keys (SSE-C), and asking for money to hand over the key they used. Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them? A threat actor has leaked … More

The post Week in review: AWS S3 data encrypted without ransomware, data of 15k Fortinet firewalls leaked appeared first on Help Net Security.

"

Autosummary: Balancing usability and security in the fight against identity-based attacks In this Help Net Security interview, Adam Bateman, CEO of Push Security, talks about the rise in identity-based attacks, how they’re becoming more sophisticated each year, and how AI and ML are both fueling these threats and helping to defend against them.Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Attackers are encrypting AWS S3 data without using ransomware A ransomware gang dubbed Codefinger is encrypting data stored in target organizations’ AWS S3 buckets with AWS’s server-side encryption option with customer-provided keys (SSE-C), and asking for money to hand over the key they used. "


Python-Based Malware Powers RansomHub Ransomware to Exploit Network Flaws

exploits ransomware
2025-01-16 https://thehackernews.com/2025/01/python-based-malware-powers-ransomhub.html
Cybersecurity researchers have detailed an attack that involved a threat actor utilizing a Python-based backdoor to maintain persistent access to compromised endpoints and then leveraged this access to deploy the RansomHub ransomware throughout the target network. According to GuidePoint Security, initial access is said to have been facilitated by means of a JavaScript malware downloaded named "

Autosummary: As highlighted by Halcyon earlier this month, some of the other tools deployed prior to ransomware deployment include those responsible for - Disabling Endpoint Detection and Response (EDR) solutions using EDRSilencer and Backstab Stealing credentials using LaZagne Compromising email accounts by brute-forcing credentials using MailBruter Maintaining stealthy access and delivering additional payloads using Sirefef and Mediyes Ransomware campaigns have also been observed targeting Amazon S3 buckets by leveraging Amazon Web Services" Server-Side Encryption with Customer Provided Keys (SSE-C) to encrypt victim data. "


Clop Ransomware exploits Cleo File Transfer flaw: dozens of claims, disputed breaches

exploits ransomware
2025-01-16 https://securityaffairs.com/173135/cyber-crime/clop-ransomware-gang-claims-hack-of-cleo-file-transfer-customers.html
The Clop ransomware gang claims dozens of victims from a Cleo file transfer vulnerability, though several companies dispute the breaches. The Clop ransomware group added 59 new companies to its leak site, the gain claims to have breached them by exploiting a vulnerability ​​in Cleo file transfer products.  “We have data of many companies who […] "

Autosummary: Clop Ransomware exploits Cleo File Transfer flaw: dozens of claims, disputed breaches Pierluigi Paganini January 16, 2025 January 16, 2025 The Clop ransomware gang claims dozens of victims from a Cleo file transfer vulnerability, though several companies dispute the breaches. "


Clop Ransomware exploits Cleo File Transfer flaw: dozens of claims, disputed breaches

exploits ransomware
2025-01-16 https://securityaffairs.com/173135/uncategorized/clop-ransomware-gang-claims-hack-of-cleo-file-transfer-customers.html
The Clop ransomware gang claims dozens of victims from a Cleo file transfer vulnerability, though several companies dispute the breaches. The Clop ransomware group added 59 new companies to its leak site, the gain claims to have breached them by exploiting a vulnerability ​​in Cleo file transfer products.  “We have data of many companies who […] "

Autosummary: Clop Ransomware exploits Cleo File Transfer flaw: dozens of claims, disputed breaches Pierluigi Paganini January 16, 2025 January 16, 2025 The Clop ransomware gang claims dozens of victims from a Cleo file transfer vulnerability, though several companies dispute the breaches. "


UK government proposes ransomware payment ban for public sector

exploits government ransomware
2025-01-16 https://www.exponential-e.com/blog/uk-government-proposes-ransomware-payment-ban-for-public-sector
The UK government has proposed extending its ban on ransomware payments to cover the entire public sector in an attempt to deter cybercriminal attacks and protect taxpayers. But is a ban a good idea? Read more in my article on the Exponential-e blog. "

Autosummary: "


Codefinger ransomware gang uses compromised AWS keys to encrypt S3 bucket

exploits ransomware
2025-01-15 https://securityaffairs.com/173089/cyber-crime/codefinger-ransomware-gang-encrypts-s3-bucket.html
The ransomware group Codefinger is using compromised AWS keys to encrypt S3 bucket data using SSE-C, Halcyon researchers warn. The ransomware group Codefinger has been spotted using compromised AWS keys to encrypt data in S3 buckets. The threat actor used AWS’s Server-Side Encryption with Customer Provided Keys (SSE-C) for encryption, then demanded the payment of […] "

Autosummary: The Codefinger ransomware campaign targeting AWS SSE-C encryption is highly dangerous due to irreversible data loss without the attacker’s key, limited forensic evidence in AWS CloudTrail logs, and the potential to significantly disrupt critical data storage on Amazon S3 Organizations are recommended to protect themselves by hardening AWS environments: restrict SSE-C usage with IAM policies, monitor and audit AWS keys, enable detailed S3 logging, and collaborate with AWS support.Then they start the encryption by The threat actor looks for keys with permissions to write and read S3 objects (s3:GetObject and s3:PutObject requests), and then launches the encryption process by calling the x-amz-server-side-encryption-customer-algorithm header. "


Attackers are encrypting AWS S3 data without using ransomware

exploits ransomware
2025-01-13 https://www.helpnetsecurity.com/2025/01/13/codefinger-encrypting-aws-s3-data-without-ransomware-sse-c/

A ransomware gang dubbed Codefinger is encrypting data stored in target organizations’ AWS S3 buckets with AWS’s server-side encryption option with customer-provided keys (SSE-C), and asking for money to hand over the key they used. They do not exfiltrate the data beforehand, but mark the encrypted files for deletion within seven days, thus adding more pressure on organizations to pay the ransom. How does the attack unfold? The threat actor leverages targets’ previous compromised (whether … More

The post Attackers are encrypting AWS S3 data without using ransomware appeared first on Help Net Security.

"

Autosummary: “The attacker initiates the encryption process by calling the x-amz-server-side-encryption-customer-algorithm header, utilizing an AES-256 encryption key they generate and store locally,” the Halcyon research team explained. "


OneBlood confirms personal data stolen in July ransomware attack

exploits ransomware
2025-01-13 https://www.bleepingcomputer.com/news/security/oneblood-confirms-personal-data-stolen-in-july-ransomware-attack/
Blood-donation not-for-profit OneBlood confirms that donors" personal information was stolen in a ransomware attack last summer. [...] "

Autosummary: "


Inexperienced actors developed the FunkSec ransomware using AI tools

exploits ransomware
2025-01-13 https://securityaffairs.com/173018/cyber-crime/funksec-ransomware-was-developed-using-ai-tools.html
FunkSec, a new ransomware group that attacked more than 80 victims in December 2024, was developed using AI tools. The FunkSec ransomware-as-a-service (RaaS) group has been active since late 2024, the gang published over 85 victims in December 2024. The group likely used AI-based systems to quickly develop advanced tools, blending hacktivism and cybercrime. However, […] "

Autosummary: Inexperienced actors developed the FunkSec ransomware using AI tools Pierluigi Paganini January 13, 2025 January 13, 2025 FunkSec, a new ransomware group that attacked more than 80 victims in December 2024, was developed using AI tools. Once executed, FunkSec ransomware disables security features, including Windows Defender, logging, PowerShell restrictions, and shadow copy backups during execution. "


Preventing the next ransomware attack with help from AI

exploits ransomware
2025-01-10 https://www.helpnetsecurity.com/2025/01/10/darren-williams-blackfog-ransomware-awareness-training/

In this Help Net Security interview, Dr. Darren Williams, CEO at BlackFog, talks about how employee training plays a crucial role in preventing ransomware attacks. He points out that human error is often the biggest security risk and explains how AI tools, alongside gamification and real-time alerts, help employees identify advanced phishing threats. What role does employee awareness training play in preventing ransomware attacks? What innovative approaches can make such training more effective? Awareness training … More

The post Preventing the next ransomware attack with help from AI appeared first on Help Net Security.

"

Autosummary: Next, it is important to understand WHO is affected and WHAT sort of data is involved, because this will dictate your next critical step, which is communication with the authorities, internally and with customers.Now, with triple extortion, attackers target not only the initial victim but also customers, partners, regulators and even shareholders.In this Help Net Security interview, Dr. Darren Williams, CEO at BlackFog, talks about how employee training plays a crucial role in preventing ransomware attacks. "


AI-Driven Ransomware FunkSec Targets 85 Victims Using Double Extortion Tactics

exploits ransomware industry
2025-01-10 https://thehackernews.com/2025/01/ai-driven-ransomware-funksec-targets-85.html
Cybersecurity researchers have shed light on a nascent artificial intelligence (AI) assisted ransomware family called FunkSec that sprang forth in late 2024, and has claimed more than 85 victims to date. "The group uses double extortion tactics, combining data theft with encryption to pressure victims into paying ransoms," Check Point Research said in a new report shared with The Hacker News. " "

Autosummary: Some of the prominent actors associated with FunkSec are listed below - A suspected Algeria-based actor named Scorpion (aka DesertStorm) who has promoted the group on underground forums such as Breached Forum El_farado, who emerged as a main figure advertising FunkSec after DesertStorm"s ban from Breached Forum XTN, a likely associate who is involved in an as-yet-unknown "data-sorting" service Blako, who has been tagged by DesertStorm along with El_farado Bjorka, a known Indonesian hacktivist whose alias has been used to claim leaks attributed to FunkSec on DarkForums, either pointing to a loose affiliation or their attempts to impersonate FunkSec The possibility that the group may also be dabbling in hacktivist activity is evidenced by the presence of DDoS attack tools, as well as those related to remote desktop management (JQRAXY_HVNC) and password generation (funkgenerate). "


US charges operators of cryptomixers linked to ransomware gangs

exploits ransomware
2025-01-10 https://www.bleepingcomputer.com/news/security/us-charges-operators-of-cryptomixers-linked-to-ransomware-gangs/
The U.S. Department of Justice indicted three operators of sanctioned Blender.io and Sinbad.io crypto mixer services used by ransomware gangs and North Korean hackers to launder ransoms and stolen cryptocurrency. [...] "

Autosummary: "


BayMark Health Services sends breach notifications after ransomware attack

exploits ransomware
2025-01-10 https://www.malwarebytes.com/blog/news/2025/01/baymark-health-services-sends-breach-notifications-after-ransomware-attack
BayMark Health Services, Inc. notified an unknown number of patients that attackers stole their personal and health information. "

Autosummary: An investigation showed that the exposed files contained information that varied per patient but could have included the patient’s name and one or more of the following: Social Security number (SSN) Driver’s license number Date of birth The services received and the dates of service Insurance information Treating provider Treatment and/or diagnostic information While BayMark did not provide any information about the number of victims or the nature of the accident, it has been separately reported that the RansomHub ransomware group has BayMark listed on their leak site. "


Space Bears ransomware: what you need to know

exploits ransomware
2025-01-09 https://www.tripwire.com/state-of-security/space-bears-ransomware-what-you-need-know
The Space Bears ransomware gang stands out from the crowd by presenting itself better than many legitimate companies, with corporate stock images and a professional-looking leak site. Read more in my article on the Tripwire State of Security blog. "

Autosummary: Image Guarantees after the transaction: - Your publication will be deleted from this site - All downloaded information, confidential data, personal data, databases will be deleted from the servers - Tools to decrypt your system will be provided if necessary - We will give you information on how to avoid similar attacks in the futureThe gang, which is aligned to the Phobos ransomware-as-a-service group, steals sensitive data from organisations, encrypts victims" computer systems, and demands that a ransom be paid for a decryption key or the data will be published on the dark web. "


Casio says data of 8,500 people exposed in October ransomware attack

exploits ransomware
2025-01-07 https://www.bleepingcomputer.com/news/security/casio-says-data-of-8-500-people-exposed-in-october-ransomware-attack/
Japanese electronics manufacturer Casio says that the October 2024 ransomware incident exposed the personal data of approximately 8,500 people. [...] "

Autosummary: The latest announcement from the company lists the following exposed data: Employees (6,456 individuals) : Name, employee number, email address, affiliation, gender, date of birth, family details, address, phone number, taxpayer ID numbers, and HQ system account information. "


French govt contractor Atos denies Space Bears ransomware attack claims

exploits ransomware
2025-01-03 https://www.bleepingcomputer.com/news/security/french-govt-contractor-atos-denies-space-bears-ransomware-attack-claims/
French tech giant Atos, which secures communications for the country"s military and secret services, has denied claims made by the Space Bears ransomware gang that they compromised one of its databases. [...] "

Autosummary: "


Service disruptions continue to blindside businesses

ransomware
2024-12-26 https://www.helpnetsecurity.com/2024/12/26/service-disruptions-concern/

Service disruptions remain a critical concern for IT and business executives, with 88% of respondents saying they believe another major incident will occur in the next 12 months, according to PagerDuty. PagerDuty surveyed 1,000 IT and business executives who were director level and above, from the US, UK, Australia and Japan. Organizations must focus on preventing service disruptions 86% of executives surveyed now realize that they have been prioritizing security at the expense of readiness … More

The post Service disruptions continue to blindside businesses appeared first on Help Net Security.

"

Autosummary: Nearly half in the US (48%), Australia (48%), and the UK (47%), along with a majority in Japan (53%) believe that limited access to real-time data tools will further hinder their organizations during an outage, if approaches to service disruption are not prioritized. "


A ransomware attack disrupted services at Pittsburgh Regional Transit

exploits ransomware
2024-12-26 https://securityaffairs.com/172333/cyber-crime/pittsburgh-regional-transit-ransomware-attack.html
A ransomware attack on Pittsburgh Regional Transit (PRT) was the root cause of the agency’s service disruptions. On December 23, 2024, Pittsburgh Regional Transit (PRT) announced it was actively responding to a ransomware attack that was first detected on Thursday, December 19. Pittsburgh Regional Transit (PRT) is the public transportation agency that serves the Pittsburgh […] "

Autosummary: A ransomware attack disrupted services at Pittsburgh Regional Transit Pierluigi Paganini December 26, 2024 December 26, 2024 A ransomware attack on Pittsburgh Regional Transit (PRT) was the root cause of the agency’s service disruptions. "


Clop ransomware threatens 66 Cleo attack victims with data leak

exploits ransomware
2024-12-24 https://www.bleepingcomputer.com/news/security/clop-ransomware-threatens-66-cleo-attack-victims-with-data-leak/
The Clop ransomware gang started to extort victims of its Cleo data theft attacks and announced on its dark web portal that 66 companies have 48 hours to respond to the demands. [...] "

Autosummary: Clop achieves another major breach The Cleo data theft attack represents another major success for Clop, who leveraged leveraging a zero-day vulnerability in Cleo LexiCom, VLTransfer, and Harmony products to steal data from the networks of breached companies. "


Clop ransomware is now extorting 66 Cleo data-theft victims

exploits ransomware
2024-12-24 https://www.bleepingcomputer.com/news/security/clop-ransomware-is-now-extorting-66-cleo-data-theft-victims/
The Clop ransomware gang started to extort victims of its Cleo data theft attacks and announced on its dark web portal that 66 companies have 48 hours to respond to the demands. [...] "

Autosummary: Clop achieves another major breach The Cleo data theft attack represents another major success for Clop, who leveraged leveraging a zero-day vulnerability in Cleo LexiCom, VLTransfer, and Harmony products to steal data from the networks of breached companies. "


How companies can fight ransomware impersonations

exploits ransomware
2024-12-23 https://www.helpnetsecurity.com/2024/12/23/cybersecurity-measures-ransomware-impersonations-video/

As these threat actors become increasingly strategic and harder to detect, organizations must take all measures to protect their data, including cybersecurity training. In this Help Net Security video, Rodman Ramezanian, Global Cloud Threat Lead at Skyhigh Security, discusses how companies can defend themselves against threats and be prepared for future ones.

The post How companies can fight ransomware impersonations appeared first on Help Net Security.

"

Autosummary: "


US charges suspected LockBit ransomware developer

exploits ransomware
2024-12-23 https://www.helpnetsecurity.com/2024/12/23/us-charges-suspected-lockbit-ransomware-developer/

The US Department of Justice has unsealed charges against Rostislav Panev, 51, a dual Russian and Israeli national, suspected of being a developer for the LockBit ransomware group. Panev was arrested in August 2024 and is currently in custody in Israel pending extradition. The charges “According to the superseding complaint, documents filed in this and related cases, and statements made in court, Panev acted as a developer of the LockBit ransomware group from its inception … More

The post US charges suspected LockBit ransomware developer appeared first on Help Net Security.

"

Autosummary: The criminal complaint says that at the time of Panev’s arrest, Israeli law enforcement found on his computer: Administrator credentials for a dark web online repository, where source code for multiple versions of the LockBit builder were stored, along with source code for LockBit’s StealBit data exfiltration tool Access credentials for the LockBit control panel, an online dashboard maintained by LockBit developers for LockBit’s affiliates The complaint also alleges that Panev was in contact with Lockbit’s alleged primary administrator- Dimitry Yuryevich Khoroshev, aka LockBitSupp – and discussed work that needed to be done on the LockBit builder and control panel. "


US charged Dual Russian and Israeli National as LockBit Ransomware developer

exploits ransomware rusia-ucrania
2024-12-22 https://securityaffairs.com/172201/uncategorized/us-authorities-charged-lockbit-ransomware-developer.html
US authorities charged a dual Russian and Israeli national for being a developer of the LockBit ransomware group. Rostislav Panev, 51, a dual Russian-Israeli national, was charged as a LockBit ransomware developer. Arrested in Israel, he awaits extradition to the U.S. Panev was arrested in Israel in August and is awaiting extradition to the U.S. […] "

Autosummary: “As alleged in the superseding complaint, at the time of Panev’s arrest in Israel in August, law enforcement discovered on Panev’s computer administrator credentials for an online repository that was hosted on the dark web and stored source code for multiple versions of the LockBit builder, which allowed LockBit’s affiliates to generate custom builds of the LockBit ransomware malware for particular victims. "


LockBit Developer Rostislav Panev Charged for Billions in Global Ransomware Damages

exploits ransomware
2024-12-21 https://thehackernews.com/2024/12/lockbit-developer-rostislav-panev.html
A dual Russian and Israeli national has been charged in the United States for allegedly being the developer of the now-defunct LockBit ransomware-as-a-service (RaaS) operation since its inception in or around 2019 through at least February 2024. Rostislav Panev, 51, was arrested in Israel earlier this August and is currently awaiting extradition, the U.S. Department of Justice (DoJ) said in a "

Autosummary: " With the latest arrest, a total of seven LockBit members – Mikhail Vasiliev, Ruslan Astamirov, Artur Sungatov, Ivan Gennadievich Kondratiev, Mikhail Pavlovich Matveev – have been charged in the U.S. Despite these operational setbacks, the LockBit operators appear to be plotting a comeback, with a new version LockBit 4.0 scheduled for release in February 2025. "Once a co-conspirator sold the data, Antonenko and others used Bitcoin as well as traditional bank and cash transactions to launder the proceeds in order to disguise their nature, location, source, ownership, and control," the DoJ noted in May 2020. "


Romanian national was sentenced to 20 years in prison for his role in NetWalker ransomware attacks

exploits ransomware
2024-12-21 https://securityaffairs.com/172182/cyber-crime/romanian-national-was-sentenced-to-20-years-netwalker-attacks.html
Romanian national was sentenced to 20 years in prison for his role in NetWalker ransomware attacks, pleading guilty to fraud charges in June. Romanian national Daniel Christian Hulea, 30, was sentenced to 20 years in prison for his role in NetWalker ransomware attacks. Hulea pleaded guilty to computer fraud conspiracy and wire fraud conspiracy on […] "

Autosummary: “The Department of Justice today announced a coordinated international law enforcement action to disrupt a sophisticated form of ransomware known as NetWalker.” reads the press release published by DoJ. “NetWalker ransomware has impacted numerous victims, including companies, municipalities, hospitals, law enforcement, emergency services, school districts, colleges, and universities. "


Romanian Netwalker ransomware affiliate sentenced to 20 years in prison

exploits ransomware
2024-12-20 https://www.bleepingcomputer.com/news/security/romanian-netwalker-ransomware-affiliate-sentenced-to-20-years-in-prison/
​Daniel Christian Hulea, a Romanian man charged for his involvement in NetWalker ransomware attacks, was sentenced to 20 years in prison after pleading guilty to computer fraud conspiracy and wire fraud conspiracy in June. [...] "

Autosummary: Affiliates of the NetWalker cybercrime gang have deployed this malware in attacks against hundreds of victims worldwide, including hospitals, law enforcement, emergency services, companies, municipalities, school districts, colleges, and universities. "


Ascension: Health data of 5.6 million stolen in ransomware attack

exploits ransomware
2024-12-20 https://www.bleepingcomputer.com/news/security/ascension-health-data-of-56-million-stolen-in-ransomware-attack/
​Ascension, one of the largest private U.S. healthcare systems, is notifying over 5.6 million patients and employees that their personal and health data was stolen in a May cyberattack linked to the Black Basta ransomware operation. [...] "

Autosummary: " Since the breach, Ascension"s investigation has revealed that some of the stolen files contained patients" and employees" names and information across one or more of the following categories (the specific type of exposed information varies from one individual to another): Medical information, such as medical record numbers, dates of service, types of lab tests, or procedure codes, Payment information encompassing credit card information or bank account numbers, Insurance information containing Medicaid/Medicare IDs, policy numbers, or insurance claims, Government identification information, including Social Security numbers, tax identification numbers, driver"s license numbers, or passport numbers, And other personal information, such as dates of birth or addresses. "


US charges Russian-Israeli as suspected LockBit ransomware coder

exploits ransomware rusia-ucrania
2024-12-20 https://www.bleepingcomputer.com/news/security/us-charges-russian-israeli-as-suspected-lockbit-ransomware-coder/
The US Department of Justice has charged a Russian-Israeli dual-national for his suspected role in developing malware and managing the infrastructure for the notorious LockBit ransomware group. [...] "

Autosummary: "As alleged in the superseding complaint, at the time of Panev"s arrest in Israel in August, law enforcement discovered on Panev"s computer administrator credentials for an online repository that was hosted on the dark web and stored source code for multiple versions of the LockBit builder, which allowed LockBit"s affiliates to generate custom builds of the LockBit ransomware malware for particular victims," reads the complaint. "


Krispy Kreme breach, data theft claimed by Play ransomware gang

exploits ransomware
2024-12-20 https://www.bleepingcomputer.com/news/security/krispy-kreme-breach-data-theft-claimed-by-play-ransomware-gang/
The Play ransomware gang has claimed responsibility for a cyberattack that impacted the business operations of the U.S. doughnut chain Krispy Kreme in November. [...] "

Autosummary: Krispy Kreme entry on Play Ransomware leak site (BleepingComputer) Play ransomware claims, without proof, that they collected and stole files containing "private and personal confidential data, client documents, budget, payroll, accounting, contracts, taxes, IDs, finance information," and more. "


Rhode Island confirms data breach after Brain Cipher ransomware attack

financial exploits ransomware
2024-12-16 https://www.bleepingcomputer.com/news/security/rhode-island-confirms-data-breach-after-brain-cipher-ransomware-attack/
Rhode Island is warning that its RIBridges system, managed by Deloitte, suffered a data breach exposing residents" personal information after the Brain Cipher ransomware gang hacked its systems. [...] "

Autosummary: "On December 13, 2024, the State was informed by its vendor, Deloitte, that there was a major security threat to the RIBridges system," reads the announcement published by the Rhode Island authorities on Saturday. "


Clop ransomware claims responsibility for Cleo data theft attacks

exploits ransomware
2024-12-15 https://www.bleepingcomputer.com/news/security/clop-ransomware-claims-responsibility-for-cleo-data-theft-attacks/
The Clop ransomware gang has confirmed to BleepingComputer that they are behind the recent Cleo data-theft attacks, utilizing zero-day exploits to breach corporate networks and steal data. [...] "

Autosummary: If the data is government services, institutions, medicine, then we will immediately delete this data without hesitation (let me remind you about the last time when it was with moveit - all government data, medicine, clinics, data of scientific research at the state level were deleted), we comply with our regulations. "


CISA confirms critical Cleo bug exploitation in ransomware attacks

exploits ransomware
2024-12-13 https://www.bleepingcomputer.com/news/security/cisa-confirms-critical-cleo-bug-exploitation-in-ransomware-attacks/
CISA confirmed today that a critical remote code execution bug in Cleo Harmony, VLTrader, and LexiCom file transfer software is being exploited in ransomware attacks. [...] "

Autosummary: While the cybersecurity agency didn"t provide any other information regarding the ransomware campaign targeting Cleo servers left vulnerable to CVE-2024-50623 exploits, these attacks are uncannily similar to previous Clop data theft attacks that exploited zero-days in MOVEit Transfer, GoAnywhere MFT, and Accellion FTA in recent years. "


Cleo patches zero-day exploited by ransomware gang

exploits ransomware
2024-12-12 https://www.helpnetsecurity.com/2024/12/12/cleo-patches-zero-day-exploited-by-ransomware-gang/

Cleo has released a security patch to address the critical vulnerability that started getting exploited while still a zero-day to breach internet-facing Cleo Harmony, VLTrader, and LexiCom instances. Version 5.8.0.24 of the three products, which was pushed out on Wednesday, plugs the hole that allowed attackers into vulnerable installations, where they moved to establish a reverse shell connection to their servers and perform reconnaissance. Huntress researcher John Hammond confirmed that the patch is effective at … More

The post Cleo patches zero-day exploited by ransomware gang appeared first on Help Net Security.

"

Autosummary: The post-exploitation framework: Deletes the first stage payload (downloader) Sends out status updates to the C2 server Allows operators to read and collect files or directories Allows operators to retrieve Cleo configuration files (for information about the installation) and issue execution commands Allows operators to perform basic read and write operations on the filesystem Rapid7 researchers have visually explained the attack flow thus: Attack flow (Source: Rapid7) After initial exploitation, they’ve also observed the attacker: Executing commands aimed at gathering user, group and system information from the impacted system and displaying domain trust relationships Executing an overpass-the-hash attack to create a valid Kerberos ticket and thus gain access to additional network resources within the impacted environment. "


Lynx ransomware behind Electrica energy supplier cyberattack

exploits ransomware industry ciber
2024-12-11 https://www.bleepingcomputer.com/news/security/lynx-ransomware-behind-electrica-energy-supplier-cyberattack/
​The Romanian National Cybersecurity Directorate (DNSC) says the Lynx ransomware gang breached Electrica Group, one of the largest electricity suppliers in the country. [...] "

Autosummary: INC vs Lynx ransomware string comparison (BleepingComputer) Since it emerged as a ransomware-as-a-service (RaaS) operation in July 2023, INC Ransom has also breached many education, healthcare, government, and industrial entities, including Yamaha Motor Philippines, Scotland"s National Health Service (NHS), and the U.S. division of Xerox Business Solutions (XBS). "


SecureAuth protects sensitive information with biometric continuous identity assurance

ransomware
2024-12-10 https://www.helpnetsecurity.com/2024/12/10/secureauth-biometric-continuous-identity-assurance/

SecureAuth is releasing biometric continuous identity assurance (BCIA). This ability is designed to safeguard a company’s sensitive information for the duration of a user’s session — providing additional protection from emerging threats in today’s hybrid and remote work environments. “Not having biometric continuous identity assurance after the initial login authentication creates a critical vulnerability,” said SecureAuth CEO Joseph Dhanapal. “The rest of the session remains unprotected, leaving organizations exposed to unauthorized access and malicious actions. … More

The post SecureAuth protects sensitive information with biometric continuous identity assurance appeared first on Help Net Security.

"

Autosummary: According to SecureAuth CRO Tom Smith, these expanded capabilities strengthen SecureAuth’s competitiveness in sectors with high security needs, especially legal services, call centers and regulated industries like financial services, healthcare, defense contracting, and more. "


US sanctions Chinese firm for hacking firewalls in ransomware attacks

exploits ransomware
2024-12-10 https://www.bleepingcomputer.com/news/security/us-sanctions-chinese-firm-for-hacking-firewalls-in-ragnarok-ransomware-attacks/
The U.S. Treasury Department has sanctioned Chinese cybersecurity company Sichuan Silence and one of its employees for their involvement in a series of Ragnarok ransomware attacks targeting U.S. critical infrastructure companies and many other victims worldwide in April 2020. [...] "

Autosummary: "Between April 22 and 25, 2020, Guan Tianfeng used this zero-day exploit to deploy malware to approximately 81,000 firewalls owned by thousands of businesses worldwide," a press release published today revealed. "


3AM ransomware: what you need to know

exploits ransomware
2024-12-10 https://www.tripwire.com/state-of-security/3am-ransomware-what-you-need-know
The 3AM ransomware first emerged in late 2023. Like other ransomware, 3AM exfiltrates victims" data (demanding a ransom is paid) and encrypts the copies left behind. Here"s what you need to know. Read more in my article on the Tripwire State of Security blog. "

Autosummary: Not "backup" as in a "backup of your data" unfortunately but rather as a "backup plan". 3AM drops a ransom note on attacked systems, warning victims that their sensitive data has been stolen and proposing "a deal" to prevent it from being sold on the dark web.The latter of those not only saw social security numbers, driver’s licenses, payroll, health and other personal data of Hoboken workers and residents leaked, but also erotic short stories found on an employee"s computer. "


US sanctions Chinese cybersecurity company for firewall compromise, ransomware attacks

exploits ransomware ciber
2024-12-10 https://www.helpnetsecurity.com/2024/12/10/us-sanctions-sichuan-silence-guan-tianfeng/

The Department of the Treasury is sanctioning Chinese cybersecurity company Sichuan Silence, and one of its employees, Guan Tianfeng, for their roles in the April 2020 compromise of tens of thousands of firewalls worldwide. Many of the victims were U.S. critical infrastructure companies. The Department of Justice unsealed an indictment on Guan for the same activity. The U.S. Department of State also announced a Rewards for Justice reward offer of up to $10 million for … More

The post US sanctions Chinese cybersecurity company for firewall compromise, ransomware attacks appeared first on Help Net Security.

"

Autosummary: OFAC is designating Sichuan Silence and Guan pursuant to Executive Order (E.O.) 13694, as amended by E.O. 13757, for being responsible for or complicit in, or having engaged in, directly or indirectly cyber-enabled activities originating from, or directed by persons located, in whole or in substantial part, outside the United States that are reasonably likely to result in, or have materially contributed to, a significant threat to the national security, foreign policy, or economic health or financial stability of the United States and that have the purpose or effect of harming, or otherwise significantly compromising the provision of services by, a computer or network of computers that support one or more entities in a critical infrastructure sector. "


Romanian energy supplier Electrica Group is facing a ransomware attack

exploits ransomware industry
2024-12-10 https://securityaffairs.com/171832/hacking/electrica-group-ransomware-attack.html
Romanian energy supplier Electrica Group is investigating an ongoing ransomware attack impacting its operations. Romanian energy supplier Electrica Group suffered a cyber attack that is impacting its operations. The company assured investors that the attack hadn’t affected its critical systems, but temporary disruptions in customer services might occur due to enhanced security protocols. These measures […] "

Autosummary: The teams of specialists are working closely with the national cybersecurity authorities to manage and resolve the incident, aiming to address the situation as quickly as possible, identify the source of the attack, and limit its impact.” reads the note. Pierluigi Paganini December 10, 2024 December 10, 2024 Romanian energy supplier Electrica Group is investigating an ongoing ransomware attack impacting its operations. "


Romanian energy supplier Electrica hit by ransomware attack

exploits ransomware industry
2024-12-09 https://www.bleepingcomputer.com/news/security/romanian-energy-supplier-electrica-hit-by-ransomware-attack/
Electrica Group, a key player in the Romanian electricity distribution and supply market, is investigating a ransomware attack that was still "in progress" earlier today. [...] "

Autosummary: "


Black Basta Ransomware Evolves with Email Bombing, QR Codes, and Social Engineering

exploits ransomware
2024-12-09 https://thehackernews.com/2024/12/black-basta-ransomware-evolves-with.html
The threat actors linked to the Black Basta ransomware have been observed switching up their social engineering tactics, distributing a different set of payloads such as Zbot and DarkGate since early October 2024. "Users within the target environment will be email bombed by the threat actor, which is often achieved by signing up the user"s email to numerous mailing lists simultaneously," Rapid7 "

Autosummary: The threat actor, which is also referred to as UNC4393, has since put to use various bespoke malware families to carry out its objectives - KNOTWRAP, a memory-only dropper written in C/C++ that can execute an additional payload in memory KNOTROCK, a .NET-based utility that"s used to execute the ransomware DAWNCRY, a memory-only dropper that decrypts an embedded resource into memory with a hard-coded key PORTYARD, a tunneler that establishes a connection to a hard-coded command-and-control (C2) server using a custom binary protocol over TCP COGSCAN, a .NET reconnaissance assembly used to gather a list of hosts available on the network "Black Basta"s evolution in malware dissemination shows a peculiar shift from a purely botnet-reliant approach to a hybrid model that integrates social engineering," RedSense"s Yelisey Bohuslavskiy said. "


Deloitte denied its systems were hacked by Brain Cipher ransomware group

exploits ransomware
2024-12-09 https://securityaffairs.com/171827/uncategorized/deloitte-denied-its-systems-were-hacked-by-brain-cipher-ransomware-group.html
Deloitte has responded to claims by the Brain Cipher ransomware group, which alleges the theft of over 1 terabyte of the company’s data. Recently, the ransomware group Brain Cipher added Deloitte UK to its Tor leak site. The gang claimed to have stolen one terabyte of compressed data from the company. A Deloitte spokesperson addressed […] "

Autosummary: Deloitte denied its systems were hacked by Brain Cipher ransomware group Pierluigi Paganini December 09, 2024 December 09, 2024 Deloitte has responded to claims by the Brain Cipher ransomware group, which alleges the theft of over 1 terabyte of the company’s data. "


Anna Jaques Hospital ransomware breach exposed data of 300K patients

exploits ransomware
2024-12-07 https://www.bleepingcomputer.com/news/security/anna-jaques-hospital-ransomware-breach-exposed-data-of-300k-patients/
Anna Jaques Hospital has confirmed on its website that a ransomware attack it suffered almost precisely a year ago, on December 25, 2023, has exposed sensitive health data for over 316,000 patients. [...] "

Autosummary: "


8Base ransomware group hacked Croatia’s Port of Rijeka

exploits ransomware
2024-12-07 https://securityaffairs.com/171779/cyber-crime/8base-ransomware-croatias-port-of-rijeka.html
The 8Base ransomware group attacked Croatia’s Port of Rijeka, stealing sensitive data, including contracts and accounting info. A cyber attack hit the Port of Rijeka in Croatia, the 8Base ransomware group claimed responsibility for the security breach. The Port of Rijeka (Luka Rijeka d.d.), Croatia’s largest dry cargo concessionaire, provides maritime traffic services, port operations, […] "

Autosummary: "


Blue Yonder SaaS giant breached by Termite ransomware gang

exploits ransomware
2024-12-06 https://www.bleepingcomputer.com/news/security/blue-yonder-saas-giant-breached-by-termite-ransomware-gang/
​The Termite ransomware gang has officially claimed responsibility for the November breach of software as a service (SaaS) provider Blue Yonder. [...] "

Autosummary: Its list of over 3,000 customers includes other high-profile companies like Microsoft, Renault, Bayer, Tesco, Lenovo, DHL, 3M, Ace Hardware, Procter & Gamble, Carlsberg, Dole, Wallgreens, Western Digital, and 7-Eleven. "


Netography introduces AI-powered ransomware detection capabilities

exploits ransomware
2024-12-05 https://www.helpnetsecurity.com/2024/12/05/netography-ransomware-detection-capabilities/

Netography announced new ransomware detection capabilities that enable organizations to respond to malicious activity in real-time before it disrupts operations or threatens business continuity. These AI-powered enhancements enable Fusion customers to close the network observability and security gaps caused by limitations in their existing platform-native and cloud-native tools, including the inability to detect malicious activity and the lack of a holistic view of all network activity. The scope of the ransomware problem continues to grow, … More

The post Netography introduces AI-powered ransomware detection capabilities appeared first on Help Net Security.

"

Autosummary: The Fusion platform also reduces the workload of operations teams by automatically discovering new VPCs or VNet instances (or changes in the behavior in existing instances), applying policies, and monitoring the activity of those instances: Virtual Private Cloud (VPC) and Virtual Network (VNet) Auto-Detection and Auto-Onboarding – Fusion can now automatically detect, apply policies, and monitor newly discovered VPC and VNets, eliminating blind spots in security monitoring. "


Russian money-laundering network linked to drugs and ransomware disrupted, 84 arrests

financial exploits ransomware rusia-ucrania
2024-12-05 https://www.tripwire.com/state-of-security/money-laundering-network-linked-drugs-and-ransomware-disrupted
The UK"s National Crime Agency (NCA) has revealed details of Operation Destabilise, a years-long international law enforcement investigation into a giant Russian money laundering enterprise that handled billions of dollars for drug traffickers and ransomware gangs worldwide. Read more in my article on the Tripwire State of Security blog. "

Autosummary: Led by the National Crime Agency working with Border Force, Op Destabilise has exposed Russian kleptocrats, drug gangs, and cyber criminals - all of whom relied on the flow of dirty money," said Security Minister Dan Jarvis. "


UK disrupts Russian money laundering networks used by ransomware

financial exploits ransomware rusia-ucrania
2024-12-04 https://www.bleepingcomputer.com/news/security/uk-disrupts-russian-money-laundering-networks-used-by-ransomware/
​A law enforcement operation led by the United Kingdom"s National Crime Agency (NCA) has disrupted two Russian money laundering networks working with criminals worldwide, including ransomware gangs. [...] "

Autosummary: As part of this Operation Destabilise, U.K. law enforcement has collaborated with many international partners, including the U.S. Department of the Treasury"s Office of Foreign Assets Control (OFAC), the FBI, the Drug Enforcement Agency, the French Direction Centrale de la Police Judiciaire, and Ireland"s national police and security service, An Garda Síochána (AGS). "


BT unit took servers offline after Black Basta ransomware breach

exploits ransomware
2024-12-04 https://www.bleepingcomputer.com/news/security/bt-conferencing-division-took-servers-offline-after-black-basta-ransomware-attack/
Multinational telecommunications giant BT Group (formerly British Telecom) has confirmed that its BT Conferencing business division shut down some of its servers following a Black Basta ransomware breach. [...] "

Autosummary: Some of its most notable victims include U.S. healthcare giant Ascension, U.K. tech outsourcing firm Capita, German defense contractor Rheinmetall, government contractor ABB, Hyundai"s European division, the Toronto Public Library, the American Dental Association, and Yellow Pages Canada. "


Black Basta ransomware gang hit BT Group

exploits ransomware
2024-12-04 https://securityaffairs.com/171668/breaking-news/black-basta-ransomware-attack-bt-group.html
BT Group (formerly British Telecom)’s Conferencing division shut down some of its servers following a Black Basta ransomware attack. British multinational telecommunications holding company BT Group (formerly British Telecom) announced it has shut down some of its servers following a Black Basta ransomware attack. “We identified an attempt to compromise our BT Conferencing platform. This […] "

Autosummary: The group claimed to have stolen 500GB of data including Finacial data, Organisation data, Users data and personal documents, NDA’s, Confidential data, and more. "


No guarantees of payday for ransomware gang that claims to have hacked children’s hospital

exploits ransomware
2024-12-03 https://www.bitdefender.com/en-us/blog/hotforsecurity/no-guarantees-of-payday-for-ransomware-gang-that-claims-to-have-hacked-childrens-hospital
What is the point of INC Ransom"s attack on Alder Hey? They are not likely to be paid, and the attack on a children"s hospital only increases the chances that they will one day find their collars felt by law enforcement. Read more in my article on the Hot for Security blog. "

Autosummary: Fortunately, Alder Hey Children"s Hospital says that it continues to operate as normal, and that patients" care has not been disrupted as a result of the suspected data breach, in what appears to be the latest in a string of ransomware attacks against NHS organisations. "


US government, energy sector contractor hit by ransomware

exploits government ransomware industry
2024-12-03 https://www.helpnetsecurity.com/2024/12/03/englobal-ransomware-attack/

ENGlobal, a Texas-based engineering and automation contractor for companies in the energy sector, has had its data encrypted by attackers. “On November 25, 2024, ENGlobal Corporation (the “Company”) became aware of a cybersecurity incident. The preliminary investigation has revealed that a threat actor illegally accessed the Company’s information technology (“IT”) system and encrypted some of its data files,” the company shared in an 8-K filed on Monday with the US Securities and Exchange Commission. The … More

The post US government, energy sector contractor hit by ransomware appeared first on Help Net Security.

"

Autosummary: "


Energy industry contractor ENGlobal Corporation discloses a ransomware attack

exploits ransomware industry
2024-12-03 https://securityaffairs.com/171617/cyber-crime/englobal-corporation-disclosed-a-ransomware-attack.html
ENGlobal Corporation disclosed a ransomware attack, discovered on November 25, disrupting operations, in a filing to the SEC. A ransomware attack disrupted the operations of a major energy industry contractor, ENGlobal Corporation. Founded in 1985, ENGlobal Corporation designs automated control systems for commercial and government sectors, reporting $6 million in Q3 revenue and $18.4 million […] "

Autosummary: Energy industry contractor ENGlobal Corporation discloses a ransomware attack Pierluigi Paganini December 03, 2024 December 03, 2024 ENGlobal Corporation disclosed a ransomware attack, discovered on November 25, disrupting operations, in a filing to the SEC. "


Vodka maker Stoli files for bankruptcy in US after ransomware attack

financial exploits ransomware
2024-12-03 https://www.bleepingcomputer.com/news/security/vodka-maker-stoli-files-for-bankruptcy-in-us-after-ransomware-attack/
Stoli Group"s U.S. companies have filed for bankruptcy following an August ransomware attack and Russian authorities seizing the company"s remaining distilleries in the country. [...] "

Autosummary: "


No company too small for Phobos ransomware gang, indictment reveals

exploits ransomware
2024-12-02 https://www.malwarebytes.com/blog/news/2024/12/no-company-too-small-for-phobos-ransomware-gang-indictment-reveals
The US indictment against an alleged Phobos ransomware kingpin reveals that no company was too small for the cybercriminal gang to hit. "

Autosummary: Ptitsyn, who was extradited to the United States out of South Korea, now faces 13 counts, which include wire fraud, conspiracy to commit wire fraud, and conspiracy to commit computer fraud and abuse, along with four counts each of causing intentional damage to protected computers and extortion in relation to hacking. "


Radiant Logic provides continuous identity hygiene assessments via real-time streaming data

ransomware
2024-12-02 https://www.helpnetsecurity.com/2024/12/02/radiant-logic-identity-assessments/

Radiant Logic announces the expansion of its central intelligence hub solution, RadiantOne, to now include Identity Observability. Building on the identity security foundation of Identity Data Management and Identity Analytics, Identity Observability allows the world’s most complex organizations to access an intuitive map of their entire identity infrastructure with 360° continuously streaming visibility, an intelligent risk collaboration hub, and seamless AI-powered risk remediation workflows. For large organizations wrestling with identity sprawl or legacy architectures, the … More

The post Radiant Logic provides continuous identity hygiene assessments via real-time streaming data appeared first on Help Net Security.

"

Autosummary: "


Wanted Russian Cybercriminal Linked to Hive and LockBit Ransomware Has Been Arrested

exploits ransomware rusia-ucrania ciber
2024-11-30 https://thehackernews.com/2024/11/wanted-russian-cybercriminal-linked-to.html
A Russian cybercriminal wanted in the U.S. in connection with LockBit and Hive ransomware operations has been arrested by law enforcement authorities in the country. According to a news report from Russian media outlet RIA Novosti, Mikhail Pavlovich Matveev has been accused of developing a malicious program designed to encrypt files and seek ransom in return for a decryption key. "At present, "

Autosummary: "


Notorious ransomware programmer Mikhail Pavlovich Matveev arrested in Russia

exploits ransomware
2024-11-30 https://securityaffairs.com/171541/cyber-crime/mikhail-pavlovich-matveev-arrested-in-russia.html
Russian authorities arrested ransomware affiliate Mikhail Matveev, aka Wazawaka, for developing malware and ties to hacking groups. Russian authorities arrested a ransomware affiliate, Mikhail Pavlovich Matveev (also known as Wazawaka, Uhodiransomwar, m1x, and Boriselcin), and charged him for developing malware and his role in several hacking groups. The man was arrested in Kaliningrad, Russia, law […] "

Autosummary: He has been tied to Lockbit, Conti, and BABUKhttps://t.co/t2VAJjhlJS — vx-underground (@vxunderground) November 29, 2024 “The Kaliningrad Interior Ministry and the prosecutor’s office reported that the case of a programmer accused of creating a malicious program has been sent to court; according to a RIA Novosti source, this is hacker Mikhail Matveyev, for whom the American FBI is offering a $10 million reward for help in capturing him.” reported RIA Novosti. "


Russia arrests cybercriminal Wazawaka for ties with ransomware gangs

exploits ransomware ciber
2024-11-29 https://www.bleepingcomputer.com/news/security/russia-arrests-cybercriminal-wazawaka-for-ties-with-ransomware-gangs/
Russian law enforcement has arrested and indicted notorious ransomware affiliate Mikhail Pavlovich Matveev (also known as Wazawaka, Uhodiransomwar, m1x, and Boriselcin) for developing malware and his involvement in several hacking groups. [...] "

Autosummary: In April 2021, the defendant and Babuk ransomware coconspirators allegedly deployed malicious payloads on the systems of the Metropolitan Police Department in Washington, D.C. In May 2022, Matveev and Hive ransomware gang members allegedly encrypted the systems of a nonprofit behavioral healthcare organization headquartered in Mercer County, New Jersey. "


Bologna FC confirms data breach after RansomHub ransomware attack

financial exploits ransomware
2024-11-29 https://www.bleepingcomputer.com/news/security/bologna-fc-confirms-data-breach-after-ransomhub-ransomware-attack/
Bologna Football Club 1909 has confirmed it suffered a ransomware attack after its stolen data was leaked online by the RansomHub extortion group. [...] "

Autosummary: Complete financial data of the club"s history Personal and confidential player data Transfer strategies for new and young players Confidential data of fans and employees Data on young athletes Medical records Information on structures and stadiums Commercial strategies and business plans Previously, the threat actors attempted to blackmail the Italian football team by listing examples of how leaked documents caused other teams to pay huge fines over various violations and used GDPR as leverage. "


Phishing-as-a-Service Rockstar 2FA continues to be prevalent

financial ransomware
2024-11-29 https://securityaffairs.com/171532/cyber-crime/rockstar-2fa-phaas.html
Phishing tool Rockstar 2FA targets Microsoft 365 credentials, it uses adversary-in-the-middle (AitM) attacks to bypass multi-factor authentication. Trustwave researchers are monitoring malicious activity associated with Phishing-as-a-Service (PaaS) platforms, their latest report focuses on a toolkit called Rockstar 2FA. Rockstar 2FA targets Microsoft 365 accounts and bypasses multi-factor authentication with adversary-in-the-middle (AitM) attacks. In AiTM phishing, threat […] "

Autosummary: Phishing-as-a-Service Rockstar 2FA continues to be prevalent Pierluigi Paganini November 29, 2024 November 29, 2024 Phishing tool Rockstar 2FA targets Microsoft 365 credentials, it uses adversary-in-the-middle (AitM) attacks to bypass multi-factor authentication. "


VPN vulnerabilities, weak credentials fuel ransomware attacks

exploits ransomware
2024-11-28 https://www.helpnetsecurity.com/2024/11/28/vpn-weak-credentials-ransomware-attacks/

Attackers leveraging virtual private network (VPN) vulnerabilities and weak passwords for initial access contributed to nearly 30% of ransomware attacks, according to Corvus Insurance. According to the Q3 report, many of these incidents were traced to outdated software or VPN accounts with inadequate protection. For example, common usernames such as “admin” or “user” and a lack of multi-factor authentication (MFA) made accounts vulnerable to automated brute-force attacks, where attackers exploit publicly accessible systems by testing … More

The post VPN vulnerabilities, weak credentials fuel ransomware attacks appeared first on Help Net Security.

"

Autosummary: For example, following law enforcement’s takedown of LockBit in Q1, RansomHub, which emerged in February 2024, quickly filled the void, becoming one of the more prolific and dangerous cybercriminal groups. "


Mimic ransomware: what you need to know

exploits ransomware
2024-11-28 https://www.tripwire.com/state-of-security/mimic-ransomware-what-you-need-know
What makes Mimic particularly unusual is that it exploits the API of a legitimate Windows file search tool ("Everything" by Voidtools) to quickly locate files for encryption. Find out more about the threat in my article on the Tripwire State of Security blog. "

Autosummary: Yes, some variants of Mimic can also exfiltrate data from a user"s computers before it is encrypted - the stolen data is typically used as an additional bargaining chip by the extortionists, who may threaten to release it online or sell it to other criminals. Well, a new variant of Mimic has recently been discovered called Elpaco, which has been used in attacks where malicious hackers accessed victims" systems via RDP after successfully brute-forcing their way in. "


Starbucks, grocery stores impacted by Blue Yonder ransomware attack

exploits ransomware
2024-11-26 https://www.helpnetsecurity.com/2024/11/26/starbucks-blue-yonder-ransomware-attack/

Supply chain management SaaS vendor Blue Yonder announced on November 21 that it experienced a ransomware attack that impacted its managed services hosted environment. “Since learning of the incident, the Blue Yonder team has been working diligently together with external cybersecurity firms to make progress in their recovery process. We have implemented several defensive and forensic protocols,” the company said. “With respect to the Blue Yonder Azure public cloud environment, we are actively monitoring and … More

The post Starbucks, grocery stores impacted by Blue Yonder ransomware attack appeared first on Help Net Security.

"

Autosummary: "


Software firm Blue Yonder providing services to US and UK stores, including Starbucks, hit by ransomware attack

exploits ransomware
2024-11-26 https://securityaffairs.com/171434/uncategorized/blue-yonder-ransomware-attack.html
Blue Yonder, a supply chain software provider, suffered a ransomware attack, impacting operations for clients like Starbucks and grocery stores. A ransomware attack on Blue Yonder disrupted operations for several customers, including Starbucks and U.K. grocery chain Sainsbury. “A ransomware attack has disrupted a third-party software system that Starbucks uses to track and manage its baristas’ schedules, […] "

Autosummary: Pierluigi Paganini November 26, 2024 November 26, 2024 Blue Yonder, a supply chain software provider, suffered a ransomware attack, impacting operations for clients like Starbucks and grocery stores. "


Blue Yonder ransomware attack disrupts grocery store supply chain

exploits ransomware
2024-11-25 https://www.bleepingcomputer.com/news/security/blue-yonder-ransomware-attack-disrupts-grocery-store-supply-chain/
Supply chain management firm Blue Yonder is warning that a ransomware attack caused significant disruption to its services, with the outages impacting grocery store chains in the UK. [...] "

Autosummary: Among its 3,000 customers are high-profile organizations like DHL, Renault, Bayer, Morrisons, Nestle, 3M, Tesco, Starbucks, Ace Hardware, Procter & Gamble, Sainsbury, and 7-Eleven. "


Cybercriminals turn to pen testers to test ransomware efficiency

exploits ransomware ciber
2024-11-22 https://www.helpnetsecurity.com/2024/11/22/pen-testers-ransomware-recruiting/

Ransomware gangs recruit pen testers to improve attack reliability Threat actors employ pen testers to improve ransomware effectiveness Threat actors are recruiting pen testers to test and improve the reliability of their ransomware for affiliate programs, according to Cato Networks. Any good developer knows that software needs to be tested before deploying in production environments. This is also true for ransomware gangs. They want to ensure that their ransomware can be deployed successfully against organizations. … More

The post Cybercriminals turn to pen testers to test ransomware efficiency appeared first on Help Net Security.

"

Autosummary: Out of the hundreds of AI applications that Cato CTRL monitors, 10 AI applications were tracked and used by organizations (Bodygram, Craiyon, Otter.ai, Writesonic, Poe, HIX.AI, Fireflies.ai, PeekYou, Character.AI, and Luma AI), revealing various security risks. "


Deep Instinct delivers malware and ransomware prevention for cloud data stored in S3 buckets

exploits ransomware
2024-11-21 https://www.helpnetsecurity.com/2024/11/21/deep-instinct-dsx-for-cloud-amazon-s3/

Deep Instinct launched Deep Instinct DSX for Cloud Amazon S3. As organizations increasingly rely on the cloud to power their digital transformation, businesses are generating and storing record amounts of data in the cloud. Cybercriminals know this and are leveraging generative AI to create sophisticated malware that evades existing security tools and takes advantage of the “assume breach” mindset. DSX for Cloud enables businesses to protect sensitive data across cloud storage environments by preventing and … More

The post Deep Instinct delivers malware and ransomware prevention for cloud data stored in S3 buckets appeared first on Help Net Security.

"

Autosummary: "


CISA says BianLian ransomware now focuses only on data theft

exploits ransomware
2024-11-21 https://www.bleepingcomputer.com/news/security/cisa-says-bianlian-ransomware-now-focuses-only-on-data-theft/
The BianLian ransomware operation has shifted its tactics, becoming primarily a data theft extortion group, according to an updated advisory from the U.S. Cybersecurity & Infrastructure Security Agency, the FBI, and the Australian Cyber Security Centre. [...] "

Autosummary: The advisory has also been updated with the ransomware gang"s new techniques, tactics, and procedures: Targets Windows and ESXi infrastructure, possibly the ProxyShell exploit chain (CVE-2021-34473, CVE-2021-34523, CVE-2021-31207) for initial access. "


Ransomhub ransomware gang claims the hack of Mexican government Legal Affairs Office

exploits government ransomware
2024-11-21 https://securityaffairs.com/171257/data-breach/mexico-suffers-ransomware-attack.html
Mexico is investigating a ransomware attack targeting its legal affairs office, as confirmed by the president amidst growing cybersecurity concerns. Mexico’s president announced the government is investigating an alleged ransomware hack that targeted the administration’s legal affairs office. “Today they are going to send me a report on the supposed hacking.” President Claudia Sheinbaum said […] "

Autosummary: Ransomhub ransomware gang claims the hack of Mexican government Legal Affairs Office Pierluigi Paganini November 21, 2024 November 21, 2024 Mexico is investigating a ransomware attack targeting its legal affairs office, as confirmed by the president amidst growing cybersecurity concerns. "


Five backup lessons learned from the UnitedHealth ransomware attack

exploits ransomware
2024-11-20 https://www.helpnetsecurity.com/2024/11/20/backup-strategies/

The ransomware attack on UnitedHealth earlier this year is quickly becoming the healthcare industry’s version of Colonial Pipeline, prompting congressional testimony, lawmaker scrutiny and potential legislation.  Over the past few months, there have been two congressional hearings on the attack — one in the Senate, followed by one in the House — as well as calls from multiple senators for investigations into how the government responded to the incident, not to mention the criticism against UnitedHealth’s CISO, Steven Martin, … More

The post Five backup lessons learned from the UnitedHealth ransomware attack appeared first on Help Net Security.

"

Autosummary: Auditing should include: Multifactor authentication Immutability best practices CISA #StopRansomware guidelines Dual authorization for critical changes Restricted administrative access Logging best practices Account lockout settings Backup isolation NAS security guidelines Secure snapshots Encryption Adherence to NIST, ISO, NERC CIP, HIPAA and other standards And more… Implementing these strategies and leveraging a security posture management tool ensures that backup systems remain secure, reliable, and resilient against evolving cyber threats. Some ransomware groups – BlackCat, Akira, Lockbit, Phobos, and Crypto, for example – have been bypassing production systems altogether, and going straight for the backups. "


Phobos ransomware administrator faces US cybercrime charges

exploits ransomware
2024-11-19 https://www.helpnetsecurity.com/2024/11/19/phobos-ransomware-cybercrime-charges/

The Justice Department unsealed criminal charges against Evgenii Ptitsyn, 42, a Russian national, for allegedly administering the sale, distribution, and operation of Phobos ransomware. Ptitsyn made his initial appearance in the US District Court for the District of Maryland on Nov. 4 after being extradited from South Korea. Phobos ransomware, through its affiliates, victimized more than 1,000 public and private entities in the United States and around the world, and extorted ransom payments worth more … More

The post Phobos ransomware administrator faces US cybercrime charges appeared first on Help Net Security.

"

Autosummary: Phobos ransomware suspect charged with 13 crimes Ptitsyn is charged in a 13-count indictment with wire fraud conspiracy, wire fraud, conspiracy to commit computer fraud and abuse, four counts of causing intentional damage to protected computers, and four counts of extortion in relation to hacking. "


New "Helldown" Ransomware Variant Expands Attacks to VMware and Linux Systems

exploits ransomware Linux
2024-11-19 https://thehackernews.com/2024/11/new-helldown-ransomware-expands-attacks.html
Cybersecurity researchers have shed light on a Linux variant of a relatively new ransomware strain called Helldown, suggesting that the threat actors are broadening their attack focus. "Helldown deploys Windows ransomware derived from the LockBit 3.0 code," Sekoia said in a report shared with The Hacker News. "Given the recent development of ransomware targeting ESX, it appears that the group "

Autosummary: Truesec, in an analysis published earlier this month, detailed Helldown attack chains that have been observed making use of internet-facing Zyxel firewalls to obtain initial access, followed by carrying out persistence, credential harvesting, network enumeration, defense evasion, and lateral movement activities to ultimately deploy the ransomware. Interlock is assessed to be a new group that sprang forth from Rhysida operators or developers, the company added, citing overlaps in tradecraft, tools, and ransomware behavior. "


Great Plains Regional Medical Center ransomware attack impacted 133,000 individuals

exploits ransomware
2024-11-19 https://securityaffairs.com/171156/data-breach/great-plains-regional-medical-center-data-breach.html
A ransomware attack on Great Plains Regional Medical Center compromised personal data of 133,000 individuals, exposing sensitive information. On September 8, 2024, Great Plains Regional Medical Center (Oklahoma) suffered a ransomware attack. The organization launched an investigation into the incident with the help of a cybersecurity firm. The healthcare center discovered that a threat actor […] "

Autosummary: The exposed patient info varied by individual and may include name, demographic information, health insurance information, clinical treatment information, such as diagnosis and medication information, driver’s license number, and/or in some instances, Social Security number. "


Helldown ransomware exploits Zyxel VPN flaw to breach networks

exploits ransomware
2024-11-19 https://www.bleepingcomputer.com/news/security/helldown-ransomware-exploits-zyxel-vpn-flaw-to-breach-networks/
The new "Helldown" ransomware operation is believed to target vulnerabilities in Zyxel firewalls to breach corporate networks, allowing them to steal data and encrypt devices. [...] "

Autosummary: Configuration files similarities Source: Sekoia As of November 7, 2024, the threat group listed 31 victims on its recently-renewed extortion portal, primarily small and medium-sized firms based in the United States and Europe. "


Russian Phobos ransomware operator faces cybercrime charges

exploits ransomware rusia-ucrania
2024-11-19 https://securityaffairs.com/171184/cyber-crime/phobos-ransomware-operator-faces-cybercrime-charges.html
Russian Phobos ransomware operator Evgenii Ptitsyn, accused of managing attacks, was extradited from South Korea to the US to face cybercrime charges. Russian Phobos ransomware operator Evgenii Ptitsyn, suspected of playing a key role in the ransomware operations, was extradited from South Korea to the US to face cybercrime charges. According to the DoJ, the […] "

Autosummary: According to the DoJ, the Phobos ransomware operation targeted over 1,000 public and private entities in the United States and worldwide, extorting more than $16 million in ransom payments “The Justice Department unsealed criminal charges today against Evgenii Ptitsyn, 42, a Russian national, for allegedly administering the sale, distribution, and operation of Phobos ransomware.” "


US charges Phobos ransomware admin after South Korea extradition

exploits ransomware
2024-11-18 https://www.bleepingcomputer.com/news/security/us-charges-phobos-ransomware-admin-after-south-korea-extradition/
Evgenii Ptitsyn, a Russian national and suspected administrator of the Phobos ransomware operation, was extradited from South Korea and is facing cybercrime charges in the United States. [...] "

Autosummary: "Ptitsyn and his co-conspirators hacked not only large corporations but also schools, hospitals, nonprofits, and a federally recognized tribe, and they extorted more than $16 million in ransom payments," said Nicole M. Argentieri, the head of the Justice Department"s Criminal Division. "


5 BCDR Oversights That Leave You Exposed to Ransomware

exploits ransomware
2024-11-14 https://thehackernews.com/2024/11/5-bcdr-oversights-that-leave-you-exposed-to-ransomware.html
Ransomware isn’t just a buzzword; it’s one of the most dreaded challenges businesses face in this increasingly digitized world. Ransomware attacks are not only increasing in frequency but also in sophistication, with new ransomware groups constantly emerging. Their attack methods are evolving rapidly, becoming more dangerous and damaging than ever. Almost all respondents (99.8%) in a recent "

Autosummary: According to IBM X-Force Threat Intelligence Index 2024, cyberattacks involving valid stolen or compromised credentials rose by over 70% year-over-year.[3] To better protect your SaaS data from ransomware, consider implementing these key recommendations: Implement third-party backup solutions that are purpose-built for SaaS environments.Regular application-level recovery tests help identify hidden issues like data corruption, configuration errors, or dependency failures, which can prevent applications from running smoothly post-recovery.Today, SaaS apps, such as Google Workspace, Microsoft 365 and Salesforce, hold large volumes of business-critical data. Insufficient recovery testing can result in prolonged downtime, failed recoveries, loss of critical data and operational disruption, impacting business continuity and escalating costs associated with restoring services.Whether your organization"s critical data is stored on on-premises data centers, in the cloud, within SaaS applications or on endpoints, Unitrends protects it all. "


ShrinkLocker ransomware: what you need to know

exploits ransomware
2024-11-14 https://www.tripwire.com/state-of-security/shrinklocker-ransomware-what-you-need-know
ShrinkLocker is a family of ransomware that encrypts an organisation"s data and demands a ransom payment in order to restore access to their files. It was first identified by security researchers in May 2024, after attacks were observed in Mexico, Indonesia, and Jordan. Read more in my article on the Tripwire State of Security blog. "

Autosummary: Which is great if your laptop is stolen by a thief... ...but not so good if ShrinkLocker is the one that"s chosen to scramble your data with Bitlocker, and not told you the password it used. "


Bitdefender released a decryptor for the ShrinkLocker ransomware

exploits ransomware
2024-11-14 https://securityaffairs.com/170934/cyber-crime/shrinklocker-ransomware-decryptor.html
Bitdefender released a decryptor for the ShrinkLocker ransomware, which modifies BitLocker configurations to encrypt a system’s drives. ShrinkLocker ransomware was first discovered in May 2024 by researchers from Kaspersky. Unlike modern ransomware it doesn’t rely on sophisticated encryption algorithms and modifies BitLocker configurations to encrypt a system’s drives. It first checks if BitLocker is enabled […] "

Autosummary: Bitdefender released a decryptor for the ShrinkLocker ransomware Pierluigi Paganini November 14, 2024 November 14, 2024 Bitdefender released a decryptor for the ShrinkLocker ransomware, which modifies BitLocker configurations to encrypt a system’s drives. Proactive monitoring of Windows event logs, specifically from the “Microsoft-Windows-BitLocker-API/Management” source, can help organizations detect early stages of BitLocker attacks, such as when attackers test encryption capabilities. "


New ShrinkLocker ransomware decryptor recovers BitLocker password

exploits ransomware
2024-11-13 https://www.bleepingcomputer.com/news/security/new-shrinklocker-ransomware-decryptor-recovers-bitlocker-password/
Bitdefender has released a decryptor for the "ShrinkLocker" ransomware strain, which uses Windows" built-in BitLocker drive encryption tool to lock victim"s files. [...] "

Autosummary: In a report today, Bitdefender highlights a ShrinkLocker attack against a healthcare organization where attackers encrypted Windows 10, Windows 11, and Windows Server devices across the network, including backups. "


Free Decryptor Released for BitLocker-Based ShrinkLocker Ransomware Victims

exploits ransomware
2024-11-13 https://thehackernews.com/2024/11/free-decryptor-released-for-bitlocker.html
Romanian cybersecurity company Bitdefender has released a free decryptor to help victims recover data encrypted using the ShrinkLocker ransomware. The decryptor is the result of a comprehensive analysis of ShrinkLocker"s inner workings, allowing the researchers to discover a "specific window of opportunity for data recovery immediately after the removal of protectors from BitLocker-encrypted "

Autosummary: "Even if the server is rebooted manually (e.g. by an unsuspecting administrator), the script does not have a mechanism to resume its execution after the reboot, meaning that the attack may be interrupted or prevented," Martin Zugec, technical solutions director at Bitdefender, said. "


New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks

exploits ransomware
2024-11-12 https://thehackernews.com/2024/11/new-ymir-ransomware-exploits-memory-for.html
Cybersecurity researchers have flagged a new ransomware family called Ymir that was deployed in an attack two days after systems were compromised by a stealer malware called RustyStealer. "Ymir ransomware introduces a unique combination of technical features and tactics that enhance its effectiveness," Russian cybersecurity vendor Kaspersky said. "Threat actors leveraged an unconventional blend "

Autosummary: "If the brokers are indeed the same actors who deployed the ransomware, this could signal a new trend, creating additional hijacking options without relying on traditional Ransomware-as-a-Service (RaaS) groups," Kaspersky researcher Cristian Souza said. Last month, Secureworks, which is set to be acquired by Sophos early next year, revealed that the number of active ransomware groups has witnessed a 30% year-over-year increase, driven by the emergence of 31 new groups in the ecosystem. "


Zscaler Zero Trust Segmentation prevents lateral movement from ransomware attacks

exploits ransomware
2024-11-12 https://www.helpnetsecurity.com/2024/11/12/zscaler-zero-trust-segmentation/

Zscaler announced a Zero Trust Segmentation solution to provide a more secure, agile and cost-effective means to connect users, devices, and workloads across and within globally distributed branches, factories, campuses, data centers, and public clouds. While traditional networks, including SD-WAN and site-to-site VPN, have extended enterprise connectivity to branches and clouds, they have also inadvertently accelerated the spread of ransomware. Although firewalls are used to do segmentation on networks, they add complexity, increase costs, and … More

The post Zscaler Zero Trust Segmentation prevents lateral movement from ransomware attacks appeared first on Help Net Security.

"

Autosummary: Zscaler announced a Zero Trust Segmentation solution to provide a more secure, agile and cost-effective means to connect users, devices, and workloads across and within globally distributed branches, factories, campuses, data centers, and public clouds. "


Ymir ransomware, a new stealthy ransomware grow in the wild

exploits ransomware
2024-11-12 https://securityaffairs.com/170814/malware/ymir-ransomware-analysis.html
New Ymir ransomware was deployed in attacks shortly after systems were breached by RustyStealer malware, Kaspersky warns. Kaspersky researchers discovered a new ransomware family, called Ymir ransomware, which attackers deployed after breaching systems via PowerShell commands. Ymir includes detection-evasion features, executing tasks in memory using functions like malloc, memmove, and memcmp. Attackers initially accessed systems […] "

Autosummary: Ymir ransomware, a new stealthy ransomware grow in the wild Pierluigi Paganini November 12, 2024 November 12, 2024 New Ymir ransomware was deployed in attacks shortly after systems were breached by RustyStealer malware, Kaspersky warns. "


How human ingenuity continues to outpace automated security tools

ransomware
2024-11-11 https://www.helpnetsecurity.com/2024/11/11/ai-safety-issues/

10% of security researchers now specialize in AI technology as 48% of security leaders consider AI to be one of the greatest risks to their organizations, according to HackerOne. HackerOne’s report combines perspectives from the researcher community, customers, and security leaders. It explores how security-focused organizations integrate human expertise with technology and AI for a defense-in-depth strategy. AI is a threat and an opportunity 67% of security professionals said an external and unbiased review of … More

The post How human ingenuity continues to outpace automated security tools appeared first on Help Net Security.

"

Autosummary: 30% now hack full-time, up from 24% in 2023, and 44% spend over 20 hours a week hacking, compared to 35% the previous year. "


Halliburton reports $35 million loss after ransomware attack

exploits ransomware
2024-11-11 https://www.bleepingcomputer.com/news/security/halliburton-reports-35-million-loss-after-ransomware-attack/
Halliburton has revealed that an August ransomware attack has led to $35 million in losses after the breach caused the company to shut down IT systems and disconnect customers. [...] "

Autosummary: "


New Ymir ransomware partners with RustyStealer in attacks

exploits ransomware
2024-11-11 https://www.bleepingcomputer.com/news/security/new-ymir-ransomware-partners-with-rustystealer-in-attacks/
A new ransomware family called "Ymir" has been spotted in the wild, being introduced onto systems that were previously compromised by the RustyStealer info-stealer malware. [...] "

Autosummary: Ymir is a novel Windows ransomware strain that operates entirely from memory, leveraging functions like "malloc," "memove," and "memcmp," to evade detection. "


Veeam Backup & Replication exploit reused in new Frag ransomware attack

exploits ransomware
2024-11-09 https://securityaffairs.com/170717/malware/veeam-backup-replication-flaw-frag-ransomware.html
A critical flaw, tracked as CVE-2024-40711, in Veeam Backup & Replication (VBR) was also recently exploited to deploy Frag ransomware. In mid-October, Sophos researchers warned that ransomware operators are exploiting the critical vulnerability CVE-2024-40711 in Veeam Backup & Replication to create rogue accounts and deploy malware. In early September 2024, Veeam released security updates to address multiple vulnerabilities impacting […] "

Autosummary: Veeam Backup & Replication exploit reused in new Frag ransomware attack Pierluigi Paganini November 09, 2024 November 09, 2024 A critical flaw, tracked as CVE-2024-40711, in Veeam Backup & Replication (VBR) was also recently exploited to deploy Frag ransomware. In a recent attack, threat group STAC 5881 accessed networks via a compromised VPN appliance, exploited a VEEAM vulnerability, and then created accounts named “point” and “point2.” "


Critical Veeam RCE bug now used in Frag ransomware attacks

exploits ransomware
2024-11-08 https://www.bleepingcomputer.com/news/security/critical-veeam-rce-bug-now-used-in-frag-ransomware-attacks/
After being used in Akira and Fog ransomware attacks, a critical Veeam Backup & Replication (VBR) security flaw was also recently exploited to deploy Frag ransomware. [...] "

Autosummary: Frag ransom note (Sophos) ​"In a recent case MDR analysts once again observed the tactics associated with STAC 5881 – but this time observed the deployment of a previously-undocumented ransomware called "Frag,"" said Sean Gallagher, a principal threat researcher at Sophos X-Ops. "


Texas oilfield supplier Newpark Resources suffered a ransomware attack

exploits ransomware
2024-11-08 https://securityaffairs.com/170696/cyber-crime/newpark-resources-ransomware-attack.html
Texas oilfield supplier Newpark Resources suffered a ransomware attack that disrupted its information systems and business applications. Texas oilfield supplier Newpark Resources revealed that a ransomware attack on October 29 disrupted access to some of its information systems and business applications. The company immediately activated its cybersecurity response plan and launched an investigation into the […] "

Autosummary: "


GoZone ransomware accuses and threatens victims

exploits ransomware
2024-11-06 https://www.helpnetsecurity.com/2024/11/06/gozone-ransomware-d3pru/

A new ransomware dubbed GoZone is being leveraged by attackers that don’t seem to be very greedy: they are asking the victims to pay just $1,000 in Bitcoin if they want their files decrypted. The GoZone HTML ransom note (Source: SonicWall) The ransom notes shown by the malware lay out another incentive for paying up: they claim that child sexual abuse material has been found on the targeted computer and urge the victim to pay … More

The post GoZone ransomware accuses and threatens victims appeared first on Help Net Security.

"

Autosummary: "


Memorial Hospital and Manor suffered a ransomware attack

exploits ransomware
2024-11-06 https://securityaffairs.com/170629/cyber-crime/memorial-hospital-and-manor-ransomware-attack.html
Georgia, a ransomware attack disrupted Memorial Hospital and Manor’s access to its Electronic Health Record system. A ransomware attack hit Memorial Hospital and Manor in Bainbridge, Georgia, and disrupted the access to its Electronic Health Record system. Memorial Hospital and Manor is a community hospital and healthcare facility that serves Decatur County and surrounding areas […] "

Autosummary: Read more: https://t.co/onRsd2ZfF2 pic.twitter.com/qenqRNZrrF — Comparitech (@Comparitech) November 5, 2024 The Embargo ransomware gang has been active since April 2024, it runs a ransomware-as-a-service model and has claimed eight attacks, including another two attacks on U.S. healthcare providers, NorthBay Healthcare and Weiser Memorial Hospital. "


City of Columbus: Data of 500,000 stolen in July ransomware attack

exploits government ransomware
2024-11-04 https://www.bleepingcomputer.com/news/security/city-of-columbus-data-of-500-000-stolen-in-july-ransomware-attack/
​The City of Columbus, Ohio, notified 500,000 individuals that a ransomware gang stole their personal and financial information in a July 2024 cyberattack. [...] "

Autosummary: "The information involved in the Incident may have included your personal information, such as your first and last name, date of birth, address, bank account information, driver"s license(s), Social Security number, and other identifying information concerning you and/or your interactions with the City," the breach notification letters reveal. "


July 2024 ransomware attack on the City of Columbus impacted 500,000 people

exploits government ransomware
2024-11-04 https://securityaffairs.com/170568/data-breach/city-of-columbus-ransomware-attack-impacted-500000-people.html
The July 2024 ransomware attack that hit the City of Columbus, Ohio, exposed the personal and financial data of 500,000 individuals. On July 18, 2024, the City of Columbus, Ohio, suffered a cyber attack that impacted the City’s services. On July 29, 2024, the City published an update on the City’s website and confirmed that the […] "

Autosummary: “The information involved in the Incident may have included your personal information, such as your first and last name, date of birth, address, bank account information, driver’s license(s), Social Security number, and other identifying information concerning you and/or your interactions with the City.” "


Meet Interlock — The new ransomware targeting FreeBSD servers

exploits ransomware
2024-11-03 https://www.bleepingcomputer.com/news/security/meet-interlock-the-new-ransomware-targeting-freebsd-servers/
A relatively new ransomware operation named Interlock attacks organizations worldwide, taking the unusual approach of creating an encryptor to target FreeBSD servers. [...] "

Autosummary: interlock.elf: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), statically linked, BuildID[sha1]=c7f876806bf4d3ccafbf2252e77c2a7546c301e6, for FreeBSD 10.4, FreeBSD-style, not stripped However, even when testing the sample on a FreeBSD virtual machine, BleepingComputer was unable to get the sample to properly execute. "


LA housing authority confirms breach claimed by Cactus ransomware

exploits ransomware
2024-11-01 https://www.bleepingcomputer.com/news/security/la-housing-authority-confirms-breach-claimed-by-cactus-ransomware/
The Housing Authority of the City of Los Angeles (HACLA), one of the largest public housing authorities in the United States, confirmed that a cyberattack hit its IT network after recent breach claims from the Cactus ransomware gang. [...] "

Autosummary: Before encrypting devices on the breached network on December 31, 2022, the attackers had access to HACLA members" sensitive personal information, including (but not limited to) names, social security numbers, contact information, driver"s licenses, credit card and financial account numbers, as well as their health insurance and medical information. "


North Korean hackers pave the way for Play ransomware

exploits ransomware
2024-10-31 https://www.helpnetsecurity.com/2024/10/31/north-korean-hackers-play-ransomware/

North Korean state-sponsored hackers – Jumpy Pisces, aka Andariel, aka Onyx Sleet – have been spotted burrowing into enterprise systems, then seemingly handing matters over to the Play ransomware group. Timeline of the attack (Source: Palo Alto Networks) The attack The ransomware attack was investigated by Palo Alto Networks’ Unit 42 in September 2024, and they determined that North Korean hackers: Gained access to a host using a compromised users account Moved laterally to other … More

The post North Korean hackers pave the way for Play ransomware appeared first on Help Net Security.

"

Autosummary: "


North Korean govt hackers linked to Play ransomware attack

exploits ransomware
2024-10-30 https://www.bleepingcomputer.com/news/security/north-korean-govt-hackers-linked-to-play-ransomware-attack/
The North Korean state-sponsored hacking group tracked as "Andariel" has been linked to the Play ransomware operation, using the RaaS to work behind the scenes and evade sanctions. [...] "

Autosummary: However, this led the threat actors to frequently rebrand under different names, like WastedLocker, Hades, Phoenix CryptoLocker, PayLoadBin, and Macaw, to evade sanctions. "


North Korean Group Collaborates with Play Ransomware in Significant Cyber Attack

exploits ransomware
2024-10-30 https://thehackernews.com/2024/10/north-korean-group-collaborates-with.html
Threat actors in North Korea have been implicated in a recent incident that deployed a known ransomware family called Play, underscoring their financial motivations. The activity, observed between May and September 2024, has been attributed to a threat actor tracked as Jumpy Pisces, which is also known as Andariel, APT45, DarkSeoul, Nickel Hyatt, Onyx Sleet (formerly Plutonium), Operation Troy, "

Autosummary: The activity, observed between May and September 2024, has been attributed to a threat actor tracked as Jumpy Pisces, which is also known as Andariel, APT45, DarkSeoul, Nickel Hyatt, Onyx Sleet (formerly Plutonium), Operation Troy, Silent Chollima, and Stonefly. "


Massive PSAUX ransomware attack targets 22,000 CyberPanel instances

exploits ransomware
2024-10-29 https://www.bleepingcomputer.com/news/security/massive-psaux-ransomware-attack-targets-22-000-cyberpanel-instances/
Over 22,000 CyberPanel instances exposed online to a critical remote code execution (RCE) vulnerability were mass-targeted in a PSAUX ransomware attack that took almost all instances offline. [...] "

Autosummary: Error. "


Fog and Akira ransomware attacks exploit SonicWall VPN flaw CVE-2024-40766

exploits ransomware
2024-10-29 https://securityaffairs.com/170359/cyber-crime/fog-akira-ransomware-sonicwall-vpn-flaw.html
Fog and Akira ransomware operators are exploiting SonicWall VPN flaw CVE-2024-40766 to breach enterprise networks. Fog and Akira ransomware operators are exploiting the critical SonicWall VPN vulnerability CVE-2024-40766 (CVSS v3 score: 9.3) to breach corporate networks via SSL VPN access. CVE-2024-40766  is an Improper Access Control Vulnerability impacting SonicWall SonicOS, the company addressed it in August […] "

Autosummary: “An improper access control vulnerability has been identified in the SonicWall SonicOS management access and SSLVPN, potentially leading to unauthorized resource access and in specific conditions, causing the firewall to crash.” reads the SonicWall’s advisory. “An improper access control vulnerability has been identified in the SonicWall SonicOS management access and SSLVPN, potentially leading to unauthorized resource access and in specific conditions, causing the firewall to crash.” reads the advisory. "


Four REvil Ransomware members sentenced for hacking and money laundering

financial exploits ransomware
2024-10-27 https://securityaffairs.com/170287/cyber-crime/revil-ransomware-group-member-sentenced.html
Russian authorities sentenced four members of the REvil ransomware operation to several years in prison in Russia. Four former members of the REvil ransomware group were sentenced in Russia for hacking and money laundering, marking a rare case of Russian gang members being convicted in the country. The four men are Artem Zaets, Alexei Malozemov, […] "

Autosummary: Vasinskyi (aka Profcomserv, Rabotnik, Rabotnik_New, Yarik45, Yaraslav2468, and Affiliate 22) was arrested on October 8, 2021, while he was trying to enter Poland. "


Fog ransomware targets SonicWall VPNs to breach corporate networks

exploits ransomware
2024-10-27 https://www.bleepingcomputer.com/news/security/fog-ransomware-targets-sonicwall-vpns-to-breach-corporate-networks/
Fog and Akira ransomware operators have increased their exploitation efforts of CVE-2024-40766, a critical access control flaw that allows unauthorized access to resources on the SSL VPN feature of SonicWall SonicOS firewalls. [...] "

Autosummary: Akira, a far more established player in the ransomware space, has recently had Tor website access problems, as observed by BleepingComputer, but those are gradually returning online now. "


Four REvil Ransomware Members Sentenced in Rare Russian Cybercrime Convictions

exploits ransomware rusia-ucrania
2024-10-26 https://thehackernews.com/2024/10/four-revil-ransomware-members-sentenced.html
Four members of the now-defunct REvil ransomware operation have been sentenced to several years in prison in Russia, marking one of the rare instances where cybercriminals from the country have been convicted of hacking and money laundering charges. Russian news publication Kommersant reported that a court in St. Petersburg found Artem Zaets, Alexei Malozemov, Daniil Puzyrevsky, and Ruslan "

Autosummary: "


Black Basta ransomware poses as IT support on Microsoft Teams to breach networks

exploits ransomware
2024-10-25 https://www.bleepingcomputer.com/news/security/black-basta-ransomware-poses-as-it-support-on-microsoft-teams-to-breach-networks/
The BlackBasta ransomware operation has moved its social engineering attacks to Microsoft Teams, posing as corporate help desks contacting employees to assist them with an ongoing spam attack. [...] "

Autosummary: The accounts are created under Entra ID tenants that are named to appear to be help desk, like: securityadminhelper.onmicrosoft[.]com supportserviceadmin.onmicrosoft[.]com supportadministrator.onmicrosoft[.]com cybersecurityadmin.onmicrosoft[.]com "These external users set their profiles to a "DisplayName" designed to make the targeted user think they were communicating with a help-desk account," explains the new ReliaQuest report. "


Russia sentences REvil ransomware members to over 4 years in prison

exploits ransomware
2024-10-25 https://www.bleepingcomputer.com/news/security/russia-sentences-revil-ransomware-members-to-over-4-years-in-prison/
Russia has sentenced four members of the REvil ransomware operation to over 4 years in prison for distributing malware and illegal circulation of means of payment. [...] "

Autosummary: As reported by The Record, eight members were ultimately tried, with Artem Zayets, Alexey Malozemov, Daniil Puzyrevsky, and Ruslan Khansvyarov sentenced today and four others put into a separate proceeding. "


New Qilin ransomware encryptor features stronger encryption, evasion

exploits ransomware
2024-10-24 https://www.bleepingcomputer.com/news/security/new-qilin-ransomware-encryptor-features-stronger-encryption-evasion/
A new Rust-based variant of the Qilin (Agenda) ransomware strain, dubbed "Qilin.B," has been spotted in the wild, featuring stronger encryption, better evasion from security tools, and the ability to disrupt data recovery mechanisms. [...] "

Autosummary: Veeam (backup and recovery) Windows Volume Shadow Copy Service (system backup and recovery) SQL database services (enterprise data management) Sophos (security and antivirus software) Acronis Agent (backup and recovery service) SAP (enterprise resource planning) Existing volume shadow copies are wiped to prevent easy system restoration, and Windows Event Logs are cleared to hinder forensic analysis. "


NotLockBit: ransomware discovery serves as wake-up call for Mac users

exploits ransomware
2024-10-24 https://www.tripwire.com/state-of-security/notlockbit-rransomware-discovery-serves-wake-call-mac-users
Historically, Mac users haven"t had to worry about malware as much as their Windows-using cousins. But that doesn"t mean that Mac users should be complacent. And the recent discovery of a new malware strain emphasises that the threat - even if much smaller than on Windows - remains real. Read more in my article on the Tripwire State of Security blog. "

Autosummary: Although malware targeting Apple devices actually predates viruses written for PCs, and there have been some families of malware that have presented a significant threat for both operating systems (for instance, the Word macro viruses that hit computers hard from 1995 onwards), it is generally the case that you"re simply a lot less likely to encounter malware on your Mac than you are on your Windows PC. "


New Qilin.B Ransomware Variant Emerges with Improved Encryption and Evasion Tactics

exploits ransomware industry
2024-10-24 https://thehackernews.com/2024/10/new-qilinb-ransomware-variant-emerges.html
Cybersecurity researchers have discovered an advanced version of the Qilin ransomware sporting increased sophistication and tactics to evade detection. The new variant is being tracked by cybersecurity firm Halcyon under the moniker Qilin.B. "Notably, Qilin.B now supports AES-256-CTR encryption for systems with AESNI capabilities, while still retaining Chacha20 for systems that lack this support "

Autosummary: "Out of the 99 healthcare organizations that admitted to paying the ransom and disclosed the ransom paid, the median payment was $1.5 million, and the average payment was $4.4 million," the tech giant said. "


Henry Schein discloses data breach a year after ransomware attack

financial exploits ransomware
2024-10-24 https://www.bleepingcomputer.com/news/security/henry-schein-discloses-data-breach-a-year-after-ransomware-attack/
Henry Schein has finally disclosed a data breach following at least two back-to-back cyberattacks in 2023 by the BlackCat Ransomware gang, revealing that over 160,000 people had their personal information stolen. [...] "

Autosummary: "


Ransomware Gangs Use LockBit"s Fame to Intimidate Victims in Latest Attacks

exploits ransomware
2024-10-23 https://thehackernews.com/2024/10/ransomware-gangs-use-lockbits-fame-to.html
Threat actors have been observed abusing Amazon S3 (Simple Storage Service) Transfer Acceleration feature as part of ransomware attacks designed to exfiltrate victim data and upload them to S3 buckets under their control. "Attempts were made to disguise the Golang ransomware as the notorious LockBit ransomware," Trend Micro researchers Jaromir Horejsi and Nitesh Surana said. "However, such is "

Autosummary: Some of the vulnerabilities exploited by Akira affiliates are listed below - "Throughout 2024, Akira has targeted a significant number of victims, with a clear preference for organizations in the manufacturing and professional, scientific, and technical services sectors," Talos researchers James Nutland and Michael Szeliga said. "


Embargo ransomware: Rock’n’Rust

exploits ransomware
2024-10-23 https://www.welivesecurity.com/en/eset-research/embargo-ransomware-rocknrust/
Novice ransomware group Embargo is testing and deploying a new Rust-based toolkit "

Autosummary: The loader achieves this using a combination of Windows command line tools bcdedit, sc, and reg to: set Safe Mode as the default boot mode, disable Windows Defender in Safe Mode, create a service, irnagentd , that executes the loader after the system is rebooted into Safe Mode, and , that executes the loader after the system is rebooted into Safe Mode, and restart the system. There are four stages that the attacker distinguishes in their log messages – they use a different prefix for logging errors in each of them: [dec] – payload decryption, – payload decryption, [exec] – ransomware execution, – ransomware execution, [execk] – MS4Killer execution, and – MS4Killer execution, and [kler] – MS4Killer run (this prefix is used when MS4Killer exits unexpectedly).Decryption and dropping of vulnerable driver probmon.sys Driver loading is consistent with s4killer: enabling the SeLoadDriverPrivilege necessary for loading and unloading device drivers, creating a service via CreateServiceW , creating additional registry keys, required for filter loading, in HKLM\SYSTEM\ControlSet001\services\<service_name> , and loading a minifilter driver into the system via FilterLoad .N/A Subject C KR Valid from 2011-06-08 06:01:39 Valid to 2014-06-07 08:32:23 Additional MDeployer file paths C:\Windows\Debug\b.cache C:\Windows\Debug\a.cache C:\Windows\Debug\fail.txt C:\Windows\Debug\stop.exe Commands used by MDeployer reg delete HKLM\SYSTEM\CurrentControlSet\Control\Safeboot\Network\WinDefend /f C:\Windows\System32\cmd.exe /c takeown /R /A /F After that, it does a “Safe Mode cleanup” – it deletes the decrypted ransomware file pay.exe, creates the control flow file stop.exe to prevent double encryption, deletes the persistence service irnagentd, and reboots the system back into normal mode.{default} safeboot reg delete HKLM\SYSTEM\CurrentControlSet\Control\Safeboot\Network\WinDefend /f C:\Windows\System32\cmd.exe /c ping localhost -n 5 > nul & del C:\Windows\Debug\dtest.dll shutdown -r -f -t 00 C:\Windows\praxisbackup.exe C:\Windows\Debug\pay.exe MITRE ATT&CK techniques This table was built using version 15 of the MITRE ATT&CK framework.Attributes of the exploited driver probmon.sys String decryption MS4Killer uses encryption to hide embedded strings in the binary from plain sight: specifically, it XORs log message strings, the RC4 key used to decrypt the embedded driver, and the list of process names to terminate. In this particular case, MS4Killer abuses an older, vulnerable minifilter driver: probmon.sys, version 3.0.0.4 (Figure 7), signed by an already revoked certificate from ITM System Co.,LTD.Decryption of log message after OpenProcessToken API call Loading probmon.sys As mentioned previously, the legitimate vulnerable driver is embedded as an RC4-encrypted blob (using the key FGFOUDa87c21Vg+cxrr71boU6EG+QC1mwViTciNaTUBuW4gQbcKboN9THK4K35sL), which is also XOR encrypted, in the MS4Killer binary.Figure 11 shows a code snippet, where, in that particular case, only process names ERAAgent.exe and ekrn.exe, which are from ESET products, are compared against the running processes. Execution In all of the observed cases, the persistence of the loader was achieved by a scheduled task, Perf_sys (Figure 5), created by an already elevated system user BITCH\Administrator.[reg-del] – modifying Windows registry, and , – modifying Windows registry, and [setsb] – using the bcdedit.exe command line tool to set Safe Mode on next restart. During cleanup, the loader terminates the MS4Killer process, deletes the decrypted payloads and the vulnerable driver dropped by MS4Killer, and creates the flow control file stop.exe.[sc delete] – creating or deleting the service irnagentd , , – creating or deleting the service , [reg] ,Next, it does the same for the ransomware payload, which is decrypted from a.cache , saved as pay.exe , and executed. "


The Internet Archive breach continues

ransomware
2024-10-21 https://www.helpnetsecurity.com/2024/10/21/internet-archive-breach-continues/

Cybersecurity troubles are not over for the Internet Archive (IA), the nonprofit organization behind the popular digital library site: after the recent DDoS attacks, defacement and data breach, an email sent via its Zendesk customer service platform has shown that some of its IT assets remain compromised. The initial attacks Two weeks ago, the Internet Archive was made inaccessible by several DDoS attacks claimed by pro-Palestinian hacktivists. In the days before the first one, a … More

The post The Internet Archive breach continues appeared first on Help Net Security.

"

Autosummary: A new development On Friday, October 18, IA’s founder Brewster Kahle said that the stored data of the Internet Archive is safe, and that “the Wayback Machine, Archive-It, scanning, and national library crawls have resumed, as well as email, blog, helpdesk, and social media communications.” "


Crypt Ghouls Targets Russian Firms with LockBit 3.0 and Babuk Ransomware Attacks

exploits ransomware rusia-ucrania
2024-10-19 https://thehackernews.com/2024/10/crypt-ghouls-targets-russian-firms-with.html
A nascent threat actor known as Crypt Ghouls has been linked to a set of cyber attacks targeting Russian businesses and government agencies with ransomware with the twin goals of disrupting business operations and financial gain. "The group under review has a toolkit that includes utilities such as Mimikatz, XenAllPasswordPro, PingCastle, Localtonet, resocks, AnyDesk, PsExec, and others," "

Autosummary: "


Tech giant Nidec confirms data breach following ransomware attack

financial exploits ransomware
2024-10-18 https://www.bleepingcomputer.com/news/security/tech-giant-nidec-confirms-data-breach-following-ransomware-attack/
Nidec Corporation is informing that hackers behind a ransomware attack is suffered earlier this year stole data and leaked it on the dark web. [...] "

Autosummary: The investigation also revealed that the attackers stole 50,694 files, including the following: Internal documents Letters from business partners Documents related to green procurement Labor safety and health policies (business and supply chain, etc.) "


Researchers Uncover Cicada3301 Ransomware Operations and Its Affiliate Program

exploits ransomware
2024-10-17 https://thehackernews.com/2024/10/cross-platform-cicada3301-ransomware.html
Cybersecurity researchers have gleaned additional insights into a nascent ransomware-as-a-service (RaaS) called Cicada3301 after successfully gaining access to the group"s affiliate panel on the dark web. Singapore-headquartered Group-IB said it contacted the threat actor behind the Cicada3301 persona on the RAMP cybercrime forum via the Tox messaging service after the latter put out an "

Autosummary: "


BianLian ransomware claims attack on Boston Children"s Health Physicians

exploits ransomware
2024-10-17 https://www.bleepingcomputer.com/news/security/bianlian-ransomware-claims-attack-on-boston-childrens-health-physicians/
The BianLian ransomware group has claimed the cyberattack on Boston Children"s Health Physicians (BCHP) and threatens to leak stolen files unless a ransom is paid. [...] "

Autosummary: Full names Social Security numbers Addresses Dates of birth Driver"s license numbers Medical record numbers Health insurance information Billing information Treatment information (limited) BHCP clarifies that the cyberattack did not impact its electronic medical record systems, as they are hosted on a separate network. "


A glimmer of good news on the ransomware front, as encryption rates plummet

exploits ransomware
2024-10-17 https://www.tripwire.com/state-of-security/glimmer-good-news-ransomware-front-encryption-rates-plummet
No-one would be bold enough to say that the ransomware problem is receding, but a newly-published report by Microsoft does deliver a slither of encouraging news amongst the gloom. And boy do we need some good news - amid reports that 389 US-based healthcare institutions were hit by ransomware last year - more than one every single day. Read more in my article on the Tripwire State of Security blog. "

Autosummary: The 114-page Microsoft Digital Defense Report (MMDR) looks at multiple aspects of the cybersecurity landscape, including AI security, denial-of-service attacks, phishing, social engineering, and nation-state threats. "


Critical Veeam Vulnerability Exploited to Spread Akira and Fog Ransomware

exploits ransomware
2024-10-14 https://thehackernews.com/2024/10/critical-veeam-vulnerability-exploited.html
Threat actors are actively attempting to exploit a now-patched security flaw in Veeam Backup & Replication to deploy Akira and Fog ransomware. Cybersecurity vendor Sophos said it has been tracking a series of attacks in the past month leveraging compromised VPN credentials and CVE-2024-40711 to create a local account and deploy the ransomware. CVE-2024-40711, rated 9.8 out of 10.0 on the "

Autosummary: " The disclosure comes as Palo Alto Networks Unit 42 detailed a successor to INC ransomware named Lynx that has been active since July 2024, targeting organizations in retail, real estate, architecture, financial, and environmental services sectors in the U.S. and U.K. The emergence of Lynx is said to have been spurred by the sale of INC ransomware"s source code on the criminal underground market as early as March 2024, prompting malware authors to repackage the locker and spawn new variants. "


Casio confirms customer data stolen in a ransomware attack

exploits ransomware
2024-10-11 https://www.bleepingcomputer.com/news/security/casio-confirms-customer-data-stolen-in-a-ransomware-attack/
Casio now confirms it suffered a ransomware attack earlier this month, warning that the personal and confidential data of employees, job candidates, and some customers was also stolen. [...] "

Autosummary: "Please refrain from spreading this information through social media, etc., as it could increase the damage caused by the leak of information on this case, violate the privacy of those affected, have serious effects on their lives and businesses, and encourage crime," says the updated Casio statement. "


Underground ransomware claims attack on Casio, leaks stolen data

exploits ransomware
2024-10-10 https://www.bleepingcomputer.com/news/security/underground-ransomware-claims-attack-on-casio-leaks-stolen-data/
The Underground ransomware gang has claimed responsibility for an October 5 attack on Japanese tech giant Casio, which caused system disruptions and impacted some of the firm"s services. [...] "

Autosummary: The leaked data includes: Confidential documents (社外秘) Legal documents Personal data of employees Confidential NDA"s Employee payroll information Patents information Company financial documents "


Akira and Fog ransomware now exploit critical Veeam RCE flaw

exploits ransomware
2024-10-10 https://www.bleepingcomputer.com/news/security/akira-and-fog-ransomware-now-exploiting-critical-veeam-rce-flaw/
Ransomware gangs now exploit a critical security vulnerability that lets attackers gain remote code execution (RCE) on vulnerable Veeam Backup & Replication (VBR) servers. [...] "

Autosummary: Weeks later, in late March, Finnish cybersecurity and privacy company WithSecure spotted CVE-2023-27532 exploits deployed in attacks linked to the financially motivated FIN7 threat group, known for its links to the Conti, REvil, Maze, Egregor, and BlackBasta ransomware operations. "


MoneyGram: No evidence ransomware is behind recent cyberattack

financial exploits ransomware ciber
2024-10-05 https://www.bleepingcomputer.com/news/security/moneygram-no-evidence-ransomware-is-behind-recent-cyberattack/
MoneyGram says there is no evidence that ransomware is behind a recent cyberattack that led to a five-day outage in September. [...] "

Autosummary: "After working with leading external cybersecurity experts, including CrowdStrike, and coordinating with U.S. law enforcement, the majority of our systems are now operational, and we have resumed money transfer services," says an email obtained by BleepingComputer. "


Highline Public Schools confirms ransomware behind shutdown

exploits ransomware
2024-10-04 https://www.bleepingcomputer.com/news/security/highline-public-schools-confirms-ransomware-attack-was-behind-september-shut-down/
On Thursday, K-12 school district Highline Public Schools confirmed that a ransomware attack forced it to shut down all schools in early September. [...] "

Autosummary: "In response, a third-party cybersecurity forensic specialist was engaged, and an investigation was launched, which confirmed that the unauthorized activity was a form of ransomware," the school district said this week. "


LockBit Ransomware and Evil Corp Members Arrested and Sanctioned in Joint Global Effort

exploits ransomware
2024-10-03 https://thehackernews.com/2024/10/lockbit-ransomware-and-evil-corp.html
A new wave of international law enforcement actions has led to four arrests and the takedown of nine servers linked to the LockBit (aka Bitwise Spider) ransomware operation, marking the latest salvo against what was once a prolific financially motivated group. This includes the arrest of a suspected LockBit developer in France while on holiday outside of Russia, two individuals in the U.K. who "

Autosummary: In conjunction, authorities outed a Russian national named Aleksandr Ryzhenkov (aka Beverley, Corbyn_Dallas, G, Guester, and Kotosel) as one of the high-ranking members of the Evil Corp cybercrime group, while simultaneously painting him as a LockBit affiliate. "


Tick tock.. Operation Cronos arrests more LockBit ransomware gang suspects

exploits ransomware
2024-10-03 https://www.tripwire.com/state-of-security/tick-tock-operation-cronos-arrests-more-lockbit-ransomware-gang-suspects
International law enforcement continues to dismantle the LockBit ransomware gang"s infrastructure. Read more in my article on the Tripwire State of Security blog. "

Autosummary: Australia, the UK, and the United States have additionally implemented sanctions against an individual that the NCA believes to be a highly active affiliate of LockBit (and who they also suspect of being strongly linked to another cybercrime group, Evil Corp.) 31-year-old Aleksandr Ryzhenkov, believed to reside in Russia, is wanted for his alleged involvement in a series of ransomware attacks and money laundering activities. "


Police arrested four new individuals linked to the LockBit ransomware operation

exploits ransomware
2024-10-02 https://securityaffairs.com/169225/cyber-crime/new-arrests-linked-to-lockbit-ransomware-group.html
An international police operation led to the arrest of four individuals linked to the LockBit ransomware group, including a developer. Europol, the UK, and the US law enforcement authorities announced a new operation against the LockBit ransomware gang. The police arrested an alleged LockBit developer at France’s request while vacationing outside Russia and two individuals […] "

Autosummary: Police arrested four new individuals linked to the LockBit ransomware operation Pierluigi Paganini October 02, 2024 October 02, 2024 An international police operation led to the arrest of four individuals linked to the LockBit ransomware group, including a developer. "


4 new LockBit-related arrests, identities of suspected Evil Corp members, affiliates revealed

ransomware
2024-10-02 https://www.helpnetsecurity.com/2024/10/02/lockbit-evil-corp-arrests-sanctions/

The third phase of Operation Cronos, which involved officers from the UK National Crime Agency (NCA), the FBI, Europol and other law enforcement agencies, has resulted in the arrest of four persons for allegedly participating in the LockBit ransomware-as-a-service operation in various roles. “A suspected developer of LockBit was arrested at the request of the French authorities, while the British authorities arrested two individuals for supporting the activity of a LockBit affiliate,” Europol announced on … More

The post 4 new LockBit-related arrests, identities of suspected Evil Corp members, affiliates revealed appeared first on Help Net Security.

"

Autosummary: "


Halcyon offers ransomware protection for Linux environments

exploits ransomware Linux
2024-10-01 https://www.helpnetsecurity.com/2024/10/01/halcyon-linux/

As an integral part of the Halcyon Anti-Ransomware Platform, Halcyon Linux offers protection against ransomware attacks targeting Linux systems. While ransomware operators were once almost exclusively focused on targeting Windows environments, the introduction of Linux variants represents a significant expansion of the addressable target range. In 2023, Linux-based ransomware attacks increased by 75% yet Linux-based systems and endpoints are often overlooked and without ransomware defenses. “When it comes to ransomware protection, organizations typically prioritize securing … More

The post Halcyon offers ransomware protection for Linux environments appeared first on Help Net Security.

"

Autosummary: "


Use Windows event logs for ransomware investigations, JPCERT/CC advises

exploits ransomware
2024-10-01 https://www.helpnetsecurity.com/2024/10/01/windows-event-logs-ransomware-response/

The JPCERT Coordination Center – the first Computer Security Incident Response Team established in Japan – has compiled a list of entries in Windows event logs that could help enterprise defenders respond to human-operated ransomware attacks and potentially limit the malware’s damage. “The difficult part of the initial response to a human-operated ransomware attack is identifying the attack vector,” the organization pointed out. Detecting specific entries in Windows event logs – Application, Security, System, Setup … More

The post Use Windows event logs for ransomware investigations, JPCERT/CC advises appeared first on Help Net Security.

"

Autosummary: "


Evil Corp hit with new sanctions, BitPaymer ransomware charges

exploits ransomware
2024-10-01 https://www.bleepingcomputer.com/news/security/evil-corp-hit-with-new-sanctions-bitpaymer-ransomware-charges/
The Evil Corp cybercrime syndicate has been hit with new sanctions by the United States, United Kingdom, and Australia. The US also indicted one of its members for conducting BitPaymer ransomware attacks. [...] "

Autosummary: "Eduard Benderskiy (Benderskiy), a former Spetnaz officer of the Russian Federal Security Service (FSB), which is designated under numerous OFAC sanctions authorities, current Russian businessman, and the father-in-law of Evil Corp"s leader Maksim Viktorovich Yakubets (Maksim), has been a key enabler of Evil Corp"s relationship with the Russian state," alleges the U.S. Department of the Treasury announcement. The sanctioned individuals are Eduard Benderskiy (Maksim"s father-in-law), Viktor Grigoryevich Yakubets (Maksim"s father), Aleksandr Viktorovich Ryzhenkov, Sergey Viktorovich Ryzhenkov, Aleksey Yevgenevich Shchetinin, Beyat Enverovich Ramazanov, and Vadim Gennadievich Pogodin. "


Police arrest four suspects linked to LockBit ransomware gang

exploits ransomware
2024-10-01 https://www.bleepingcomputer.com/news/security/police-arrest-four-suspects-linked-to-lockbit-ransomware-gang/
Law enforcement authorities from 12 countries arrested four suspects linked to the LockBit ransomware gang, including a developer, a bulletproof hosting service administrator, and two people connected to LockBit activity. [...] "

Autosummary: ​Additional LockBit arrests and charges LockBit emerged in September 2019 and has since claimed responsibility for and been linked to attacks against many high-profile companies and organizations worldwide, including Bank of America, Boeing, the Continental automotive giant, the Italian Internal Revenue Service, and the UK Royal Mail. "


UMC Health System diverted patients following a ransomware attack

exploits ransomware
2024-10-01 https://securityaffairs.com/169198/cyber-crime/umc-health-system-cyberattack.html
US healthcare provider UMC Health System had to divert patients due to a network outage caused by a ransomware attack. On September 27, 2024, US healthcare provider UMC Health System announced an investigation into an IT outage across its network. UMC diverted patients for several days after taking IT systems offline following a ransomware attack. […] "

Autosummary: UMC Health System diverted patients following a ransomware attack Pierluigi Paganini October 01, 2024 October 01, 2024 US healthcare provider UMC Health System had to divert patients due to a network outage caused by a ransomware attack.It’s unclear if threat actors had exfiltrated patients’ data during the attack Healthcare infrastructure in the US continues to be under attack, in July, the Lockbit ransomware gang breached the Fairfield Memorial Hospital in Illinois. "


Community Clinic of Maui discloses a data breach following May Lockbit ransomware attack

financial exploits ransomware
2024-09-30 https://securityaffairs.com/169125/data-breach/community-clinic-of-maui-lockbit-ransomware.html
Community Clinic of Maui experienced a data breach impacting over 120,000 people following a LockBit ransomware attack. In May, the Community Clinic of Maui experienced a major IT outage that impacted thousands of patients following a cyber attack. In June, the Lockbit ransomware gang took credit for the attack. The Community Clinic of Maui, also known as Mālama […] "

Autosummary: “The personal information that was potentially impacted included first and last names with one or more of the following identifiers: Social Security Number, Date Of Birth, Driver’s License Number / State Id Number, Passport Number, Financial Account Number, Routing Number, Bank Name, Credit / Debit Card Number, Card CVV Expiration Date, Pin/Security Code, Login Information, Medical Diagnosis, Clinical Information, Medical Treatment/Procedure Information, Treatment Type, Treatment Location, Treatment Cost Information, Doctor’s Name, Medical Record Number, Patient Account Number, Prescription Information and/ or Biometric Data. Mālama investigated the security breach with external cybersecurity professionals, and on August 7, 2024, the experts determined that personal data may ‘have been subject to unauthorized access and acquisition between May 4, 2024 and May 7, 2024.’ "


JPCERT shares Windows Event Log tips to detect ransomware attacks

exploits ransomware
2024-09-30 https://www.bleepingcomputer.com/news/security/jpcert-shares-windows-event-log-tips-to-detect-ransomware-attacks/
Japan"s Computer Emergency Response Center (JPCERT/CC) has shared tips on detecting different ransomware gang"s attacks based on entries in Windows Event Logs, providing timely detection of ongoing attacks before they spread too far into a network. [...] "

Autosummary: Characteristic Bisamware ransomware logs Source: JPCERT/CC JPCERT/CC also notes that seemingly unrelated ransomware variants such as Shade, GandCrab, AKO, AvosLocker, BLACKBASTA, and Vice Society, leave behind very similar traces (event IDs: 13, 10016). "


Microsoft Identifies Storm-0501 as Major Threat in Hybrid Cloud Ransomware Attacks

exploits ransomware
2024-09-27 https://thehackernews.com/2024/09/microsoft-identifies-storm-0501-as.html
The threat actor known as Storm-0501 has targeted government, manufacturing, transportation, and law enforcement sectors in the U.S. to stage ransomware attacks. The multi-stage attack campaign is designed to compromise hybrid cloud environments and perform lateral movement from on-premises to cloud environment, ultimately resulting in data exfiltration, credential theft, tampering, persistent "

Autosummary: Active since 2021, the threat actor has a history of targeting education entities with Sabbath (54bb47h) ransomware before evolving into a ransomware-as-a-service (RaaS) affiliate delivering various ransomware payloads over the years, including Hive, BlackCat (ALPHV), Hunters International, LockBit, and Embargo ransomware. "


Embargo ransomware escalates attacks to cloud environments

exploits ransomware
2024-09-27 https://www.bleepingcomputer.com/news/security/embargo-ransomware-escalates-attacks-to-cloud-environments/
Microsoft warns that ransomware threat actor Storm-0501 has recently switched tactics and now targets hybrid cloud environments, expanding its strategy to compromise all victim assets. [...] "

Autosummary: "Once the threat actor achieved sufficient control over the network, successfully extracted sensitive files, and managed to move laterally to the cloud environment, the threat actor then deployed the Embargo ransomware across the organization" Microsoft "We observed that the threat actor did not always resort to ransomware distribution, and in some cases only maintained backdoor access to the network," Microsoft said. "


US sanctions crypto exchanges used by Russian ransomware gangs

exploits ransomware rusia-ucrania
2024-09-26 https://www.bleepingcomputer.com/news/security/us-sanctions-crypto-exchanges-used-by-russian-ransomware-gangs/
The U.S. Treasury Department"s Office of Foreign Assets Control (OFAC) has sanctioned PM2BTC and Cryptex, two cryptocurrency exchanges that laundered funds from Russian ransomware gangs and other cybercrime groups. [...] "

Autosummary: "Cryptex is also associated with over $720 million in transactions to services frequently used by Russia-based ransomware actors and cybercriminals, including fraud shops, mixing services, exchanges lacking KYC programs, and OFAC-designated virtual currency exchange Garantex," the Treasury said. "


How cyber compliance helps minimize the risk of ransomware infections

exploits ransomware
2024-09-24 https://www.helpnetsecurity.com/2024/09/24/cyber-compliance-minimize-risk/

Over the past decade, ransomware has been cemented as one of the top cybersecurity threats. In 2023 alone, the FBI received 2,385 ransomware complaints, resulting in over $34 million in losses. To help businesses combat ransomware and other threats, various regulatory bodies have developed cyber compliance frameworks to standardize best security practices across industries. While following governmental and industry-focused guidelines doesn’t necessarily ensure a stronger cyber posture, these frameworks do provide useful starting points as … More

The post How cyber compliance helps minimize the risk of ransomware infections appeared first on Help Net Security.

"

Autosummary: The platform comes with features designed to simplify the entire compliance lifecycle, with tools to support selecting frameworks, creating custom frameworks based on risk analyses, collecting evidence from integrated platforms, identifying gaps, executing user access reviews, implementing new controls, generating reports and continuously monitoring compliance efforts. Cyber governance, risk, and compliance (GRC) platform Cypago provides a centralized approach to managing compliance by automating many of the repetitive and time-consuming tasks involved in tracking, reporting, and maintaining adherence to various standards. By following the standards and practices outlined in these frameworks, organizations can establish structured and industry-standard cybersecurity programs that are capable of minimizing vulnerabilities, adapting to evolving ransomware trends, and responding to security incidents. "


MFA bypass becomes a critical security issue as ransomware tactics advance

exploits ransomware industry
2024-09-24 https://www.helpnetsecurity.com/2024/09/24/ransomware-session-hijacking-tactics/

Ransomware is seen as the biggest cybersecurity threat across every industry, with 75% of organizations affected by ransomware more than once in the past 12 months – a jump from 61% in 2023, according to SpyCloud. Session hijacking surges as major ransomware threat Traditional tools and solutions like antivirus and MFA are not infallible. For organizations affected by ransomware in the past year, MFA bypass via session hijacking is seen as the greatest emerging threat … More

The post MFA bypass becomes a critical security issue as ransomware tactics advance appeared first on Help Net Security.

"

Autosummary: Insurance: 6.3x more likely to experience a ransomware attack Healthcare: 2.1x more likely to experience a ransomware attack CIOs, CISOs, and other IT security executives (91%) are almost twice as confident than their security practitioner counterparts (54%) in their organization’s ability to prevent a full-blown ransomware attack – outlining an alarming disconnect between key decision makers and front-line teams on their preparedness for this costly threat. Rise of infostealer malware and digital identity exposure Cybercriminals have pivoted to next-generation tactics, using information-stealing malware (or “infostealers”) to siphon digital identity data, authentication details, and session cookies from infected users and selling this information to ransomware operators – leaving virtually every respondent (99.8%) concerned about this trend. "


Discover Latest Ransomware Tactics and Zero Trust Strategies in This Expert Webinar

exploits ransomware industry
2024-09-24 https://thehackernews.com/2024/09/discover-latest-ransomware-tactics-and.html
Ransomware is no longer just a threat; it"s an entire industry. Cybercriminals are growing more sophisticated, and their tactics are evolving rapidly. This persistent danger is a major concern for business leaders. But there"s good news: you don"t have to be defenseless. What if you could gain a strategic edge? Join our exclusive webinar, "Unpacking the 2024 Ransomware Landscape: Insights and "

Autosummary: In this informative session, you will: Go Beyond the Headlines : Explore the details behind recent ransomware incidents and uncover how attackers infiltrate, encrypt, and extort their victims. "


Warnings after new Valencia ransomware group strikes businesses and leaks data

exploits ransomware
2024-09-24 https://www.tripwire.com/state-of-security/warnings-after-new-valencia-ransomware-group-strikes-businesses-and-leaks-data
A new ransomware operation has started to leak information it claims has been stolen from organisations it has compromised around the world. In recent days Valencia Ransomware has posted on its dark web leak site"s so-called "Wall of shame" links to gigabytes of downloadable information that has seemingly been exfiltrated from a Californian municipality, a pharmaceutical firm, and a paper manufacturer. Read more in my article on the Tripwire State of Security blog. "

Autosummary: Image The alleged victims include the City of Pleasanton in California (where the attacker claims to have stolen 283GB of sensitive information), Malaysian pharmaceutical firm Duopharma Biotech (25.7GB), Indian paper manufacturer Satia (7.1GB), and Bangladeshi drugs maker Globe Pharmaceuticals (200MB). "


AutoCanada says ransomware attack "may" impact employee data

exploits ransomware
2024-09-24 https://www.bleepingcomputer.com/news/security/autocanada-says-ransomware-attack-may-impact-employee-data/
AutoCanada is warning that employee data may have been exposed in an August cyberattack claimed by the Hunters International ransomware gang. [...] "

Autosummary: The data that has been exposed includes: Full name Address Date of birth Payroll information, including salaries and bonuses Social insurance number Bank account number used for direct deposits Scans of government-issued identification documents Any personal documents stored on a work computer or drives tied to a work computer Those impacted will receive a three-year free-of-charge identity theft protection and credit monitoring coverage through Equifax, with the enrollment deadline set to January 31, 2025. "


New Mallox ransomware Linux variant based on leaked Kryptina code

exploits ransomware Linux
2024-09-23 https://www.bleepingcomputer.com/news/security/new-mallox-ransomware-linux-variant-based-on-leaked-kryptina-code/
An affiliate of the Mallox ransomware operation, also known as TargetCompany, was spotted using a slightly modified version of the Kryptina ransomware to attack Linux systems. [...] "

Autosummary: "


The Vanilla Tempest cybercrime gang used INC ransomware for the first time in attacks on the healthcare sector

exploits ransomware
2024-09-20 https://securityaffairs.com/168633/uncategorized/vanilla-tempest-used-inc-ransomware.html
Microsoft warns that financially motivated threat actor Vanilla Tempest is using INC ransomware in attacks aimed at the healthcare sector in the U.S. Microsoft Threat Intelligence team revealed that a financially motivated threat actor, tracked as Vanilla Tempest (formerly DEV-0832) is using the INC ransomware for the first time to target the U.S. healthcare sector. “Vanilla […] "

Autosummary: "


Microsoft Warns of New INC Ransomware Targeting U.S. Healthcare Sector

exploits ransomware
2024-09-19 https://thehackernews.com/2024/09/microsoft-warns-of-new-inc-ransomware.html
Microsoft has revealed that a financially motivated threat actor has been observed using a ransomware strain called INC for the first time to target the healthcare sector in the U.S. The tech giant"s threat intelligence team is tracking the activity under the name Vanilla Tempest (formerly DEV-0832). "Vanilla Tempest receives hand-offs from GootLoader infections by the threat actor Storm-0494, "

Autosummary: "


Germany seizes 47 crypto exchanges used by ransomware gangs

exploits ransomware
2024-09-19 https://www.bleepingcomputer.com/news/security/germany-seizes-47-crypto-exchanges-used-by-ransomware-gangs/
German law enforcement seized 47 cryptocurrency exchange services hosted in the country that facilitated illegal money laundering activities for cybercriminals, including ransomware gangs. [...] "

Autosummary: "


Wherever There"s Ransomware, There"s Service Account Compromise. Are You Protected?

exploits ransomware
2024-09-19 https://thehackernews.com/2024/09/wherever-theres-ransomware-theres.html
Until just a couple of years ago, only a handful of IAM pros knew what service accounts are. In the last years, these silent Non-Human-Identities (NHI) accounts have become one of the most targeted and compromised attack surfaces. Assessments report that compromised service accounts play a key role in lateral movement in over 70% of ransomware attacks. However, there’s an alarming disproportion "

Autosummary: Silverfort"s service account protection: Automated discovery, profiling, and protection Silverfort enables identity and security teams to keep their service accounts secure in the following manner: Automated discovery Silverfort sees and analyzes every AD authentication. In this article, we explore what makes service accounts such a lucrative target, why they are beyond the scope of most security control, and how the new approach of unified identity security can prevent service accounts from compromise and abuse.Silverfort"s identity security platform is built on a proprietary technology that enables it to have continuous visibility, risk analysis, and active enforcement on any AD authentication, including, of course, the ones made by service accounts. "


Rapid7 launches Vector Command for continuous red teaming and security gap identification

ransomware
2024-09-18 https://www.helpnetsecurity.com/2024/09/18/rapid7-vector-command/

Rapid7 has unveiled Vector Command, a fully-managed offensive security service. Vector Command combines the external attack surface assessment capabilities of Rapid7’s recently launched Command Platform with continuous Red Teaming services by its internal experts to help customers identify and validate IT security posture weaknesses from an attacker’s perspective. As the attack surface expands through shadow IT, cloud resources, SaaS solutions, and more, security leaders must maintain visibility of their organization’s internet-facing assets and the security … More

The post Rapid7 launches Vector Command for continuous red teaming and security gap identification appeared first on Help Net Security.

"

Autosummary: "


Microsoft: Vanilla Tempest hackers hit healthcare with INC ransomware

exploits ransomware
2024-09-18 https://www.bleepingcomputer.com/news/microsoft/microsoft-vanilla-tempest-hackers-hit-healthcare-with-inc-ransomware/
​Microsoft says a ransomware affiliate it tracks as Vanilla Tempest now targets U.S. healthcare organizations in INC ransomware attacks. [...] "

Autosummary: "


Qilin ransomware attack on Synnovis impacted over 900,000 patients

exploits ransomware
2024-09-17 https://securityaffairs.com/168480/data-breach/qilin-attack-on-synnovis-impacted-900000-patients.html
The personal information of a million individuals was published online following a ransomware attack that in June disrupted NHS hospitals in London. In June, a ransomware attack on pathology and diagnostic services provider Synnovis has severely impacted the operations at several major NHS hospitals in London. The attack forced the impacted hospitals to cancel some […] "

Autosummary: “People with symptoms of sensitive medical conditions, including cancer and sexually transmitted infections, are among almost a million individuals who had their personal information published online following a ransomware attack that disrupted NHS hospitals in London earlier this year, according to an analysis shared with Recorded Future News.” reported Recorded Future News. "


Port of Seattle confirmed that Rhysida ransomware gang was behind the August attack

exploits ransomware
2024-09-15 https://securityaffairs.com/168412/cyber-crime/port-of-seattle-rhysida-ransomware.html
Port of Seattle confirmed on Friday that the Rhysida ransomware group was behind the cyberattack that hit the agency in August. In August, a cyber attack hit the Port of Seattle, which also operates the Seattle-Tacoma International Airport, websites and phone systems were impacted. Media reported that the Port of Seattle, which also operates the […] "

Autosummary: The Port confirmed that an unauthorized actor accessed and encrypted parts of their computer systems, disrupting key services like baggage handling, check-in kiosks, ticketing, Wi-Fi, and parking.The ransomware gang hit organizations in multiple industries, including the education, healthcare, manufacturing, information technology, and government sectors. "


Port of Seattle hit by Rhysida ransomware in August attack

exploits ransomware
2024-09-13 https://www.bleepingcomputer.com/news/security/port-of-seattle-says-rhysida-ransomware-was-behind-august-attack/
Port of Seattle, the United States government agency overseeing Seattle"s seaport and airport, confirmed on Friday that the Rhysida ransomware operation was behind a cyberattack impacting its systems over the last three weeks. [...] "

Autosummary: " The Port"s decision to take systems offline and the ransomware gang encrypting those that weren"t isolated in time caused outages impacting multiple services and systems, including baggage, check-in kiosks, ticketing, Wi-Fi, passenger display boards, the Port of Seattle website, the flySEA app, and reserved parking. "


RansomHub ransomware gang relies on Kaspersky TDSKiller tool to disable EDR

exploits ransomware
2024-09-11 https://securityaffairs.com/168296/malware/ransomhub-ransomware-tdskiller-disable-edr.html
Researchers observed the RansomHub ransomware group using the TDSSKiller tool to disable endpoint detection and response (EDR) systems. The RansomHub ransomware gang is using the TDSSKiller tool to disable endpoint detection and response (EDR) systems, Malwarebytes ThreatDown Managed Detection and Response (MDR) team observed. TDSSKiller a legitimate tool developed by the cybersecurity firm Kaspersky to […] "

Autosummary: RansomHub ransomware gang relies on Kaspersky TDSKiller tool to disable EDR Pierluigi Paganini September 11, 2024 September 11, 2024 Researchers observed the RansomHub ransomware group using the TDSSKiller tool to disable endpoint detection and response (EDR) systems. "


NoName ransomware gang deploying RansomHub malware in recent attacks

exploits ransomware
2024-09-10 https://www.bleepingcomputer.com/news/security/noname-ransomware-gang-deploying-ransomhub-malware-in-recent-attacks/
The NoName ransomware gang has been trying to build a reputation for more than three years targeting small and medium-sized businesses worldwide with its encryptors and may now be working as a RansomHub affiliate. [...] "

Autosummary: - ESET NoName has been using brute force to gain access to networks but the threat actor also exploits several vulnerabilities that are more likely to be present in SMB environments: • CVE-2017-0144 (aka EternalBlue), • CVE-2023-27532 (a vulnerability in a Veeam Backup & Replication component) • CVE-2021-42278 and CVE-2021-42287 (AD privilege escalation vulnerabilities) through noPac • CVE-2022-42475 (a vulnerability in FortiOS SSL-VPN) • CVE-2020-1472 (aka Zerologon) Before launching the encryptor, ScRansom kills a list of processes and services on the Windows host, including Windows Defender, the Volume Shadow Copy, SVCHost, RDPclip, LSASS, and processes associated with VMware tools. "


RansomHub ransomware abuses Kaspersky TDSSKiller to disable EDR software

exploits ransomware
2024-09-10 https://www.bleepingcomputer.com/news/security/ransomhub-ransomware-abuses-kaspersky-tdsskiller-to-disable-edr-software/
The RansomHub ransomware gang has been using TDSSKiller, a legitimate tool from Kaspersky, to disable endpoint detection and response (EDR) services on target systems. [...] "

Autosummary: EDR agents are more advanced solutions that operate, at least partially, at the kernel level, as they need to monitor and control low-level system activities such as file access, process creation, and network connections, all providing real-time protection against threats like ransomware. "


CosmicBeetle Deploys Custom ScRansom Ransomware, Partnering with RansomHub

exploits ransomware
2024-09-10 https://thehackernews.com/2024/09/cosmicbeetle-deploys-custom-scransom.html
The threat actor known as CosmicBeetle has debuted a new custom ransomware strain called ScRansom in attacks targeting small- and medium-sized businesses (SMBs) in Europe, Asia, Africa, and South America, while also likely working as an affiliate for RansomHub. "CosmicBeetle replaced its previously deployed ransomware, Scarab, with ScRansom, which is continually improved," ESET researcher Jakub "

Autosummary: " Targets of ScRansom attacks span manufacturing, pharmaceuticals, legal, education, healthcare, technology, hospitality, leisure, financial services, and regional government sectors. POORTRY, detected as far back as in 2021, is also referred to as BURNTCIGAR, and has been used by multiple ransomware gangs, including CUBA, BlackCat, Medusa, LockBit, and RansomHub over the years. "


Veeam Backup & Replication RCE flaw may soon be leveraged by ransomware gangs (CVE-2024-40711)

exploits ransomware
2024-09-09 https://www.helpnetsecurity.com/2024/09/09/cve-2024-40711-exploited/

CVE-2024-40711, a critical vulnerability affecting Veeam Backup & Replication (VBR), could soon be exploited by attackers to steal enterprise data. Discovered and reported by Code WHite researcher Florian Hauser, the vulnerability can be leveraged for full system takeover, and security researchers from watchTowr Labs have already confirmed its potential for exploitation. Luckily for enterprises using VBR, both companies have refrained from sharing PoC exploit code or additional details about the flaw until most admins have … More

The post Veeam Backup & Replication RCE flaw may soon be leveraged by ransomware gangs (CVE-2024-40711) appeared first on Help Net Security.

"

Autosummary: "


Wing Security SaaS Pulse: Continuous Security & Actionable Insights — For Free

ransomware
2024-09-09 https://thehackernews.com/2024/09/wing-security-saas-pulse-continuous.html
Designed to be more than a one-time assessment— Wing Security’s SaaS Pulse provides organizations with actionable insights and continuous oversight into their SaaS security posture—and it’s free! Introducing SaaS Pulse: Free Continuous SaaS Risk Management  Just like waiting for a medical issue to become critical before seeing a doctor, organizations can’t afford to overlook the constantly "

Autosummary: Security teams instantly get a real-time security "health" score, prioritized risks, contextualized threat insights, and the organization"s app inventory—without setups or integrations.Users get instant clarity on App2App connectivity, third-party risk management (TPRM), Gen-AI, compliance, and more. "


Critical SonicWall SSLVPN bug exploited in ransomware attacks

exploits ransomware
2024-09-09 https://www.bleepingcomputer.com/news/security/critical-sonicwall-sslvpn-bug-exploited-in-ransomware-attacks/
Ransomware affiliates exploit a critical security vulnerability in SonicWall SonicOS firewall devices to breach victims" networks. [...] "

Autosummary: Federal agencies ordered to patch by September 30 CISA followed suit on Monday, adding the critical access control flaw to its Known Exploited Vulnerabilities catalog, ordering federal agencies to secure vulnerable SonicWall firewalls on their networks within three weeks by September 30, as mandated by Binding Operational Directive (BOD) 22-01. "


83% of organizations experienced at least one ransomware attack in the last year

exploits ransomware
2024-09-06 https://www.helpnetsecurity.com/2024/09/06/organizations-experienced-ransomware-attack/

Ransomware is an all-too-common occurrence: 83% of organizations have experienced at least one ransomware attack in the last year, 46% of respondents experienced four or more and 14% indicated they experienced 10 or more. Of those respondents who experienced at least one ransomware attack in the last year, 61% said it resulted in downtime of at least 24 hours, according to Onapsis. Source: Onapsis Of those organizations that experienced ransomware attacks, 89% said their Enterprise … More

The post 83% of organizations experienced at least one ransomware attack in the last year appeared first on Help Net Security.

"

Autosummary: "


Planned Parenthood partly offline after ransomware attack

exploits ransomware
2024-09-05 https://www.malwarebytes.com/blog/news/2024/09/planned-parenthood-partly-offline-after-ransomware-attack
Intermountain Planned Parenthood of Montana suffered a cyberattack which has been claimed by a ransomware group "

Autosummary: As laid out in a recent joint advisory by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Multi-State Information Sharing and Analysis Center (MS-ISAC), and the Department of Health and Human Services (HHS), RansomHub is a relatively new but very active Ransomware-as-a-Service group known to target healthcare organizations and other critical infrastructure sectors. Phishing attacks often impersonate people or brands you know, and use themes that require urgent attention, such as missed deliveries, account suspensions, and security alerts.Phishing attacks often impersonate people or brands you know, and use themes that require urgent attention, such as missed deliveries, account suspensions, and security alerts. "


Cicada ransomware – what you need to know

exploits ransomware
2024-09-05 https://www.tripwire.com/state-of-security/cicada-ransomware-what-you-need-know
Cicada (also known as Cicada3301) is a sophisticated ransomware, written in Rust, that has claimed more than 20 victims since its discovery in June 2024. Read more in my article on the Tripwire State of Security blog. "

Autosummary: While there"s no definitive proof, the similarities between Cicada and BlackCat, including the use of Rusy, evasion techniques, and timing, suggest a possible connection. According to a blog post by security researchers at Morphisec, at least 21 companies, predominantly in North America and the UK, have been hit by Cicada since June 18, 2024. "


How ransomware tactics are shifting, and what it means for your business

exploits ransomware industry
2024-09-03 https://www.helpnetsecurity.com/2024/09/03/tim-west-withsecure-ransomware-tactics-shifting/

In this Help Net Security interview, Tim West, Director of Threat Intelligence and Outreach at WithSecure, discusses Ransomware-as-a-Service (RaaS) with a focus on how these cybercriminal operations are adapting to increased competition, shifting structures, and a fragmented ecosystem. West talks about the implications of these changes for targeted industries, particularly engineering and manufacturing, and examines ransomware actors’ growing reliance on dual-use tools. How has the ransomware-as-a-service (RaaS) landscape evolved? Are we seeing a shift in … More

The post How ransomware tactics are shifting, and what it means for your business appeared first on Help Net Security.

"

Autosummary: The tools we found to be commonly used by RaaS actors included PDQ Connect, Action1, AnyDesk, and TeamViewer for remote access, as well as rclone, rsync, Megaupload, and FileZilla for data exfiltration.In this Help Net Security interview, Tim West, Director of Threat Intelligence and Outreach at WithSecure, discusses Ransomware-as-a-Service (RaaS) with a focus on how these cybercriminal operations are adapting to increased competition, shifting structures, and a fragmented ecosystem.At the same time, from a defender’s perspective, the mistrust among cybercriminals is beneficial, as it likely makes them less effective, less efficient, and easier to defend against. Proprietary data and intellectual property (IP), including designs, blueprints, and trade secrets are critical to maintaining a competitive edge, and therefore lucrative assets for theft or sale. At the same time, traditional defences against ransomware encryption, such as backup strategies and network segmentation, remain important. "


New Rust-Based Ransomware Cicada3301 Targets Windows and Linux Systems

exploits ransomware Linux
2024-09-03 https://thehackernews.com/2024/09/new-rust-based-ransomware-cicada3301.html
Cybersecurity researchers have unpacked the inner workings of a new ransomware variant called Cicada3301 that shares similarities with the now-defunct BlackCat (aka ALPHV) operation. "It appears that Cicada3301 ransomware primarily targets small to medium-sized businesses (SMBs), likely through opportunistic attacks that exploit vulnerabilities as the initial access vector," cybersecurity "

Autosummary: "


RansomHub Ransomware Group Targets 210 Victims Across Critical Sectors

exploits ransomware
2024-09-02 https://thehackernews.com/2024/09/ransomhub-ransomware-group-targets-210.html
Threat actors linked to the RansomHub ransomware group encrypted and exfiltrated data from at least 210 victims since its inception in February 2024, the U.S. government said. The victims span various sectors, including water and wastewater, information technology, government services and facilities, healthcare and public health, emergency services, food and agriculture, financial services, "

Autosummary: The victims span various sectors, including water and wastewater, information technology, government services and facilities, healthcare and public health, emergency services, food and agriculture, financial services, commercial facilities, critical manufacturing, transportation, and communications critical infrastructure. "


Lockbit gang claims the attack on the Toronto District School Board (TDSB)

ransomware
2024-09-02 https://securityaffairs.com/167934/cyber-crime/lockbit-ransomware-toronto-district-school-board.html
The Toronto District School Board (TDSB) confirmed that student information was compromised in the June Lockbit ransomware attack. The Toronto District School Board (TDSB) confirmed that students’ information was compromised following a ransomware attack that was discovered in June.  The TDSB is the largest school board in Canada with 582 schools and about 235,000 students. In […] "

Autosummary: LockBit also claims to have re-breached Bridgestone Americas and claims Albany Bank, PKF Australia, HP Hood… pic.twitter.com/KBU9CtXbIs — Dominic Alvieri (@AlvieriD) August 29, 2024 At the end of July, two foreign nationals, Ruslan Magomedovich Astamirov and Mikhail Vasiliev, pleaded guilty in Newark federal court for their roles in the LockBit ransomware operation. "


A new variant of Cicada ransomware targets VMware ESXi systems

exploits ransomware
2024-09-02 https://securityaffairs.com/167897/cyber-crime/a-new-variant-of-cicada-ransomware-targets-vmware-esxi-systems.html
A new ransomware-as-a-service (RaaS) operation called Cicada3301 has emerged in the threat landscape and already targeted tens of companies. Cicada3301 is a new ransomware-as-a-service (RaaS) operation that appeared in the threat landscape. The group appears to be very active and already listed 23 victims on its extortion portal since mid-June. The following image shows the […] "

Autosummary: Both are written in Rust Both use ChaCha20 for encryption Both use almost identical commands to shutdown VM and remove snapshots[1] Both use –ui command parameters to provide a graphic output on encryption Both use the same convention for naming files, but changing “RECOVER-“ransomware extension”-FILES.txt” to “RECOVER-“ransomware extension”-DATA.txt”[2] How the key parameter is used to decrypt the ransomware note The initial attack by the Cicada3301 group began with the use of stolen or brute-forced credentials to log in via ScreenConnect.A new variant of Cicada ransomware targets VMware ESXi systems Pierluigi Paganini September 02, 2024 September 02, 2024 A new ransomware-as-a-service (RaaS) operation called Cicada3301 has emerged in the threat landscape and already targeted tens of companies. "


Cicada3301 ransomware’s Linux encryptor targets VMware ESXi systems

exploits ransomware Linux
2024-09-01 https://www.bleepingcomputer.com/news/security/cicada3301-ransomwares-linux-encryptor-targets-vmware-esxi-systems/
A new ransomware-as-a-service (RaaS) operation named Cicada3301 has already listed 19 victims on its extortion portal, as it quickly attacked companies worldwide. [...] "

Autosummary: It should be noted that BlackCat/ALPHV encryptors also used random seven-character extensions and a ransom note named "RECOVER-[extension]-FILES.txt." Cicada3301 ransom note Source: BleepingComputer The ransomware"s operators can set a sleep parameter to delay the encryptor"s execution, potentially to evade immediate detection. Cicada3301 ransomware operator seeking affiliates on RAMP forums Source: Truesec Like other ransomware operations, Cicada3301 conducts double-extortion tactics where they breach corporate networks, steal data, and then encrypt devices. "


Linux version of new Cicada ransomware targets VMware ESXi servers

exploits ransomware Linux
2024-09-01 https://www.bleepingcomputer.com/news/security/linux-version-of-new-cicada-ransomware-targets-vmware-esxi-servers/
A new ransomware-as-a-service (RaaS) operation named Cicada3301 has already listed 19 victims on its extortion portal, as it quickly attacked companies worldwide. [...] "

Autosummary: It should be noted that BlackCat/ALPHV encryptors also used random seven-character extensions and a ransom note named "RECOVER-[extension]-FILES.txt." Cicada3301 ransom note Source: BleepingComputer The ransomware"s operators can set a sleep parameter to delay the encryptor"s execution, potentially to evade immediate detection. Cicada3301 ransomware operator seeking affiliates on RAMP forums Source: Truesec Like other ransomware operations, Cicada3301 conducts double-extortion tactics where they breach corporate networks, steal data, and then encrypt devices. "


Researcher sued for sharing data stolen by ransomware with media

exploits ransomware
2024-08-30 https://www.bleepingcomputer.com/news/security/researcher-sued-for-sharing-data-stolen-by-ransomware-with-media/
The City of Columbus, Ohio, has filed a lawsuit against security researcher David Leroy Ross, aka Connor Goodwolf, accusing him of illegally downloading and disseminating data stolen from the City"s IT network and leaked by the Rhysida ransomware gang. [...] "

Autosummary: On the same day, Rhysida ransomware claimed responsibility for the attack, alleging they stole 6.5 TB of databases, including employee credentials, server dumps, city video camera feeds, and other sensitive information. "


Why ransomware attackers target Active Directory

exploits ransomware
2024-08-29 https://www.helpnetsecurity.com/2024/08/29/why-ransomware-attackers-target-active-directory-video/

Ransomware attacks have surged 78% year-over-year, affecting various sectors and organizations and significantly impacting supply chains. In this Help, Net Security video, Craig Birch, Technology Evangelist, and Principal Security Engineer at Cayosoft, discusses the rise of ransomware attacks, why attackers often target Microsoft Active Directory and best practices to limit the impact of such attacks. Microsoft Active Directory, the core identity and access system in over 90% of enterprises, has become a prime target for … More

The post Why ransomware attackers target Active Directory appeared first on Help Net Security.

"

Autosummary: "


‘Big-game hunting’ – Ransomware gangs are focusing on more lucrative attacks

exploits ransomware
2024-08-29 https://www.exponential-e.com/blog/big-game-hunting-ransomware-gangs-are-focusing-on-more-lucrative-attacks
2024 looks set to be the highest-grossing year yet for ransomware gangs, due - in no small part - to emboldened cybercriminals causing costly disruption at larger companies. Read more in my article on the Exponential-e blog. "

Autosummary: "


U.S. Agencies Warn of Iranian Hacking Group"s Ongoing Ransomware Attacks

exploits ransomware
2024-08-29 https://thehackernews.com/2024/08/us-agencies-warn-of-iranian-hacking.html
U.S. cybersecurity and intelligence agencies have called out an Iranian hacking group for breaching multiple organizations across the country and coordinating with affiliates to deliver ransomware. The activity has been linked to a threat actor dubbed Pioneer Kitten, which is also known as Fox Kitten, Lemon Sandstorm (formerly Rubidium), Parisite, and UNC757, which it described as connected to "

Autosummary: " Initial access is accomplished by taking advantage of remote external services on internet-facing assets that are vulnerable to previously disclosed flaws (CVE-2019-19781, CVE-2022-1388, CVE-2023-3519, CVE-2024-3400, and CVE-2024-24919), followed by a series of steps to persist, escalate privileges, and set up remote access through tools like AnyDesk or the open-source Ligolo tunneling tool. Peach Sandstorm Delivers Tickler Malware in Long-Running Campaign The development comes as Microsoft said it observed Iranian state-sponsored threat actor Peach Sandstorm (aka APT33, Curious Serpens, Elfin, and Refined Kitten) deploying a new custom multi-stage backdoor referred to as Tickler in attacks against targets in the satellite, communications equipment, oil and gas, as well as federal and state government sectors in the U.S. and U.A.E. between April and July 2024. "


#StopRansomware: RansomHub Ransomware

exploits ransomware
2024-08-29 https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-242a

Summary

Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Multi-State Information Sharing and Analysis Center (MS-ISAC), and the Department of Health and Human Services (HHS) (hereafter referred to as the authoring organizations) are releasing this joint advisory to disseminate known RansomHub ransomware IOCs and TTPs. These have been identified through FBI threat response activities and third-party reporting as recently as August 2024. RansomHub is a ransomware-as-a-service variant—formerly known as Cyclops and Knight—that has established itself as an efficient and successful service model (recently attracting high-profile affiliates from other prominent variants such as LockBit and ALPHV).

Since its inception in February 2024, RansomHub has encrypted and exfiltrated data from at least 210 victims representing the water and wastewater, information technology, government services and facilities, healthcare and public health, emergency services, food and agriculture, financial services, commercial facilities, critical manufacturing, transportation, and communications critical infrastructure sectors.

The affiliates leverage a double-extortion model by encrypting systems and exfiltrating data to extort victims. It should be noted that data exfiltration methods are dependent on the affiliate conducting "

Autosummary: To successfully encrypt files that are currently in use, the ransomware binary will typically attempt to stop the following processes: "vmms.exe" "msaccess.exe" "mspub.exe" "svchost.exe" "vmcompute.exe" "notepad.exe" "ocautoupds.exe" "ocomm.exe" "ocssd.exe" "oracle.exe" "onenote.exe" "outlook.exe" "powerpnt.exe" "explorer.exe" "sql.exe" "steam.exe" "synctime.exe" "vmwp.exe" "thebat.exe" "thunderbird.exe" "visio.exe" "winword.exe" "wordpad.exe" "xfssvccon.exe" "TeamViewer.exe" "agntsvc.exe" "dbsnmp.exe" "dbeng50.exe" "encsvc.exe" The ransomware binary will attempt to encrypt any files that the user has access to, including user files and networked shares. Since its inception in February 2024, RansomHub has encrypted and exfiltrated data from at least 210 victims representing the water and wastewater, information technology, government services and facilities, healthcare and public health, emergency services, food and agriculture, financial services, commercial facilities, critical manufacturing, transportation, and communications critical infrastructure sectors.A heap-based buffer overflow vulnerability in FortiOS version 7.2.4 and below, version 7.0.11 and below, version 6.4.12 and below, version 6.0.16 and below and FortiProxy version 7.2.3 and below, version 7.0.9 and below, version 2.0.12 and below, version 1.2 all versions, version 1.1 all versions SSL-VPN may allow a remote attacker to execute arbitrary code or commands via specifically crafted requests.Data exfiltration has been observed through the usage of tools such as PuTTY [T1048.002], Amazon AWS S3 buckets/tools [T1537], HTTP POST requests [T1048.003], WinSCP, Rclone, Cobalt Strike, Metasploit, and other methods. The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Multi-State Information Sharing and Analysis Center (MS-ISAC), and the Department of Health and Human Services (HHS) (hereafter referred to as the authoring organizations) are releasing this joint advisory to disseminate known RansomHub ransomware IOCs and TTPs. "


Halliburton cyberattack linked to RansomHub ransomware gang

exploits ransomware ciber
2024-08-29 https://www.bleepingcomputer.com/news/security/halliburton-cyberattack-linked-to-ransomhub-ransomware-gang/
The RansomHub ransomware gang is behind the recent cyberattack on oil and gas services giant Halliburton, which disrupted the company"s IT systems and business operations. [...] "

Autosummary: "As soon as we learned of the issue, we activated our cybersecurity response plan and took steps to address it, including (1) proactively taking certain systems offline to help protect them, (2) engaging the support of leading external advisors, including Mandiant, and (3) notifying law enforcement. However, soon after, it was discovered that the operation also utilized ransomware encryptors in its double-extortion attacks, where the threat actors breached networks, stole data, and then encrypted files. "


FBI: RansomHub ransomware breached 210 victims since February

exploits ransomware
2024-08-29 https://www.bleepingcomputer.com/news/security/fbi-ransomhub-ransomware-breached-210-victims-since-february/
​Since surfacing in February 2024, RansomHub ransomware affiliates have breached over 200 victims from a wide range of critical U.S. infrastructure sectors. [...] "

Autosummary: "


BlackByte Ransomware Exploits VMware ESXi Flaw in Latest Attack Wave

exploits ransomware
2024-08-28 https://thehackernews.com/2024/08/blackbyte-ransomware-exploits-vmware.html
The threat actors behind the BlackByte ransomware group have been observed likely exploiting a recently patched security flaw impacting VMware ESXi hypervisors, while also leveraging various vulnerable drivers to disarm security protections. "The BlackByte ransomware group continues to leverage tactics, techniques, and procedures (TTPs) that have formed the foundation of its tradecraft since its "

Autosummary: A majority of the attacks have targeted healthcare, finance, and government sectors in the U.S., Brazil, Italy, Spain, and the U.K. "For initial access the affiliates usually purchase compromised valid domain accounts from Initial Access Brokers (IABs) and external remote services," Group-IB said, adding the "accounts have been acquired via LummaC2 stealer.All the four drivers follow a similar naming convention: Eight random alphanumeric characters followed by an underscore and an incremental numerical value - AM35W2PH (RtCore64.sys) AM35W2PH_1 (DBUtil_2_3.sys) AM35W2PH_2 (zamguard64.sys aka Terminator) AM35W2PH_3 (gdrv.sys) The professional, scientific, and technical services sectors have the greatest exposure to the observed vulnerable drivers, accounting for 15% of the total, followed by manufacturing (13%) and educational services (13%). "


Iranian hackers work with ransomware gangs to extort breached orgs

exploits ransomware
2024-08-28 https://www.bleepingcomputer.com/news/security/iranian-hackers-work-with-ransomware-gangs-to-extort-breached-orgs/
An Iran-based hacking group known as Pioneer Kitten is breaching defense, education, finance, and healthcare organizations across the United States and working with affiliates of several ransomware operations to extort the victims. [...] "

Autosummary: "


Pioneer Kitten: Iranian hackers partnering with ransomware affiliates

exploits ransomware
2024-08-28 https://www.helpnetsecurity.com/2024/08/28/pioneer-kitten-iranian-hackers-partnering-with-ransomware-affiliates/

A group of Iranian hackers – dubbed Pioneer Kitten by cybersecurity researchers – is straddling the line between state-contracted cyber espionage group and initial access provider (and partner in crime) for affiliates of several ransomware groups. “The FBI assesses these actors do not disclose their Iran-based location to their ransomware affiliate contacts and are intentionally vague as to their nationality and origin,” US security agencies say. Also, “the group’s ransomware activities are likely not sanctioned … More

The post Pioneer Kitten: Iranian hackers partnering with ransomware affiliates appeared first on Help Net Security.

"

Autosummary: Iranian hackers working with ransomware affiliates Pioneer Kitten – also known as Fox Kitten, UNC757, Parisite, RUBIDIUM, and Lemon Sandstorm in the cybersecurity research community – is an group that refers to itself as “xplfinder” and, more recently “Br0k3r”. "


CODAC Behavioral Healthcare, US Marshalls are latest ransomware targets

exploits ransomware
2024-08-28 https://www.malwarebytes.com/blog/news/2024/08/codac-behavioral-healthcare-us-marshalls-are-latest-ransomware-targets
Ransomware gangs love sensitive data from healthcare and support organizations to increase their leverage on the victims "

Autosummary: The Qilin ransomware group listed CODAC Behavioral Healthcare Within the stolen data, Malwarebytes Labs noticed financial information, pictures of ID cards, a list of staff members—including their Social Security Numbers (SSNs)—and healthcare cards. Phishing attacks often impersonate people or brands you know, and use themes that require urgent attention, such as missed deliveries, account suspensions, and security alerts.Hunters International ransomware group posted 386 GB of data that appears to include files on gangs, documents from the FBI, specific case information, operational data, and more. "


BlackByte Ransomware group targets recently patched VMware ESXi flaw CVE-2024-37085

exploits ransomware
2024-08-28 https://securityaffairs.com/167695/malware/blackbyte-ransomware-vmware-esxi-flaw.html
BlackByte ransomware operators are exploiting a recently patched VMware ESXi hypervisors vulnerability in recent attacks. Cisco Talos observed the BlackByte ransomware group exploiting the recently patched security flaw CVE-2024-37085 in VMware ESXi hypervisors in recent attacks. The flaw CVE-2024-37085 (CVSS score of 6.8) is an authentication bypass vulnerability in VMware ESXi. At the end of July, […] "

Autosummary: The group has been active since at least 2021, BlackByte is known for using vulnerable drivers to bypass security, deploying self-propagating ransomware with worm-like abilities, and leveraging legitimate system binaries and commercial tools in its attacks.BlackByte Ransomware group targets recently patched VMware ESXi flaw CVE-2024-37085 Pierluigi Paganini August 28, 2024 August 28, 2024 BlackByte ransomware operators are exploiting a recently patched VMware ESXi hypervisors vulnerability in recent attacks. "


Lateral movement: Clearest sign of unfolding ransomware attack

exploits ransomware
2024-08-27 https://www.helpnetsecurity.com/2024/08/27/ransomware-attacks-lateral-movement/

44% of unfolding ransomware attacks were spotted during lateral movement, according to Barracuda Networks. 25% of incidents were detected when the attackers started writing or editing files, and 14% were unmasked by behavior that didn’t fit with known activity patterns. Barracuda researchers analyzed a sample of 200 reported incidents covering August 2023 to July 2024, involving 37 countries and 36 different ransomware groups. RaaS models most common in recent ransomware attacks The sample shows that … More

The post Lateral movement: Clearest sign of unfolding ransomware attack appeared first on Help Net Security.

"

Autosummary: Leading indicators of ransomware activity According to detection data from Barracuda, in the first six months of 2024 the top indicators of likely ransomware activity include: Lateral movement : 44% of the ransomware attacks were spotted by detection systems monitoring for lateral movement. "


BlackSuit ransomware stole data of 950,000 from software vendor

exploits ransomware
2024-08-27 https://www.bleepingcomputer.com/news/security/blacksuit-ransomware-stole-data-of-950-000-from-software-vendor/
Young Consulting is sending data breach notifications to 954,177 people who had their information exposed in a BlackSuit ransomware attack on April 10, 2024. [...] "

Autosummary: "


US Marshals Service disputes ransomware gang"s breach claims

exploits ransomware
2024-08-27 https://www.bleepingcomputer.com/news/security/us-marshals-service-disputes-ransomware-gangs-breach-claims/
The U.S. Marshals Service (USMS) denies its systems were breached by the Hunters International ransomware gang after being listed as a new victim on the cybercrime group"s leak site on Monday. [...] "

Autosummary: "


Rebrand, regroup, ransomware, repeat

exploits ransomware
2024-08-26 https://www.helpnetsecurity.com/2024/08/26/rebrand-regroup-ransomware-repeat-video/

Changes witnessed over the last few years have led to larger ransomware groups breaking into smaller units, posing more considerable challenges for law enforcement. Ransomware actors are evading arrest more easily and adapting methods with innovative technologies. In this Help Net Security video, Shobhit Gautam, Security Solutions Architect at HackerOne, discusses how ransomware tactics have evolved and how organizations and government bodies are having to fight change with change.

The post Rebrand, regroup, ransomware, repeat appeared first on Help Net Security.

"

Autosummary: "


Patelco notifies 726,000 customers of ransomware data breach

financial exploits ransomware Telcos
2024-08-26 https://www.bleepingcomputer.com/news/security/patelco-notifies-726-000-customers-of-ransomware-data-breach/
Patelco Credit Union warns customers it suffered a data breach after personal data was stolen in a RansomHub ransomware attack earlier this year. [...] "

Autosummary: "


The changing dynamics of ransomware as law enforcement strikes

exploits ransomware industry
2024-08-23 https://www.helpnetsecurity.com/2024/08/23/changing-dynamics-of-ransomware/

After peaking in late 2023, the ransomware industry is beginning to stabilize in productivity, with notable developments in ransomware targets, and industry dynamics, according to WithSecure. Sectors impacted by ransomware (Source: WithSecure) While ransomware productivity has shown signs of leveling off in 2024, the frequency of attacks and ransom payments collected remained higher in the first half of 2024 than in 2022 and 2023. “There has been a marked shift towards targeting small and medium-sized … More

The post The changing dynamics of ransomware as law enforcement strikes appeared first on Help Net Security.

"

Autosummary: "


New Qilin Ransomware Attack Uses VPN Credentials, Steals Chrome Data

exploits ransomware
2024-08-23 https://thehackernews.com/2024/08/new-qilin-ransomware-attack-uses-vpn.html
The threat actors behind a recently observed Qilin ransomware attack have stolen credentials stored in Google Chrome browsers on a small set of compromised endpoints. The use of credential harvesting in connection with a ransomware infection marks an unusual twist, and one that could have cascading consequences, cybersecurity firm Sophos said in a Thursday report. The attack, detected in July "

Autosummary: Indeed, Coveware said over 10% of the incidents handled by the company in Q2 2024 were unaffiliated, meaning they were "attributed to attackers that were deliberately operating independently of a specific brand and what we typically term "lone wolves."" "Continued takedowns of cybercriminal forums and marketplaces shortened the lifecycle of criminal sites, as the site administrators try to avoid drawing law enforcement (LE) attention," Europol said in an assessment released last month. "Once the attacker reached the domain controller in question, they edited the default domain policy to introduce a logon-based Group Policy Object (GPO) containing two items," researchers Lee Kirkpatrick, Paul Jacobs, Harshal Gosalia, and Robert Weiland said. "


Qilin ransomware steals credentials stored in Google Chrome

exploits ransomware
2024-08-23 https://securityaffairs.com/167496/cyber-crime/qilin-ransomware-steal-google-chrome-passwords.html
Sophos researchers investigated a Qilin ransomware breach attack that led to the theft of credentials stored in Google Chrome browsers. Sophos researchers investigated a Qilin ransomware attack where operators stole credentials stored in Google Chrome browsers of a limited number of compromised endpoints. The experts pointed out that the credential harvesting activity is usually not […] "

Autosummary: Qilin ransomware steals credentials stored in Google Chrome Pierluigi Paganini August 23, 2024 August 23, 2024 Sophos researchers investigated a Qilin ransomware breach attack that led to the theft of credentials stored in Google Chrome browsers. "


Iran-based Cyber Actors Enabling Ransomware Attacks on US Organizations

exploits ransomware
2024-08-23 https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-241a

Summary

The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Defense Cyber Crime Center (DC3) are releasing this joint Cybersecurity Advisory (CSA) to warn network defenders that, as of August 2024, a group of Iran-based cyber actors continues to exploit U.S. and foreign organizations. This includes organizations across several sectors in the U.S. (including in the education, finance, healthcare, and defense sectors as well as local government entities) and other countries (including in Israel, Azerbaijan, and the United Arab Emirates). The FBI assesses a significant percentage of these threat actors’ operations against US organizations are intended to obtain and develop network access to then collaborate with ransomware affiliate actors to deploy ransomware. The FBI further assesses these Iran-based cyber actors are associated with the Government of Iran (GOI) and—separate from the ransomware activity—conduct computer network exploitation activity in support of the GOI (such as intrusions enabling the theft of sensitive technical data against organizations in Israel and Azerbaijan).

This CSA provides the threat actor’s tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs), as well as highlights similar activity from a previous advisory (Iran-Based Threat Actor Exploits VPN Vulnerabilities) that the FBI and CISA published on Sept. 15, 2020. The information and guidance in this advisory are derived from FBI investigative activity and technical analysis of this group’s intrusion activity against U.S. organizations and engagements with numerous entities impacted by this malicious activity.

The FBI recommends all organizations follow guidance provided in the Mitigations section of this advisory to defend against the Iranian cyber actors’ activity.

If organizations belie "

Autosummary: The actors’ initial access is usually obtained via exploiting a public-facing networking device, such as Citrix Netscaler (CVE-2019-19781 and CVE-2023-3519), F5 BIG-IP (CVE-2022-1388), Pulse Secure/Ivanti VPNs (CVE-2024-21887), and, more recently, PanOS firewalls (CVE-2024-3400) Exfiltration and Impact After infiltrating victim networks, the actors collaborate with ransomware affiliates (including NoEscape, Ransomhouse, and ALPHV [aka BlackCat]) in exchange for a percentage of the ransom payments by providing affiliates with access to victim networks, locking victim networks, and strategizing to extort victims [T1657].Summary The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Defense Cyber Crime Center (DC3) are releasing this joint Cybersecurity Advisory (CSA) to warn network defenders that, as of August 2024, a group of Iran-based cyber actors continues to exploit U.S. and foreign organizations. This CSA provides the threat actor’s tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs), as well as highlights similar activity from a previous advisory (Iran-Based Threat Actor Exploits VPN Vulnerabilities) that the FBI and CISA published on Sept. 15, 2020.This includes organizations across several sectors in the U.S. (including in the education, finance, healthcare, and defense sectors as well as local government entities) and other countries (including in Israel, Azerbaijan, and the United Arab Emirates). Execution, Privilege Escalation, and Defense Evasion Repurpose compromised credentials from exploiting networking devices, such as Citrix Netscaler, to log into other applications (i.e., Citrix XenDesktop) "


Most ransomware attacks occur between 1 a.m. and 5 a.m.

exploits ransomware
2024-08-22 https://www.helpnetsecurity.com/2024/08/22/ransomware-attacks-time/

There’s been an alarming increase in ransomware attacks over the past year, alongside significant shifts in the tactics and strategies employed by cybercriminals that underscore the necessity for organizations to implement around-the-clock monitoring and investigation of suspicious behaviors, according to a new Malwarebytes report. “Ransomware gangs have time and motivation on their side. They constantly evolve to respond to the latest technologies chasing at their tails,” said Marcin Kleczynski, CEO, Malwarebytes. “We’ve seen this distinctly … More

The post Most ransomware attacks occur between 1 a.m. and 5 a.m. appeared first on Help Net Security.

"

Autosummary: There’s been an alarming increase in ransomware attacks over the past year, alongside significant shifts in the tactics and strategies employed by cybercriminals that underscore the necessity for organizations to implement around-the-clock monitoring and investigation of suspicious behaviors, according to a new Malwarebytes report. "


The Facts About Continuous Penetration Testing and Why It’s Important

ransomware
2024-08-22 https://thehackernews.com/2024/08/the-facts-about-continuous-penetration.html
What is Continuous Attack Surface Penetration Testing or CASPT? Continuous Penetration Testing or Continuous Attack Surface Penetration Testing (CASPT) is an advanced security practice that involves the continuous, automated, and ongoing penetration testing services of an organization"s digital assets to identify and mitigate security vulnerabilities. CASPT is designed for enterprises with an "

Autosummary: How CASPT is Applied Across Different Assets Continuous Attack Surface Penetration Testing can be applied across a variety of digital assets, including: Web Applications: Continuous testing of web applications helps in identifying vulnerabilities like SQL injection, cross-site scripting (XSS), and broken authentication mechanisms. The benefits of integrating CASPT with other offensive security tools like ASM and red teaming are significant including a reduced attack surface, increased resilience to withstand real-world attacks, cost-efficiencies from reduced breaches and operational downtime, and meeting regulatory requirements by providing ongoing evidence of security practices and vulnerabilities management.High-Value Targets Scenario: Organizations that are considered high-value targets for cyberattacks, such as those in finance, healthcare, government, or technology sectors.Regulatory and Compliance Requirements Scenario: Industries with strict compliance standards, such as finance, healthcare, or critical infrastructure, where maintaining high levels of security is mandatory. Continuous Penetration Testing or Continuous Attack Surface Penetration Testing (CASPT) is an advanced security practice that involves the continuous, automated, and ongoing penetration testing services of an organization"s digital assets to identify and mitigate security vulnerabilities.Unlike traditional penetration testing, which is often performed annually or semi-annually, CASPT is an ongoing process that integrates directly into the software development lifecycle (SDLC), ensuring that vulnerabilities are discovered and addressed in real-time or near-real-time.By adopting a proactive, continuous approach to penetration testing, organizations can stay ahead of emerging threats, improve their security development cycle, and protect their most valuable assets. Attack Path Validation and Mapping More innovative CASPT providers offer organizations with continuous validation of their attack paths by with an automatic visualization that maps out all potential routes an attacker might take to compromise critical assets from domain, subdomains, IP addresses, and discovered vulnerabilities. What Continuous Attack Surface Penetration Testing is Not While CASPT shares similarities with traditional penetration testing, there are distinct differences: Not a One-Time Assessment: Traditional penetration testing is typically a one-time assessment conducted periodically. "


QNAP releases QTS 5.2 to prevent data loss from ransomware threats

exploits ransomware
2024-08-22 https://www.helpnetsecurity.com/2024/08/22/qnap-qts-5-2-nas/

QNAP has released the QTS 5.2 NAS operating system. A standout feature of this release is the debut of Security Center, which actively monitors file activities and thwarts ransomware threats. Additionally, system security receives a boost with the inclusion of support for TCG-Ruby self-encrypting drives (SED). Extensive optimizations have been implemented to streamline operations, configuration, and management processes, significantly elevating the overall user experience. “We greatly appreciate the invaluable feedback provided by our dedicated QTS … More

The post QNAP releases QTS 5.2 to prevent data loss from ransomware threats appeared first on Help Net Security.

"

Autosummary: “We greatly appreciate the invaluable feedback provided by our dedicated QTS 5.2 beta testers, which has been instrumental in putting the finishing touches on this official release,” said Tim Lin, Product Manager of QNAP, adding “QNAP remains committed to ensuring our data storage and management solutions stay current, offering dependable NAS storage solutions that meet the heightened expectations of today’s users.” "


Qilin ransomware now steals credentials from Chrome browsers

exploits ransomware
2024-08-22 https://www.bleepingcomputer.com/news/security/qilin-ransomware-now-steals-credentials-from-chrome-browsers/
The Qilin ransomware group has been using a new tactic and deploys a custom stealer to steal account credentials stored in Google Chrome browser. [...] "

Autosummary: Such extensive credential theft could enable follow-up attacks, lead to widespread breaches across multiple platforms and services, make response efforts a lot more cumbersome, and introduce a lingering, long-lasting threat after the ransomware incident is resolved. "


QNAP adds NAS ransomware protection to latest QTS version

exploits ransomware
2024-08-21 https://www.bleepingcomputer.com/news/security/qnap-adds-nas-ransomware-protection-to-latest-qts-version/
​Taiwanese hardware vendor QNAP has added a Security Center with ransomware protection capabilities to the latest version of its QTS operating system for network-attached storage (NAS) devices. [...] "

Autosummary: "


CISA Warns of Critical Jenkins Vulnerability Exploited in Ransomware Attacks

exploits ransomware
2024-08-20 https://thehackernews.com/2024/08/cisa-warns-of-critical-jenkins.html
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security flaw impacting Jenkins to its Known Exploited Vulnerabilities (KEV) catalog, following its exploitation in ransomware attacks. The vulnerability, tracked as CVE-2024-23897 (CVSS score: 9.8), is a path traversal flaw that could lead to code execution. "Jenkins Command Line Interface (CLI) contains a "

Autosummary: "


Why you need to know about ransomware

exploits ransomware
2024-08-20 https://www.malwarebytes.com/blog/ransomware/2024/08/why-you-need-to-know-about-ransomware
A home ransomware campaign sprung up amidst an increase in attacks against businesses, making the threat a must-know facet of cybersecurity. "

Autosummary: Why you need to know about ransomware The most important services in your life are also the most attractive targets for ransomware gangs around the world, which is why your banks, grocery stores, hospitals, schools, government resources, and more could, without any fault of your own, suddenly grind to a halt. For years, cybercriminals have focused their ransomware attacks against the types of organizations that are essential for everyday life, including hospitals, schools, critical infrastructure, and entire city governments.Because of ransomware attacks in the past, surgeries have been delayed, classes have been cancelled, and, more recently, a credit union’s customers had their direct deposit payments thrown into disarray. "


CannonDesign confirms Avos Locker ransomware data breach

financial exploits ransomware
2024-08-20 https://www.bleepingcomputer.com/news/security/cannondesign-confirms-avos-locker-ransomware-data-breach/
The Cannon Corporation dba CannonDesign is sending notices of a data breach to more than 13,000 of its clients, informing that hackers breached and stole data from its network in an attack in early 2023. [...] "

Autosummary: The data allegedly included database dumps, project schematics, hiring documents, client details, marketing material, IT and infrastructure details, and quality assurance reports. "


The Mad Liberator ransomware group uses social-engineering techniques

exploits ransomware
2024-08-19 https://securityaffairs.com/167231/malware/mad-liberator-ransomware-social-engineering.html
New cybercrime group Mad Liberator is targeting AnyDesk users and runs a fake Microsoft Windows update screen to conceal data exfiltrating. The Sophos X-Ops Incident Response team warned that a new ransomware group called Mad Liberator is exploiting the remote-access application Anydesk for their attacks. The group was also spotted running a fake Microsoft Windows update […] "

Autosummary: The Mad Liberator ransomware group uses social-engineering techniques Pierluigi Paganini August 19, 2024 August 19, 2024 New cybercrime group Mad Liberator is targeting AnyDesk users and runs a fake Microsoft Windows update screen to conceal data exfiltrating.The attack lasted almost four hours, at the conclusion of which the attacker terminated the fake update screen and ended the Anydesk session, giving control of the device back to the victim.” continues the researchers. "


CISA warns of Jenkins RCE bug exploited in ransomware attacks

exploits ransomware
2024-08-19 https://www.bleepingcomputer.com/news/security/cisa-warns-of-jenkins-rce-bug-exploited-in-ransomware-attacks/
​CISA has added a critical Jenkins vulnerability that can be exploited to gain remote code execution to its catalog of security bugs, warning that it"s actively exploited in attacks. [...] "

Autosummary: "


Black Basta ransomware gang linked to a SystemBC malware campaign

exploits ransomware
2024-08-15 https://securityaffairs.com/167079/cyber-crime/black-basta-ransomware-systembc-campaign.html
Experts linked an ongoing social engineering campaign, aimed at deploying the malware SystemBC, to the Black Basta ransomware group. Rapid7 researchers uncovered a new social engineering campaign distributing the SystemBC dropper to the Black Basta ransomware operation. On June 20, 2024, Rapid7 researchers detected multiple attacks consistent with an ongoing social engineering campaign being tracked […] "

Autosummary: Black Basta ransomware gang linked to a SystemBC malware campaign Pierluigi Paganini August 15, 2024 August 15, 2024 Experts linked an ongoing social engineering campaign, aimed at deploying the malware SystemBC, to the Black Basta ransomware group. "


Belarusian-Ukrainian Hacker Extradited to U.S. for Ransomware and Cybercrime Charges

exploits ransomware rusia-ucrania
2024-08-14 https://thehackernews.com/2024/08/belarusian-ukrainian-hacker-extradited.html
A coalition of law enforcement agencies coordinated by the U.K. National Crime Agency (NCA) has led to the arrest and extradition of a Belarussian and Ukrainian dual-national believed to be associated with Russian-speaking cybercrime groups. Maksim Silnikau (aka Maksym Silnikov), 38, went by the online monikers J.P. Morgan, xxx, and lansky. He was extradited to the U.S. from Poland on August 9, "

Autosummary: "On various occasions, Silnikau allegedly distributed information and tools to Ransom Cartel participants, including information about compromised computers, such as stolen credentials, and tools such as those designed to encrypt or "lock" compromised computers," the DoJ noted. "


International investigation shuts down Radar/Dispossessor ransomware group

exploits ransomware
2024-08-13 https://www.helpnetsecurity.com/2024/08/13/radar-dispossessor-disruption/

FBI Cleveland announced the disruption of “Radar/Dispossessor”—the criminal ransomware group led by the online moniker “Brain”—and the dismantling of three U.S. servers, three United Kingdom servers, 18 German servers, eight U.S.-based criminal domains, and one German-based criminal domain. Since its inception in August 2023, Radar/Dispossessor has quickly developed into an internationally impactful ransomware group, targeting and attacking small-to-mid-sized businesses and organizations from the production, development, education, healthcare, financial services, and transportation sectors. Originally focused on … More

The post International investigation shuts down Radar/Dispossessor ransomware group appeared first on Help Net Security.

"

Autosummary: Originally focused on entities in the United States, the investigation discovered 43 companies as victims of the attacks, from countries including Argentina, Australia, Belgium, Brazil, Honduras, India, Canada, Croatia, Peru, Poland, the United Kingdom, the United Arab Emirates, and Germany. "


FBI Shuts Down Dispossessor Ransomware Group"s Servers Across U.S., U.K., and Germany

exploits ransomware
2024-08-13 https://thehackernews.com/2024/08/fbi-shuts-down-dispossessor-ransomware.html
The U.S. Federal Bureau of Investigation (FBI) on Monday announced the disruption of online infrastructure associated with a nascent ransomware group called Dispossessor (aka Radar). The effort saw the dismantling of three U.S. servers, three United Kingdom servers, 18 German servers, eight U.S.-based criminal domains, and one German-based criminal domain. Dispossessor is said to be led by "

Autosummary: As many as 43 companies have been identified as victims of Dispossessor attacks, including those located in Argentina, Australia, Belgium, Brazil, Canada, Croatia, Germany, Honduras, India, Peru, Poland, the U.A.E., the U.K., and the U.S. Dispossessor first emerged in August 2023 as a ransomware-as-a-service (RaaS) group following the same dual-extortion model pioneered by other e-crime gangs. "


Ransom Cartel, Reveton ransomware owner arrested, charged in US

exploits ransomware
2024-08-13 https://www.bleepingcomputer.com/news/security/ransom-cartel-reveton-ransomware-owner-arrested-charged-in-us/
Belarusian-Ukrainian national Maksim Silnikau was arrested in Spain and is now extradited to the USA to face charges for creating the Ransom Cartel ransomware operation in 2021 and running a malvertising operation from 2013 to 2022. [...] "

Autosummary: Co-conspirators Volodymyr Kadariya, a Belarussian and Ukrainian national, 38, and Andrei Tarasov, a Russian national, 33, were also charged for their role in the malvertising operation.- NCA Maksim Silnikau faces significant legal consequences based on the charges in both indictments, including imprisonment sentences for wire fraud, computer fraud, computer fraud and abuse, aggravated identity theft, and access device fraud. "


Australian gold mining company hit with ransomware

exploits ransomware
2024-08-13 https://www.helpnetsecurity.com/2024/08/13/evolution-mining-ransomware/

Australian gold mining firm Evolution Mining has announced on Monday that it became aware on 8 August 2024 of a ransomware attack impacting its IT systems, and has been working with its external cyber forensic experts to investigate the incident. “Based on work to date, the Company believes the incident is now contained,” Evolution Mining said. “The Company does not anticipate any material impact on operations.” There has been no mention of data stolen before … More

The post Australian gold mining company hit with ransomware appeared first on Help Net Security.

"

Autosummary: "


3AM ransomware stole data of 464,000 Kootenai Health patients

exploits ransomware
2024-08-13 https://www.bleepingcomputer.com/news/security/3am-ransomware-stole-data-of-464-000-kootenai-health-patients/
Kootenai Health has disclosed a data breach impacting over 464,000 patients after their personal information was stolen and leaked by the 3AM ransomware operation. [...] "

Autosummary: "


74% of ransomware victims were attacked multiple times in a year

exploits ransomware
2024-08-12 https://www.helpnetsecurity.com/2024/08/12/74-of-ransomware-victims-were-attacked-multiple-times-in-a-year/

An alarming trend toward multiple, sometimes simultaneous cyber attacks forces business leaders to re-evaluate their cyber resilience strategies to address common points of failure, including inadequate identity system backup and recovery practices, according to Semperis. Survey of nearly 1,000 IT and security professionals shows 83% of organizations were targeted by ransomware attacks in the past year with a high degree of success, sounding alarming trends in attack frequency, severity, and consequences. Companies are suffering successful … More

The post 74% of ransomware victims were attacked multiple times in a year appeared first on Help Net Security.

"

Autosummary: Identity is the new security perimeter Although 70% of respondents said they had an identity recovery plan, signaling strong progress towards IAM-centric security, only 27% reported having dedicated, AD-specific backup systems.Without AD-specific, malware-free backups and a tested, cyber-specific recovery plan, recovery will be prolonged, increasing the chance that the organization will decide to pay ransom to restore business operations. "


The BlackSuit ransomware gang has demanded over $500 million since 2022

exploits ransomware
2024-08-12 https://www.bitdefender.com/blog/hotforsecurity/the-blacksuit-ransomware-gang-has-demanded-over-500-million-since-2022/
A notorious ransomware group has demanded more than half a billion dollars from victims in less than two years. Read more in my article on the Hot for Security blog. "

Autosummary: According to the CISA/FBI joint advisory: "Ransom demands have typically ranged from approximately $1 million to $10 million USD, with payment demanded in Bitcoin. "


Australian gold producer Evolution Mining hit by ransomware

exploits ransomware
2024-08-12 https://www.bleepingcomputer.com/news/security/australian-gold-producer-evolution-mining-hit-by-ransomware/
Evolution Mining has informed that it has been targeted by a ransomware attack on August 8, 2024, which impacted its IT systems. [...] "

Autosummary: "


FBI disrupts the Dispossessor ransomware operation, seizes servers

exploits ransomware
2024-08-12 https://www.bleepingcomputer.com/news/security/fbi-disrupts-the-dispossessor-ransomware-operation-seizes-servers/
The FBI announced on Monday that it seized the servers and websites of the Radar/Dispossessor ransomware operation following a joint international investigation. [...] "

Autosummary: Since August 2023, Dispossessor—led by a threat actor known as Brain—has targeted small to mid-sized businesses in various sectors worldwide, claiming attacks against dozens of companies (the FBI identified 43 victims) from the U.S., Argentina, Australia, Belgium, Brazil, Honduras, India, Canada, Croatia, Peru, Poland, the United Kingdom, the United Arab Emirates, and Germany. "


Is the INC ransomware gang behind the attack on McLaren hospitals?

exploits ransomware
2024-08-10 https://securityaffairs.com/166851/cyber-crime/mclaren-hospitals-attack.html
A INC Ransom ransomware attack this week disrupted IT and phone systems at McLaren Health Care hospitals. On Tuesday, an INC Ransom ransomware attack hit the McLaren Health Care hospitals and disrupted their IT and phone systems. The organizations did not disclose details about the attack, however Bleeping Computer noticed that employees at McLaren Bay […] "

Autosummary: The McLaren operates 14 hospitals in Michigan, ambulatory surgery centers, imaging centers, a 490-member employed primary and specialty care physician network, commercial and Medicaid HMOs covering more than 732,838 lives in Michigan and Indiana, home health, infusion and hospice providers, pharmacy services, a clinical laboratory network and a wholly owned medical malpractice insurance company.including billing or claims information, diagnosis, physician information, medical record number, Medicare/Medicaid information, prescription/medication information, diagnostic and treatment information. "


Malware-as-a-Service and Ransomware-as-a-Service lower barriers for cybercriminals

exploits ransomware ciber
2024-08-09 https://www.helpnetsecurity.com/2024/08/09/maas-threat-landscape/

The sophistication of cyber threats has escalated dramatically, with malicious actors’ deploying advanced tactics, techniques, and procedures (TTPs) to exploit vulnerabilities and evade detection, according to Darktrace. Subscription-based tools such as Malware-as-a-Service (MaaS) and Ransomware-as-a-Service (RaaS) have also lowered the barrier-to-entry for less experienced attackers, making it easier to carry out complex, multistage attacks. “The threat landscape continues to evolve, but new threats often build upon old foundations rather than replacing them. While we have … More

The post Malware-as-a-Service and Ransomware-as-a-Service lower barriers for cybercriminals appeared first on Help Net Security.

"

Autosummary: MaaS continues to pose significant risk for organizations The findings show that cybercrime-as-a-service continues to dominate the threat landscape, with Malware-as-a-Service (MaaS) and Ransomware-as-a-Service (RaaS) tools making up a significant portion of malicious tools in use by attackers. "


Ransomware operators continue to innovate

exploits ransomware
2024-08-08 https://www.helpnetsecurity.com/2024/08/08/ransomware-operators-innovate/

Ransomware groups continue to refine their craft, building and scaling business models that resemble legitimate corporate enterprises, according to Rapid7. They market their services to prospective buyers, offer company insiders commissions in exchange for access, and run formal bug bounty programs. In addition, Rapid7 researchers found three major clusters of ransomware families with similar source code, indicating that ransomware groups are focusing their development efforts on quality over quantity. “The Ransomware Radar Report uses data … More

The post Ransomware operators continue to innovate appeared first on Help Net Security.

"

Autosummary: "


FBI and CISA Warn of BlackSuit Ransomware That Demands Up to $500 Million

exploits ransomware
2024-08-08 https://thehackernews.com/2024/08/fbi-and-cisa-warn-of-blacksuit.html
The ransomware strain known as BlackSuit has demanded as much as $500 million in ransoms to date, with one individual ransom demand hitting $60 million. That"s according to an updated advisory from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI). "BlackSuit actors have exhibited a willingness to negotiate payment amounts," the "

Autosummary: The development comes amid the emergence of new ransomware families like Lynx, OceanSpy, Radar, Zilla (a Crysis/Dharma ransomware variant), and Zola (a Proton ransomware variant) in the wild, even as existing ransomware groups are constantly evolving their modus operandi by incorporating new tools into their arsenal. "


FBI and CISA update a joint advisory on the BlackSuit Ransomware group

exploits ransomware
2024-08-08 https://securityaffairs.com/166760/hacking/blacksuit-ransomware-group-advisory.html
FBI and CISA published a joint advisory on the BlackSuit Ransomware group, the document provides TTPs and IOCs as recently as July 2024. CISA, in collaboration with the FBI, has published a joint advisory on the BlackSuit Ransomware group. The advisory includes recent and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise […] "

Autosummary: Historically, Royal actors were observed leveraging Chisel , Secure Shell (SSH) client, PuTTY, OpenSSH, and MobaXterm for C2 communications. "


Rhysida Ransomware group claims to have breached Bayhealth Hospital in Delaware

exploits ransomware
2024-08-08 https://securityaffairs.com/166749/cyber-crime/rhysida-ransomware-bayhealth-hospital.html
The Rhysida Ransomware group claims to have breached Bayhealth Hospital in Delaware and offers alleged stolen data for 25 BTC. Bayhealth Hospital is a technologically advanced not-for-profit healthcare system with nearly 4,000 employees and a medical staff of more than 450 physicians and 200 advanced practice clinicians. Bayhealth Medical Center, serving central and southern Delaware, […] "

Autosummary: Bayhealth Medical Center, serving central and southern Delaware, operates two hospitals: Bayhealth Hospital, Kent Campus in Dover and Bayhealth Hospital, Sussex Campus in Milford, along with the Bayhealth Emergency Center in Smyrna. The ransomware gang hit organizations in multiple industries, including the education, healthcare, manufacturing, information technology, and government sectors. "


Number of incidents affecting GitHub, Bitbucket, GitLab, and Jira continues to rise

ransomware
2024-08-07 https://www.helpnetsecurity.com/2024/08/07/github-bitbucket-gitlab-jira-incidents/

Outages, human errors, cyberattacks, data breaches, ransomware, security vulnerabilities, and, as a result, data loss are the reality that DevSecOps teams have to face every few days, according to GitProtect.io. DevSecOps The possibility to integrate security in development processes has given rise to DevSecOps, where development and operations teams work together with security teams and all their processes are converged. In DevSecOps, security is not an afterthought but a fundamental component integrated from the outset … More

The post Number of incidents affecting GitHub, Bitbucket, GitLab, and Jira continues to rise appeared first on Help Net Security.

"

Autosummary: Outages, human errors, cyberattacks, data breaches, ransomware, security vulnerabilities, and, as a result, data loss are the reality that DevSecOps teams have to face every few days, according to GitProtect.io. In 2023, the number of events with the greatest negative impact on the operation of DevOps services – GitHub, Bitbucket, GitLab, and Jira – did not exceed 14%: GitHub recorded 13.94% events Bitbucket 8,33% GitLab 7,89% Jira only 4% Most issues affected components’ operation, resulting in degraded performance at various levels. "


Online games likely to be hit if strikes continue - union

ransomware
2024-08-07 https://www.bbc.com/news/articles/cvgddkq2zx9o
The union leading the video game performers" strike says multiplayer games might be first affected. "

Autosummary: "I"ve had the experience of people showing me AI film work, for example, and being like, "oh, look how amazing this is"," he says. Surgent Studios Abu also voiced the main character in the English dub of his game Tales of Kenzera: Zau "I think it will probably cost more really, truly, because let"s say you make a whole game based on AI voices and you realise that the voices aren"t necessarily that great," he says. "


McLaren hospitals disruption linked to INC ransomware attack

exploits ransomware
2024-08-07 https://www.bleepingcomputer.com/news/security/mclaren-hospitals-disruption-linked-to-inc-ransomware-attack/
​On Tuesday, IT and phone systems at McLaren Health Care hospitals were disrupted following an attack linked to the INC Ransom ransomware operation. [...] "

Autosummary: Compromised data included names, Social Security numbers, health insurance and physician information, as well as Medicare/Medicaid, prescription/medication, and diagnostic results and treatment information. "


UK IT provider faces $7.7 million fine for 2022 ransomware breach

exploits ransomware
2024-08-07 https://www.bleepingcomputer.com/news/security/uk-it-provider-faces-77-million-fine-for-2022-ransomware-breach/
The UK"s Information Commissioner"s Office (ICO) has announced a provisional decision to impose a fine of £6.09M ($7.74 million) on Advanced Computer Software Group Ltd (Advanced) for its failure to protect the personal information of tens of thousands when it was hit by ransomware in 2022. [...] "

Autosummary: "


FBI: BlackSuit ransomware made over $500 million in ransom demands

exploits ransomware
2024-08-07 https://www.bleepingcomputer.com/news/security/fbi-blacksuit-ransomware-made-over-500-million-in-ransom-demands/
CISA and the FBI confirmed today that the Royal ransomware rebranded to BlackSuit and has demanded over $500 million from victims since it emerged more than two years ago. [...] "

Autosummary: In March 2023 and a subsequent November 2023 advisory update, the two agencies shared indicators of compromise and a list of tactics, techniques, and procedures (TTPs) to help defenders block the gang"s attempts to deploy ransomware on their networks. "


FBI: BlackSuit ransomware behind over $500 million in ransom demands

exploits ransomware
2024-08-07 https://www.bleepingcomputer.com/news/security/fbi-blacksuit-ransomware-behind-over-500-million-in-ransom-demands/
CISA and the FBI confirmed today that the Royal ransomware rebranded to BlackSuit and has demanded over $500 million from victims since it emerged more than two years ago. [...] "

Autosummary: In March 2023 and a subsequent November 2023 advisory update, the two agencies shared indicators of compromise and a list of tactics, techniques, and procedures (TTPs) to help defenders block the gang"s attempts to deploy ransomware on their networks. "


Magniber ransomware targets home users

exploits ransomware
2024-08-06 https://www.malwarebytes.com/blog/news/2024/08/magniber-ransomware-targets-home-users
Home users are being targeted by a ransomware called Magniber which locks up files and demands money for the key. "

Autosummary: BleepingComputer, which has a dedicated forum for ransomware victims, reports: “A massive Magniber ransomware campaign is underway, encrypting home users’ devices worldwide and demanding thousand-dollar ransoms to receive a decryptor.” How home users can prevent ransomware There are some rules that can help you avoid falling victim to this type of ransomware: Make sure your system and software are on the latest version. "


A ransomware attack hit French museum network

exploits ransomware
2024-08-06 https://securityaffairs.com/166696/cyber-crime/ransomware-attack-french-museum-network.html
The Réunion des Musées Nationaux network, including Paris’ Grand Palais and other museums, was hit by a ransomware attack. A ransomware attack hit the Réunion des Musées Nationaux network, including Paris’ Grand Palais and other museums. The attack impacted around 40 museums across France. The attack occurred on Sunday, and despite some affected venues are […] "

Autosummary: "


Keytronic incurred approximately $17 million of expenses following ransomware attack

exploits ransomware
2024-08-05 https://securityaffairs.com/166595/data-breach/keytronic-lost-revenue-exceeding-17m.html
Printed circuit board assembly (PCBA) manufacturer Keytronic reported that a recent ransomware attack led to expenses and lost revenue exceeding $17 million. In June, Keytronic disclosed a data breach after a ransomware group leaked allegedly stolen personal information from its systems. The company did not provide any info on the ransomware operation that hit its […] "

Autosummary: “As previously disclosed, Key Tronic detected a cybersecurity incident on May 6, 2024 that caused disruptions and limited access to portions of the Company’s business applications supporting operations and corporate functions, including financial and operating reporting systems, at its Mexico and U.S. sites during the fourth quarter of fiscal 2024.” "


Keytronic reports losses of over $17 million after ransomware attack

exploits ransomware
2024-08-05 https://www.bleepingcomputer.com/news/security/keytronic-reports-losses-of-over-17-million-after-ransomware-attack/
Electronic manufacturing services provider Keytronic has revealed that it suffered losses of over $17 million due to a May ransomware attack. [...] "

Autosummary: Some of the notable victims include German defense contractor Rheinmetall, government contractor ABB, U.S. healthcare giant Ascension, U.K. tech outsourcing firm Capita, the American Dental Association, Hyundai"s European division, the Toronto Public Library, and Yellow Pages Canada. "


Surge in Magniber ransomware attacks impact home users worldwide

exploits ransomware
2024-08-04 https://www.bleepingcomputer.com/news/security/surge-in-magniber-ransomware-attacks-impact-home-users-worldwide/
[...] "

Autosummary: Once launched, the ransomware encrypts files on the device and appends a random 5-9 character extension, like .oaxysw or .oymtk, to encrypted file names. "


OneBlood"s virtual machines encrypted in ransomware attack

exploits ransomware
2024-07-31 https://www.bleepingcomputer.com/news/security/onebloods-virtual-machines-encrypted-in-ransomware-attack/
OneBlood, a large not-for-profit blood center that serves hospitals and patients in the United States, is dealing with an IT systems outage caused by a ransomware attack. [...] "

Autosummary: The organization plays a critical role in ensuring a stable blood supply to the Southeastern part of the country, collecting, testing, and distributing a large volume of blood products. "


A ransomware attack disrupted operations at OneBlood blood bank

financial exploits ransomware
2024-07-31 https://securityaffairs.com/166401/cyber-crime/oneblood-suffered-ransomware-attack.html
OneBlood, a non-profit blood bank serving over 300 U.S. hospitals, suffered a ransomware attack that disrupted its medical operations. OneBlood is a non-profit organization that provides blood and blood products to over 300 hospitals and medical facilities across the U.S. Southeast. The organization collects, tests, and distributes blood to ensure a steady supply for needy […] "

Autosummary: A ransomware attack disrupted operations at OneBlood blood bank Pierluigi Paganini July 31, 2024 July 31, 2024 OneBlood, a non-profit blood bank serving over 300 U.S. hospitals, suffered a ransomware attack that disrupted its medical operations. "


VMware ESXi Flaw Exploited by Ransomware Groups for Admin Access

exploits ransomware
2024-07-30 https://thehackernews.com/2024/07/vmware-esxi-flaw-exploited-by.html
A recently patched security flaw impacting VMware ESXi hypervisors has been actively exploited by "several" ransomware groups to gain elevated permissions and deploy file-encrypting malware. The attacks involve the exploitation of CVE-2024-37085 (CVSS score: 6.8), an Active Directory integration authentication bypass that allows an attacker to obtain administrative access to the host. "A "

Autosummary: "VMware ESXi hypervisors joined to an Active Directory domain consider any member of a domain group named "ESX Admins" to have full administrative access by default," researchers Danielle Kuznets Nohi, Edan Zwick, Meitar Pinto, Charles-Edouard Bettan, and Vaibhav Deshmukh said. "


VMware ESXi auth bypass zero-day exploited by ransomware operators (CVE-2024-37085)

exploits ransomware
2024-07-30 https://www.helpnetsecurity.com/2024/07/30/cve-2024-37085-exploited/

Ransomware operators have been leveraging CVE-2024-37085, an authentication bypass vulnerability affecting Active Directory domain-joined VMware ESXi hypervisors, to gain full administrative access to them and encrypt their file system. VMware owner Broadcom has released a fix for CVE-2024-37085 on June 25, 2024 and credited Microsoft’s researchers for flagging it, but did not mention that the vulnerability – at that time, a zero-day – was under active exploitation. Attackers exploiting CVE-2024-37085 “ESXi is a bare-metal hypervisor … More

The post VMware ESXi auth bypass zero-day exploited by ransomware operators (CVE-2024-37085) appeared first on Help Net Security.

"

Autosummary: Ransomware operators have been using custom Linux versions of the Akira, Black Basta, Babuk, Lockbit, and other encryptors to encrypt VMware ESXi virtual machines, but leveraging ESXi vulnerabilities such as CVE-2024-37085 means easy encryption of multiple virtual machines (VMs) in one fell swoop. "


Dark Angels ransomware extorts record-breaking $75 million ransom

exploits ransomware
2024-07-30 https://www.bleepingcomputer.com/news/security/dark-angels-ransomware-extorts-record-breaking-75-million-ransom/
A Fortune 50 company paid a record-breaking $75 million ransom payment to the Dark Angels ransomware gang, according to a report by Zscaler ThreatLabz. [...] "

Autosummary: "In early 2024, ThreatLabz uncovered a victim who paid Dark Angels $75 million, higher than any publicly known amount— an achievement that"s bound to attract the interest of other attackers looking to replicate such success by adopting their key tactics (which we describe below)," reads the 2024 Zscaler Ransomware Report. "


CISA warns of VMware ESXi bug exploited in ransomware attacks

exploits ransomware
2024-07-30 https://www.bleepingcomputer.com/news/security/cisa-warns-of-vmware-esxi-bug-exploited-in-ransomware-attacks/
CISA has ordered U.S. Federal Civilian Executive Branch (FCEB) agencies to secure their servers against a VMware ESXi authentication bypass vulnerability exploited in ransomware attacks. [...] "

Autosummary: "


Black Basta ransomware switches to more evasive custom malware

exploits ransomware
2024-07-30 https://www.bleepingcomputer.com/news/security/black-basta-ransomware-switches-to-more-evasive-custom-malware/
The Black Basta ransomware gang has shown resilience and an ability to adapt to a constantly shifting space, using new custom tools and tactics to evade detection and spread throughout a network. [...] "

Autosummary: Moreover, Mandiant, who tracks the threat actors as UNC4393, has identified new malware and tools used in Black Basta intrusions, demonstrating evolution and resilience. "


Columbus investigates whether data was stolen in ransomware attack

exploits ransomware
2024-07-30 https://www.bleepingcomputer.com/news/security/columbus-investigates-whether-data-was-stolen-in-ransomware-attack/
The City of Columbus, Ohio, says it"s investigating whether personal data was stolen in a ransomware attack on July 18, 2024 that disrupted the City"s services. [...] "

Autosummary: The mayor"s statement published on June 23, 2024 Email services and IT connectivity between public agencies were rendered unavailable, but the 911 and 311 lines and all public safety and emergency services continued to operate as usual. "


Dark Angels ransomware receives record-breaking $75 million ransom

exploits ransomware
2024-07-30 https://www.bleepingcomputer.com/news/security/dark-angels-ransomware-receives-record-breaking-75-million-ransom/
A Fortune 50 company paid a record-breaking $75 million ransom payment to the Dark Angels ransomware gang, according to a report by Zscaler ThreatLabz. [...] "

Autosummary: "In early 2024, ThreatLabz uncovered a victim who paid Dark Angels $75 million, higher than any publicly known amount— an achievement that"s bound to attract the interest of other attackers looking to replicate such success by adopting their key tactics (which we describe below)," reads the 2024 Zscaler Ransomware Report. "


Phishing targeting Polish SMBs continues via ModiLoader

financial ransomware
2024-07-30 https://www.welivesecurity.com/en/eset-research/phishing-targeting-polish-smbs-continues-modiloader/
ESET researchers detected multiple, widespread phishing campaigns targeting SMBs in Poland during May 2024, distributing various malware families "

Autosummary: Example of a phishing email containing ModiLoader in the attachment In other campaigns, email messages were more verbose, such as the phishing email in Figure 3, which can be translated as follows: Hi, We are looking to purchase your product for our client.The final payload to be delivered and launched on the compromised machines varied; we’ve detected campaigns delivering: Formbook – information stealing malware discovered in 2016, Agent Tesla – a remote access trojan and information stealer, and Rescoms RAT – remote control and surveillance software, able to steal sensitive information.Chain of compromise of ModiLoader phishing campaigns in Poland during May 2024 Data exfiltration Three different malware families were used as a final payload: Agent Tesla, Rescoms, and Formbook. Overview Even though the phishing campaigns have been ongoing throughout the first half of 2024, this blogpost focuses just on May 2024, as this was an eventful month. In the other case, when a RAR archive was sent as an attachment, the content was a heavily obfuscated batch script, with the same name as the archive and with the .cmd file extension. Key points of this blogpost: ESET detected nine notable ModiLoader phishing campaigns during May 2024 in Poland, Romania, and Italy.A more verbose phishing email example containing ModiLoader in the attachment As in the phishing campaigns of H2 2023, attackers impersonated existing companies and their employees as the technique of choice to increase campaign success rate. "


Microsoft: Ransomware gangs exploit VMware ESXi auth bypass in attacks

exploits ransomware
2024-07-29 https://www.bleepingcomputer.com/news/microsoft/microsoft-ransomware-gangs-exploit-vmware-esxi-auth-bypass-in-attacks/
Microsoft warned today that ransomware gangs are actively exploiting a VMware ESXi authentication bypass vulnerability in attacks. [...] "

Autosummary: "A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management by re-creating the configured AD group ("ESXi Admins" by default) after it was deleted from AD," Broadcom explains. "


U.S. DoJ Indicts North Korean Hacker for Ransomware Attacks on Hospitals

exploits ransomware
2024-07-26 https://thehackernews.com/2024/07/us-doj-indicts-north-korean-hacker-for.html
The U.S. Department of Justice (DoJ) on Thursday unsealed an indictment against a North Korean military intelligence operative for allegedly carrying out ransomware attacks against healthcare facilities in the country and funneling the payments to orchestrate additional intrusions into defense, technology, and government entities across the world. "Rim Jong Hyok and his co-conspirators deployed "

Autosummary: A Go-based backdoor that can run an arbitrary file, list contents of a directory, download a file, take screenshots, and launch a shell to execute arbitrary commands Dora RAT - A "simple malware strain" with support for reverse shell and file download/upload capabilities "They have evolved from targeting South Korean financial institutions with disruptive attacks to targeting U.S. healthcare with ransomware, known as Maui, although not at the same scale as other Russian speaking cybercrime groups," Alex Rose, director of threat research and government partnerships at Secureworks Counter Threat Unit, said. "


Russian ransomware gangs account for 69% of all ransom proceeds

exploits ransomware rusia-ucrania
2024-07-26 https://www.bleepingcomputer.com/news/security/russian-ransomware-gangs-account-for-69-percent-of-all-ransom-proceeds/
Russian-speaking threat actors accounted for at least 69% of all crypto proceeds linked to ransomware throughout the previous year, exceeding $500,000,000. [...] "

Autosummary: In 2023, the largest players in this space included LockBit, Black Basta, ALPHV/BlackCat, Cl0p, PLAY, and Akira, all run by Russian-speaking threat actors. "


SEXi / APT Inc ransomware – what you need to know

exploits ransomware
2024-07-25 https://www.tripwire.com/state-of-security/sexi-apt-inc-ransomware-what-you-need-know
A cybercrime group has gained notoriety for attacking VMware ESXi servers since February 2024. Learn more about the SEXi / APT Inc ransomware in my article on the Tripwire State of Security blog. "

Autosummary: ESXi is a popular choice with cloud providers and data centres that have a require to host thousands of virtual machines for their customers, but there are also use cases in healthcare, finance, education, and other sectors.Files related to virtual machines, such as virtual disks, storage, and backup images, are targeted. "


North Korean Hackers Shift from Cyber Espionage to Ransomware Attacks

exploits ransomware
2024-07-25 https://thehackernews.com/2024/07/north-korean-hackers-shift-from-cyber.html
A North Korea-linked threat actor known for its cyber espionage operations has gradually expanded into financially-motivated attacks that involve the deployment of ransomware, setting it apart from other nation-state hacking groups linked to the country. Google-owned Mandiant is tracking the activity cluster under a new moniker APT45, which overlaps with names such as Andariel, Nickel Hyatt, "

Autosummary: "APT45 is a long-running, moderately sophisticated North Korean cyber operator that has carried out espionage campaigns as early as 2009," researchers Taylor Long, Jeff Johnson, Alice Revelli, Fred Plan, and Michael Barnhart said. "


US offers $10M for tips on DPRK hacker linked to Maui ransomware attacks

exploits ransomware
2024-07-25 https://www.bleepingcomputer.com/news/security/us-offers-10m-for-tips-on-dprk-hacker-linked-to-maui-ransomware-attacks/
The U.S. State Department is offering a reward of up to $10 million for information that could lead to the identification or location of a North Korean military hacker. [...] "

Autosummary: " "The information targeted—such as contract specifications, bills of materials, project details, design drawings, and engineering documents—has military and civilian applications and leads the authoring agencies to assess one of the group"s chief responsibilities as satisfying collection requirements for Pyongyang"s nuclear and defense programs," the authoring agencies added. "


British teen arrested in connection with MGM Resorts ransomware attack

exploits ransomware
2024-07-23 https://www.bitdefender.com/blog/hotforsecurity/british-teen-arrested-in-connection-with-mgm-resorts-ransomware-attack/
British police have arrested a 17-year-old boy believed to be linked to a cybercriminal gang that launched devastating ransomware attacks last year on MGM Resorts and other companies. Read more in my article on the Hot for Security blog. "

Autosummary: "


Strata Identity Continuity prevents mission-critical applications from going offline

ransomware
2024-07-23 https://www.helpnetsecurity.com/2024/07/23/strata-identity-continuity/

Strata Identity announced Identity Continuity, an addition to its Maverics Identity Orchestration platform. This new premium offering ensures business continuity and uninterrupted application access by seamlessly failing over from a primary cloud Identity Provider (IDP) to a secondary IDP, using an on-premises IDP or cloud-to-cloud failover capabilities. “In many sectors, especially financial services, system outages to critical applications have become extremely damaging to the business. Uptime for business-critical applications is often tied to uptime of … More

The post Strata Identity Continuity prevents mission-critical applications from going offline appeared first on Help Net Security.

"

Autosummary: These interruptions, whether due to SaaS misconfigurations, natural disasters, malicious attacks, or platform outages, can halt business operations, leading to revenue loss, productivity decline, and reputational damage. "


New Linux Variant of Play Ransomware Targeting VMware ESXi Systems

exploits ransomware Linux
2024-07-22 https://thehackernews.com/2024/07/new-linux-variant-of-play-ransomware.html
Cybersecurity researchers have discovered a new Linux variant of a ransomware strain known as Play (aka Balloonfly and PlayCrypt) that"s designed to target VMware ESXi environments. "This development suggests that the group could be broadening its attacks across the Linux platform, leading to an expanded victim pool and more successful ransom negotiations," Trend Micro researchers said in a "

Autosummary: Manufacturing, professional services, construction, IT, retail, financial services, transportation, media, legal services, and real estate are some of the top industries affected by the Play ransomware during the time period. "


Los Angeles Superior Court shuts down after ransomware attack

exploits ransomware
2024-07-22 https://www.bleepingcomputer.com/news/security/los-angeles-superior-court-shuts-down-after-ransomware-attack/
The largest trial court in the United States, the Superior Court of Los Angeles County, closed all 36 courthouse locations on Monday to restore systems affected by a Friday ransomware attack. [...] "

Autosummary: "The Court experienced an unprecedented cyber-attack on Friday which has resulted in the need to shut down nearly all network systems in order to contain the damage, protect the integrity and confidentiality of information and ensure future network stability and security," Presiding Judge Samantha P. Jessner said. "


New Play ransomware Linux version targets VMware ESXi VMs

exploits ransomware Linux
2024-07-22 https://www.bleepingcomputer.com/news/security/new-play-ransomware-linux-version-targets-vmware-esxi-vms/
Play ransomware is the latest ransomware gang to start deploying a dedicated Linux locker for encrypting VMware ESXi virtual machines. [...] "

Autosummary: To power off all running VMware ESXi virtual machines so that they can be encrypted, Trend Micro says the encryptor will execute the following code: /bin/sh -c "for vmid in $(vim-cmd vmsvc/getallvms | grep -v Vmid | awk "{print $1}"); do vim-cmd vmsvc/power.off $vmid; done" As BleepingComputer found while analyzing it, this variant is designed to specifically target VMFS (Virtual Machine File System), which is used by VMware"s vSphere server virtualization suite. "


CrowdStrike shares hit again as IT disruption continues

ransomware
2024-07-22 https://www.bbc.com/news/articles/c725knvnk5zo
Shares in the cybersecurity firm drop a further 13% after last week"s global IT outage. "

Autosummary: Delta Airlines, one of the most affected firms, had cancelled more than 4,000 flights since Friday, including more than 700 on Monday, according to outside tracking firm, Flight Aware. "


Russian nationals plead guilty to participating in the LockBit ransomware group

exploits ransomware rusia-ucrania
2024-07-20 https://securityaffairs.com/165941/cyber-crime/lockbit-ransomware-group-members-plead-guilty.html
Two Russian nationals pleaded guilty to participating in the LockBit ransomware group and carrying out attacks against victims worldwide. Two foreign nationals, Ruslan Magomedovich Astamirov and Mikhail Vasiliev, pleaded guilty in Newark federal court for their roles in the LockBit ransomware operation. The LockBit ransomware operation has been active since January 2020, the group hit […] "

Autosummary: In May 2023, the US Justice Department charged Russian national Mikhail Pavlovich Matveev (30), aka Wazawaka, m1x, Boriselcin, and Uhodiransomwar, for his alleged role in multiple ransomware attacks.On April 26, 2021, Matveev and his Babuk coconspirators hit the Metropolitan Police Department in Washington, D.C. The Russian citizen was charged with conspiring to transmit ransom demands, conspiring to damage protected computers, and intentionally damaging protected computers. "


Russians plead guilty to involvement in LockBit ransomware attacks

exploits ransomware rusia-ucrania
2024-07-19 https://www.bleepingcomputer.com/news/security/russians-plead-guilty-to-involvement-in-lockbit-ransomware-attacks/
Two Russian individuals admitted to participating in many LockBit ransomware attacks, which targeted victims worldwide and across the United States. [...] "

Autosummary: Between 2021 and 2023, Vasiliev (aka Ghostrider, Free, Digitalocean90, Digitalocean99, Digitalwaters99, and Newwave110) also used LockBit ransomware in at least 12 attacks against victims worldwide, including businesses in New Jersey, Michigan, the United Kingdom, and Switzerland, causing at least $500,000 in damage and losses, according to the guilty plea. "


Two Russian Nationals Plead Guilty in LockBit Ransomware Attacks

exploits ransomware rusia-ucrania
2024-07-19 https://thehackernews.com/2024/07/two-russian-nationals-plead-guilty-in.html
Two Russian nationals have pleaded guilty in a U.S. court for their participation as affiliates in the LockBit ransomware scheme and helping facilitate ransomware attacks across the world. The defendants include Ruslan Magomedovich Astamirov, 21, of Chechen Republic, and Mikhail Vasiliev, 34, a dual Canadian and Russian national of Bradford, Ontario. Astamirov was arrested in Arizona by U.S. law "

Autosummary: " Astamirov (aka BETTERPAY, offtitan, and Eastfarmer) is said to have deployed LockBit against at least 12 victims between 2020 and 2023, receiving $1.9 million in ransom payments from victims located in the U.S. state of Virginia, Japan, France, Scotland, and Kenya. "


MediSecure: Ransomware gang stole data of 12.9 million people

exploits ransomware
2024-07-19 https://www.bleepingcomputer.com/news/security/medisecure-ransomware-gang-stole-data-of-129-million-people/
MediSecure, an Australian prescription delivery service provider, revealed that roughly 12.9 million people had their personal and health information stolen in an April ransomware attack. [...] "

Autosummary: "


HardBit ransomware – what you need to know

exploits ransomware
2024-07-17 https://www.tripwire.com/state-of-security/hardbit-ransomware-what-you-need-know
A new strain of the HardBit ransomware has emerged in the wild, which contains a protection mechanism in an attempt to prevent analysis from security researchers. Read more in my article on the Tripwire State of Security blog. "

Autosummary: The ransom note left behind by HardBit asks victims to make contact via TOX, an open-source peer-to-peer secure messaging platform. Image So, if they don"t appear to have a leak site on the dark web, how are you supposed to negotiate the ransom payment? "


Scattered Spider Adopts RansomHub and Qilin Ransomware for Cyber Attacks

exploits ransomware
2024-07-17 https://thehackernews.com/2024/07/scattered-spider-adopts-ransomhub-and.html
The infamous cybercrime group known as Scattered Spider has incorporated ransomware strains such as RansomHub and Qilin into its arsenal, Microsoft has revealed. Scattered Spider is the designation given to a threat actor that"s known for its sophisticated social engineering schemes to breach targets and establish persistence for follow-on exploitation and data theft. It also has a history of "

Autosummary: "


The Octo Tempest group adds RansomHub and Qilin ransomware to its arsenal

exploits ransomware
2024-07-17 https://securityaffairs.com/165811/cyber-crime/octo-tempest-ransomhub-qilin-ransomware.html
Microsoft said that in Q2 2024, the Octo Tempest cybercrime gang added RansomHub and Qilin ransomware to its arsenal. In the second quarter of 2024, financially motivated threat actor Octo Tempest (aka Scattered Spider, UNC3944, and 0ktapus), added RansomHub and Qilin ransomware to its arsenal and used them in its campaigns. Octo Tempest has been active […] "

Autosummary: "


Microsoft links Scattered Spider hackers to Qilin ransomware attacks

exploits ransomware
2024-07-16 https://www.bleepingcomputer.com/news/security/microsoft-links-scattered-spider-hackers-to-qilin-ransomware-attacks/
Microsoft says the Scattered Spider cybercrime gang has added Qilin ransomware to its arsenal and is now using it in attacks. [...] "

Autosummary: "


SEXi ransomware rebrands to APT INC, continues VMware ESXi attacks

exploits ransomware
2024-07-15 https://www.bleepingcomputer.com/news/security/sexi-ransomware-rebrands-to-apt-inc-continues-vmware-esxi-attacks/
The SEXi ransomware operation, known for targeting VMware ESXi servers, has rebranded under the name APT INC and has targeted numerous organizations in recent attacks. [...] "

Autosummary: SEXi ransom note Source: BleepingComputer Cybersecurity researcher Will Thomas later found other variants that use the names SOCOTRA, FORMOSA, and LIMPOPO. "


New HardBit Ransomware 4.0 Uses Passphrase Protection to Evade Detection

exploits ransomware
2024-07-15 https://thehackernews.com/2024/07/new-hardbit-ransomware-40-uses.html
Cybersecurity researchers have shed light on a new version of a ransomware strain called HardBit that comes packaged with new obfuscation techniques to deter analysis efforts. "Unlike previous versions, HardBit Ransomware group enhanced the version 4.0 with passphrase protection," Cybereason researchers Kotaro Ogino and Koshi Oyama said in an analysis. "The passphrase needs to be provided during "

Autosummary: Ransomware activity continues to "remain on an upward trend" in 2024, with ransomware actors claiming 962 attacks in the first quarter of 2024, up from 886 attacks reported year-over-year. "


Rite Aid confirms data breach after June ransomware attack

financial exploits ransomware
2024-07-12 https://www.bleepingcomputer.com/news/security/rite-aid-confirms-data-breach-after-june-ransomware-attack/
Pharmacy giant Rite Aid confirmed a data breach after suffering a cyberattack in June, which was claimed by the RansomHub ransomware operation. [...] "

Autosummary: "In the meantime, we can confirm that no social security numbers, financial information, or patient information were impacted by this incident," the company added. "


RansomHub ransomware – what you need to know

exploits ransomware
2024-07-12 https://www.tripwire.com/state-of-security/ransomhub-ransomware-what-you-need-know
Despite first appearing earlier this year, RansomHub is already considered one of the most prolific ransomware groups in existence. Read more in my article on the Tripwire State of Security blog. "

Autosummary: On its website, in its "About" section, RansomHub says that it does not allow attacks on "CIS, Cuba, North Korea, and China." It operates a ransomware-as-a-service (RaaS) operation, meaning that a central core of the group creates and maintains the ransomware code and infrastructure, and rents it out to other cybercriminals who act as affiliates. So, making life harder for LockBit didn"t get rid of the ransomware problem... ...it just drove it elsewhere, yes. "


Should ransomware payments be banned? – Week in security with Tony Anscombe

exploits ransomware
2024-07-12 https://www.welivesecurity.com/en/videos/should-ransomware-payments-be-banned-week-security-tony-anscombe/
Blanket bans on ransomware payments are a much-debated topic in cybersecurity and policy circles. What are the implications of outlawing the payments, and would the ban be effective? "

Autosummary: "


Dallas County: Data of 200,000 exposed in 2023 ransomware attack

exploits government ransomware
2024-07-11 https://www.bleepingcomputer.com/news/security/dallas-county-data-of-200-000-exposed-in-2023-ransomware-attack/
Dallas County is notifying over 200,000 people that the Play ransomware attack, which occurred in October 2023, exposed their personal data to cybercriminals. [...] "

Autosummary: "


ARRL finally confirms ransomware gang stole data in cyberattack

exploits ransomware ciber
2024-07-11 https://www.bleepingcomputer.com/news/security/arrl-finally-confirms-ransomware-gang-stole-data-in-cyberattack/
The American Radio Relay League (ARRL) finally confirmed that some of its employees" data was stolen in a May ransomware attack initially described as a "serious incident." [...] "

Autosummary: "


New Ransomware Group Exploiting Veeam Backup Software Vulnerability

exploits ransomware
2024-07-10 https://thehackernews.com/2024/07/new-ransomware-group-exploiting-veeam.html
A now-patched security flaw in Veeam Backup & Replication software is being exploited by a nascent ransomware operation known as EstateRansomware. Singapore-headquartered Group-IB, which discovered the threat actor in early April 2024, said the modus operandi involved the exploitation of CVE-2023-27532 (CVSS score: 7.5) to carry out the malicious activities. Initial access to the target "

Autosummary: Group-IB said it observed the actor exploiting Veeam flaw CVE-2023-27532 with an aim to enable xp_cmdshell on the backup server and create a rogue user account named "VeeamBkp," alongside conducting network discovery, enumeration, and credential harvesting activities using tools like NetScan, AdFind, and NitSoft via the newly created account. "


Align strengthens defense against double-extortion ransomware tactics

exploits ransomware industry
2024-07-09 https://www.helpnetsecurity.com/2024/07/09/align-exfiltration-prevention-feature/

Align adds a new exfiltration prevention feature to its Align Guardian Managed Detection and Response offering, powered by Adlumin. This innovation is designed to detect and stop attackers from exfiltrating data, providing a defense against modern ransomware tactics that employ double-extortion techniques. The new ransomware and exfiltration prevention feature complements Guardian’s existing ransomware prevention capabilities, which already stop ransomware encryption fast enough to save 99% of files. This comprehensive approach now protects organizations from both … More

The post Align strengthens defense against double-extortion ransomware tactics appeared first on Help Net Security.

"

Autosummary: "


Avast released a decryptor for DoNex Ransomware and its predecessors

exploits ransomware
2024-07-09 https://securityaffairs.com/165469/malware/donex-ransomware-decryptor.html
Avast developed and released a decryptor for the DoNex ransomware family that allows victims to recover their files for free. Avast researchers identified a cryptographic flaw in the DoNex ransomware and its predecessors that allowed them to develop a decryptor. The experts revealed the weakness during the Recon 2024 conference. Avast also released a decryptor […] "

Autosummary: Avast released a decryptor for DoNex Ransomware and its predecessors Pierluigi Paganini July 09, 2024 July 09, 2024 Avast developed and released a decryptor for the DoNex ransomware family that allows victims to recover their files for free. "


Decryptor for DoNex, Muse, DarkRace, (fake) LockBit 3.0 ransomware released

exploits ransomware
2024-07-08 https://www.helpnetsecurity.com/2024/07/08/decryptor-donex-muse-darkrace-fake-lockbit-3-0/

A cryptographic weakness in the DoNex ransomware and its previous incarnations – Muse, fake LockBit 3.0, and DarkRace – has allowed Avast researchers to create a decryptor for files encrypted by all those ransomware variants. DoNex ransom note (Source: Avast) “In cooperation with law enforcement organizations, we have been silently providing the decryptor to DoNex ransomware victims since March 2024,” the company’s Threat Research Team has shared on Monday. About DoNex The DoNex ransomware actor … More

The post Decryptor for DoNex, Muse, DarkRace, (fake) LockBit 3.0 ransomware released appeared first on Help Net Security.

"

Autosummary: After downloading the decryptor, victims need to provide a list of drives, folders, and files that need to be decrypted, as well as an encrypted file and the same file in its original form. "


New Ransomware-as-a-Service "Eldorado" Targets Windows and Linux Systems

exploits ransomware Linux
2024-07-08 https://thehackernews.com/2024/07/new-ransomware-as-service-eldorado.html
An emerging ransomware-as-a-service (RaaS) operation called Eldorado comes with locker variants to encrypt files on Windows and Linux systems. Eldorado first appeared on March 16, 2024, when an advertisement for the affiliate program was posted on the ransomware forum RAMP, Singapore-headquartered Group-IB said. The cybersecurity firm, which infiltrated the ransomware group, noted that its "

Autosummary: Eldorado is the latest in the list of new double-extortion ransomware players that have sprung up in recent times, including Arcus Media, AzzaSec, dan0n, Limpopo (aka SOCOTRA, FORMOSA, SEXi), LukaLocker, Shinra, and Space Bears once again highlighting the enduring and persistent nature of the threat. "


Avast releases free decryptor for DoNex ransomware and past variants

exploits ransomware
2024-07-08 https://www.bleepingcomputer.com/news/security/avast-releases-free-decryptor-for-donex-ransomware-and-past-variants/
Antivirus company Avast have discovered a weakness in the cryptographic scheme of the DoNex ransomware family and released a decryptor so victims can recover their files for free. [...] "

Autosummary: Location of recent DoNex ransomware victims Source: Avast Weakness in cryptography During the DoNex ransomware"s execution, an encryption key is generated using the "CryptGenRandom()" function, initializing a ChaCha20 symmetric key used to encrypt the target"s files. "


New Eldorado ransomware targets Windows, VMware ESXi VMs

exploits ransomware
2024-07-05 https://www.bleepingcomputer.com/news/security/new-eldorado-ransomware-targets-windows-vmware-esxi-vms/
A new ransomware-as-a-service (RaaS) called Eldorado emerged in March and comes with locker variants for VMware ESXi and Windows. [...] "

Autosummary: The gang has already claimed 16 victims, most of them in the U.S., in real estate, educational, healthcare, and manufacturing sectors. "


Volcano Demon ransomware group rings its victims to extort money

financial exploits ransomware
2024-07-04 https://www.tripwire.com/state-of-security/volcano-demon-ransomware-group-rings-its-victims-extort-money
Security researchers have warned that a new ransomware group has taken an unusual twist on the traditional method of extorting money from its corporate victims. Read more in my article on the Tripwire State of Security blog. "

Autosummary: Yes, and it"s much more likely that a member of staff outside your cybersecurity team finds themselves in the prickly position of acting as a negotiator, unlike a demand that arrives via an email or a ransom note dropped by the cybercriminals on your compromised network. Whereas many ransomware attacks see a company"s company"s data exfiltrated by attackers, and the threat made that stolen data will be sold to other cybercriminals or released to the public, the Volcano Demon gang... Security researchers at Halcyon, which has reported seeing at least two successful attacks perpetrated by Volcano Demon in the last week, say that the calls can be threatening in nature and come from unidentified caller-ID numbers. "


American Patelco Credit Union suffered a ransomware attack

exploits ransomware Telcos
2024-07-03 https://securityaffairs.com/165152/hacking/patelco-credit-union-ransomware-attack.html
The American credit union Patelco Credit Union shut down several of its banking systems to contain a ransomware attack. Patelco Credit Union is a member-owned, not-for-profit credit union that serves Northern California, particularly the San Francisco Bay Area. Founded in 1936, it is one of the oldest and largest credit unions in the country. With more […] "

Autosummary: "


LockBit group claims the hack of the Fairfield Memorial Hospital in the US

ransomware
2024-07-03 https://securityaffairs.com/165162/cyber-crime/lockbit-ransomware-fairfield-memorial-hospital.html
The LockBit ransomware group breached another hospital in the United States, the victim is the Fairfield Memorial Hospital in Illinois. It has happened again, another US healthcare organization suffered a security breach, this time the victim is the Fairfield Memorial Hospital in Illinois. Fairfield Memorial Hospital is a not-for-profit critical access hospital located in Fairfield, […] "

Autosummary: It offers a wide range of medical services, including Emergency Services, General Surgical Services, Intensive Care Unit (ICU), Medical Surgical Unit, Orthopedic Surgical Services, and Urgent Care. "


How MFA Failures are Fueling a 500% Surge in Ransomware Losses

exploits ransomware
2024-07-02 https://thehackernews.com/2024/07/how-mfa-failures-are-fueling-500-surge.html
The cybersecurity threat landscape has witnessed a dramatic and alarming rise in the average ransomware payment, an increase exceeding 500%. Sophos, a global leader in cybersecurity, revealed in its annual "State of Ransomware 2024" report that the average ransom payment has increased 500% in the last year with organizations that paid a ransom reporting an average payment of $2 million, up from "

Autosummary: In summary, user convenience in MFA solutions is essential to ensure high adoption rates, reduce errors and support costs, enhance security, maintain productivity, and improve overall user satisfaction.However, legacy MFA systems including Knowledge Based Authentication (KBA), One Time Passwords (OTP), and authentication apps, developed twenty years ago, are increasingly inadequate against modern cyberattacks. The Case for Implementing Next-Generation MFA To effectively combat the virtual tsunami of ransomware attacks, organizations must consider phishing-resistant, next-generation MFA technologies.Separately, RISK & INSURANCE, a leading media source for the insurance industry reported recently that in 2023 the median ransom demand soared to $20 million in 2023 from $1.4 million in 2022, and payment skyrocketed to $6.5 million in 2023 from $335,000 in 2022, much more than 500%. "


Patelco shuts down banking systems following ransomware attack

financial exploits ransomware Telcos
2024-07-02 https://www.bleepingcomputer.com/news/security/patelco-shuts-down-banking-systems-following-ransomware-attack/
Patelco Credit Union has disclosed it experienced a ransomware attack that led to the proactive shutdown of several of its customer-facing banking systems to contain the incident"s impact. [...] "

Autosummary: It offers a wide range of financial services, including checking and savings accounts, loans, credit cards, investment services, and insurance plans. "


Meet Brain Cipher — The new ransomware behind Indonesia"s data center attack

exploits ransomware
2024-06-29 https://www.bleepingcomputer.com/news/security/meet-brain-cipher-the-new-ransomware-behind-indonesia-data-center-attack/
The new Brain Cipher ransomware operation has begun targeting organizations worldwide, gaining media attention for a recent attack on Indonesia"s temporary National Data Center. [...] "

Autosummary: Brain Cipher dark web negotiation site Source: BleepingComputer New data leak site launched Like other ransomware operations, Brain Cipher will breach a corporate network and spread laterally to other devices. "


Infosys McCamish says LockBit stole data of 6 million people

ransomware
2024-06-28 https://www.bleepingcomputer.com/news/security/infosys-mccamish-says-lockbit-stole-data-of-6-million-people/
Infosys McCamish Systems (IMS) disclosed that the LockBit ransomware attack it suffered earlier this year impacted sensitive information of more than six million individuals. [...] "

Autosummary: "


Supply-chain ransomware attack cripples thousands of car dealerships

exploits ransomware
2024-06-28 https://www.exponential-e.com/blog/supply-chain-ransomware-attack-cripples-thousands-of-car-dealerships
Car dealerships have been brought to a standstill across the United States after a software provider was hit by a ransomware attack. The attack, believed to be by the BlackSuit ransomware gang, forced CDK Global, makers of a platform widely used by car dealerships to conduct their everyday business, to down its IT systems and data centers. Read more in my article on the Exponential-e blog. "

Autosummary: "


Better resilience sees more extorted companies refuse to pay their ransomware attackers

exploits ransomware
2024-06-28 https://www.tripwire.com/state-of-security/better-resilience-sees-more-extorted-companies-refuse-pay-their-ransomware
There"s some possibly good news on the ransomware front. Companies are becoming more resilient to attacks, and the ransom payments extorted from businesses by hackers are on a downward trend. Read more in my article on the Tripwire State of Security blog. "

Autosummary: " Furthermore, in 2023, less than one quarter (23%) of all companies submitting claims had paid ransom demands, a decline from previous years. "


Chinese Cyberspies Employ Ransomware in Attacks for Diversion

exploits ransomware
2024-06-27 https://www.bleepingcomputer.com/news/security/chinese-cyberspies-employ-ransomware-in-attacks-for-diversion/
Cyberespionage groups have been using ransomware as a tactic to make attack attribution more challenging, distract defenders, or for a financial reward as a secondary goal to data theft. [...] "

Autosummary: The researchers believe that two other attacks, against a government entity in East Asia and an aviation organization in the Indian subcontinent are also the work of ChamelGang, based on the use of known TTPs, publicly available tooling seen in previous engagements, and their custom malware BeaconLoader. "


New ransomware, infostealers pose growing risk in 2024

exploits ransomware
2024-06-27 https://www.helpnetsecurity.com/2024/06/27/malicious-hashes-increase/

BlackBerry detected and stopped 3.1 million cyberattacks (37,000 per day) in the first quarter of 2024. Between January and March 2024, BlackBerry detected 630,000 malicious hashes, representing a 40% increase from its previous reporting period. 60% of attacks targeting industry were directed at critical infrastructure, including government, healthcare, financial, and communication industries, of which 40% targeted the financial sector. “Each iteration of this report highlights startling new trends: novel malware is growing with no signs … More

The post New ransomware, infostealers pose growing risk in 2024 appeared first on Help Net Security.

"

Autosummary: 60% of attacks targeting industry were directed at critical infrastructure, including government, healthcare, financial, and communication industries, of which 40% targeted the financial sector. "


New P2Pinfect version delivers miners and ransomware on Redis servers

exploits ransomware
2024-06-27 https://securityaffairs.com/164968/malware/p2pinfect-delivers-miners-ransomware-on-redis.html
Researchers warn that the P2Pinfect worm is targeting Redis servers with ransomware and cryptocurrency mining payloads. Cado Security researchers warned that the P2Pinfect worm is employed in attacks against Redis servers, aimed at deploying both ransomware and cryptocurrency mining payloads. In July 2023, Palo Alto Networks Unit 42 researchers first discovered the P2P worm P2PInfect that targets Redis servers […] "

Autosummary: “Like the ransomware, the usermode rootkit suffers from a fatal flaw; if the initial access is Redis, it is likely that it will only affect the Redis user as the Redis user is only used to run the Redis server and won’t have access to other user’s home directories.” continues the report.New P2Pinfect version delivers miners and ransomware on Redis servers Pierluigi Paganini June 27, 2024 June 27, 2024 Researchers warn that the P2Pinfect worm is targeting Redis servers with ransomware and cryptocurrency mining payloads. "


Rust-Based P2PInfect Botnet Evolves with Miner and Ransomware Payloads

exploits ransomware
2024-06-27 https://thehackernews.com/2024/06/rust-based-p2pinfect-botnet-evolves.html
The peer-to-peer malware botnet known as P2PInfect has been found targeting misconfigured Redis servers with ransomware and cryptocurrency miners. The development marks the threat"s transition from what appeared to be a dormant botnet with unclear motives to a financially motivated operation. "With its latest updates to the crypto miner, ransomware payload, and rootkit elements, it demonstrates "

Autosummary: "Remote control is facilitated through installed web shells and NetCat, and given the installation of proxy tools aimed at RDP access, data exfiltration by the threat actors is a distinct possibility," ASEC said, highlighting the use of Behinder, China Chopper, Godzilla, BadPotato, cpolar, and RingQ. It also comes as Fortinet FortiGuard Labs pointed out that botnets such as UNSTABLE, Condi, and Skibidi are abusing legitimate cloud storage and computing services operators to distribute malware payloads and updates to a broad range of devices. "


LockBit group falsely claimed the hack of the Federal Reserve

ransomware
2024-06-27 https://securityaffairs.com/164988/cyber-crime/lockbit-has-not-hacked-federal-reserve.html
The LockBit ransomware group seems to have lied when they announced the hack of the US Federal Reserve. The real victim is the Evolve Bank. The LockBit ransomware group hasn’t hacked the Federal Reserve as it has recently claimed, the real victim is the Evolve Bank. Last week, the LockBit gang announced that it had […] "

Autosummary: The twelve cities which are home to the Reserve Banks are Boston, New York City, Philadelphia, Richmond, Atlanta, Dallas, Saint Louis, Cleveland, Chicago, Minneapolis, Kansas City, and San Francisco.” "


BlackSuit ransomware gang claims attack on KADOKAWA corporation

exploits ransomware
2024-06-27 https://www.bleepingcomputer.com/news/security/blacksuit-ransomware-gang-claims-attack-on-kadokawa-corporation/
The BlackSuit ransomware gang claimed a recent cyberattack on KADOKAWA corporation and is now threatening to publish stolen data if a ransom is not paid. [...] "

Autosummary: The threat actors say they"ll publish all of the stolen data on July 1 if a ransom is not paid, including contacts, confidential documents, employee data, business plans, and financial data. "


Chinese and N. Korean Hackers Target Global Infrastructure with Ransomware

exploits ransomware
2024-06-26 https://thehackernews.com/2024/06/chinese-and-n-korean-hackers-target.html
Threat actors with suspected ties to China and North Korea have been linked to ransomware and data encryption attacks targeting government and critical infrastructure sectors across the world between 2021 and 2023. While one cluster of activity has been associated with the ChamelGang (aka CamoFei), the second cluster overlaps with activity previously attributed to Chinese and North Korean "

Autosummary: "


LockBit lied: Stolen data is from a bank, not US Federal Reserve

financial ransomware
2024-06-26 https://www.bleepingcomputer.com/news/security/lockbit-lied-stolen-data-is-from-a-bank-not-us-federal-reserve/
Recently-disrupted LockBit ransomware group, in a desperate attempt to make a comeback, claimed this week that it had hit the Federal Reserve, the central bank of the United States. Except, the rumor has been quashed. [...] "

Autosummary: "You better hire another negotiator within 48 hours, and fire this clinical idiot who values Americans" bank secrecy at $50,000." LockBit claims it attacked the Fed, leaks data (Hackmanac) Eventually, the group began publishing the stolen data on its site.By claiming to have… — AzAl Security (@azalsecurity) June 26, 2024 Previously notorious for executing ransomware attacks on high-profile targets like Boeing, the Continental automotive giant, the Italian Internal Revenue Service, Bank of America, the UK Royal Mail, and most recently London Drugs, the cybercrime group found itself in hot waters this year. "


P2PInfect botnet targets REdis servers with new ransomware module

exploits ransomware
2024-06-25 https://www.bleepingcomputer.com/news/security/p2pinfect-botnet-targets-redis-servers-with-new-ransomware-module/
P2PInfect, originally a dormant peer-to-peer malware botnet with unclear motives, has finally come alive to deploy a ransomware module and a cryptominer in attacks on Redis servers. [...] "

Autosummary: The ransomware targets files with specific extensions related to databases (SQL, SQLITE3, DB), documents (DOC, XLS), and media files (MP3, WAV, MKV) and appends the ".encrypted" extension to the resulting files. "


Ransomware disrupts Indonesia’s national data centre, LockBit gang claims US Federal Reserve breach

exploits ransomware
2024-06-25 https://www.helpnetsecurity.com/2024/06/25/lockbit-indonesia-us-fed/

Ransomware attackers wielding a LockBit variant dubbed Brain Cipher have disrupted a temporary national data center facility which supports the operations of 200+ Indonesian government agencies and public services. The attackers are asking for a $8 million ransom, which the Indonesian government is determined not to pay, according to The Jakarta Post. “As of today, Monday 24 June 2024, since 07:00 Western Standard Time, the affected Immigration Services have been operating normally. These include Visa … More

The post Ransomware disrupts Indonesia’s national data centre, LockBit gang claims US Federal Reserve breach appeared first on Help Net Security.

"

Autosummary: These include Visa and Stay Permit Services, Immigration Checkpoint Services (TPI), Passport Services, Visa on Arrival (VOA) on boarding Services, and Immigration Document Management Services,” the Indonesian Ministry of Communication and Information (KomInfo) has announced on Monday. "


LockBit claims the hack of the US Federal Reserve

ransomware
2024-06-24 https://securityaffairs.com/164873/cyber-crime/lockbit-claims-hacked-us-federal-reserve.html
The Lockbit ransomware group announced that it had breached the US Federal Reserve and exfiltrated 33 TB of sensitive data. The Lockbit ransomware group announced that it had breached the systems of Federal Reserve of the United States and exfiltrated 33 TB of sensitive data, including “Americans’ banking secrets.” The Lockbit ransomware group added the […] "

Autosummary: The twelve cities which are home to the Reserve Banks are Boston, New York City, Philadelphia, Richmond, Atlanta, Dallas, Saint Louis, Cleveland, Chicago, Minneapolis, Kansas City, and San Francisco.” "


Change Healthcare confirms the customer data stolen in ransomware attack

exploits ransomware
2024-06-24 https://www.malwarebytes.com/blog/news/2024/06/change-healthcare-confirms-the-customer-data-stolen-in-ransomware-attack
Change Healthcare has detailed the types of medical and patient data that was stolen in a recent ransomware attack. "

Autosummary: Billing, claims, and payment information: Claim numbers, account numbers, billing codes, payment card details, financial and banking information, payments made, and balances due. Health information: Medical record numbers, providers, diagnoses, medicines, test results, images, and details of care and treatment. Health insurance information: Details about primary, secondary, or other health plans/policies, insurance companies, member/group ID numbers, and Medicaid-Medicare-government payor ID numbers. "


Experts found a bug in the Linux version of RansomHub ransomware

exploits ransomware Linux
2024-06-22 https://securityaffairs.com/164779/cyber-crime/ransomhub-ransomware-esxi-encryptor.html
The RansomHub ransomware operators added a Linux encryptor to their arsenal, the version targets VMware ESXi environments. RansomHub ransomware operation relies on a new Linux version of the encrypted to target VMware ESXi environments. Although RansomHub only emerged in February 2024, it has rapidly grown and has become the fourth most prolific ransomware operator over […] "

Autosummary: Experts found a bug in the Linux version of RansomHub ransomware Pierluigi Paganini June 22, 2024 June 22, 2024 The RansomHub ransomware operators added a Linux encryptor to their arsenal, the version targets VMware ESXi environments. "


CDK Global outage caused by BlackSuit ransomware attack

exploits ransomware
2024-06-22 https://www.bleepingcomputer.com/news/security/cdk-global-outage-caused-by-blacksuit-ransomware-attack/
The BlackSuit ransomware gang is behind CDK Global"s massive IT outage and disruption to car dealerships across North America, according to multiple sources familiar with the matter. [...] "

Autosummary: " "As a result, the Company experienced disruptions to its dealer management system ("DMS") hosted by CDK, which supports critical dealership operations including those supporting sales, inventory and accounting functions and its customer relationship management ("CRM") system," reported Sonic Automotive in an SEC filing. "


Ratel RAT targets outdated Android phones in ransomware attacks

exploits ransomware
2024-06-22 https://www.bleepingcomputer.com/news/security/ratel-rat-targets-outdated-android-phones-in-ransomware-attacks/
An open-source Android malware named "Ratel RAT" is widely deployed by multiple cybercriminals to attack outdated devices, some aiming to lock them down with a ransomware module that demands payment on Telegram. [...] "

Autosummary: As for targeted brands and models, there"s a mix of everything, including Samsung Galaxy, Google Pixel, Xiaomi Redmi, Motorola One, and devices from OnePlus, Vivo, and Huawei. "


Rafel RAT targets outdated Android phones in ransomware attacks

exploits ransomware
2024-06-22 https://www.bleepingcomputer.com/news/security/rafel-rat-targets-outdated-android-phones-in-ransomware-attacks/
An open-source Android malware named "Rafel RAT" is widely deployed by multiple cybercriminals to attack outdated devices, some aiming to lock them down with a ransomware module that demands payment on Telegram. [...] "

Autosummary: As for targeted brands and models, there"s a mix of everything, including Samsung Galaxy, Google Pixel, Xiaomi Redmi, Motorola One, and devices from OnePlus, Vivo, and Huawei. "


Change Healthcare lists the medical data stolen in ransomware attack

exploits ransomware
2024-06-21 https://www.bleepingcomputer.com/news/security/change-healthcare-lists-the-medical-data-stolen-in-ransomware-attack/
UnitedHealth has confirmed for the first time what types of medical and patient data were stolen in the massive Change Healthcare ransomware attack, stating that data breach notifications will be mailed in July. [...] "

Autosummary: According to the data breach notification, a massive trove of sensitive information was stolen, including: Health insurance information (such as primary, secondary or other health plans/policies, insurance companies, member/group ID numbers, and Medicaid-Medicare-government payor ID numbers); Health information (such as medical record numbers, providers, diagnoses, medicines, test results, images, care and treatment); Billing, claims and payment information (such as claim numbers, account numbers, billing codes, payment cards, financial and banking information, payments made, and balance due); and/or Other personal information such as Social Security numbers, driver’s licenses or state ID numbers, or passport numbers. "


Ransomware attacks skyrocket, with LockBit 3.0 at the forefront

exploits ransomware
2024-06-20 https://www.exponential-e.com/blog/ransomware-attacks-skyrocket-with-lockbit-3-0-at-the-forefront
Newly-released research indicates that ransomware attacks reached a record high in May, with the surge primarily fueled by a massive increase in the number of attacks perpetrated by the LockBit ransomware group and its affiliates. Read more in my article on the Exponential-e blog. "

Autosummary: "


Qilin ransomware: What you need to know

exploits ransomware
2024-06-20 https://www.tripwire.com/state-of-security/qilin-ransomware-what-you-need-know
Qilin (also known as Agenda) is a ransomware-as-a-service criminal operation that works with affiliates, encrypting and exfiltrating the data of hacked organisations and then demanding a ransom be paid. Read more in my article on the Tripwire State of Security blog. "

Autosummary: Qilin (also known as Agenda) is a ransomware-as-a-service criminal operation that works with affiliates, encrypting and exfiltrating the data of hacked organisations and then demanding a ransom be paid.And yet, in a series of media interviews, the Qilin ransomware gang has claimed that its attack against the hospitals was not financially-motivated at all, but instead part of a protest against the British government"s involvement in an unspecified war.The Qilin ransomware group has never claimed to have political motivations for its actions in the past, and history has shown that it has no qualms about hitting all kinds of businesses, schools, hospitals and healthcare organisations in its attacks. "


Linux version of RansomHub ransomware targets VMware ESXi VMs

exploits ransomware Linux
2024-06-20 https://www.bleepingcomputer.com/news/security/linux-version-of-ransomhub-ransomware-targets-vmware-esxi-vms/
The RansomHub ransomware operation is using a Linux encryptor designed specifically to encrypt VMware ESXi environments in corporate attacks. [...] "

Autosummary: Configuration options and commands Source: Recorded Future It also features ESXi-specific commands and options, like "vim-cmd vmsvc/getallvms" and "vim-cmd vmsvc/snapshot.removeall" for snapshot deletion, and "esxcli vm process kill" for shutting down VMs. "


Mass exploitation is the new primary attack vector for ransomware

exploits ransomware
2024-06-18 https://www.helpnetsecurity.com/2024/06/18/vulnerable-software-mass-exploitation/

The cyber threat landscape in 2023 and 2024 has been dominated by mass exploitation, according to WithSecure. Edge service KEV vulnerability trends 64% of all edge service and infrastructure Common Vulnerabilities and Exposures (CVEs) in the Known Exploited Vulnerability Catalogue (KEV) exist above the 97.5th percentile of EPSS scores (a metric that scores CVEs based on the likelihood of exploitation). Only 23% of all other CVEs in the KEV are above the 97.5th percentile. Furthermore, … More

The post Mass exploitation is the new primary attack vector for ransomware appeared first on Help Net Security.

"

Autosummary: There has been a rapid tempo of security incidents caused by the mass exploitation of vulnerable software such as MOVEit, CitrixBleed, Cisco XE, Fortiguard’s FortiOS, Ivanti ConnectSecure, Palo Alto’s PAN-OS, Juniper’s Junos, and ConnectWise ScreenConnect. "


The Financial Dynamics Behind Ransomware Attacks

financial exploits ransomware industry
2024-06-18 https://securityaffairs.com/164636/cyber-crime/financial-dynamics-ransomware-attacks.html
Over the last few years, ransomware attacks have become one of the most prevalent and expensive forms of cybercrime. Initially, these attacks involved malicious software that encrypts a victim’s data, rendering it inaccessible until a ransom is paid to the attackers. Today, this tactic has evolved, where ransomware operators in nearly every case first exfiltrate […] "

Autosummary: A multi-pronged approach, including strengthening cyber defenses, improving regulations, and raising awareness, is crucial to mitigating the risk and impact of ransomware.Her experience spans B2B tech, with a lot of focus on cybersecurity, cloud, enterprise, digital transformation, and data centre.Her specialties are in news, thought leadership, features, white papers, and PR writing, and she is an experienced editor for both print and online publications. "


Keytronic confirms data breach after ransomware attack

financial exploits ransomware
2024-06-18 https://securityaffairs.com/164642/data-breach/keytronic-blackbasta-ransomware.html
Printed circuit board assembly (PCBA) manufacturer Keytronic disclosed a data breach after a ransomware attack. Keytronic has confirmed a data breach after a ransomware group leaked allegedly stolen personal information from its systems. The company did not provide any info on the ransomware operation that hit its network, however Black Basta ransomware group leaked over […] "

Autosummary: Black Basta ransomware group claims to have stolen ≈530 GB of data, including HR, Finance, Engineering documents, Corporate data, and home users data. "


Panera Bread likely paid a ransom in March ransomware attack

exploits ransomware
2024-06-17 https://www.bleepingcomputer.com/news/security/panera-bread-likely-paid-a-ransom-in-march-ransomware-attack/
Panera Bread, an American chain of fast food restaurants, most likely paid a ransom after being hit by a ransomware attack, suggests language used an internal email sent to employees. [...] "

Autosummary: Sadly, even paying a ransom does not guarantee the complete deletion of stolen data, with past incidents demonstrating that threat actors don"t always keep their promise and data was sold to other threat actors, leaked on data leak sites, or used to extort the company again. "


London hospitals canceled over 800 operations in the week after Synnovis ransomware attack

exploits ransomware
2024-06-15 https://securityaffairs.com/164541/cyber-crime/londol-hospitals-canceled-800-operations-ransomware.html
NHS England confirmed that multiple London hospitals impacted by the ransomware attack at Synnovis were forced to cancel planned operations. NHS England confirmed that the recent ransomware attack on Synnovis had a severe impact of multiple London hospitals, forcing them to cancel more than hundreds of scheduled operations. Synnovis is a pathology partnership between Guy’s […] "

Autosummary: O Negative blood is a universal blood type, anyone can receive it, for this reason, it is crucial in emergencies or when a patient’s blood type is unknown. “England’s top doctor has today (Monday 10 June) backed calls from NHS Blood and Transplant (NHSBT) for O Positive and O Negative blood donors to urgently book appointments to donate in one of the 25 town and city centre NHS Blood Donor Centres in England, to boost stocks of O type blood following the cyber incident in London.”“Unfortunately, some operations and procedures which rely more heavily on pathology services have been postponed, and blood testing is being prioritised for the most urgent cases, meaning some patients have had phlebotomy appointments cancelled.” "


London hospitals cancel over 800 operations after ransomware attack

exploits ransomware
2024-06-14 https://www.bleepingcomputer.com/news/security/london-hospitals-cancel-over-800-operations-after-ransomware-attack/
NHS England revealed today that multiple London hospitals impacted by last week"s Synnovis ransomware attack were forced to cancel hundreds of planned operations and appointments. [...] "

Autosummary: While memos issued by hospital officials revealed this "ongoing critical incident" has had a "major impact" on their procedures and operations (including blood transfusions and blood testing), the NHS said two days after the incident that emergency services like A&E, urgent care centers, and maternity departments are open as usual although some operations and procedures relying on pathology services had to be postponed. "


CISA warns of Windows bug exploited in ransomware attacks

exploits ransomware
2024-06-14 https://www.bleepingcomputer.com/news/security/cisa-warns-of-windows-bug-exploited-in-ransomware-attacks/
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity Windows vulnerability abused in ransomware attacks as a zero-day to its catalog of actively exploited security bugs. [...] "

Autosummary: Since then, the gang has breached many high-profile victims, including German defense contractor Rheinmetall, U.K. technology outsourcing company Capita, the Toronto Public Library, the American Dental Association, government contractor ABB, Hyundai"s European division, Yellow Pages Canada, and U.S. healthcare giant Ascension. "


Keytronic confirms data breach after ransomware gang leaks stolen files

financial exploits ransomware
2024-06-14 https://www.bleepingcomputer.com/news/security/keytronic-confirms-data-breach-after-ransomware-gang-leaks-stolen-files/
PCBA manufacturing giant Keytronic is warning it suffered a data breach after the Black Basta ransomware gang leaked 530GB of the company"s stolen data two weeks ago. [...] "

Autosummary: Keytronic entry on Black Basta data leak site Source: BleepingComputer The threat actors claim that human resources, finance, engineering, and corporate data were stolen in the attack, sharing screenshots of employees" passports and social security cards, customer presentations, and corporate documents. "


PHP command injection flaw exploited to deliver ransomware (CVE-2024-4577)

exploits ransomware
2024-06-13 https://www.helpnetsecurity.com/2024/06/13/cve-2024-4577-exploited/

An OS command injection vulnerability in Windows-based PHP (CVE-2024-4577) in CGI mode is being exploited by the TellYouThePass ransomware gang. Imperva says the attacks started on June 8, two days after the PHP development team pushed out fixes, and one day after Watchtowr researchers published a technical analysis of the flaw and proof-of-concept exploit code. About CVE-2024-4577 Discovered and reported by Orange Tsai, principal security researcher at Devcore, CVE-2024-4577 allows attackers to bypass the protections … More

The post PHP command injection flaw exploited to deliver ransomware (CVE-2024-4577) appeared first on Help Net Security.

"

Autosummary: "


Ukraine Police Arrest Suspect Linked to LockBit and Conti Ransomware Groups

exploits ransomware
2024-06-13 https://thehackernews.com/2024/06/ukraine-police-arrest-suspect-linked-to.html
The Cyber Police of Ukraine has announced the arrest of a local man who is suspected to have offered their services to LockBit and Conti ransomware groups. The unnamed 28-year-old native of the Kharkiv region allegedly specialized in the development of crypters to encrypt and obfuscate malicious payloads in order to evade detection by security programs. The product is believed to have been "

Autosummary: "For nearly four years, Rui-Siang Lin allegedly operated "Incognito Market," one of the largest online platforms for narcotics sales, conducting $100 million in illicit narcotics transactions and reaped millions of dollars in personal profits," James Smith, the assistant director in charge of the FBI New York field office, said. "


Toronto District School Board hit by a ransomware attack

exploits ransomware
2024-06-13 https://www.bleepingcomputer.com/news/security/toronto-district-school-board-hit-by-a-ransomware-attack/
The Toronto District School Board (TDSB) is warning that it suffered a ransomware attack on its software testing environment and is now investigating whether any personal information was exposed. [...] "

Autosummary: "


Panera warns of employee data breach after March ransomware attack

financial exploits ransomware
2024-06-13 https://www.bleepingcomputer.com/news/security/panera-warns-of-employee-data-breach-after-march-ransomware-attack/
U.S. food chain giant Panera Bread is notifying employees of a data breach after unknown threat actors stole their sensitive personal information in a March ransomware attack. [...] "

Autosummary: As a result of this breach, Panera suffered a massive outage that affected its internal IT systems, phones, point of sales system, website, and mobile apps. "


Black Basta Ransomware May Have Exploited MS Windows Zero-Day Flaw

exploits ransomware
2024-06-12 https://thehackernews.com/2024/06/black-basta-ransomware-may-have.html
Threat actors linked to the Black Basta ransomware may have exploited a recently disclosed privilege escalation flaw in the Microsoft Windows Error Reporting Service as zero-day, according to new findings from Symantec. The security flaw in question is CVE-2024-26169 (CVSS score: 7.8), an elevation of privilege bug in the Windows Error Reporting Service that could be exploited to achieve SYSTEM "

Autosummary: "Analysis of an exploit tool deployed in recent attacks revealed evidence that it could have been compiled prior to patching, meaning at least one group may have been exploiting the vulnerability as a zero-day," the Symantec Threat Hunter Team, part of Broadcom, said in a report shared with The Hacker News. "


Police arrest Conti and LockBit ransomware crypter specialist

exploits ransomware
2024-06-12 https://www.bleepingcomputer.com/news/security/police-arrest-conti-and-lockbit-ransomware-crypter-specialist/
The Ukraine cyber police have arrested a 28-year-old Russian man in Kyiv for working with Conti and LockBit ransomware operations to make their malware undetectable by antivirus software and conducting at least one attack himself. [...] "

Autosummary: "


Black Basta ransomware gang linked to Windows zero-day attacks

exploits ransomware
2024-06-12 https://www.bleepingcomputer.com/news/security/black-basta-ransomware-gang-linked-to-windows-zero-day-attacks/
The Cardinal cybercrime group (Storm-1811, UNC4394), who are the main operators of the Black Basta ransomware, is suspected of exploiting a Windows privilege escalation vulnerability, CVE-2024-26169, before a fix was made available. [...] "

Autosummary: Demonstration of CVE-2024-26169 exploit used by Black Basta Source: BleepingComputer A fascinating aspect of Symantec"s findings is that one variant of the exploit tool has a compilation timestamp dated February 27, 2024, while a second sample was built even earlier, on December 18, 2023. "


Ukraine Police arrested a hacker who developed a crypter used by Conti and LockBit ransomware operation

exploits ransomware
2024-06-12 https://securityaffairs.com/164475/breaking-news/developer-crypter-conti-lockbit-ransomware.html
The Ukraine cyber police arrested a Russian man for having developed the crypter component employed in Conti and LockBit ransomware operations. The Ukraine cyber police arrested a Russian man (28) for his role in developing a crypter used in Conti and LockBit ransomware operations. The man was arrested in Kyiv on April 18, 2024, as part of […] "

Autosummary: Ukraine Police arrested a hacker who developed a crypter used by Conti and LockBit ransomware operation Pierluigi Paganini June 12, 2024 June 12, 2024 The Ukraine cyber police arrested a Russian man for having developed the crypter component employed in Conti and LockBit ransomware operations. "


TellYouThePass ransomware exploits recent PHP RCE flaw to breach servers

exploits ransomware
2024-06-11 https://www.bleepingcomputer.com/news/security/tellyouthepass-ransomware-exploits-recent-php-rce-flaw-to-breach-servers/
The TellYouThePass ransomware gang has been exploiting the recently patched CVE-2024-4577 remote code execution vulnerability in PHP to deliver webshells and execute the encryptor payload on target systems. [...] "

Autosummary: Malicious HTA file Source: Imperva This file contains VBScript with a base64-encoded string that decodes into a binary, loading a .NET variant of the ransomware into the host"s memory, Imperva researchers explain. "


London hospitals face blood shortage after Synnovis ransomware attack

exploits ransomware
2024-06-10 https://www.bleepingcomputer.com/news/security/london-hospitals-face-blood-shortage-after-synnovis-ransomware-attack/
England"s NHS Blood and Transplant (NHSBT) has issued an urgent call to O Positive and O Negative blood donors to book appointments and donate after last week"s cyberattack on pathology provider Synnovis impacted multiple hospitals in London. [...] "

Autosummary: "


UK NHS call for O-type blood donations following ransomware attack on London hospitals

exploits ransomware
2024-06-10 https://securityaffairs.com/164386/cyber-crime/uk-nhs-blood-donations-ransomware-attack-london-hospitals.html
The UK NHS issued an urgent call for O-type blood donations following the recent ransomware attack that hit several London hospitals. The UK National Health Service (NHS) issued an urgent call for O-type blood donations due to the recent ransomware attack on Synnovis that disrupted operations at several healthcare organizations in London. In early June, […] "

Autosummary: UK NHS call for O-type blood donations following ransomware attack on London hospitals Pierluigi Paganini June 10, 2024 June 10, 2024 The UK NHS issued an urgent call for O-type blood donations following the recent ransomware attack that hit several London hospitals. “England’s top doctor has today (Monday 10 June) backed calls from NHS Blood and Transplant (NHSBT) for O Positive and O Negative blood donors to urgently book appointments to donate in one of the 25 town and city centre NHS Blood Donor Centres in England, to boost stocks of O type blood following the cyber incident in London. ” "


FBI Distributes 7,000 LockBit Ransomware Decryption Keys to Help Victims

exploits ransomware
2024-06-07 https://thehackernews.com/2024/06/fbi-distributes-7000-lockbit-ransomware.html
The U.S. Federal Bureau of Investigation (FBI) has disclosed that it"s in possession of more than 7,000 decryption keys associated with the LockBit ransomware operation to help victims get their data back at no cost. "We are reaching out to known LockBit victims and encouraging anyone who suspects they were a victim to visit our Internet Crime Complaint Center at ic3.gov," FBI Cyber Division "

Autosummary: " According to the Veeam Ransomware Trends Report 2024, which is based on a survey of 1,200 security professionals, organizations experiencing a ransomware attack can recover, on average, only 57% of the compromised data, leaving them vulnerable to "substantial data loss and negative business impact. "


FBI obtained 7,000 LockBit decryption keys, victims should contact the feds to get support

ransomware
2024-06-06 https://securityaffairs.com/164207/security/fbi-obtained-7000-lockbit-decryption-keys.html
The FBI is informing victims of LockBit ransomware it has obtained over 7,000 LockBit decryption keys that could allow some of them to decrypt their data. The FBI is inviting victims of LockBit ransomware to come forward because it has obtained over 7,000 LockBit decryption keys that could allow them to recover their encrypted data […] "

Autosummary: Since January 2020, affiliates utilizing LockBit have targeted organizations of diverse sizes spanning critical infrastructure sectors such as financial services, food and agriculture, education, energy, government and emergency services, healthcare, manufacturing, and transportation. “Additionally, from our ongoing disruption of LockBit, we now have over 7,000 decryption keys and can help victims reclaim their data and get back online.” said Bryan Vorndran, the Assistant Director at the FBI Cyber Division, during the 2024 Boston Conference on Cyber Security. "


New Fog ransomware targets US education sector via breached VPNs

exploits ransomware
2024-06-06 https://www.bleepingcomputer.com/news/security/new-fog-ransomware-targets-us-education-sector-via-breached-vpns/
A new ransomware operation named "Fog" launched in early May 2024, using compromised VPN credentials to breach the networks of educational organizations in the U.S. [...] "

Autosummary: " Once they gain access to the internal network, the attackers perform "pass-the-hash" attacks on administrator accounts, which are used to establish RDP connections to Windows servers running Hyper-V. Alternatively, credential stuffing is used to hijack valuable accounts, followed by PsExec deployment on multiple hosts. "


Hit by LockBit? The FBI is waiting to help you with over 7,000 decryption keys

ransomware
2024-06-06 https://www.tripwire.com/state-of-security/hit-lockbit-fbi-waiting-help-you-over-7000-decryption-keys
Did your company fall victim to the LockBit ransomware? Have cybercriminals left gigabytes of your data encrypted, with no easy route for recovery that doesn"t involve paying a ransom? Well, don"t fear... Read more in my article on the Tripwire State of Security blog. "

Autosummary: Vorndran described how LockBit was set up and administered by a 31-year-old Russian called Dmitry Khoroshev (who used online handles such as "LockBitsupp," "Putinkrab," and "Nerowolfe"), who receives a 20% cut of whatever payments are extorted from the ransomware"s innocent victims. "


A new Linux version of TargetCompany ransomware targets VMware ESXi environments

exploits ransomware Linux
2024-06-06 https://securityaffairs.com/164219/cyber-crime/linux-version-targetcompany-ransomware.html
A new Linux variant of the TargetCompany ransomware family targets VMware ESXi environments using a custom shell script. A new variant of the TargetCompany ransomware group uses a custom shell script as a means of payload delivery and execution, this is the first time the technique was observed in the wild. The script was also used […] "

Autosummary: A new Linux version of TargetCompany ransomware targets VMware ESXi environments Pierluigi Paganini June 06, 2024 June 06, 2024 A new Linux variant of the TargetCompany ransomware family targets VMware ESXi environments using a custom shell script. "


Rebranded Knight Ransomware Targeting Healthcare and Businesses Worldwide

exploits ransomware
2024-06-05 https://thehackernews.com/2024/06/rebranded-knight-ransomware-targeting.html
An analysis of a nascent ransomware strain called RansomHub has revealed it to be an updated and rebranded version of Knight ransomware, itself an evolution of another ransomware known as Cyclops. Knight (aka Cyclops 2.0) ransomware first arrived in May 2023, employing double extortion tactics to steal and encrypt victims" data for financial gain. It"s operational across multiple platforms, "

Autosummary: "This threat actor has an extensive understanding of the VBScript language, and Windows internals and utilities, such as WMI, diskpart, and bcdboot," Kaspersky said in its analysis of ShrinkLocker, noting that they likely "already had full control of the target system when the script was executed." "


RansomHub extortion gang linked to now-defunct Knight ransomware

exploits ransomware
2024-06-05 https://www.bleepingcomputer.com/news/security/ransomhub-extortion-gang-linked-to-now-defunct-knight-ransomware/
Security researchers analyzing the relatively new RansomHub ransomware-as-a-service believe that it has evoloved from the currently defunct Knight ransomware project. [...] "

Autosummary: Knight ransomware sale post on RAMP forums source: KELA RansomHub"s Knight origin Malware analysts at Symantec, part of Broadcom, found multiple similarities between the two ransomware families that point to a common origin: Both ransomware families are written in Go and use Gobfuscate for obfuscation. "


Qilin ransomware gang linked to attack on London hospitals

exploits ransomware
2024-06-05 https://www.bleepingcomputer.com/news/security/qilin-ransomware-gang-linked-to-attack-on-london-hospitals/
A ransomware attack that hit pathology services provider Synnovis on Monday and impacted several major NHS hospitals in London has now been linked to the Qilin ransomware operation. [...] "

Autosummary: Ciaran Martin, the inaugural CEO of the UK"s National Cyber Security Centre (NCSC), said today that the Qilin gang is likely responsible for the incident The attack has resulted in Synnovis being locked out of its systems and is causing ongoing service disruptions at Guy"s and St Thomas" NHS Foundation Trust, King"s College Hospital NHS Foundation Trust, and various primary care providers across south east London. "


Linux version of TargetCompany ransomware focuses on VMware ESXi

exploits ransomware Linux
2024-06-05 https://www.bleepingcomputer.com/news/security/linux-version-of-targetcompany-ransomware-focuses-on-vmware-esxi/
Researchers observed a new Linux variant of the TargetCompany ransomware family that targets VMware ESXi environments using a custom shell script to deliver and execute payloads. [...] "

Autosummary: Also known as Mallox, FARGO, and Tohnichi, the TargetCompany ransomware operation emerged in June 2021 and has been focusing on database attacks (MySQL, Oracle, SQL Server) against organizations mostly in Taiwan, South Korea, Thailand, and India. "


FBI recovers 7,000 LockBit keys, urges ransomware victims to reach out

exploits ransomware
2024-06-05 https://www.bleepingcomputer.com/news/security/fbi-recovers-7-000-lockbit-keys-urges-ransomware-victims-to-reach-out/
The FBI urges past victims of LockBit ransomware attacks to come forward after revealing that it has obtained over 7,000 LockBit decryption keys that they can use to recover encrypted data for free. [...] "

Autosummary: "


Major London hospitals disrupted by Synnovis ransomware attack

exploits ransomware
2024-06-04 https://www.bleepingcomputer.com/news/security/major-london-hospitals-disrupted-by-synnovis-ransomware-attack/
A ransomware attack affecting pathology and diagnostic services provider Synnovis has impacted healthcare services at multiple major NHS hospitals in London. [...] "

Autosummary: While Synnovis has yet to issue a public statement regarding the June 3 ransomware attack, memos sent by partner hospitals affected by the attack revealed that this "ongoing critical incident" has had a "major impact" on healthcare services across southeast London. "


A ransomware attack on Synnovis impacted several London hospitals

exploits ransomware
2024-06-04 https://securityaffairs.com/164142/cyber-crime/ransomware-attack-synnovis-london-hospitals.html
A ransomware attack that hit the provider of pathology and diagnostic services Synnovis severely impacted the operations of several London hospitals. A ransomware attack on pathology and diagnostic services provider Synnovis has severely impacted the operations at several major NHS hospitals in London. The attack forced the impacted hospitals to cancel some healthcare procedures, in […] "

Autosummary: A ransomware attack on Synnovis impacted several London hospitals Pierluigi Paganini June 04, 2024 June 04, 2024 A ransomware attack that hit the provider of pathology and diagnostic services Synnovis severely impacted the operations of several London hospitals.Trauma cases at Kings being sent to other sites: pic.twitter.com/zmtsq6c0zL — Shaun Lintern (@ShaunLintern) June 4, 2024 Below is the message sent by Professor Ian Abbs, Chief Executive Officer Guy’s and St Thomas’ NHS Foundation Trust:Dear Colleague "I am writing to update you about the ongoing critical incident that is currently affecting our pathology services. "


Going going gone! Ransomware attack grabs Christie’s client data for a steal

exploits ransomware
2024-05-29 https://www.bitdefender.com/blog/hotforsecurity/going-going-gone-ransomware-attack-grabs-christies-client-data-for-a-steal/
The world-renowned auction house Christie"s has confirmed that it has fallen victim to a ransomware attack, seemingly orchestrated by a Russia-linked cybercriminal gang. Read more in my article on the Hot for Security blog. "

Autosummary: "


Microsoft links North Korean hackers to new FakePenny ransomware

exploits ransomware
2024-05-28 https://www.bleepingcomputer.com/news/microsoft/microsoft-links-moonstone-sleet-north-korean-hackers-to-new-fakepenny-ransomware/
​Microsoft has linked a North Korean hacking group it tracks as Moonstone Sleet to FakePenny ransomware attacks, which have led to millions of dollars in ransom demands. [...] "

Autosummary: Previously tracked as Storm-17, Moonstone Sleet has been observed attacking both financial and cyberespionage targets using trojanized software (e.g., PuTTY), malicious games and npm packages, custom malware loaders, and fake software development companies (e.g., StarGlow Ventures, C.C. Waterfall) set up to interact with potential victims on LinkedIn, Telegram, freelancing networks, or via email. "


New ShrinkLocker ransomware uses BitLocker to encrypt your files

exploits ransomware
2024-05-24 https://www.bleepingcomputer.com/news/security/new-shrinklocker-ransomware-uses-bitlocker-to-encrypt-your-files/
A new ransomware strain called ShrinkLocker creates a new boot partition to encrypt corporate systems using Windows BitLocker. [...] "

Autosummary: Through dynamic malware analysis, Kaspersky researchers were able to confirm the malware making the following registry changes: fDenyTSConnections = 1 : disables RDP connections : disables RDP connections scforceoption = 1 : enforces smart card authentication : enforces smart card authentication UseAdvancedStartup = 1 : requires the use of the BitLocker PIN for pre-boot authentication : requires the use of the BitLocker PIN for pre-boot authentication EnableBDEWithNoTPM = 1 : allows BitLocker without a compatible TPM chip : allows BitLocker without a compatible TPM chip UseTPM = 2 : allows the use of TPM if available : allows the use of TPM if available UseTPMPIN = 2 : allows the use of a startup PIN with TPM if available : allows the use of a startup PIN with TPM if available UseTPMKey = 2 : allows the use of a startup key with TPM if available : allows the use of a startup key with TPM if availableUseTPMKeyPIN = 2 : allows the use of a startup key and PIN with TPM if available : allows the use of a startup key and PIN with TPM if available EnableNonTPM = 1 : allows BitLocker without a compatible TPM chip, requires a password or startup key on a USB flash drive : allows BitLocker without a compatible TPM chip, requires a password or startup key on a USB flash drive UsePartialEncryptionKey = 2 : requires the use of a startup key with TPM : requires the use of a startup key with TPM UsePIN = 2: requires the use of a startup PIN with TPM The threat actor behind ShrinkLocker does not drop a ransom file to establish a communication channel with the victim. "


Mandatory reporting for ransomware attacks? – Week in security with Tony Anscombe

exploits ransomware
2024-05-24 https://www.welivesecurity.com/en/videos/mandatory-reporting-ransomware-attacks-week-security-tony-anscombe/
As the UK mulls new rules for ransomware disclosure, what would be the wider implications of such a move, how would cyber-insurance come into play, and how might cybercriminals respond? "

Autosummary: "


2024 sees continued increase in ransomware activity

exploits ransomware
2024-05-23 https://www.helpnetsecurity.com/2024/05/23/2024-ransomware-activity-video/

In this Help Net Security video, Ryan Bell, Threat Intelligence Manager at Corvus Insurance, discusses how ransomware will continue to grow in 2024. In January, Corvus reported that global ransomware attacks in 2023 set a record high, surpassing 2022 by nearly 70 percent. Despite the disruption of two major ransomware groups, LockBit and ALPHV/BlackCat, which accounted for 22 percent and 8 percent of the activity, respectively, the ransomware threat remains resilient. Our Q1 ransomware report … More

The post 2024 sees continued increase in ransomware activity appeared first on Help Net Security.

"

Autosummary: "


UK Government ponders major changes to ransomware response – what you need to know

exploits government ransomware
2024-05-23 https://www.exponential-e.com/blog/uk-government-ponders-major-changes-to-ransomware-response-what-you-need-to-know
The British Government is proposing sweeping change in its approach to ransomware attacks, proposing mandatory reporting by victims and licensing regime for all payments. Read more in my article on the Exponential-e blog. "

Autosummary: "


OmniVision disclosed a data breach after the 2023 Cactus ransomware attack

financial exploits ransomware
2024-05-22 https://securityaffairs.com/163506/data-breach/omnivision-data-breach.html
The digital imaging products manufacturer OmniVision disclosed a data breach after the 2023 ransomware attack. OmniVision Technologies is a company that specializes in developing advanced digital imaging solutions. In 2023, OmniVision employed 2,200 people and had an annual revenue of $1.4 billion. OmniVision Technologies Inc. is an American subsidiary of Chinese semiconductor device and mixed-signal integrated […] "

Autosummary: The company designs and develops digital imaging products for use in mobile phones, laptops, netbooks and webcams, security and surveillance cameras, entertainment, automotive and medical imaging systems.As proof of the data breach, the extortion group published data samples, including passport images, NDAs, contracts, and other documents. "


LockBit says they stole data in London Drugs ransomware attack

exploits ransomware
2024-05-21 https://www.bleepingcomputer.com/news/security/lockbit-says-they-stole-data-in-london-drugs-ransomware-attack/
Today, the LockBit ransomware gang claimed they were behind the April cyberattack on Canadian pharmacy chain London Drugs and is now threatening to publish stolen data online after allegedly failed negotiations. [...] "

Autosummary: " London Drugs added that they will not and cannot pay the ransom requested by LockBit, but acknowledged that the gang "may leak stolen London Drugs corporate files, some of which may contain employee information on the Dark Web." "At this stage in our investigation, we are not able to provide specifics on the nature or extent of employee personal information potentially impacted. "


Consumers continue to overestimate their ability to spot deepfakes

ransomware
2024-05-20 https://www.helpnetsecurity.com/2024/05/20/consumers-online-identity-fraud/

The Jumio 2024 Online Identity Study reveals significant consumer concerns about the risks posed by generative AI and deepfakes, including the potential for increased cybercrime and identity fraud. The study examined the views of more than 8,000 adult consumers, split evenly across the United Kingdom, United States, Singapore and Mexico. The results suggest nearly 72% worry on a day-to-day basis about being fooled by a deepfake into handing over sensitive information or money. Only 15% … More

The post Consumers continue to overestimate their ability to spot deepfakes appeared first on Help Net Security.

"

Autosummary: More than 80% of Singapore consumers said they’d be willing to spend more time on identity verification if those measures improve security in industries including financial services (85%), the sharing economy (85%), healthcare (85%), government (84%), travel and hospitality (84%), retail and ecommerce (83%), social media (82%) and telecoms (82%). "


Strata Identity Maverics Identity Continuity provides real-time IDP failover capabilities

ransomware industry
2024-05-20 https://www.helpnetsecurity.com/2024/05/20/strata-identity-maverics-identity-continuity/

Strata Identity announced Maverics Identity Continuity, a new add-on product to its Maverics Identity Orchestration platform that provides always-on identity continuity in multi-cloud environments. Unlike regional redundancy offerings from cloud providers and existing backup and restore products that only shorten the time it takes to rebuild IDP (primary identity provider) infrastructures after an outage, Strata’s Identity Continuity product maintains uninterrupted identity services by autonomously and transparently failing over to an alternate IDP. With many organizations … More

The post Strata Identity Maverics Identity Continuity provides real-time IDP failover capabilities appeared first on Help Net Security.

"

Autosummary: The need for always-on identity Traditional identity resilience offerings are limited to providing disaster recovery using point-in-time IDP policy configuration backups, but cannot prevent a business’ mission-critical applications from going offline. "


OmniVision discloses data breach after 2023 ransomware attack

financial exploits ransomware
2024-05-20 https://www.bleepingcomputer.com/news/security/omnivision-discloses-data-breach-after-2023-ransomware-attack/
The California-based imaging sensors manufacturer OmniVision is warning of a data breach after the company suffered a Cactus ransomware attack last year. [...] "

Autosummary: However, an announcement by the Cactus ransomware gang on October 17, 2023, claimed the attack on OmniVision and leaked the following data samples: Passport scans Nondisclosure agreements Contracts Confidential documents The threat actors eventually released all data they held from the attack in a ZIP archive made available to download for free. "


Organizations struggle to defend against ransomware

exploits ransomware
2024-05-17 https://www.helpnetsecurity.com/2024/05/17/ransomware-incidents-surge-video/

In this Help Net Security video, Jeremy Nichols, Director, Global Threat Intelligence Center at NTT Security Holdings, discusses a recent surge in ransomware incidents. After a down year in 2022, ransomware and extortion incidents increased in 2023. More than 5,000 ransomware victims were detected or posted across multiple social channels up from approximately 3,000 in 2022, according to the 2024 Global Threat Intelligence Report by NTT Security Holdings. Other key findings: Critical infrastructure, supply chain, … More

The post Organizations struggle to defend against ransomware appeared first on Help Net Security.

"

Autosummary: "


City of Wichita disclosed a data breach after the recent ransomware attack

financial exploits government ransomware
2024-05-17 https://securityaffairs.com/163300/cyber-crime/city-of-wichita-disclosed-data-breach.html
The City of Wichita disclosed a data breach after the ransomware attack that hit the Kansas’s city earlier this month. On May 5th, 2024, the City of Wichita, Kansas, was the victim of a ransomware attack and shut down its network to contain the threat. The city immediately started its incident response procedure to prevent […] "

Autosummary: These files contained law enforcement incident and traffic information, which include names, Social Security numbers, driver’s license or state identification card numbers, and payment card information.” "


Nissan reveals ransomware attack exposed 53,000 workers’ social security numbers

exploits ransomware
2024-05-17 https://www.bitdefender.com/blog/hotforsecurity/nissan-reveals-ransomware-attack-exposed-53-000-workers-social-security-numbers/
Nissan North America has revealed that extortionists who demanded a ransom after breaking into its external VPN and disrupted systems last year also stole the social security numbers of over 53,000 staff. Read more in my article on the Hot for Security blog. "

Autosummary: For instance, in December 2023, Nissan Australia and New Zealand suffered an attack by the Akira ransomware gang which exposed details belonging to 100,000 of the company"s customers, dealers, and current and former staff. "


The Week in Ransomware - May 17th 2024 - Mailbombing is back

exploits ransomware
2024-05-17 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-may-17th-2024-mailbombing-is-back/
This week was pretty quiet on the ransomware front, with most of the attention on the seizure of the BreachForums data theft forum. However, that does not mean there was nothing of interest released this week about ransomware. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @serghei, @BleepinComputer, @billtoulas, @fwosar, @demonslay335, @Ionut_Ilascu, @Seifreed, @LawrenceAbrams, @malwrhunterteam, @rapid7, @MsftSecIntel, @3xp0rtblog, @Intel_by_KELA, @NJCybersecurity, @proofpoint, @troyhunt, @CISAgov, @FBI, @AhnLab_SecuInfo, @briankrebs, @NCSC, @sekoia_io, @JakubKroustek, and @pcrisk. Ransomware phishing attacks also took front stage this week, with the Phorpiex botnet sending millions of emails that led to LockBit Black ransomware attacks, with the encryptor believed to have been created using LockBit"s leaked source code. "


Cybercriminals Exploiting Microsoft’s Quick Assist Feature in Ransomware Attacks

exploits ransomware ciber
2024-05-16 https://thehackernews.com/2024/05/cybercriminals-exploiting-microsofts.html
The Microsoft Threat Intelligence team said it has observed a threat it tracks under the name Storm-1811 abusing the client management tool Quick Assist to target users in social engineering attacks. "Storm-1811 is a financially motivated cybercriminal group known to deploy Black Basta ransomware," the company said in a report published on May 15, 2024. The "

Autosummary: The campaign, believed to have commenced in mid-April 2024, has targeted a variety of industries and verticals, including manufacturing, construction, food & beverage, and transportation, Rapid7 said, indicating the opportunistic nature of the attacks. "


MediSecure e-script firm hit by ‘large-scale’ ransomware data breach

financial exploits ransomware
2024-05-16 https://www.bleepingcomputer.com/news/security/medisecure-e-script-firm-hit-by-large-scale-ransomware-data-breach/
Electronic prescription provider MediSecure in Australia has shut down its website and phone lines following a ransomware attack believed to originate from a third-party vendor. [...] "

Autosummary: In a short announcement, the Australian NCSC said that "a commercial health information organisation" reported being "the victim of a large-scale ransomware data breach incident. "


Electronic prescription provider MediSecure impacted by a ransomware attack

exploits ransomware
2024-05-16 https://securityaffairs.com/163257/cyber-crime/medisecure-impacted-by-ransomware-attack.html
Electronic prescription provider MediSecure in Australia suffered a ransomware attack likely originate from a third-party vendor. MediSecure is a company that provides digital health solutions, particularly focusing on secure electronic prescription delivery services in Australia. The company was forced to shut down its website and phone lines following a cyber attack, but it did not […] "

Autosummary: Pierluigi Paganini May 16, 2024 May 16, 2024 Electronic prescription provider MediSecure in Australia suffered a ransomware attack likely originate from a third-party vendor. "


Windows Quick Assist abused in Black Basta ransomware attacks

exploits ransomware
2024-05-15 https://www.bleepingcomputer.com/news/security/windows-quick-assist-abused-in-black-basta-ransomware-attacks/
​Financially motivated cybercriminals abuse the Windows Quick Assist feature in social engineering attacks to deploy Black Basta ransomware payloads on victims" networks. [...] "

Autosummary: Since then, its affiliates have breached many high-profile victims, including German defense contractor Rheinmetall, U.K. technology outsourcing company Capita, Hyundai"s European division, the Toronto Public Library, the American Dental Association, industrial automation company and government contractor ABB, Sobeys, Knauf, and Yellow Pages Canada. "


Phorpiex botnet sent millions of phishing emails to deliver LockBit Black ransomware

financial exploits ransomware
2024-05-14 https://securityaffairs.com/163109/malware/phorpiex-botnet-lockbit-black-ransomware.html
Experts reported that since April, the Phorpiex botnet sent millions of phishing emails to spread LockBit Black ransomware. New Jersey’s Cybersecurity and Communications Integration Cell (NJCCIC) reported that since April, threat actors used the the Phorpiex botnet to send millions of phishing emails as part of a LockBit Black ransomware campaign. The botnet has been active […] "

Autosummary: The botnet has been active since at least 2016, it was involved in sextortion spam campaigns, crypto-jacking, cryptocurrency clipping (substituting the original wallet address saved in the clipboard with the attacker’s wallet address during a transaction) and ransomware attacks in the past In August 2021 the criminal organization behind the Phorpiex botnet have shut down their operations and put the source code of the bot for sale on a cybercrime forum in on a dark web. "


Black Basta ransomware group’s techniques evolve, as FBI issues new warning in wake of hospital attack

exploits ransomware
2024-05-14 https://www.exponential-e.com/blog/black-basta-ransomware-groups-techniques-evolve-as-fbi-issues-new-warning-in-wake-of-hospital-attack
Security agencies in the United States have issued a new warning about the Black Basta ransomware group, in the wake of a high-profile attack against the healthcare giant Ascension. The cyber attack last week forced the Ascension computer systems offline, and caused some hospital emergency departments to turn away ambulances "in order to ensure emergency cases are triaged immediately." Read more in my article on the Exponential-e blog. "

Autosummary: "


Singing River Health System: Data of 895,000 stolen in ransomware attack

exploits ransomware
2024-05-14 https://www.bleepingcomputer.com/news/security/singing-river-health-system-data-of-895-000-stolen-in-ransomware-attack/
The Singing River Health System is warning that it is now estimating that 895,204 people are impacted by a ransomware attack it suffered in August 2023. [...] "

Autosummary: "


Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia

exploits ransomware
2024-05-13 https://thehackernews.com/2024/05/black-basta-ransomware-strikes-500.html
The Black Basta ransomware-as-a-service (RaaS) operation has targeted more than 500 private industry and critical infrastructure entities in North America, Europe, and Australia since its emergence in April 2022. In a joint advisory published by the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Department of Health and Human Services (HHS "

Autosummary: Some of the other new ransomware groups that made their appearance in recent weeks comprise APT73, DoNex, DragonForce, Hunt (a Dharma/Crysis ransomware variant), KageNoHitobito, Megazord, Qiulong, Rincrypt, and Shinra. A new analysis by NCC Group"s Fox-IT team has revealed that 3,143 servers are still at risk of CVE-2023-48365 (ak DoubleQlik), with a majority of them located in the U.S., Italy, Brazil, the Netherlands, and Germany as of April 17, 2024. "


Botnet sent millions of emails in LockBit Black ransomware campaign

exploits ransomware
2024-05-13 https://www.bleepingcomputer.com/news/security/botnet-sent-millions-of-emails-in-lockbit-black-ransomware-campaign/
Since April, millions of phishing emails have been sent through the Phorpiex botnet to conduct a large-scale LockBit Black ransomware campaign. [...] "

Autosummary: These phishing emails with "your document" and "photo of you???" subject lines are being sent using "Jenny Brown" or "Jenny Green" aliases from over 1,500 unique IP addresses worldwide, including Kazakhstan, Uzbekistan, Iran, Russia, and China. "


INC ransomware source code selling on hacking forums for $300,000

exploits ransomware
2024-05-13 https://www.bleepingcomputer.com/news/security/inc-ransomware-source-code-selling-on-hacking-forums-for-300-000/
A cybercriminal using the name "salfetka" claims to be selling the source code of INC Ransom, a ransomware-as-a-service (RaaS) operation launched in August 2023. [...] "

Autosummary: INC Ransom moving to a new site On May 1, 2024, INC Ransom announced on its old leak site that it would move to a new data leak extortion "blog" and shared a new TOR address, stating the old site would be closed in two to three months. "


As of May 2024, Black Basta ransomware affiliates hacked over 500 organizations worldwide

exploits ransomware
2024-05-12 https://securityaffairs.com/163019/cyber-crime/black-basta-ransomware-500-organizations.html
Black Basta ransomware affiliates have breached over 500 organizations between April 2022 and May 2024, FBI and CISA reported. The FBI, CISA, HHS, and MS-ISAC have issued a joint Cybersecurity Advisory (CSA) regarding the Black Basta ransomware activity as part of the StopRansomware initiative. Black Basta has targeted at least 12 critical infrastructure sectors, including […] "

Autosummary: As of May 2024, Black Basta ransomware affiliates hacked over 500 organizations worldwide Pierluigi Paganini May 12, 2024 May 12, 2024 Black Basta ransomware affiliates have breached over 500 organizations between April 2022 and May 2024, FBI and CISA reported. "


CISA: Black Basta ransomware breached over 500 orgs worldwide

exploits ransomware
2024-05-11 https://www.bleepingcomputer.com/news/security/cisa-black-basta-ransomware-breached-over-500-orgs-worldwide/
​CISA and the FBI said today that Black Basta ransomware affiliates breached over 500 organizations between April 2022 and May 2024. [...] "

Autosummary: Its affiliates have since breached many high-profile victims, including German defense contractor Rheinmetall, Hyundai"s European division, U.K. technology outsourcing company Capita, industrial automation company and government contractor ABB, the Toronto Public Library, the American Dental Association, Sobeys, Knauf, and Yellow Pages Canada. "


Ohio Lottery ransomware attack impacts over 538,000 individuals

exploits ransomware
2024-05-10 https://www.bleepingcomputer.com/news/security/ohio-lottery-ransomware-attack-impacts-over-538-000-individuals/
​The Ohio Lottery is sending data breach notification letters to over 538,000 individuals affected by a cyberattack that hit the organization"s systems on Christmas Eve. [...] "

Autosummary: " Breach claimed by DragonForce ransomware While the Ohio Lottery didn"t reveal the nature of the incident, which affected mobile and prize-cashing operations, the DragonForce ransomware gang claimed the attack days later. "


Boeing refused to pay $200 million LockBit ransomware demand

exploits ransomware
2024-05-10 https://www.bitdefender.com/blog/hotforsecurity/boeing-refused-to-pay-200-million-ransomware-demand-from-lockbit-gang/
Boeing has confirmed that it received a demand for a massive $200 million after a ransomware attack by the notorious LockBit hacking group in October 2023. The company confirmed its link to the indictment of Dmitry Yuryevich Khoroshev, who was identified this week by the US Department of Justice as the true identity of LockBitSupp, the kingpin of the LockBit gang. Read more in my article on the Hot for Security blog. "

Autosummary: "


Ascension redirects ambulances after suspected ransomware attack

exploits ransomware
2024-05-10 https://www.bleepingcomputer.com/news/security/healthcare-giant-ascension-redirects-ambulances-after-suspected-Black-Basta-ransomware-attack/
Ascension, a major U.S. healthcare network, is diverting ambulances from several hospitals due to a suspected ransomware attack that has been causing clinical operation disruptions and system outages since Wednesday. [...] "

Autosummary: Since then, its affiliates have breached many high-profile victims, including German defense contractor Rheinmetall, U.K. technology outsourcing company Capita, industrial automation company and government contractor ABB, and the Toronto Public Library. "


The Week in Ransomware - May 10th 2024 - Chipping away at LockBit

exploits ransomware
2024-05-10 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-may-10th-2024-chipping-away-at-lockbit/
After many months of taunting law enforcement and offering a million-dollar reward to anyone who could reveal his identity, the FBI and NCA have done just that, revealing the name of LockBitSupp, the operator of the LockBit ransomware operation. [...] "

Autosummary: Other ransomware attacks we learned more about this week are: Contributors and those who provided new ransomware information and stories this week include: @billtoulas, @serghei, @fwosar, @LawrenceAbrams, @malwrhunterteam, @Seifreed, @Ionut_Ilascu, @BleepinComputer, @demonslay335, @snlyngaas, @pcrisk, @AJVicens, @chainalysis, @F_A_C_C_T_ , @zackwhittaker, @H4ckManac, and @JakubKroustek. May 6th 2024 A historic surge of ransomware incidents and payment totals in 2023 was not without resistance, as significant actions were taken against ransomware actors in 2023 and early 2024, including notable disruptions on Qakbot malware, and the LockBit and ALPHV-BlackCat ransomware-as-a-service (RaaS) groups. "


Global ransomware crisis worsens

exploits ransomware
2024-05-09 https://www.helpnetsecurity.com/2024/05/09/global-ransomware-crisis-worsens/

Ransomware and extortion incidents surged by 67% in 2023, according to NTT Security Holdings’ 2024 Global Threat Intelligence Report. Global ransomware crisis After a down year in 2022, ransomware and extortion incidents increased in 2023. More than 5,000 ransomware victims were detected or posted across multiple social channels, up from approximately 3,000 in 2022. The number of victims is likely higher because the research does not reflect incidents where ransoms were paid before the listing … More

The post Global ransomware crisis worsens appeared first on Help Net Security.

"

Autosummary: “Our 2023 report highlighted the increase in cyberthreats affecting day to day life, economic conditions, and privacy,” said Jeremy Nichols, NTT Security Holdings’ Global Threat Intelligence Center director. "


$10 million reward offer for apprehension of unmasked LockBit ransomware leader

exploits ransomware
2024-05-09 https://www.exponential-e.com/blog/10-million-reward-offer-for-apprehension-of-unmasked-lockbit-ransomware-leader
Do you know Dmitry Yuryevich Khoroshev? If you do, there"s a chance that you might well on the way to receiving a reward of up to $10 million. Read more in my article on the Exponential-e blog. "

Autosummary: "


97% of organizations hit by ransomware turn to law enforcement

exploits ransomware
2024-05-08 https://www.helpnetsecurity.com/2024/05/08/ransomware-law-enforcement-help/

Sophos has released additional findings from its annual “State of Ransomware 2024” survey. According to the report, among organizations surveyed, 97% of those hit by ransomware over the past year engaged with law enforcement and/or official government bodies for help with the attack. In addition, 59% of those organizations that did engage with law enforcement found the process easy or somewhat easy. Only 10% of those surveyed said the process was very difficult. Based on … More

The post 97% of organizations hit by ransomware turn to law enforcement appeared first on Help Net Security.

"

Autosummary: “At the Bureau, we’ve been doubling down in particular on our work with the private sector, in their capacity as victims of cyberattacks, of course, because the mission of the FBI always has been—and always will be—victim-centric—but also as integral partners, who can share valuable information about threats and trends, and, increasingly, join in our operations themselves,“ said Christopher Wray, FBI director. "


City of Wichita breach claimed by LockBit ransomware gang

exploits government ransomware
2024-05-08 https://www.bleepingcomputer.com/news/security/city-of-wichita-breach-claimed-by-lockbit-ransomware-gang/
The LockBit ransomware gang has claimed responsibility for a disruptive cyberattack on the City of Wichita, which has forced the City"s authorities to shut down IT systems used for online bill payment, including court fines, water bills, and public transportation. [...] "

Autosummary: Public services, including golf courses, parks, courts, and the water district, require residents to pay in cash or by check while online payment platforms are shut down. "


Smashing Security podcast #371: Unmasking LockBitsupp, company extortion, and a Tinder fraudster

ransomware
2024-05-08 https://grahamcluley.com/smashing-security-podcast-371/
The kingpin of the LockBit ransomware is named and sanctioned, a cybersecurity consultant is charged with a $1.5 million extortion, and a romance fraudster defrauded women he met on Tinder of £80,000. All this and much much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by “Ransomware Sommelier” Allan Liska. "

Autosummary: Hosts: Graham Cluley – @gcluley Carole Theriault – @caroletheriault Guest: Allan Liska – @uuallan Episode links: Sponsored by: Kiteworks – Step into the future of secure managed file transfer with Kiteworks. "


LockBit gang claimed responsibility for the attack on City of Wichita

government ransomware
2024-05-08 https://securityaffairs.com/162910/cyber-crime/city-of-wichita-lockbit-ransomware.html
The LockBit ransomware group has added the City of Wichita to its Tor leak site and threatened to publish stolen data. Last week, the City of Wichita, Kansas, was the victim of a ransomware attack and shut down its network to contain the threat. Wichita is the most populous city in the U.S. state of […] "

Autosummary: LockBit gang claimed responsibility for the attack on City of Wichita Pierluigi Paganini May 08, 2024 May 08, 2024 The LockBit ransomware group has added the City of Wichita to its Tor leak site and threatened to publish stolen data. "


LockBit ransomware admin identified, sanctioned in US, UK, Australia

exploits ransomware
2024-05-07 https://www.bleepingcomputer.com/news/security/lockbit-ransomware-admin-identified-sanctioned-in-us-uk-australia/
The FBI, UK National Crime Agency, and Europol have unveiled sweeping indictments and sanctions against the admin of the LockBit ransomware operation, with the identity of the Russian threat actor revealed for the first time. [...] "

Autosummary: Between June 2022 and February 2024, law enforcement claims that the ransomware operation conducted over 7,000 attacks, with the top five countries hit being the US, the UK, France, Germany, and China. "


LockBit leader unmasked: US charges Russian national

ransomware rusia-ucrania
2024-05-07 https://www.helpnetsecurity.com/2024/05/07/lockbit-lockbitsupp-unmasked/

Russian national Dmitry Khoroshev is “LockBitSupp”, the creator, developer and administator of the infamous LockBit ransomware group, according to UK, US and Australia law enforcement agencies. The US Justice Deparment has unsealed charges against Khoroshev and the US Department of the Treasury’s Office of Foreign Assets Control (OFAC), the Australian Department of Foreign Affairs, and the UK Foreign, Commonwealth and Development Office have imposed sanctions on him. Taking LockBit down In February 2024, the UK … More

The post LockBit leader unmasked: US charges Russian national appeared first on Help Net Security.

"

Autosummary: With the help of affiliates, the LockBit ransomware group attacked more than 2,500 victims – individuals, businesses, hospitals, critical infrastructure organizations, government agencies, etc. – in 120+ countries, and “extracted at least $500 million in ransom payments from their victims and caused billions of dollars in broader losses, such as lost revenue, incident response, and recovery.” "


Russian Hacker Dmitry Khoroshev Unmasked as LockBit Ransomware Administrator

exploits ransomware rusia-ucrania
2024-05-07 https://thehackernews.com/2024/05/russian-hacker-dmitry-khoroshev.html
The U.K. National Crime Agency (NCA) has unmasked the administrator and developer of the LockBit ransomware operation, revealing it to be a 31-year-old Russian national named Dmitry Yuryevich Khoroshev. In addition, Khoroshev has been sanctioned by the U.K. Foreign, Commonwealth and Development Office (FCD), the U.S. Department of the Treasury’s Office of Foreign Assets Control ( "

Autosummary: "LockBit ransomware has been used against Australian, UK and US businesses, comprising 18% of total reported Australian ransomware incidents in 2022-23 and 119 reported victims in Australia," Penny Wong, Minister for Foreign Affairs of Australia, said. "


Law enforcement agencies identified LockBit ransomware admin and sanctioned him

exploits ransomware
2024-05-07 https://securityaffairs.com/162823/cyber-crime/lockbit-ransomware-admin-identified.html
The FBI, UK National Crime Agency, and Europol revealed the identity of the admin of the LockBit operation and sanctioned him. The FBI, UK National Crime Agency, and Europol have unmasked the identity of the admin of the LockBit ransomware operation, aka ‘LockBitSupp’ and ‘putinkrab’ , and issued sanctions against him. It was the first time that […] "

Autosummary: Law enforcement agencies identified LockBit ransomware admin and sanctioned him Pierluigi Paganini May 07, 2024 May 07, 2024 The FBI, UK National Crime Agency, and Europol revealed the identity of the admin of the LockBit operation and sanctioned him. The US government also charged in the past other five LockBit members, Artur Sungatov, Ivan Kondratyev (Bassterlord), Ruslan Magomedovich Astamirov, Mikhail Matveev (Wazawaka), and Mikhail Vasiliev. "


City of Wichita shuts down IT network after ransomware attack

exploits government ransomware
2024-05-06 https://www.bleepingcomputer.com/news/security/city-of-wichita-shuts-down-it-network-after-ransomware-attack/
The City of Wichita, Kansas, disclosed it was forced to shut down portions of its network after suffering a weekend ransomware attack. [...] "

Autosummary: "


Lockbit"s seized site comes alive to tease new police announcements

ransomware
2024-05-06 https://www.bleepingcomputer.com/news/security/lockbits-seized-site-comes-alive-to-tease-new-police-announcements/
The NCA, FBI, and Europol have revived a seized LockBit ransomware data leak site to hint at new information being revealed by law enforcement this Tuesday. [...] "

Autosummary: Revised LockBit dark web data leak site Source: BleepingComputer These blog posts tease titles like "What have we learnt?," "More LB hackers exposed," "What have we been doing?," and what many hope to be the coup de grâce on the diminished ransomware operation, another blog post titled "Who is LockBitSupp?". "


City of Wichita hit by a ransomware attack

exploits government ransomware
2024-05-06 https://securityaffairs.com/162799/security/city-of-wichita-ransomware.html
The City of Wichita in Kansas was forced to shut down its computer systems after a ransomware attack. The City of Wichita, Kansas, was the victim of a ransomware attack and shut down its network to contain the threat. The security breach took place on May 5th, 2024, and immediately started its incident response procedure […] "

Autosummary: City of Wichita hit by a ransomware attack Pierluigi Paganini May 06, 2024 May 06, 2024 The City of Wichita in Kansas was forced to shut down its computer systems after a ransomware attack. "


Ransomware drama: Law enforcement seized Lockbit group’s website again

exploits ransomware
2024-05-05 https://securityaffairs.com/162778/cyber-crime/law-enforcement-seized-lockbit-site-again.html
Law enforcement seized the Lockbit group’s Tor website again and announced they will reveal more identities of its operators Law enforcement seized the Lockbit group’s Tor website again. The authorities resumed the Lockbit seized leak site and mocked its administrators. According to the countdown active on the seized, law enforcement that are currently controlling the […] "

Autosummary: Ransomware drama: Law enforcement seized Lockbit group’s website again Pierluigi Paganini May 05, 2024 May 05, 2024 Law enforcement seized the Lockbit group’s Tor website again and announced they will reveal more identities of its operators Law enforcement seized the Lockbit group’s Tor website again. Lockbit also said and quote: "I don"t understand why they"re… — vx-underground (@vxunderground) May 5, 2024 In February, a joint law enforcement action, code-named Operation Cronos, conducted by law enforcement agencies from 11 countries disrupted the LockBit ransomware operation. "


LockBit published data stolen from Simone Veil hospital in Cannes

ransomware
2024-05-03 https://securityaffairs.com/162721/cyber-crime/lockbit-published-simone-veil-hospital-data.html
LockBit ransomware operators have published sensitive data allegedly stolen from the Simone Veil hospital in Cannes. In April, a cyber attack hit the Hospital Simone Veil in Cannes (CHC-SV), impacting medical procedures and forcing personnel to return to pen and paper. Non-urgent surgical procedures and consultations scheduled at the time of the attack were postponed. The French […] "

Autosummary: LockBit published data stolen from Simone Veil hospital in Cannes Pierluigi Paganini May 03, 2024 May 03, 2024 LockBit ransomware operators have published sensitive data allegedly stolen from the Simone Veil hospital in Cannes. "


REvil hacker behind Kaseya ransomware attack gets 13 years in prison

exploits ransomware
2024-05-02 https://www.bleepingcomputer.com/news/security/revil-hacker-behind-kaseya-ransomware-attack-gets-13-years-in-prison/
Yaroslav Vasinskyi, a Ukrainian national, was sentenced to 13 years and seven months in prison and ordered to pay $16 million in restitution for his involvement in the REvil ransomware operation. [...] "

Autosummary: REvil was one of the most successful ransomware operations in recent history, reaching its peak in 2021 with the Kaseya MSP supply-chain attack, a $50 million ransom demand from computer maker Acer, and blueprint leaks of unreleased upcoming Apple devices. "


French hospital CHC-SV refuses to pay LockBit extortion demand

ransomware
2024-05-01 https://www.bleepingcomputer.com/news/security/french-hospital-chc-sv-refuses-to-pay-lockbit-extortion-demand/
The Hôpital de Cannes - Simone Veil (CHC-SV) in France announced it received a ransom demand from the Lockbit 3.0 ransomware gang, saying they refuse to pay the ransom. [...] "

Autosummary: "


Sweden’s liquor supply severely impacted by ransomware attack on logistics company

exploits ransomware industry
2024-04-26 https://securityaffairs.com/162333/cyber-crime/swedens-liquor-supply-ransomware-attack.html
A ransomware attack on a Swedish logistics company Skanlog severely impacted the country’s liquor supply.  Skanlog, a critical distributor for Systembolaget, the Swedish government-owned retail chain suffered a ransomware attack. Systembolaget has a monopoly on the sale of alcoholic beverages containing more than 3.5% alcohol by volume. It operates stores across Sweden and is responsible […] "

Autosummary: Sweden’s liquor supply severely impacted by ransomware attack on logistics company Pierluigi Paganini April 26, 2024 April 26, 2024 A ransomware attack on a Swedish logistics company Skanlog severely impacted the country’s liquor supply. "


“Junk gun” ransomware: the cheap new threat to small businesses

exploits ransomware
2024-04-25 https://www.tripwire.com/state-of-security/junk-gun-ransomware-cheap-new-threat-small-businesses
A wave of cheap, crude, amateurish ransomware has been spotted on the dark web - and although it may not make as many headlines as LockBit, Rhysida, and BlackSuit, it still presents a serious threat to organizations. Read more in my article on the Tripwire State of Security blog. "

Autosummary: Image Other "junk gun" ransomware examples include Diablo, Evil Extractor, Yasmha, HardShield, Jigsaw, LoliCrypt, and CatLogs. "


City street lights “misbehave” after ransomware attack

exploits government ransomware
2024-04-24 https://www.bitdefender.com/blog/hotforsecurity/city-street-lights-misbehave-after-ransomware-attack/
The UK"s Leicester City Council was thrown into chaos last month when a crippling cyber attack forced it to shut down its IT systems and phone lines. But the ransomware attack also had a more unusual impact... Read more in my article on the Hot for Security blog. "

Autosummary: Hopefully, Leicester City Council will manage to turn off its lights and continue to recover from all of the impact of its unfortunate ransomware attack in time, and provide support for any individuals and organisations who have been impacted by the data leak. "


Global attacker median dwell time continues to fall

ransomware
2024-04-24 https://www.helpnetsecurity.com/2024/04/24/2023-attacker-dwell-time/

While the use of zero-day exploits is on the rise, Mandiant’s M-Trends 2024 report reveals a significant improvement in global cybersecurity posture: the global median dwell time – the time attackers remain undetected within a target environment – has reached its lowest point in over a decade. The metrics reported in M-Trends 2024 are based on Mandiant Consulting investigations of targeted attack activity conducted between January 1, 2023 and December 31, 2023. Global cybersecurity shows … More

The post Global attacker median dwell time continues to fall appeared first on Help Net Security.

"

Autosummary: Following this sector were business and professional services (13%), high technology (12%), retail and hospitality (9%), and healthcare (8%). Attacker median dwell time varies by region Organizations in the Asia-Pacific (JAPAC) region experienced the most dramatic decrease, reducing their median dwell time to 9 days, compared to 33 days in 2022. "


Smashing Security podcast #369: Keeping the lights on after a ransomware attack

exploits ransomware
2024-04-24 https://grahamcluley.com/smashing-security-podcast-369/
Leicester City Council suffers a crippling ransomware attack, and a massive data breach, but is it out of the dark yet? And as election fever hits India we take a close eye at deepfakery. All this and more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault. "

Autosummary: Hosts: Graham Cluley – @gcluley Carole Theriault – @caroletheriault Episode links: Sponsored by: Sonrai’s Cloud Permissions Firewall – A one-click solution to least privilege without disrupting DevOps. "


Behavioral patterns of ransomware groups are changing

exploits ransomware
2024-04-23 https://www.helpnetsecurity.com/2024/04/23/ransomware-groups-activity-q1-2024/

Q1 saw substantial shifts in activity from some of the most prolific Ransomware-as-a-Service (RaaS) groups, according to GuidePoint Security. RaaS groups attempt to recruit disaffected or displaced affiliates In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such … More

The post Behavioral patterns of ransomware groups are changing appeared first on Help Net Security.

"

Autosummary: RaaS groups attempt to recruit disaffected or displaced affiliates In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. "


Align introduces ransomware prevention feature, powered by Adlumin

exploits ransomware
2024-04-23 https://www.helpnetsecurity.com/2024/04/23/align-guardian/

Align announces the inclusion of a new ransomware prevention feature to enhance its Align Guardian Managed Detection and Response offering powered by Adlumin. This innovative solution is designed to detect and halt ransomware in its tracks, safeguarding files from encryption and providing organizations with the peace of mind to focus on their core business operations. The solution demonstrated incredible success in benchmark tests amongst the most notorious ransomware groups, saving on average 99% of files … More

The post Align introduces ransomware prevention feature, powered by Adlumin appeared first on Help Net Security.

"

Autosummary: "


Veeam acquires Coveware to boost its ransomware protection capabilities

exploits ransomware
2024-04-23 https://www.helpnetsecurity.com/2024/04/23/veeam-coveware-acquisition/

Veeam Software announced the acquisition of Coveware, a provider in cyber-extortion incident response. It brings ransomware recovery and first responder capabilities to further strengthen Veeam’s radical resilience solutions for customers. Coveware by Veeam will continue to operate as it does today, providing incident response services to victims of cyber extortion attacks as well as working proactively with enterprise customers on incident response preparedness. Since its founding in 2018, Coveware has helped thousands of cyber extortion … More

The post Veeam acquires Coveware to boost its ransomware protection capabilities appeared first on Help Net Security.

"

Autosummary: Coveware by Veeam Coveware by Veeam will continue to be available to customers as a full-featured offering, including: Fully automated technology that runs across the client’s operational environment to perform forensic triage analysis which assesses any impact, identifies the ransomware (strain, threat actor group, entry point), and helps recover encrypted data from known ransomware groups – though nothing is as safe as secure, clean backups. Veeam will also incorporate elements of Coveware technology into the Veeam Data Platform and through the Veeam Cyber Secure Program, which provides customers with cyber protection and support including pre, during and post-support of cyber incidents, and a $5 million warranty. "


UnitedHealth confirms it paid ransomware gang to stop data leak

exploits ransomware
2024-04-23 https://www.bleepingcomputer.com/news/security/unitedhealth-confirms-it-paid-ransomware-gang-to-stop-data-leak/
The UnitedHealth Group has confirmed that it paid a ransom to cybercriminals to protect sensitive data stolen during the Optum ransomware attack in late February. [...] "

Autosummary: “Based on initial targeted data sampling to date, the company has found files containing protected health information (PHI) or personally identifiable information (PII), which could cover a substantial proportion of people in America,” reads the announcement. "


Pentera"s 2024 Report Reveals Hundreds of Security Events per Week, Highlighting the Criticality of Continuous Validation

ransomware
2024-04-22 https://thehackernews.com/2024/04/penteras-2024-report-reveals-hundreds.html
Over the past two years, a shocking 51% of organizations surveyed in a leading industry report have been compromised by a cyberattack. Yes, over half.  And this, in a world where enterprises deploy an average of 53 different security solutions to safeguard their digital domain.  Alarming? Absolutely. A recent survey of CISOs and CIOs, commissioned by Pentera and "

Autosummary: What do These Findings Mean? The State of Pentesting Survey of 2024, by Pentera, underscores a critical juncture for cybersecurity: As threats continue to evolve, many security solutions fail to mitigate them, requiring CISOs to more consistently validate the security of their infrastructure. Key findings include: The impact of a breach is high: 43% reported unplanned downtime 36% reported data exposure 31% reported financial loss As Board of Directors (BoDs) become more cyber aware, over 50% of CISOs now share their pentesting reports with their BoDs . Security Breaches Persist Despite Investments The 2024 report reveals that enterprises have an average of 53 security solutions, yet they are struggling to maintain the Confidentiality, Integrity, Availability (CIA) triad. "


Synlab Italia suspends operations following ransomware attack

exploits ransomware
2024-04-22 https://www.bleepingcomputer.com/news/security/synlab-italia-suspends-operations-following-ransomware-attack/
Synlab Italia has suspended all its medical diagnostic and testing services after a ransomware attack forced its IT systems to be taken offline. [...] "

Autosummary: "In these hours, the SYNLAB task force is being analyzed for every single portion of the IT infrastructure, including backup systems, in order to restore the systems safely as soon as possible," reads the status update. "


Akira ransomware received $42M in ransom payments from over 250 victims

exploits ransomware
2024-04-21 https://securityaffairs.com/162098/cyber-crime/akira-ransomware-report-fbi.html
Government agencies revealed that Akira ransomware has breached over 250 entities worldwide and received over $42 million in ransom payments. A joint advisory published by CISA, the FBI, Europol, and the Netherlands’ National Cyber Security Centre (NCSC-NL) revealed that since early 2023, Akira ransomware operators received $42 million in ransom payments from more than 250 […] "

Autosummary: A joint advisory published by CISA, the FBI, Europol, and the Netherlands’ National Cyber Security Centre (NCSC-NL) revealed that since early 2023, Akira ransomware operators received $42 million in ransom payments from more than 250 victims worldwide. "


Akira Ransomware Gang Extorts $42 Million; Now Targets Linux Servers

exploits ransomware Linux
2024-04-19 https://thehackernews.com/2024/04/akira-ransomware-gang-extorts-42.html
Threat actors behind the Akira ransomware group have extorted approximately $42 million in illicit proceeds after breaching the networks of more than 250 victims as of January 1, 2024. "Since March 2023, Akira ransomware has impacted a wide range of businesses and critical infrastructure entities in North America, Europe, and Australia," cybersecurity agencies from the Netherlands and the U.S., "

Autosummary: "Away from the complex infrastructure of modern ransomware, junk-gun ransomware allows criminals to get in on the action cheaply, easily, and independently," Sophos said, describing it as a "relatively new phenomenon" that further lowers the cost of entry. "Since March 2023, Akira ransomware has impacted a wide range of businesses and critical infrastructure entities in North America, Europe, and Australia," cybersecurity agencies from the Netherlands and the U.S., along with Europol"s European Cybercrime Centre (EC3), said in a joint alert. "


HelloKitty ransomware rebrands, releases CD Projekt and Cisco data

exploits ransomware
2024-04-19 https://www.bleepingcomputer.com/news/security/hellokitty-ransomware-rebrands-releases-cd-projekt-and-cisco-data/
An operator of the HelloKitty ransomware operation announced they changed the name to "HelloGookie," releasing passwords for previously leaked CD Projekt source code, Cisco network information, and decryption keys from old attacks.. [...] "

Autosummary: To celebrate the launch, the threat actor released four private decryption keys that can be used to decrypt files in older attacks, as well as internal information stolen from Cisco in a 2022 attack and passwords for the leaked source code for Gwent, Witcher 3, and Red Engine stolen from CD Projekt in 2021. "


United Nations agency investigates ransomware attack, data theft

exploits ransomware
2024-04-19 https://www.bleepingcomputer.com/news/security/united-nations-agency-investigates-ransomware-attack-claimed-by-8Base-gang/
​The United Nations Development Programme (UNDP) is investigating a cyberattack after threat actors breached its IT systems to steal human resources data. [...] "

Autosummary: UNDP entry on 8Base"s leak site (BleepingComputer) ​The files they temporarily leaked via a now-expired link allegedly include "a huge amount of confidential information," personal data, accounting data, certificates, employment contracts, confidentiality agreements, invoices, receipts, and more. "


The Week in Ransomware - April 19th 2024 - Attacks Ramp Up

exploits ransomware
2024-04-19 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-april-19th-2024-attacks-ramp-up/
While ransomware attacks decreased after the LockBit and BlackCat disruptions, they have once again started to ramp up with other operations filling the void. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @billtoulas, @BleepinComputer, @Ionut_Ilascu, @serghei, @fwosar, @LawrenceAbrams, @malwrhunterteam, @demonslay335, @Seifreed, @pcrisk, @SophosXOps, @jgreigj, @JessicaHrdcstle, @3xp0rtblog, @AShukuhi, and @vxunderground. A Sophos X-Ops investigation finds that a wave of crude, cheap ransomware could spell trouble for small businesses and individuals – but also provide insights into threat actor career development and the wider threat landscape April 18th 2024 According to a joint advisory from the FBI, CISA, Europol"s European Cybercrime Centre (EC3), and the Netherlands" National Cyber Security Centre (NCSC-NL), the Akira ransomware operation has breached the networks of over 250 organizations and raked in roughly $42 million in ransom payments. "


Cheap ransomware for sale on dark web marketplaces is changing the way hackers operate

exploits ransomware
2024-04-18 https://www.helpnetsecurity.com/2024/04/18/junk-gun-cheap-ransomware-dark-web/

Since June 2023, Sophos X-Ops has discovered 19 junk gun ransomware variants — cheap, independently produced, and crudely constructed — on the dark web. The developers of these junk gun variants are attempting to disrupt the traditional affiliate-based ransomware-as-a-service (RaaS) model that has dominated the ransomware racket for nearly a decade. Instead of selling or buying ransomware to or as an affiliate, attackers create and sell unsophisticated variants for a one-time cost—which other attackers sometimes … More

The post Cheap ransomware for sale on dark web marketplaces is changing the way hackers operate appeared first on Help Net Security.

"

Autosummary: “Over the past two months, however, some of the biggest players in the ransomware ecosystem have disappeared or shut down, and, in the past, we’ve also seen ransomware affiliates vent their anger over the profit-sharing scheme of RaaS. Nothing within the cybercrime world stays static forever, and these cheap versions of off-the-shelf ransomware may be the next evolution in the ransomware ecosystem—especially for lower-skilled cyber attackers simply looking to make a profit rather than a name for themselves,” Budd concluded. "


Recover from Ransomware in 5 Minutes—We will Teach You How!

exploits ransomware
2024-04-18 https://thehackernews.com/2024/04/recover-from-ransomware-in-5-minuteswe.html
Super Low RPO with Continuous Data Protection:Dial Back to Just Seconds Before an Attack Zerto, a Hewlett Packard Enterprise company, can help you detect and recover from ransomware in near real-time. This solution leverages continuous data protection (CDP) to ensure all workloads have the lowest recovery point objective (RPO) possible. The most valuable thing about CDP is that it does not use "

Autosummary: With full automation and orchestration, a Zerto failover can achieve benefits like these: Thousands of VMs with an RTO of minutes Full re-IP of each VM, if required Restoring directly onto production-grade storage of your choice with no additional migrations required (such as Storage vMotion) Restoring directly back onto production-grade compute without any further steps such as vMotion This type of recovery is ideal for cyber recovery because large-scale recoveries can be difficult to achieve with backup tools that are not designed for recovery at scale. Real-time, in-line encryption detection helps identify anomalous activity, limit blast radius, and provide the earliest warning signal that an attack may be occurring.You can drill down to see the exact disk the anomalous activity is being generated from, allowing you to quickly identify infected machines, limit blast radius, and create a timeline of events to aid in investigations and forensics post-recovery, as shown in this image. "


Change Healthcare data for sale on dark web as fallout from ransomware attack spirals out of control

exploits ransomware
2024-04-18 https://www.bitdefender.com/blog/hotforsecurity/change-healthcare-data-for-sale-on-dark-web-as-fallout-from-ransomware-attack-spirals-out-of-control/
February"s crippling ransomware attack against Change Healthcare, which saw prescription orders delayed across the United States, continues to have serious consequences. Read more in my article on the Hot for Security blog. "

Autosummary: The cybercriminal group RansomHub published a portion of what it claims to be the many millions of patient records it stole in the attack on the dark web, including medical information, insurance records, and billing details. "


FBI: Akira ransomware raked in $42 million from 250+ victims

exploits ransomware
2024-04-18 https://www.bleepingcomputer.com/news/security/fbi-akira-ransomware-raked-in-42-million-from-250-plus-victims/
According to a joint advisory from the FBI, CISA, Europol"s European Cybercrime Centre (EC3), and the Netherlands" National Cyber Security Centre (NCSC-NL), the Akira ransomware operation has breached the networks of over 250 organizations and raked in roughly $42 million in ransom payments. [...] "

Autosummary: "


Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware

exploits ransomware Linux
2024-04-17 https://thehackernews.com/2024/04/critical-atlassian-flaw-exploited-to.html
Threat actors are exploiting unpatched Atlassian servers to deploy a Linux variant of Cerber (aka C3RB3R) ransomware. The attacks leverage CVE-2023-22518 (CVSS score: 9.1), a critical security vulnerability impacting the Atlassian Confluence Data Center and Server that allows an unauthenticated attacker to reset Confluence and create an administrator account. Armed with this access, a "

Autosummary: The development comes amid the emergence of new ransomware families like Evil Ant, HelloFire, L00KUPRU (an Xorist ransomware variant), Muliaka (based on the leaked Conti ransomware code), Napoli (a Chaos ransomware variant), Red CryptoApp, Risen, and SEXi (based on the leaked Babuk ransomware code) that have been spotted targeting Windows and VMware ESXi servers. "


Moldovan charged for operating botnet used to push ransomware

exploits ransomware
2024-04-17 https://www.bleepingcomputer.com/news/security/moldovan-charged-for-operating-botnet-used-to-push-ransomware/
The U.S. Justice Department charged Moldovan national Alexander Lefterov, the owner and operator of a large-scale botnet that infected thousands of computers across the United States. [...] "

Autosummary: "


Linux variant of Cerber ransomware targets Atlassian servers

exploits ransomware Linux
2024-04-17 https://securityaffairs.com/161962/cyber-crime/cerber-ransomware-cve-2023-22518-atlassian.html
Threat actors are exploiting the CVE-2023-22518 flaw in Atlassian servers to deploy a Linux variant of Cerber (aka C3RB3R) ransomware. At the end of October 2023, Atlassian warned of a critical security flaw, tracked as CVE-2023-22518 (CVSS score 9.1), that affects all versions of Confluence Data Center and Server. The vulnerability is an improper authorization issue that can lead to […] "

Autosummary: The agttydck malware, written in C++ and packed with UPX, performs several malicious actions: it logs activity in “/tmp/log.0” at startup and “/tmp/log.1” at completion, searches the root directory for encryptable directories, drops a ransom note in each directory, and encrypts all files, appending a “.L0CK3D” extension.Linux variant of Cerber ransomware targets Atlassian servers Pierluigi Paganini April 17, 2024 April 17, 2024 Threat actors are exploiting the CVE-2023-22518 flaw in Atlassian servers to deploy a Linux variant of Cerber (aka C3RB3R) ransomware. "


#StopRansomware: Akira Ransomware

exploits ransomware
2024-04-17 https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-109a

SUMMARY

Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

The United States’ Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Europol’s European Cybercrime Centre (EC3), and the Netherlands’ National Cyber Security Centre (NCSC-NL) are releasing this joint CSA to disseminate known Akira ransomware IOCs and TTPs identified through FBI investigations and trusted third party reporting as recently as February 2024.

Since March 2023, Akira ransomware has impacted a wide range of businesses and critical infrastructure entities in North America, Europe, and Australia. In April 2023, following an initial focus on Windows systems, Akira threat actors deployed a Linux variant targeting VMware ESXi virtual machines. As of January 1, 2024, the ransomware group has impacted over 250 organizations and claimed approximately $42 million (USD) in ransomware proceeds.

Early versions of the Akira ransomware variant were written in C++ and encrypted files with a .akira extension; however, beginning in August 2023, some Akira attacks began deploying Megazord, using Rust-based code which encrypts files with a .powerranges extension.  Akira threat actors have continued to use both Megazord and Akira, including Akira_v2 (identified by trusted third party investigations) interchangeably.

The FBI, CISA, EC3, and NCSC-NL encourage organizati "

Autosummary: The FBI, CISA, EC3, and NCSC-NL do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document.To establish command and control channels, threat actors leverage readily available tools like AnyDesk, MobaXterm, RustDesk, Ngrok, and Cloudflare Tunnel, enabling exfiltration through various protocols such as File Transfer Protocol (FTP), Secure File Transfer Protocol (SFTP), and cloud storage services like Mega Additional details of interest include: a targeted company point of contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, and host- and network-based indicators.SoftPerfect A network scanner ( netscan.exe ) used to ping computers, scan ports, discover shared folders, and retrieve information about network devices via Windows Management Instrumentation (WMI), Simple Network Management Protocol (SNMP), HTTP, Secure Shell (SSH) and PowerShell.Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by the FBI or CISA. VALIDATE SECURITY CONTROLS In addition to applying mitigations, the FBI, CISA, EC3, and NCSC-NL recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The FBI is interested in any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with Akira threat actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.Previous versions of the encryptor provided options to insert arguments at runtime, including: -p --encryption_path (targeted file/folder paths) -s --share_file (targeted network drive path) -n --encryption_percent (percentage of encryption) --fork (create a child process for encryption The ability to insert additional threads allows Akira threat actors to have more granular control over the number of CPU cores in use, increasing the speed and efficiency of the encryption process.[T1133], spear phishing [T1566.001][T1566.002], and the abuse of valid credentials[T1078].[4] Persistence and Discovery Once initial access is obtained, Akira threat actors attempt to abuse the functions of domain controllers by creating new domain accounts [T1136.002] to establish persistence. MITIGATIONS Network Defenders The FBI, CISA, EC3, and NCSC-NL recommend organizations apply the following mitigations to limit potential adversarial use of common system and network discovery techniques, and to reduce the risk of compromise by Akira ransomware.A tool used to acquire detailed process and system information [T1082].[7] PowerShell A cross-platform task automation solution made up of a command line shell, a scripting language, and a configuration management framework, which runs on Windows, Linux, and macOS. The United States’ Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Europol’s European Cybercrime Centre (EC3), and the Netherlands’ National Cyber Security Centre (NCSC-NL) are releasing this joint CSA to disseminate known Akira ransomware IOCs and TTPs identified through FBI investigations and trusted third party reporting as recently as February 2024. The FBI, CISA, EC3, and NCSC-NL recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory. Exfiltration and Impact Akira threat actors leverage tools such as FileZilla, WinRAR [T1560.001], WinSCP, and RClone to exfiltrate data [T1048]. "


Zarf: Open-source continuous software delivery on disconnected networks

ransomware
2024-04-15 https://www.helpnetsecurity.com/2024/04/15/zarf-open-source-continuous-software-delivery-on-disconnected-networks/

Zarf is a free, open-source tool that enables continuous software delivery on disconnected networks. It currently offers fully automated support for K3s, K3d, and Kind and is also compatible with EKS, AKS, GKE, RKE2, and many other distro services. The Zarf CLI, a statically compiled binary, operates independently without any dependencies, ensuring it runs smoothly on any machine. Unlike proprietary software, Zarf avoids vendor lock-in, allowing easy removal and manual deployment. The tool excels in … More

The post Zarf: Open-source continuous software delivery on disconnected networks appeared first on Help Net Security.

"

Autosummary: "


Daixin ransomware gang claims attack on Omni Hotels

exploits ransomware
2024-04-15 https://www.bleepingcomputer.com/news/security/daixin-ransomware-gang-claims-attack-on-omni-hotels/
The Daixin Team ransomware gang claimed a recent cyberattack on Omni Hotels & Resorts and is now threatening to publish customers" sensitive information if a ransom is not paid. [...] "

Autosummary: " Omni Hotels Daixin Team leak (BleepingComputer) In October 2022, CISA, the FBI, and the Department of Health and Human Services (HHS) warned the Daixin Team cybercrime gang was targeting the U.S. Healthcare and Public Health (HPH) sector in ransomware attacks. "


Chipmaker Nexperia confirms breach after ransomware gang leaks data

exploits ransomware
2024-04-15 https://www.bleepingcomputer.com/news/security/chipmaker-nexperia-confirms-breach-after-ransomware-gang-leaks-data/
Dutch chipmaker Nexperia confirmed late last week that hackers breached its network in March 2024 after a ransomware gang leaked samples of allegedly stolen data. [...] "

Autosummary: 41.5 GB of corporate data, including HR, employee personal details, passports, NDAs, etc. 109 GB of client and user data, including brands such as SpaceX, IBM, Apple, and Huawei. "


Optics giant Hoya hit with $10 million ransomware demand

exploits ransomware industry
2024-04-11 https://www.bleepingcomputer.com/news/security/optics-giant-hoya-hit-with-10-million-ransomware-demand/
A recent cyberattack on Hoya Corporation was conducted by the "Hunters International" ransomware operation, which demanded a $10 million ransom for a file decryptor and not to release files stolen during the attack. [...] "

Autosummary: Hunters International is a Ransomware-as-a-Service (RaaS) operation that emerged in mid-2023, whose encryptor shares code with the Hive ransomware operation, indicating a possible rebrand. "


East Central University suffers BlackSuit ransomware attack

exploits ransomware
2024-04-11 https://www.bitdefender.com/blog/hotforsecurity/east-central-university-suffers-blacksuit-ransomware-attack/
The East Central University (ECU) of Ada, Oklahoma, has revealed that a ransomware gang launched an attack against its systems that left some computers and servers encrypted and may have also seen sensitive information stolen. Read more in my article on the Hot for Security blog. "

Autosummary: "


DragonForce ransomware – what you need to know

exploits ransomware
2024-04-11 https://www.tripwire.com/state-of-security/dragonforce-ransomware-what-you-need-know
Learn more about the DragonForce ransomware - how it came to prominence, and some of the unusual tactics used by the hackers who extort money from companies with it. Read more in my article on the Tripwire State of Security blog. "

Autosummary: The similar names should not, of course, be considered proof of a connection - and it"s always possible that the name of DragonForce has been chosen intentionally by the ransomware gang to lead investigators off the scent, or as a piece of mischief-making. Like many other ransomware groups, DragonForce attempts to extort money from its victims in two ways - locking companies out of their computers and data through encryption, and exfiltrating data from compromised systems with the threat of releasing it to others via the dark web. "


New ransomware group demands Change Healthcare ransom

exploits ransomware
2024-04-10 https://www.malwarebytes.com/blog/threats/2024/04/new-ransomware-group-demands-change-healthcare-ransom
The Change Healthcare ransomware attack as suffered a third cruel twist. "

Autosummary: A new ransomware group, RansomHub, has listed the organisation as a victim on its dark web leak site, saying it has 4 TB of “highly selective data,” which relates to “all Change Health clients that have sensitive data being processed by the company.”Once you’ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again. ALPHV used the ransomware-as-a-service (RaaS) business model, selling the software and infrastructure used to carry out ransomware attacks to criminal gangs known as affiliates, in return for a share of the ransoms they extorted. "


New ransomware group demands Change Healthcare ransom

exploits ransomware
2024-04-10 https://www.malwarebytes.com/blog/ransomware/2024/04/new-ransomware-group-demands-change-healthcare-ransom
The Change Healthcare ransomware attack as suffered a third cruel twist. "

Autosummary: A new ransomware group, RansomHub, has listed the organisation as a victim on its dark web leak site, saying it has 4 TB of “highly selective data,” which relates to “all Change Health clients that have sensitive data being processed by the company.”Once you’ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again. ALPHV used the ransomware-as-a-service (RaaS) business model, selling the software and infrastructure used to carry out ransomware attacks to criminal gangs known as affiliates, in return for a share of the ransoms they extorted. "


CL0P"s Ransomware Rampage - Security Measures for 2024

exploits ransomware
2024-04-09 https://thehackernews.com/2024/04/cl0ps-ransomware-rampage-security.html
2023 CL0P Growth  Emerging in early 2019, CL0P was first introduced as a more advanced version of its predecessor the ‘CryptoMix’ ransomware, brought about by its owner CL0P ransomware, a cybercrime organisation. Over the years the group remained active with significant campaigns throughout 2020 to 2022. But in 2023 the CL0P ransomware gang took itself to new heights and became one of the "

Autosummary: CL0P was able to capitalize on vulnerable networks and systems extremely quickly, extracting sensitive data from some of the world"s largest organizations (BBC, Ernst Young, PwC, Gen Digital, British Airways, TFL, Siemens, and many more). Those at greater risk, for instance, those in industries specifically targeted by CLOP (Finance, Manufacturing, Healthcare), or those that hold sensitive data, should work with an MSSP to ensure that the best security practices are in place. CL0P operates a Ransomware-as-a-Service model (RaaS), which frequently employs the "steal, encrypt, and leak" tactics common worldwide among many ransomware affiliates. "


GHC-SCW: Ransomware gang stole health data of 533,000 people

exploits ransomware
2024-04-09 https://www.bleepingcomputer.com/news/security/ghc-scw-ransomware-gang-stole-health-data-of-533-000-people/
Non-profit healthcare service provider Group Health Cooperative of South Central Wisconsin (GHC-SCW) has disclosed that a ransomware gang breached its network in January and stole documents containing the personal and medical information of over 500,000 individuals. [...] "

Autosummary: " Health data stolen during the January ransomware attack includes affected individuals" names, addresses, telephone numbers, e-mail addresses, dates of birth and/or deaths, social security numbers, member numbers, and Medicare and/or Medicaid numbers. "


How can the energy sector bolster its resilience to ransomware attacks?

exploits ransomware industry
2024-04-08 https://www.helpnetsecurity.com/2024/04/08/energy-sector-attacks-resilience/

Since it plays a vital role in every functioning society, the energy sector has always been a prime target for state-backed cybercriminals. The cyber threats targeting this industry have grown significantly in recent years, as geopolitical tensions have fueled an increase in state-sponsored cyber espionage. According to one report on OT/ICS cyber security incidents, the energy sector recorded 39% of all attacks, with nearly 60% of these attacks attributed to state-affiliated groups. As well as … More

The post How can the energy sector bolster its resilience to ransomware attacks? appeared first on Help Net Security.

"

Autosummary: Moreover, energy providers still rely on ageing OT assets like industrial control systems (ICS), supervisory control and data acquisition (SCADA) systems, and programmable logic controllers (PLCs). The critical threat of ransomware In 2023, we saw an increase in ransomware attacks against the energy industry including nuclear, oil, and gas facilities. "


How malicious email campaigns continue to slip through the cracks

ransomware
2024-04-08 https://www.helpnetsecurity.com/2024/04/08/email-remains-predominant-target-video/

In this Help Net Security video, Josh Bartolomie, VP of Global Threat Services at Cofense, discusses how email will remain a target as long as it remains the predominant form of communication within a business. Cofense researchers have found that malicious email threats bypassing secure email gateways (SEGs) increased over 100% in the past year. Furthermore, threat actors are enhancing their sophistication, successfully circumventing conventional email security measures. They are adopting novel attack vectors, including … More

The post How malicious email campaigns continue to slip through the cracks appeared first on Help Net Security.

"

Autosummary: "


The Drop in Ransomware Attacks in 2024 and What it Means

exploits ransomware
2024-04-08 https://thehackernews.com/2024/04/the-drop-in-ransomware-attacks-in-2024.html
The ransomware industry surged in 2023 as it saw an alarming 55.5% increase in victims worldwide, reaching a staggering 5,070. But 2024 is starting off showing a very different picture. While the numbers skyrocketed in Q4 2023 with 1309 cases, in Q1 2024, the ransomware industry was down to 1,048 cases. This is a 22% decrease in ransomware attacks compared to Q4 2023. Figure "

Autosummary: They released a statement on Tox. "ФБР уебали сервера через PHP, резервные сервера без PHP не тронуты" "The FBI fu$%#d up servers using PHP, backup servers without PHP are not touched" Shortly after the group continued its global onslaught against organizations, maintaining its position as a dominant force in the realm of ransomware operations. The Impact of the ALPHV Takedown In a major blow to the ransomware industry, the FBI announced on December 19th, 2023, that they had disrupted the ALPHV/BlackCat ransomware group. "


HTTP/2 CONTINUATION Flood technique can be exploited in DoS attacks

exploits ransomware
2024-04-05 https://securityaffairs.com/161520/security/http-2-continuation-flood-attack.html
HTTP/2 CONTINUATION Flood: Researchers warn of a new HTTP/2 vulnerability that can be exploited to conduct powerful denial-of-service (DoS) attacks. HTTP messages can contain named fields in both header and trailer sections. CERT/CC experts explained that both header and trailer fields are serialized as field blocks in HTTP/2 to transmit them in multiple fragments to […] "

Autosummary: CVE-2024-28182 – An implementation using the nghttp2 library will continue to receive CONTINUATION frames, and will not callback to the application to allow visibility into this information before it resets the stream, resulting in a DoS. CVE-2024-27316 – HTTP/2 CONTINUATION frames without the END_HEADERS flag set can be sent in a continuous stream by an attacker to an Apache Httpd implementation, which will not properly terminate the request early.The Go packages net/http and net/http2 packages do not limit the number of CONTINUATION frames read for an HTTP/2 request, which permits an attacker to provide an arbitrarily large set of headers for a single request, that will be read, decoded, and subsequently discarded, which may result in excessive CPU consumption. "


Panera Bread week-long IT outage caused by ransomware attack

exploits ransomware
2024-04-05 https://www.bleepingcomputer.com/news/security/panera-bread-week-long-it-outage-caused-by-ransomware-attack/
Panera Bread"s recent week-long outage was caused by a ransomware attack, according to people familiar with the matter and emails seen by BleepingComputer. [...] "

Autosummary: Panera Bread suffered the massive outage on March 22, impacting its internal IT systems, phones, point of sales system, website, and mobile apps. "


The Week in Ransomware - April 5th 2024 - Virtual Machines under Attack

exploits ransomware
2024-04-05 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-april-5th-2024-virtual-machines-under-attack/
Ransomware attacks targeting VMware ESXi and other virtual machine platforms are wreaking havoc among the enterprise, causing widespread disruption and loss of services. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @fwosar, @LawrenceAbrams, @billtoulas, @BleepinComputer, @serghei, @Ionut_Ilascu, @Seifreed, @malwrhunterteam, @demonslay335, @1ZRR4H, @BushidoToken, @pcrisk, @JakubKroustek, @AJVicens, @TrendMicro, @AlexMartin, @jgreigj, @TheDFIRReport, @SonicWall, and @CSIRTGOB. April 2nd 2024 Omni Hotels & Resorts has been experiencing a chain-wide outage that brought down its IT systems on Friday, impacting reservation, hotel room door lock, and point-of-sale (POS) systems. Similarly, Omni Hotels suffered a massive outage, which took down the company"s reservation system, phones, and door lock system. "


Jackson County, Missouri, discloses a ransomware attack

exploits government ransomware
2024-04-04 https://securityaffairs.com/161453/cyber-crime/jackson-county-missouri-ransomware.html
Jackson County, Missouri, confirmed that a ransomware attack has disrupted several county services. A ransomware attack disrupted several services of the Jackson County, Missouri. The County Executive Frank White, Jr. declared a state of emergency. “Jackson County has confirmed a ransomware attack was responsible for the disruption of several county services today.” reads the statement […] "

Autosummary: Pierluigi Paganini April 04, 2024 April 04, 2024 Jackson County, Missouri, confirmed that a ransomware attack has disrupted several county services. "


What makes a ransomware attack eight times as costly? Compromised backups

exploits ransomware
2024-04-04 https://www.exponential-e.com/blog/what-makes-a-ransomware-attack-eight-times-as-costly
New research has found that ransomware remediation costs can explode when backups have been compromised by malicious hackers - with overall recovery costs eight times higher than for those whose backups are not impacted. Read more in my article on th Exponential-e blog. "

Autosummary: "


Jackson County hit by ransomware, declares state of emergency

exploits government ransomware
2024-04-04 https://www.malwarebytes.com/blog/news/2024/04/jackson-county-hit-by-ransomware-declares-state-of-emergency
Jackson County has suffered "significant disruptions within its IT systems," and its offices are closed. "

Autosummary: Offices will be closed until further notice.https://t.co/kyRMmwtiTj pic.twitter.com/piOt3khPK8 — Jackson County MO (@JacksonCountyMO) April 2, 2024 The tweet explains that the attack has affected systems dealing with “tax payments and online property, marriage license and inmate searches,” and says that “the Assessment, Collection and Recorder of Deeds offices at all County locations will be closed until further notice.”Once you’ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again. "


Hosting firm"s VMware ESXi servers hit by new SEXi ransomware

exploits ransomware
2024-04-03 https://www.bleepingcomputer.com/news/security/hosting-firms-vmware-esxi-servers-hit-by-new-sexi-ransomware/
Chilean data center and hosting provider IxMetro Powerhost has suffered a cyberattack at the hands of a new ransomware gang known as SEXi, which encrypted the company"s VMware ESXi servers and backups. [...] "

Autosummary: On Monday, PowerHost"s Chile division, IxMetro, warned customers that it suffered a ransomware attack early Saturday morning that encrypted some of the company"s VMware ESXi servers that are used to host virtual private servers for customers. "


Jackson County in state of emergency after ransomware attack

exploits government ransomware
2024-04-03 https://www.bleepingcomputer.com/news/security/jackson-county-in-state-of-emergency-after-ransomware-attack/
Jackson County, Missouri, is in a state of emergency after a ransomware attack took down some county services on Tuesday. [...] "

Autosummary: "All county staff are to take whatever steps are necessary to protect resident data, county assets, and continue essential services, thereby mitigating the impact of" the ransomware attack," White said [PDF]. "


NHS Scotland confirms ransomware attackers leaked patients’ data

exploits ransomware
2024-03-28 https://www.helpnetsecurity.com/2024/03/28/nhs-scotland-ransomware/

NHS Dumfries and Galloway (part of NHS Scotland) has confirmed that a “recognised ransomware group” was able to “access a significant amount of data including patient and staff-identifiable information,” and has published “clinical data relating to a small number of patients.” “NHS DG still holds the original files and they have not been altered or deleted. Some information has been copied and leaked. NHS DG will contact everyone whose information is known to have been … More

The post NHS Scotland confirms ransomware attackers leaked patients’ data appeared first on Help Net Security.

"

Autosummary: On Tuesday, the group released a “proof pack” consisting of a handful of sensitive documents (reports, analysis results, and letters between patients and physicians), to incentivize the board to pay the ransom in exchange for keeping the stolen data under wraps. "


3 important lessons from a devastating ransomware attack

exploits ransomware
2024-03-25 https://www.malwarebytes.com/blog/ransomware/2024/03/3-important-lessons-from-a-devastating-ransomware-attack
Three things you could learn from the cyber incident review produced by the British Library following its October ransomware attack. "

Autosummary: As important as monitoring technologies like SIEM, EDR and MDR have become, it remains as true today as it ever has that every endpoint and server, whether they’re Windows, Macs, or Linux machines, needs a next-gen antivirus engine that can detect and stop known threats and block suspicious behaviour, such as malicious encryption. The library, a vast repository of over 170 million items, is still deep in the recovery process, but recently released an eighteen page cyber incident review describing the attack, its impact, the aftermath, and the lessons learned. "


Smashing Security podcast #364: Bing pop-up wars, and the British Library ransomware scandal

exploits ransomware
2024-03-21 https://grahamcluley.com/smashing-security-podcast-364/
There"s a Bing ding dong, after Microsoft (over?) enthusiastically encourages Chrome users to stop using Google, and silence hits the British Library as it shares its story of a ransomware attack. All this and more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault. Plus: Don"t miss our featured interview with Kolide founder Jason Meller about his firm"s acquisition by 1Password. "

Autosummary: Hosts: Graham Cluley – @gcluley Carole Theriault – @caroletheriault Episode links: Sponsored by: Kiteworks – Step into the future of secure managed file transfer with Kiteworks. "


What the Latest Ransomware Attacks Teach About Defending Networks

exploits ransomware
2024-03-21 https://www.bleepingcomputer.com/news/security/what-the-latest-ransomware-attacks-teach-about-defending-networks/
Recent ransomware attacks have shared valuable lessons on how to limit risk to your own networks. Learn from Blink Ops about how organizations can limit their ransomware risk. [...] "

Autosummary: Ransomware-focused automated workflows can scan files for malware and detonate them in a safe sandbox environment, deploy countermeasures instantly, verify employees have installed important tools like EDR systems on their devices, and perform other tasks much more efficiently than with manual efforts. Blink automated workflow: Isolate or unisolated a device on CrowdStrike Properly Encrypt Sensitive Data One of the defining shifts in ransomware gangs’ operations over the last few years is becoming more data-focused. What Organizations Can Do to Limit Ransomware Risk With the onslaught of ransomware attacks companies face and the ever-evolving tactics deployed by hackers, reducing your risks against this nefarious cyber threat calls for multiple layers of defense. Have a Solid Backup Strategy While encrypting important files prevents ransomware gangs from blackmailing you with the threat of publishing sensitive data, you’ll likely still want access to those files. "


TeamCity Flaw Leads to Surge in Ransomware, Cryptomining, and RAT Attacks

exploits government ransomware
2024-03-20 https://thehackernews.com/2024/03/teamcity-flaw-leads-to-surge-in.html
Multiple threat actors are exploiting the recently disclosed security flaws in JetBrains TeamCity software to deploy ransomware, cryptocurrency miners, Cobalt Strike beacons, and a Golang-based remote access trojan called Spark RAT. The attacks entail the exploitation of CVE-2024-27198 (CVSS score: 9.8) that enables an adversary to bypass authentication measures and gain administrative "

Autosummary: " According to statistics published by NCC Group, the total number of ransomware cases in February 2024 increased by 46% from January, up from 285 to 416, led by LockBit (33%), Hunters (10%), BlackCat (9%), Qilin (9%), BianLian (8%), Play (7%), and 8Base (7%). "


Scranton School District in Pennsylvania suffered a ransomware attack

exploits ransomware
2024-03-16 https://securityaffairs.com/160542/cyber-crime/scranton-school-district-ransomware-attack.html
School districts continue to be under attack, schools in Scranton, Pennsylvania, are suffering a ransomware attack. This week, schools in Scranton, Pennsylvania, experienced a ransomware attack, resulting in IT outages. The Scranton School District is working with third-party forensic specialists to investigate the security breach and restore impacted systems. “The attack is causing a temporary […] "

Autosummary: Scranton School District in Pennsylvania suffered a ransomware attack Pierluigi Paganini March 16, 2024 March 16, 2024 School districts continue to be under attack, schools in Scranton, Pennsylvania, are suffering a ransomware attack. "


IT leaders think immutable data storage is an insurance policy against ransomware

exploits ransomware
2024-03-14 https://www.helpnetsecurity.com/2024/03/14/immutable-storage-cybersecurity-strategy/

IT leaders consider immutable storage as a must-have in the fight against cyberattacks, according to Scality. Ransomware threats are now understood by organizations to be inevitable. Reports show 1 in 4 organizations that pay a ransom never get their data back, and just 16% are able to recover without paying a ransom. This reinforces immutable data storage’s role as an essential last line of defense within a cybersecurity toolkit. With this type of storage, data … More

The post IT leaders think immutable data storage is an insurance policy against ransomware appeared first on Help Net Security.

"

Autosummary: While a relatively low number (12%) of IT leaders worldwide who currently use immutable data storage do not regard it as “essential” to their cybersecurity strategy, a larger percentage resides in the UK: 24% of UK respondents have deployed it but say it is not essential to their cybersecurity, compared to 11% in France, 9% in the US and 6% in Germany. "


Nissan confirms ransomware attack exposed data of 100,000 people

exploits ransomware
2024-03-14 https://www.bleepingcomputer.com/news/security/nissan-confirms-ransomware-attack-exposed-data-of-100-000-people/
Nissan Oceania is warning of a data breach impacting 100,000 people after suffering a cyberattack in December 2023 that was claimed by the Akira ransomware operation. [...] "

Autosummary: Nissan"s latest update confirms some of Akira"s claims, admitting that hackers stole data on some current and former employees, as well as customers of Nissan, Mitsubishi, Renault, Skyline, Infiniti, LDV, and RAM dealerships in the region. "


LockBit affiliate jailed for almost four years after guilty plea

ransomware
2024-03-14 https://www.tripwire.com/state-of-security/lockbit-affiliate-jailed-almost-four-years-after-guilty-plea
An affiliate of the LockBit ransomware gang has been sentenced to almost four years in jail after earlier pleading guilty to charges of cyber extortion and weapons charges. Read more in my article on the Tripwire State of Security blog. "

Autosummary: Investigators also discovered on Vasiliev"s PC other evidence of his closeness to the LockBit ransomware gang: malicious source code, images of usernames and passwords, and screenshots of end-to-end encrypted conversations between Vasiliev and LockBit"s mysterious administrator, LockBitSupp, discussing the extortion of victims. "


LockBit Ransomware Hacker Ordered to Pay $860,000 After Guilty Plea in Canada

exploits ransomware
2024-03-14 https://thehackernews.com/2024/03/lockbit-ransomware-hacker-ordered-to.html
A 34-year-old Russian-Canadian national has been sentenced to nearly four years in jail in Canada for his participation in the LockBit global ransomware operation. Mikhail Vasiliev, an Ontario resident, was originally arrested in November 2022 and charged by the U.S. Department of Justice (DoJ) with "conspiring with others to intentionally damage protected computers and to transmit "

Autosummary: The development arrives as a federal jury in Washington, D.C., convicted Roman Sterlingov, a dual Russian-Swedish national, for his operation of Bitcoin Fog from 2011 through 2021, facilitating the laundering of profits made from the sale of illegal narcotics, computer crimes, stolen identities, and child sexual abuse material. "


StopCrypt: Most widely distributed ransomware now evades detection

exploits ransomware
2024-03-14 https://www.bleepingcomputer.com/news/security/stopcrypt-most-widely-distributed-ransomware-now-evades-detection/
A new variant of StopCrypt ransomware (aka STOP) was spotted in the wild, employing a multi-stage execution process that involves shellcodes to evade security tools. [...] "

Autosummary: Once the final payload is executed, a series of actions takes place to secure persistence for the ransomware, modify access control lists (ACLs) to deny users permission to delete important malware files and directories, and a scheduled task is created to execute the payload every five minutes. "


StopCrypt: Most widely distributed ransomware evolves to evade detection

exploits ransomware
2024-03-14 https://www.bleepingcomputer.com/news/security/stopcrypt-most-widely-distributed-ransomware-evolves-to-evade-detection/
A new variant of StopCrypt ransomware (aka STOP) was spotted in the wild, employing a multi-stage execution process that involves shellcodes to evade security tools. [...] "

Autosummary: Once the final payload is executed, a series of actions takes place to secure persistence for the ransomware, modify access control lists (ACLs) to deny users permission to delete important malware files and directories, and a scheduled task is created to execute the payload every five minutes. "


Stanford University announced that 27,000 individuals were impacted in the 2023 ransomware attack

exploits ransomware
2024-03-13 https://securityaffairs.com/160419/cyber-crime/stanford-university-data-breach.html
Threat actors behind the ransomware attacks that hit Stanford University in 2023 gained access to 27,000 people. Stanford University confirmed that threat actors behind the September 2023 ransomware attack had access to 27,000 people. The prestigious US university was the victim of a ransomware attack carried out by the Akira ransomware group. The Akira ransomware gang claimed […] "

Autosummary: For a limited number of victims, threat actors had access to biometric data, health/medical information, email addresses with passwords, usernames with passwords, security questions and answers, digital signatures, and credit card information with security codes. "


LockBit ransomware affiliate gets four years in jail, to pay $860k

exploits ransomware
2024-03-13 https://www.bleepingcomputer.com/news/security/lockbit-ransomware-affiliate-gets-four-years-in-jail-to-pay-860k/
Russian-Canadian cybercriminal Mikhail Vasiliev has been sentenced to four years in prison by an Ontario court for his involvement in the LockBit ransomware operation. [...] "

Autosummary: Many of those victims, who had their systems paralyzed by Vasiliev between 2021 and 2022, were businesses based in Saskatchewan, Montreal, Newfoundland, and other Canadian states. "


The effects of law enforcement takedowns on the ransomware landscape

exploits ransomware
2024-03-13 https://www.helpnetsecurity.com/2024/03/13/law-enforcement-action-ransomware/

While the results of law enforcement action against ransomware-as-a-service operators Alphv/BlackCat and LockBit are yet to be fully realized, the August 2023 disruption of the Qakbot botnet has had one notable effect: ransomware affiliates have switched to vulnerability exploitation as the primary method of delivering the malware. The switch is obvious to Symantec’s Threat Hunter Team but, unfortunately, it hasn’t been accompanied by a fall in the number of ransomware victims. “Analysis of data from … More

The post The effects of law enforcement takedowns on the ransomware landscape appeared first on Help Net Security.

"

Autosummary: The researchers pointed out other current trends related to ransomware attacks: the attackers’ use of vulnerable drivers (e.g., for disabling security software), legitimate remote desktop tools (AnyDesk, Atera, etc.), custom data exfiltration tools (e.g., Lockbit’s StealBit), and abuse of built-in Windows utilities (e.g., Esentutl, DPAPI) to steal credentials. "


US govt probes if ransomware gang stole Change Healthcare data

exploits ransomware
2024-03-13 https://www.bleepingcomputer.com/news/security/us-govt-probes-if-ransomware-gang-stole-change-healthcare-data/
The U.S. Department of Health and Human Services is investigating whether protected health information was stolen in a ransomware attack that hit UnitedHealthcare Group (UHG) subsidiary Optum, which operates the Change Healthcare platform, in late February. [...] "

Autosummary: " Claims of 6TB data theft The investigation follows the BlackCat ransomware gang"s claims that they stole 6TB of data from Change Healthcare"s network belonging to "thousands of healthcare providers, insurance providers, pharmacies, etc." They said they stole source code for Change Healthcare solutions and sensitive information from many partners, including the U.S. military"s Tricare healthcare program, the Medicare federal health insurance program, CVS Caremark, MetLife, Health Net, and many other healthcare insurance providers. "


CTEM 101 - Go Beyond Vulnerability Management with Continuous Threat Exposure Management

exploits ransomware
2024-03-12 https://thehackernews.com/2024/03/ctem-101-go-beyond-vulnerability.html
In a world of ever-expanding jargon, adding another FLA (Four-Letter Acronym) to your glossary might seem like the last thing you’d want to do. But if you are looking for ways to continuously reduce risk across your environment while making significant and consistent improvements to security posture, in our opinion, you probably want to consider establishing a Continuous Threat Exposure "

Autosummary: With CTEM, a more thoughtful approach to discovery and prioritization adds value by: Quickly reducing overall risk Increasing the value of each remediation, and potentially freeing up resources Improving the alignment between security and IT teams Providing a common view into the entire process, encouraging a positive feedback loop that drives continuous improvement Getting Started with CTEM Since CTEM is a process rather than a specific service or software solution, getting started is a holistic endeavor. The Five Stages of a CTEM Program Rather than a particular product or service, CTEM is a program that reduces cyber security exposures via five stages: Scoping – According to Gartner, "To define and later refine the scope of the CTEM initiative, security teams need first to understand what is important to their business counterparts, and what impacts (such as a required interruption of a production system) are likely to be severe enough to warrant collaborative remedial effort." In our opinion, a CTEM program helps you: Identify your most exposed assets, along with how an attacker might leverage them Understand the impact and likelihood of potential breaches Prioritize the most urgent risks and vulnerabilities Get actionable recommendations on how to fix them Monitor your security posture continuously and track your progress With a CTEM program, you can get the "attacker"s view", cross referencing flaws in your environment with their likelihood of being used by an attacker. "


Claroty Advanced ATD Module provides continuous monitoring of healthcare network risks

ransomware
2024-03-12 https://www.helpnetsecurity.com/2024/03/12/claroty-advanced-atd-module/

Claroty released Advanced Anomaly Threat Detection (ATD) Module within the Medigate Platform from Claroty. The new capability provides healthcare organizations with the clinical context to properly identify, assess, and prioritize threats to connected medical devices, IoT, and building management systems (BMS). The capabilities of the Advanced ATD Module are built on Claroty’s specialized knowledge of healthcare environments and foundational, in-depth CPS device visibility, including: Agentless, clinically-aware threat detection and context to address known indicators of … More

The post Claroty Advanced ATD Module provides continuous monitoring of healthcare network risks appeared first on Help Net Security.

"

Autosummary: The capabilities of the Advanced ATD Module are built on Claroty’s specialized knowledge of healthcare environments and foundational, in-depth CPS device visibility, including: Agentless, clinically-aware threat detection and context to address known indicators of compromise in CPS Threat detection at deeper levels of the clinical network beyond areas where firewall solutions are deployed Continuous monitoring of device communication hardening measures and compliance controls According to the Germany-based healthcare network Ortenau Klinikum, with the Advanced ATD Module, “We now know what is in our network at any given minute. "


Stanford: Data of 27,000 people stolen in September ransomware attack

exploits ransomware
2024-03-12 https://www.bleepingcomputer.com/news/security/stanford-data-of-27-000-people-stolen-in-september-ransomware-attack/
Stanford University says the personal information of 27,000 individuals was stolen in a ransomware attack impacting its Department of Public Safety (SUDPS) network. [...] "

Autosummary: "


BianLian Threat Actors Exploiting JetBrains TeamCity Flaws in Ransomware Attacks

exploits government ransomware
2024-03-11 https://thehackernews.com/2024/03/bianlian-threat-actors-exploiting.html
The threat actors behind the BianLian ransomware have been observed exploiting security flaws in JetBrains TeamCity software to conduct their extortion-only attacks. According to a new report from GuidePoint Security, which responded to a recent intrusion, the incident "began with the exploitation of a TeamCity server which resulted in the deployment of a PowerShell implementation of "

Autosummary: "After multiple failed attempts to execute their standard Go backdoor, the threat actor pivoted to living-off-the-land and leveraged a PowerShell implementation of their backdoor, which provides an almost identical functionality to what they would have with their Go backdoor," security researchers Justin Timothy, Gabe Renfro, and Keven Murphy said. "


BianLian group exploits JetBrains TeamCity bugs in ransomware attacks

exploits government ransomware
2024-03-11 https://securityaffairs.com/160357/hacking/bianlian-group-ttack-jetbrains-teamcity.html
BianLian ransomware group was spotted exploiting vulnerabilities in JetBrains TeamCity software in recent attacks. Researchers from GuidePoint Security noticed, while investigating a recent attack linked to the BianLian ransomware group, that the threat actors gained initial access to the target by exploiting flaws in a TeamCity server. The BianLian ransomware emerged in August 2022, the […] "

Autosummary: TeamCity bugs in ransomware attacks Pierluigi Paganini March 11, 2024 March 11, 2024 BianLian ransomware group was spotted exploiting vulnerabilities in JetBrains TeamCity software in recent attacks. "


Equilend warns employees their data was stolen by ransomware gang

exploits ransomware
2024-03-11 https://www.bleepingcomputer.com/news/security/equilend-warns-employees-their-data-was-stolen-by-ransomware-gang/
New York-based securities lending platform EquiLend Holdings confirmed in data breach notification letters sent to employees that their data was stolen in a January ransomware attack. [...] "

Autosummary: "


Play ransomware attack on Xplain exposed 65,000 files containing data relevant to the Swiss Federal Administration.

exploits ransomware
2024-03-08 https://securityaffairs.com/160174/data-breach/xplain-data-breach-report.html
The ransomware attack on Xplain impacted tens of thousands Federal government files, said the National Cyber Security Centre (NCSC) of Switzerland. The National Cyber Security Centre (NCSC) published a data analysis report on the data breach resulting from the ransomware attack on the IT services provider Xplain. The attack took place on May 23, 2023 […] "

Autosummary: Government experts discovered sensitive information, including personal data, technical information, classified details, and passwords, in approximately half of the Federal Administration’s files (5,182). “In addition, 278 files contained technical information such as documentation on IT systems, software requirement documents or architectural descriptions, 121 objects were classified in accordance with the Information Protection Ordinance and 4 objects contained readable passwords.” "


The Week in Ransomware - March 8th 2024 - Waiting for the BlackCat rebrand

exploits ransomware
2024-03-08 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-march-8th-2024-waiting-for-the-blackcat-rebrand/
We saw another ransomware operation shut down this week after first getting breached by law enforcement and then targeting critical infrastructure, putting them further in the spotlight of the US government. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @demonslay335, @Seifreed, @fwosar, @malwrhunterteam, @billtoulas, @BleepinComputer, @LawrenceAbrams, @serghei, @Ionut_Ilascu, @ddd1ms, @uuallan, @AShukuhi, @BrettCallow, @BushidoToken, @JBurnsKoven, @Jon__DiMaggio, @ValeryMarchive, @UK_Daniel_Card, @AlexMartin, @TalosSecurity, @CarlyPage_, and @pcrisk March 4th 2024 The ALPHV/BlackCat ransomware gang has shut down its servers amid claims that they scammed the affiliate responsible for the attack on Optum, the operator of the Change Healthcare platform, of $22 million. Contributors and those who provided new ransomware information and stories this week include @demonslay335, @Seifreed, @fwosar, @malwrhunterteam, @billtoulas, @BleepinComputer, @LawrenceAbrams, @serghei, @Ionut_Ilascu, @ddd1ms, @uuallan, @AShukuhi, @BrettCallow, @BushidoToken, @JBurnsKoven, @Jon__DiMaggio, @ValeryMarchive, @UK_Daniel_Card, @AlexMartin, @TalosSecurity, @CarlyPage_, and @pcrisk. Talos observed the GhostSec and Stormous ransomware groups operating together to conduct several double extortion attacks using the GhostLocker and StormousX ransomware programs against the victims in Cuba, Argentina, Poland, China, Lebanon, Israel, Uzbekistan, India, South Africa, Brazil, Morocco, Qatar, Turkiye, Egypt, Vietnam, Thailand and Indonesia according to our assessment of the disclosure messages posted by the group in their Telegram channels and Stormous ransomware data leak site. "


Smashing Security podcast #362: Ransomware fraud, pharmacy chaos, and suicide

exploits ransomware
2024-03-07 https://grahamcluley.com/smashing-security-podcast-362/
Is there any truth behind the alleged data breach at Fortnite maker Epic Games? Who launched the ransomware attack that caused a fallout at pharmacies? And what’s the latest on the heart-breaking hack of Finnish therapy clinic Vastaamo? All this and much much more is discussed in the latest edition of the “Smashing Security” podcast … Continue reading "Smashing Security podcast #362: Ransomware fraud, pharmacy chaos, and suicide" "

Autosummary: Hosts: Graham Cluley – @gcluley Carole Theriault – @caroletheriault Guest: Jessica Barker – @drjessicabarker Episode links: Sponsored by: Kiteworks – Step into the future of secure managed file transfer with Kiteworks. "


Major shifts in identity, ransomware, and critical infrastructure threat trends

exploits ransomware
2024-03-07 https://www.helpnetsecurity.com/2024/03/07/2024-x-force-threat-intelligence-index-video/

In this Help Net Security video, Michelle Alvarez, Strategic Threat Analysis Manager at IBM X-Force, discusses the 2024 X-Force Threat Intelligence Index, revealing top threats and trends the team observed last year across its global engagements and how these shifts are forming the threat landscape in 2024 and beyond. X-Force observed shifts toward credential-driven attacks with a 71% increase in attacks caused by using valid accounts. As cybercriminals see more opportunities to “log in” vs. … More

The post Major shifts in identity, ransomware, and critical infrastructure threat trends appeared first on Help Net Security.

"

Autosummary: "


Switzerland: Play ransomware leaked 65,000 government documents

exploits government ransomware
2024-03-07 https://www.bleepingcomputer.com/news/security/switzerland-play-ransomware-leaked-65-000-government-documents/
The National Cyber Security Centre (NCSC) of Switzerland has released a report on its analysis of a data breach following a ransomware attack on Xplain, disclosing that the incident impacted thousands of sensitive Federal government files. [...] "

Autosummary: "


Emergency. Ransomware halts beer production at Belgium’s Duvel brewery

exploits ransomware
2024-03-07 https://grahamcluley.com/emergency-ransomware-halts-beer-production-at-belgiums-duvel-brewery/
I"m afraid that the people of Belgium are dealing with a national emergency. "

Autosummary: "


Haiti PM in Puerto Rico as gang violence continues

ransomware
2024-03-06 https://www.bbc.co.uk/news/world-latin-america-68486536
Ariel Henry lands in San Juan after armed gangs attacked Haiti"s main airport to stop his re-entry. "

Autosummary: "


Alert: GhostSec and Stormous Launch Joint Ransomware Attacks in Over 15 Countries

exploits ransomware
2024-03-06 https://thehackernews.com/2024/03/alert-ghostsec-and-stormous-launch.html
The cybercrime group called GhostSec has been linked to a Golang variant of a ransomware family called GhostLocker. “TheGhostSec and Stormous ransomware groups are jointly conducting double extortion ransomware attacks on various business verticals in multiple countries,” Cisco Talos researcher Chetan Raghuprasad said in a report shared with The Hacker News. “GhostLocker and "

Autosummary: " Attacks mounted by the group have targeted victims in Cuba, Argentina, Poland, China, Lebanon, Israel, Uzbekistan, India, South Africa, Brazil, Morocco, Qatar, Turkiye, Egypt, Vietnam, Thailand, and Indonesia. "


LockBit 3.0’s Bungled Comeback Highlights the Undying Risk of Torrent-Based (P2P) Data Leakage

ransomware
2024-03-06 https://securityaffairs.com/160054/cyber-crime/lockbit-3-0s-comeback-torrent-based-p2p-data-leakage.html
The wide torrent-based accessibility of these leaked victim files ensures the longevity of LockBit 3.0’s harmful impact. While embattled ransomware gang LockBit 3.0 fights for its survival following Operation Cronos, a coordinated takedown of the syndicate’s web infrastructure by global authorities, the availability of victim data leaked by the gang persists via peer-to-peer (P2P) torrent […] "

Autosummary: LockBit 3.0’s Bungled Comeback Highlights the Undying Risk of Torrent-Based (P2P) Data Leakage Pierluigi Paganini March 06, 2024 March 06, 2024 The wide torrent-based accessibility of these leaked victim files ensures the longevity of LockBit 3.0’s harmful impact. While embattled ransomware gang LockBit 3.0 fights for its survival following Operation Cronos, a coordinated takedown of the syndicate’s web infrastructure by global authorities, the availability of victim data leaked by the gang persists via peer-to-peer (P2P) torrent networks. "


Watch out, GhostSec and Stourmous groups jointly conducting ransomware attacks

exploits ransomware
2024-03-06 https://securityaffairs.com/160066/cyber-crime/ghostsec-stourmous-ransomware.html
Researchers warn that the cybercrime groups GhostSec and Stormous have joined forces in a new ransomware campaign. The GhostSec and Stormous ransomware gang are jointly conducting a ransomware campaign targeting various organizations in multiple countries, Cisco Talos reported. GhostSec is a financially motivated threat actor that is also involved in hacktivism-related operations. The group is […] "

Autosummary: The disclosures made by the groups in their Telegram channels revealed that the ransomware attacks hit organizations in Cuba, Argentina, Poland, China, Lebanon, Israel, Uzbekistan, India, South Africa, Brazil, Morocco, Qatar, Turkiye, Egypt, Vietnam, Thailand, and Indonesia. "


Duvel says it has "more than enough" beer after ransomware attack

exploits ransomware
2024-03-06 https://www.bleepingcomputer.com/news/security/duvel-says-it-has-more-than-enough-beer-after-ransomware-attack/
Duvel Moortgat Brewery was hit by a ransomware attack late last night, bringing to a halt the beer production in the company"s bottling facilities [...] "

Autosummary: "At 1:30 AM last night, alarms went off in Duvel"s IT department because ransomware was detected," stated Ellen Aarts, communications manager at Duvel Moortgat. "


ALPHV ransomware gang fakes own death, fools no one

exploits ransomware
2024-03-06 https://www.malwarebytes.com/blog/ransomware/2024/03/alphv-ransomware-gang-fakes-own-death-fools-no-one
The ALPHV gang"s attempt to cover up an exit scam isn"t going well. "

Autosummary: Once you’ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again. VX Underground reported that a day later, other ALPHV affiliates were also locked out of their accounts, while ALPHV issued an “ambiguous” message seemingly pointing the finger at the FBI for…something, before putting the source code to its ransomware up for sale for $5 million. The giveaway, spotted by ransomware researcher Fabian Wosar, was the URL of the takedown image, which was being kept in a directory called THIS WEBSITE HAS BEEN SEIZED_files . "


Exit Scam: BlackCat Ransomware Group Vanishes After $22 Million Payout

financial exploits ransomware
2024-03-06 https://thehackernews.com/2024/03/exit-scam-blackcat-ransomware-group.html
The threat actors behind the BlackCat ransomware have shut down their darknet website and likely pulled an exit scam after uploading a bogus law enforcement seizure banner. "ALPHV/BlackCat did not get seized. They are exit scamming their affiliates," security researcher Fabian Wosar said. "It is blatantly obvious when you check the source code of the new takedown notice." "There "

Autosummary: "Internally, BlackCat may be worried about moles within their group, and closing up shop preemptively could stop a takedown before it occurs," Malachi Walker, a security advisor with DomainTools, said. "


BlackCat ransomware shuts down in exit scam, blames the "feds"

financial exploits ransomware
2024-03-05 https://www.bleepingcomputer.com/news/security/blackcat-ransomware-shuts-down-in-exit-scam-blames-the-feds/
The BlackCat ransomware gang is pulling an exit scam, trying to shut down and run off with affiliates" money by pretending the FBI seized their site and infrastructure. [...] "

Autosummary: With claims from affiliates not getting paid, a sudden shut down of the infrastructure, cutting ties with multiple affiliates, the "GG" message on Tox, announcing that they"re selling the malware source code, and especially pretending that the FBI took control of their websites, all this is a cleart indication that ALPHV/BlackCat ransomware administrators are exit scamming. "


Phobos Ransomware Aggressively Targeting U.S. Critical Infrastructure

exploits ransomware
2024-03-04 https://thehackernews.com/2024/03/phobos-ransomware-aggressively.html
U.S. cybersecurity and intelligence agencies have warned of Phobos ransomware attacks targeting government and critical infrastructure entities, outlining the various tactics and techniques the threat actors have adopted to deploy the file-encrypting malware. “Structured as a ransomware as a service (RaaS) model, Phobos ransomware actors have targeted entities including municipal and "

Autosummary: "Structured as a ransomware as a service (RaaS) model, Phobos ransomware actors have targeted entities including municipal and county governments, emergency services, education, public healthcare, and critical infrastructure to successfully ransom several million in U.S. dollars," the government said. "


BlackCat ransomware turns off servers amid claim they stole $22 million ransom

exploits ransomware
2024-03-04 https://www.bleepingcomputer.com/news/security/blackcat-ransomware-turns-off-servers-amid-claim-they-stole-22-million-ransom/
The ALPHV/BlackCat ransomware gang has shut down its servers amid claims that they scammed the affiliate responsible for the attack on Optum, the operator of the Change Healthcare platform, of $22 million. [...] "

Autosummary: Optum allegedly pays ransom Earlier today, the Tox messaging platform used by the BlackCat ransomware operator contained a message that does does not provide any details about what the gang plans next: “Все выключено, решаем,” which translates to "Everything is off, we decide. Alleged ALPHV affiliate claims they got scammed of the alleged Optum ransom of $22 million source: Dmitry Smilyanets Ransomware-as-a-service (RaaS) operations typically work by partnering with external affiliates, who carry out attacks using the operation"s encryptors. "


Week in review: LockBit leak site is back online, NIST updates its Cybersecurity Framework

ransomware ciber
2024-03-03 https://www.helpnetsecurity.com/2024/03/03/week-in-review-lockbit-leak-site-is-back-online-nist-updates-its-cybersecurity-framework/

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Overcoming the pressures of cybersecurity startup leadership In this Help Net Security interview, Kunal Agarwal, CEO at Dope Security, offers a look into the CEO’s leadership philosophy, the process of building a high-caliber team, and the unique challenges of navigating a startup in the tech industry. AI-driven DevOps: Revolutionizing software engineering practices In this Help Net Security interview, Itamar Friedman, … More

The post Week in review: LockBit leak site is back online, NIST updates its Cybersecurity Framework appeared first on Help Net Security.

"

Autosummary: Infosec products of the month: February 2024 Here’s a look at the most interesting products from the past month, featuring releases from: Appdome, BackBox, Center for Internet Security, Cisco, CompliancePro Solutions, Cyberhaven, LOKKER, ManageEngine, Metomic, OPSWAT, Pindrop, ProcessUnity, Qualys, SentinelOne, Sumsub,Truffle Security, Vade Secure, and Varonis.Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Overcoming the pressures of cybersecurity startup leadership In this Help Net Security interview, Kunal Agarwal, CEO at Dope Security, offers a look into the CEO’s leadership philosophy, the process of building a high-caliber team, and the unique challenges of navigating a startup in the tech industry. "


US cyber and law enforcement agencies warn of Phobos ransomware attacks

exploits ransomware
2024-03-02 https://securityaffairs.com/159822/cyber-crime/cisa-phobos-ransomware-attacks.html
US CISA, the FBI, and MS-ISAC issued a joint CSA to warn of attacks involving Phobos ransomware variants observed as recently as February 2024 US CISA, the FBI, and MS-ISAC issued a joint cyber security advisory (CSA) to warn of attacks involving Phobos ransomware variants such as Backmydata, Devos, Eight, Elking, and Faust. The attacks […] "

Autosummary: US cyber and law enforcement agencies warn of Phobos ransomware attacks Pierluigi Paganini March 02, 2024 March 02, 2024 US CISA, the FBI, and MS-ISAC issued a joint CSA to warn of attacks involving Phobos ransomware variants observed as recently as February 2024 US CISA, the FBI, and MS-ISAC issued a joint cyber security advisory (CSA) to warn of attacks involving Phobos ransomware variants such as Backmydata, Devos, Eight, Elking, and Faust. "


The Week in Ransomware - March 1st 2024 - Healthcare under siege

exploits ransomware
2024-03-01 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-march-1st-2024-healthcare-under-siege/
Ransomware attacks on healthcare over the last few months have been relentless, with numerous ransomware operations targeting hospitals and medical services, causing disruption to patient care and access to prescription drugs in the USA. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @demonslay335, @Ionut_Ilascu, @Seifreed, @serghei, @fwosar, @BleepinComputer, @malwrhunterteam,@billtoulas, @LawrenceAbrams, @Threatlabz, @DarkWebInformer, @CISAgov, @TrendMicro, @Shadowserver, @a_greenberg, @BrettCallow, @Jon__DiMaggio, @CrowdStrike, @H4ckManac, @RobWright22, @ValeryMarchive, and @pcrisk February 25th 2024 The LockBit gang is relaunching its ransomware operation on a new infrastructure less than a week after law enforcement hacked their servers, and is threatening to focus more of their attacks on the government sector.These incidents targeted municipal and county governments, emergency services, education, public healthcare, and other critical infrastructure entities to successfully ransom several million U.S. dollars This week, the notorious ransomware gang known as LockBit threatened a kind of disruption that would have been a first even for a criminal industry that has crippled hospitals and triggered the shutdown of a gas pipeline: leaking documents from the criminal prosecution of a former president and presidential candidate. February 29th 2024 The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing this joint CSA, to disseminate known TTPs and IOCs associated with the Phobos ransomware variants observed as recently as February 2024, according to open source reporting. "


Smashing Security podcast #361: Wireless charging woe, AI romance apps, and ransomware revisited

exploits ransomware
2024-02-29 https://grahamcluley.com/smashing-security-podcast-361/
Your smartphone may be toast – if you use a hacked wireless charger, we take a closer look at the latest developments in the unfolding LockBit ransomware drama, and Carole dips her toe into online AI romance apps. All this and much much more is discussed in the latest edition of the “Smashing Security” podcast … Continue reading "Smashing Security podcast #361: Wireless charging woe, AI romance apps, and ransomware revisited" "

Autosummary: Hosts: Graham Cluley – @gcluley Carole Theriault – @caroletheriault Guest: Paul Ducklin – @duckblog Episode links: Sponsored by: BlackBerry – BlackBerry helps keeps you one step ahead. "


Is the LockBit gang resuming its operation?

ransomware
2024-02-29 https://securityaffairs.com/159757/cyber-crime/lockbit-gang-resuming-operation.html
Experts warn that the LockBit ransomware group has started using updated encryptors in new attacks, after the recent law enforcement operation. The LockBit ransomware group appears to have fully recovered its operations following the recent law enforcement initiative, code-named Operation Cronos, which aimed to disrupt its activities. Researchers from Zscaler first observed the ransomware group […] "

Autosummary: Pierluigi Paganini February 29, 2024 February 29, 2024 Experts warn that the LockBit ransomware group has started using updated encryptors in new attacks, after the recent law enforcement operation. "


Healthcare sector warned of ALPHV BlackCat ransomware after surge in targeted attacks

exploits ransomware
2024-02-29 https://www.tripwire.com/state-of-security/healthcare-sector-warned-alphv-blackcat-ransomware-after-surge-targeted-attacks
The US government has warned the healthcare sector that it is now the biggest target of the BlackCat ransomware group. Read more in my article on the Tripwire State of Security blog. "

Autosummary: Image "Because of their actions, we are introducing new rules, or rather, we are removing ALL rules, except one, you cannot touch the CIS (critical infrastructure sectors), you can now block hospitals, nuclear power plants, anything, anywhere." "


Change Healthcare outages reportedly caused by ransomware

exploits ransomware
2024-02-28 https://www.malwarebytes.com/blog/news/2024/02/change-healthcare-outages-reportedly-caused-by-ransomware
The cyberattack on Change Healthcare that has been causing a lot of disruptions is likely the work of the BlackCat/ALPHV ransomware gang. "

Autosummary: What the ramifications of any stolen data are, remains to be seen, but they could be very serious given the size of the company and the nationwide application of their electronic health record (EHR) systems, payment processing, care coordination, and data analytics.Once you’ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.This platform is the largest payment exchange platform between doctors, pharmacies, healthcare providers, and patients in the US healthcare system. "


FBI Warns U.S. Healthcare Sector of Targeted BlackCat Ransomware Attacks

exploits ransomware
2024-02-28 https://thehackernews.com/2024/02/fbi-warns-us-healthcare-sector-of.html
The U.S. government is warning about the resurgence of BlackCat (aka ALPHV) ransomware attacks targeting the healthcare sector as recently as this month. "Since mid-December 2023, of the nearly 70 leaked victims, the healthcare sector has been the most commonly victimized," the government said in an updated advisory. "This is likely in response to the ALPHV/BlackCat administrator"s "

Autosummary: Attack surface management firm Censys said, as of February 27, 2024, it observed no less than 3,400 exposed potentially vulnerable ScreenConnect hosts online, with a majority of them located in the U.S., Canada, the U.K., Australia, Germany, France, India, the Netherlands, Turkey, and Ireland. "


FBI, CISA, HHS warn of targeted ALPHV/Blackcat ransomware attacks against the healthcare sector

exploits ransomware
2024-02-28 https://securityaffairs.com/159703/cyber-crime/alphv-blackcat-ransomware-healthcare-sector.html
The FBI, CISA, and the Department of HHS warned U.S. healthcare organizations of targeted ALPHV/Blackcat ransomware attacks. A cybersecurity alert published by the FBI, CISA, and the Department of Health and Human Services (HHS) warned U.S. healthcare organizations of targeted attacks conducted by ALPHV/Blackcat ransomware attacks. The US agencies released a report containing IOCs and […] "

Autosummary: FBI, CISA, HHS warn of targeted ALPHV/Blackcat ransomware attacks against the healthcare sector Pierluigi Paganini February 28, 2024 February 28, 2024 The FBI, CISA, and the Department of HHS warned U.S. healthcare organizations of targeted ALPHV/Blackcat ransomware attacks. "


Rhysida ransomware wants $3.6 million for children’s stolen data

exploits ransomware
2024-02-28 https://www.bleepingcomputer.com/news/security/rhysida-ransomware-wants-36-million-for-childrens-stolen-data/
The Rhysida ransomware gang has claimed the cyberattack on Lurie Children"s Hospital in Chicago at the start of the month. [...] "

Autosummary: Lurie Children"s still impaired As per the latest status update from Lurie Children"s on February 22, 2024, effort to restore the IT system is ongoing, and service disruptions still impact some operational segments. "


LockBit ransomware returns to attacks with new encryptors, servers

exploits ransomware
2024-02-28 https://www.bleepingcomputer.com/news/security/lockbit-ransomware-returns-to-attacks-with-new-encryptors-servers/
The LockBit ransomware gang is once again conducting attacks, using updated encryptors with ransom notes linking to new servers after last week"s law enforcement disruption. [...] "

Autosummary: As part of this operation, law enforcement seized infrastructure, retrieved decryptors, and, in an embarrassing moment for LockBit, converted the ransomware gang"s data leak site into a police press portal. "


UnitedHealth subsidiary Optum hack linked to BlackCat ransomware

exploits ransomware
2024-02-27 https://www.bleepingcomputer.com/news/security/unitedhealth-subsidiary-optum-hack-linked-to-blackcat-ransomware/
A cyberattack on UnitedHealth Group subsidiary Optum that led to an ongoing outage impacting the Change Healthcare payment exchange platform was linked to the BlackCat ransomware group by sources familiar with the investigation. [...] "

Autosummary: Optum Solutions, its subsidiary, operates the Change Healthcare platform, the largest payment exchange platform connecting doctors, pharmacies, healthcare providers, and patients in the U.S. healthcare system. "


Octopus Deploy acquires Codefresh to drive innovation in continuous delivery

ransomware
2024-02-27 https://www.helpnetsecurity.com/2024/02/27/octopus-deploy-codefresh-acquisition/

Octopus Deploy announced the acquisition of Codefresh. Codefresh, founded in 2014 by Oleg Verhovsky and Raziel Tabib, is Argo maintainer and leader in Kubernetes CD, GitOps, and CI. The acquisition marks a significant milestone as Octopus strengthens its support for Kubernetes and its commitment to providing powerful continuous delivery platform for virtual machines and cloud-native enterprise-scale applications. The combined business positions Octopus Deploy as one of the largest privately held companies in the DevOps ecosystem. … More

The post Octopus Deploy acquires Codefresh to drive innovation in continuous delivery appeared first on Help Net Security.

"

Autosummary: Octopus and Codefresh offer unparalleled benefits for software teams, including advanced CD, deployment automation, release orchestration, environment progression, observability, and enterprise compliance across all workloads. "


US pharmacy outage caused by Blackcat ransomware attack on Optum Solutions

exploits ransomware
2024-02-27 https://securityaffairs.com/159641/cyber-crime/blackcat-ransomware-attack-optum-solutions.html
A BlackCat ransomware attack hit UnitedHealth Group subsidiary Optum causing an outage impacting the Change Healthcare payment exchange platform. A ransomware attack hit the UnitedHealth Group subsidiary Optum leading to an outage impacting the Change Healthcare payment exchange platform. Optum Solutions is a subsidiary of UnitedHealth Group, a leading health insurance company in the United States. Optum Solutions […] "

Autosummary: The seizure is the result of a joint operation conducted by international law enforcement agencies from the US, Denmark, Germany, UK, Netherlands, Germany, Australia, Spain, Austria and Europol. BlackCat/ALPHV ransomware gang has been active since November 2021, the list of its victims is long and includes industrial explosives manufacturer SOLAR INDUSTRIES INDIA, the US defense contractor NJVC, gas pipeline Creos Luxembourg S.A., the fashion giant Moncler, the Swissport, NCR, and Western Digital. "


Hesse Consumer Advice Center says systems encrypted by ransomware

exploits ransomware
2024-02-27 https://www.bleepingcomputer.com/news/security/hesse-consumer-advice-center-says-systems-encrypted-by-ransomware/
The Hesse Consumer Advice Center in Germany has been hit with a ransomware attack, causing IT systems and disrupting the availability of its consumer advice center. [...] "

Autosummary: The Hesse Consumer Advice Center is an organization that provides unbiased advice to the residents of Hesse about consumer law, telephone and internet, finance and insurance, energy saving, health and care, food and nutrition. "


Black Basta, Bl00dy ransomware gangs join ScreenConnect attacks

exploits ransomware
2024-02-27 https://www.bleepingcomputer.com/news/security/black-basta-bl00dy-ransomware-gangs-join-screenconnect-attacks/
The Black Basta and Bl00dy ransomware gangs have joined widespread attacks targeting ScreenConnect servers unpatched against a maximum severity authentication bypass vulnerability. [...] "

Autosummary: ScreenConnect attack flow (Trend Micro) ​While investigating their attacks, Trend Micro observed reconnaissance, discovery, and privilege escalation activity after the attackers gained access to the network and Black Basta-linked Cobalt Strike beacons being deployed on compromised systems. "


Hessen Consumer Center says systems encrypted by ransomware

exploits ransomware
2024-02-27 https://www.bleepingcomputer.com/news/security/hessen-consumer-center-says-systems-encrypted-by-ransomware/
The Hessen Consumer Center in Germany has been hit with a ransomware attack, causing IT systems to shut down and temporarily disrupting its availability. [...] "

Autosummary: The Hessen Consumer Center is an non-profit organization that aims to provide unbiased and neutral advice to the residents of Hessen about consumer law, telephone and internet, finance and insurance, energy saving, health and care, food and nutrition. "


FBI, CISA warn US hospitals of targeted BlackCat ransomware attacks

exploits ransomware
2024-02-27 https://www.bleepingcomputer.com/news/security/fbi-cisa-warn-us-hospitals-of-targeted-blackcat-ransomware-attacks/
Today, the FBI, CISA, and the Department of Health and Human Services (HHS) warned U.S. healthcare organizations of targeted ALPHV/Blackcat ransomware attacks. [...] "

Autosummary: BlackCat now using ScreenConnect for initial access Today"s advisory comes after the BlackCat ransomware operation was linked to a cyberattack on UnitedHealth Group subsidiary Optum that triggered an ongoing outage impacting Change Healthcare, the largest payment exchange platform connecting doctors, pharmacies, healthcare providers, and patients in the U.S. healthcare system. "


Black Basta and Bl00dy ransomware gangs exploit recent ConnectWise ScreenConnect bugs

exploits ransomware
2024-02-27 https://securityaffairs.com/159640/cyber-crime/black-basta-bl00dy-ransomware-connectwise-screenconnect.html
New threat actors have started exploiting ConnectWise ScreenConnect vulnerabilities, including the Black Basta and Bl00dy ransomware gangs. Multiple threat actors have started exploiting the recently disclosed vulnerabilities, tracked as CVE-2024-1709 (CVSS score of 10) and CVE-2024-1708 (CVSS score of 8.4), in the ConnectWise ScreenConnect software. ConnectWise recently warned of the following two critical vulnerabilities in […] "

Autosummary: Black Basta and Bl00dy ransomware gangs exploit recent ConnectWise ScreenConnect bugs Pierluigi Paganini February 27, 2024 February 27, 2024 New threat actors have started exploiting ConnectWise ScreenConnect vulnerabilities, including the Black Basta and Bl00dy ransomware gangs. "


LockBit is back and threatens to target more government organizations

government ransomware
2024-02-26 https://securityaffairs.com/159584/cyber-crime/lockbit-gang-resumed-raas.html
The LockBit gang is back and set up a new infrastructure after the recent attempt by law enforcement to disrupt their operation. Last week, a joint law enforcement action, code-named Operation Cronos, conducted by law enforcement agencies from 11 countries disrupted the LockBit ransomware operation. The operation led to the arrest of two members of the ransomware gang […] "

Autosummary: *when I write the word FBI I mean not only FBI, but also all their assistants, who know how to arrest servers of partners, which act as the first lining after stealing data from the attacked company and do not represent any value: South West Regional Organized Crime Unit in the U.K., Metropolitan Police Service in the U.K., Europol, Gendarmerie-C3N in France, the State Criminal Police Office L-K-A and Federal Criminal Police Office in Germany, Fedpol and Zurich Cantonal Police in Switzerland, the National Police Agency in Japan, the Australian Federal Police in Australia, the Swedish Police Authority in Sweden, the National Bureau of Investigation in Finland, the Royal Canadian Mounted Police in Canada, and the National Police in the Netherlands.A couple of my partners were arrested, to be honest I doubt that very much, they are probably just people who are laundering cryptocurrencies, maybe they were working for some mixers and exchangers with drops, that"s why they were arrested and considered my partners, it would be interesting to see the video of the arrest, where at their homes, Lamborghinis and laptops with evidence of their involvement in our activities, but I somehow think we will not see it, because the FBI arrested random people to get a certificate of merit from the management, say look there are arrests, we are not getting money for nothing, we are honestly working off taxes and imprisoning random people, when real pentesters quietly continue their work.The FBI says they received about 1000 decryptors, a nice figure, but it doesn"t look like the truth, yes they received some unprotected decryptors, those builds of the locker that were made without the "maximum decryptor protection" checkbox could only be received by the FBI in the last 30 days, it"s not known on what day the FBI got access to the server, but we know exactly the date of CVE disclosure and the date when PHP generated an error, before Feb 19th the attacked companies were regularly paying even for unprotected decryptors, so there is a chance the FBI were only on the server for 1 day, it would be nice if the FBI released all the decryptors to the public, then you could trust them that they really own the decryptors, not bluffing and praising their superiority, not the superiority of 1 smart pentester with a public CVE.The FBI designer should work for me, you have good taste, I especially liked the new preloader, in the new update I should do something similar, USA, UK and Europe revolve around my logo, brilliant idea, right there made me feel very good, thanks.Even if you updated your PHP version after reading this information, it will not be enough, because you have to change the hoster, server, all possible passwords, user passwords in the database, audit the source code and migrate everything, there is no guarantee that you have not been hardened on the server.As a result of hacking the servers, the FBI obtained a database, web panel sources, locker stubs that are not source as they claim and a small portion of unprotected decryptors, they claim 1000 decryptors, although there were almost 20000 decryptors on the server, most of which were protected and cannot be used by the FBI. "


LockBit Ransomware Group Resurfaces After Law Enforcement Takedown

exploits ransomware
2024-02-26 https://thehackernews.com/2024/02/lockbit-ransomware-group-resurfaces.html
The threat actors behind the LockBit ransomware operation have resurfaced on the dark web using new infrastructure, days after an international law enforcement exercise seized control of its servers. To that end, the notorious group has moved its data leak portal to a new .onion address on the TOR network, listing 12 new victims as of writing. The administrator behind LockBit, in a& "

Autosummary: "The attackers worked under the guise of a legitimate IT firm Shtazi-IT, which offers services for the development of landing pages, mobile applications, scripts, parsers, and online stores," Russian cybersecurity firm F.A.C.C.T. said. The stolen information included names, dates of birth, Medicare numbers, and sensitive medical information, including records on mental health, sexual health, and drug use. "


The LockBit ransomware gang rears its ugly head again, after law enforcement takedown

exploits ransomware
2024-02-26 https://www.bitdefender.com/blog/hotforsecurity/the-lockbit-ransomware-gang-rears-its-ugly-head-again-after-law-enforcement-takedown/
Surprise! The LockBit ransomware group has re-emerged, just days after a high-profile law enforcement operation seized control of its infrastructure and disrupted its operations. Read more in my article on the Hot for Security blog. "

Autosummary: LockBit"s secretive administrator, who uses the online handle "LockBitSupp", acknowledged that the group"s infrastructure was likely compromised by computer crime-fighting authorities due to their failure to patch their PHP version because of "personal negligence and irresponsibility. "


LockBit leak site is back online

ransomware
2024-02-26 https://www.helpnetsecurity.com/2024/02/26/lockbit-leak-site-is-back-online/

LockBitSupp, the individual running the LockBit ransomware-as-a-service operation, has made good on one promise: the LockBit leak site is back online on backup domains, with lists of victims expected to be unveiled in the coming days. Law enforcement strikes LockBit RaaS gang Last week, Operation Cronos hit LockBit hard by taking over their leak site and affiliate panel, disrupting part of their infrastructure, and arresting some suspected affiliates. It followed up by teasing a reveal … More

The post LockBit leak site is back online appeared first on Help Net Security.

"

Autosummary: "


#StopRansomware: Phobos Ransomware

exploits ransomware
2024-02-26 https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-060a

SUMMARY

Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing this joint CSA, to disseminate known TTPs and IOCs associated with the Phobos ransomware variants observed as recently as February 2024, according to open source reporting. Phobos is structured as a ransomware-as-a-service (RaaS) model. Since May 2019, Phobos ransomware incidents impacting state, local, tribal, and territorial (SLTT) governments have been regularly reported to the MS-ISAC. These incidents targeted municipal and county governments, emergency services, education, public healthcare, and other critical infrastructure entities to successfully ransom several million U.S. dollars.[1],[2]

The FBI, CISA, and the MS-ISAC encourage organizations to implement the recommendations in the Mitigations section of this CSA to reduce the likelihood and impact of Phobos ransomware and other ransomware incidents.

Download the PDF version of this report:

"

Autosummary: A case of the FAUST Ransomware [12] VirusTotal: Phobos Domain #1 [13] VirusTotal: Phobos executable: Ahpdate.exe [14] VirusTotal: Phobos GUI extension: ELF File [15] VirusTotal: Phobos IP address: 185.202.0[.]111 [16] VirusTotal: Phobos GUI extension: Binary File [17] Cisco Talos GitHub: IOCs/2023/11/deep-dive-into-phobos-ransomware.txt at main REPORTING The FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom-note, communications with Phobos actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file. [6] Cisco Talos: Understanding the Phobos affiliate structure and activity [7] Cisco Talos: A deep dive into Phobos ransomware, recently deployed by 8Base group [8] Malwarebytes Labs: A deep dive into Phobos ransomware [9] Any Run: Smokeloader [10] Malpedia: Smokeloader [11] In addition, the authoring authorities of this CSA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques, and to reduce the impact and risk of compromise by ransomware or data extortion actors: Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (i.e., hard drive, storage device, or the cloud). Additional details requested include: a targeted company point of contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, and host and network-based indicators.Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise does not constitute or imply endorsement, recommendation, or favoring by CISA, the FBI, and the MS-ISAC.The Windows command shell enables threat actors to control various aspects of a system, with multiple permission levels required for different subsets of commands [T1059.003][T1105].[8] Smokeloader Deployment Phobos operations feature a standard three phase process to decrypt a payload that allows the threat actors to deploy additional destructive malware.[9] For the first phase, Smokeloader manipulates either VirtualAlloc or VirtualProtect API functions—which opens an entry point, enabling code to be injected into running processes and allowing the malware to evade network defense tools [T1055.002].These tools are all widely accessible and easy to use in various operating environments, making it (and associated variants) a popular choice for many threat actors.[3],[4] Reconnaissance and Initial Access Phobos actors typically gain initial access to vulnerable networks by leveraging phishing campaigns [T1598] to drop hidden payloads or using internet protocol (IP) scanning tools, such as Angry IP Scanner, to search for vulnerable Remote Desktop Protocol (RDP) ports [T1595.001] or by leveraging RDP on Microsoft WindowsSee Figure 2 for a list of email providers used by the following Phobos affiliates: Devos, Eight, Elbie, Eking, and Faust.[6] Figure 1: Phobos Affiliate Providers List INDICATORS OF COMPROMISE (IOCs) See Table 1 through 6 for IOCs obtained from CISA and the FBI investigations from September through November 2023. Overview According to open source reporting, Phobos ransomware is likely connected to numerous variants (including Elking, Eight, Devos, Backmydata, and Faust ransomware) due to similar TTPs observed in Phobos intrusions. The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing this joint CSA, to disseminate known TTPs and IOCs associated with the Phobos ransomware variants observed as recently as February 2024, according to open source reporting.Threat actors leveraging Phobos have notably deployed remote access tools to establish a remote connection within the compromised network [T1219].[7] Alternatively, threat actors send spoofed email attachments [T1566.001] that are embedded with hidden payloads [T1204.002] such as SmokeLoader, a backdoor trojan that is often used in conjunction with Phobos. VALIDATE SECURITY CONTROLS In addition to applying mitigations, the FBI, CISA, and MS-ISAC recommend exercising, testing, and validating your organization"s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (i.e., hard drive, storage device, or the cloud). Finally, once Smokeloader reaches its third stage, it unpacks a program-erase cycle from stored memory, which is then sent to be extracted from a SHA 256 hash as a payload.[7] Following successful payload decryption, the threat actors can begin downloading additional malware. RESOURCES REFERENCES [1] Privacy Affairs: “Moral” 8Base Ransomware Targets 2 New Victims [2] VMware: 8base ransomware:A Heavy Hitting Player [3] Infosecurity Magazine: Phobos Ransomware Family Expands With New FAUST Variant [4] The Record: Hospitals offline across Romania following ransomware attack on IT platform [5] The FBI, CISA, and MS-ISAC recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory. "


Authorities Claim LockBit Admin "LockBitSupp" Has Engaged with Law Enforcement

ransomware
2024-02-25 https://thehackernews.com/2024/02/authorities-claim-lockbit-admin.html
LockBitSupp, the individual(s) behind the persona representing the LockBit ransomware service on cybercrime forums such as Exploit and XSS, "has engaged with law enforcement," authorities said. The development comes following the takedown of the prolific ransomware-as-a-service (RaaS) operation as part of a coordinated international operation codenamed Cronos. Over 14,000 rogue "

Autosummary: " PRODAFT, in its own analysis of the LockBit operation, said it identified over 28 affiliates, some of whom share ties with other Russian e-crime groups like Evil Corp, FIN7, and Wizard Spider (aka TrickBot)." "[Initial access brokers], which were the main source of LockBit"s venture, will not trust their access to a group after a takedown, as they want their access to be turned into cash." "


LockBit ransomware returns, restores servers after police disruption

exploits ransomware
2024-02-25 https://www.bleepingcomputer.com/news/security/lockbit-ransomware-returns-restores-servers-after-police-disruption/
The LockBit gang is relaunching its ransomware operation on a new infrastructure less than a week after law enforcement hacked their servers, and is threatening to focus more of their attacks on the government sector. [...] "

Autosummary: Relaunched LockBit data leak site shows five victims source: BleepingComputer On February 19, authorities took down LockBit’s infrastructure, which included 34 servers hosting the data leak website and its mirrors, data stolen from the victims, cryptocurrency addresses, decryption keys, and the affiliate panel. "


2024 will be a volatile year for cybersecurity as ransomware groups evolve

exploits ransomware ciber
2024-02-23 https://www.helpnetsecurity.com/2024/02/23/ransomware-groups-tactics/

Hackers have significantly increased demands for ransomware, rising over 20% year-over-year to $600,000, according to Arctic Wolf. Organizations are failing to patch their networks And there are worrying signs that 2024 will be especially volatile, as ransomware groups expand their list of targets, and explore new pressure tactics in response to increasingly effective international law enforcement efforts and the growing momentum of refuse-to-pay initiatives. “By helping to end cyber risk for thousands of customers around … More

The post 2024 will be a volatile year for cybersecurity as ransomware groups evolve appeared first on Help Net Security.

"

Autosummary: With an uptick in cloud services, more endpoints, unmanaged/BYO devices, and business operations transitioning from analog to digital platforms, stopping ransomware attacks with effective prevention, detection, and response becomes more challenging by the day. "


LockBitsupp unmasked!!? My reaction to the FBI and NCA’s LockBit ransomware revelation

exploits ransomware
2024-02-23 https://grahamcluley.com/lockbitsupp-unmasked-my-reaction-to-the-fbi-and-ncas-lockbit-ransomware-revelation/
Check out my "live reaction" (isn"t that what all the kids post on social media these days?) to the much-hyped revelation of the identity of the LockBit ransomware"s administrator. "

Autosummary: "


Insomniac Games alerts employees hit by ransomware data breach

financial exploits ransomware
2024-02-23 https://www.bleepingcomputer.com/news/security/insomniac-games-alerts-employees-hit-by-ransomware-data-breach/
Sony subsidiary Insomniac Games is sending data breach notification letters to employees whose personal information was stolen and leaked online following a Rhysida ransomware attack in November. [...] "

Autosummary: Insomniac Games leak on Rhysida"s leak site (BleepingComputer) ​Now, Insomniac Games is notifying employees whose data was stolen between November 25 and November 26 and later leaked on the Rhysida ransomware group"s leak site. "


LockBit ransomware gang has over $110 million in unspent bitcoin

exploits ransomware
2024-02-23 https://www.bleepingcomputer.com/news/security/lockbit-ransomware-gang-has-over-110-million-in-unspent-bitcoin/
The LockBit ransomware gang received more than $125 million in ransom payments over the past 18 months, according to the analysis of hundreds of cryptocurrency wallets associated with the operation. [...] "

Autosummary: “Given that confirmed attacks by LockBit over their 4 years in operation total well over 2,000, this suggests that their impact globally is in the region of multi-billions of dollars” - UK’s National Crime Agency LockBit had $110+ million in 2,200 unspent bitcoins source: NCA In mid-June 2023, America’s Cyber Defense Agency (CISA) said that LockBit was responsible for 1,700 ransomware attacks in the U.S. since 2020 and the gang extorted victims of $91 million. "


Smashing Security podcast #360: Lockbit locked out, and funeral Facebook scams

financial ransomware
2024-02-22 https://grahamcluley.com/smashing-security-podcast-360/
Heaven"s above! Scammers are exploiting online funerals, and Lockbit - the "Walmart of Ransomware" - is dismantled in style by cyber cops. All this and more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault. "

Autosummary: Hosts: Graham Cluley – @gcluley Carole Theriault – @caroletheriault Episode links: Sponsored by: BlackBerry – BlackBerry helps keeps you one step ahead. "


U.S. Offers $15 Million Bounty to Hunt Down LockBit Ransomware Leaders

exploits ransomware
2024-02-22 https://thehackernews.com/2024/02/us-offers-15-million-bounty-to-hunt.html
The U.S. State Department has announced monetary rewards of up to $15 million for information that could lead to the identification of key leaders within the LockBit ransomware group and the arrest of any individual participating in the operation. "Since January 2020, LockBit actors have executed over 2,000 attacks against victims in the United States, and around the world, causing costly "

Autosummary: "LockBit"s operation grew in scale by consistently delivering new product features, providing good customer support, and at times, marketing stunts that included paying people to tattoo themselves with the group"s logo," Intel 471 said. "


LockBit ransomware secretly building next-gen encryptor before takedown

exploits ransomware
2024-02-22 https://www.bleepingcomputer.com/news/security/lockbit-ransomware-secretly-building-next-gen-encryptor-before-takedown/
LockBit ransomware developers were secretly building a new version of their file encrypting malware, dubbed LockBit-NG-Dev - likely a future LockBit 4.0, when law enforcement took down the cybercriminal"s infrastructure earlier this week. [...] "

Autosummary: "


ScreenConnect servers hacked in LockBit ransomware attacks

exploits ransomware
2024-02-22 https://www.bleepingcomputer.com/news/security/screenconnect-servers-hacked-in-lockbit-ransomware-attacks/
Attackers are exploiting a maximum severity authentication bypass vulnerability to breach unpatched ScreenConnect servers and deploy LockBit ransomware payloads on compromised networks. [...] "

Autosummary: "In the last 24 hours, we"ve observed several LockBit attacks, apparently after exploitation of the recent ConnectWise ScreenConnect vulnerabilities (CVE-2024-1708 / CVE-2024-1709)," the Sophos" threat response task force said. "


Why ransomware gangs love using RMM tools—and how to stop them

exploits ransomware
2024-02-22 https://www.malwarebytes.com/blog/business/2024/02/why-ransomware-gangs-love-using-rmm-tools-and-how-to-stop-them
More and more ransomware gangs are using RMM tools in their attacks. "

Autosummary: Ransomware gangs exploit Remote Monitoring and Management (RMM) tools through one of three main strategies: Gaining initial access via preexisting RMM tools: As RMM tools typically require credentials for system access, attackers can exploit weak or default RMM credentials and vulnerabilities to gain unauthorized access to a network. In this post, we will delve into how ransomware gangs use RMM tools, identify the most exploited RMM tools, and discuss how to detect and prevent suspicious RMM tool activity using Application Block and Endpoint Detection and Response (EDR). Whether using RMM tools for initial access, post-infection ransomware deployment, or a combination of the two, ransomware attackers are upping the sophistication of their attacks. "


Bring us the head of LockBit! $15 million bounty offered for information on leaders of notorious ransomware gang

exploits ransomware
2024-02-22 https://www.tripwire.com/state-of-security/bring-us-head-lockbit-15-million-bounty-offered-information-leaders-notorious
A huge reward is being offered for information leading to the identification or location of any of the leaders of the LockBit ransomware gang. Read more in my article on the Tripwire State of Security blog. "

Autosummary: "


New ScreenConnect RCE flaw exploited in ransomware attacks

exploits ransomware
2024-02-22 https://www.bleepingcomputer.com/news/security/new-screenconnect-rce-flaw-exploited-in-ransomware-attacks/
Attackers are exploiting a maximum severity authentication bypass vulnerability to breach unpatched ScreenConnect servers and deploy LockBit ransomware payloads on compromised networks. [...] "

Autosummary: "On February 22, 2024, Sophos X-Ops reported through our social media handle that despite the recent law enforcement activity against the LockBit threat actor group we had observed several attacks over the preceding 24 hours that appeared to be carried out with LockBit ransomware, built using a leaked malware builder tool," Sophos explained. "


US offers $15 million bounty for info on LockBit ransomware gang

exploits ransomware
2024-02-21 https://www.bleepingcomputer.com/news/security/us-offers-15-million-bounty-for-info-on-lockbit-ransomware-gang/
The U.S. State Department is now also offering rewards of up to $15 million to anyone who can provide information about LockBit ransomware gang members and their associates. [...] "

Autosummary: U.S. State Department Secure Drop page (BleepingComputer) "The Department of State is announcing reward offers totaling up to $15 million for information leading to the arrest and/or conviction of any individual participating in a LockBit ransomware variant attack and for information leading to the identification and/or location of any key leaders of the LockBit ransomware group," U.S. State Department Spokesperson Matthew Miller said today. "


US GOV OFFERS A REWARD OF UP TO $15M FOR INFO ON LOCKBIT GANG MEMBERS AND AFFILIATES

ransomware
2024-02-21 https://securityaffairs.com/159454/cyber-crime/lockbit-members-reward.html
U.S. government offers rewards of up to $15 million for information that could lead to the identification or location of LockBit ransomware gang members and affiliates. The U.S. Department of State is offering a reward of up to $15 million for information leading to the identification or location of members of the Lockbit ransomware gang and […] "

Autosummary: Since January 2020, affiliates utilizing LockBit have targeted organizations of diverse sizes spanning critical infrastructure sectors such as financial services, food and agriculture, education, energy, government and emergency services, healthcare, manufacturing, and transportation.US GOV OFFERS A REWARD OF UP TO $15M FOR INFO ON LOCKBIT GANG MEMBERS AND AFFILIATES Pierluigi Paganini February 21, 2024 February 21, 2024 U.S. government offers rewards of up to $15 million for information that could lead to the identification or location of LockBit ransomware gang members and affiliates. "


LockBit, the world&#8217;s worst ransomware, is down

exploits ransomware
2024-02-20 https://www.malwarebytes.com/blog/cybercrime/2024/02/lockbit-the-worlds-worst-ransomware-is-down
LockBit"s position as ransomware"s biggest beast is suddenly in doubt. "

Autosummary: Once you’ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again. Top 5 ransomware gangs by known attacks, February 2023 – January 2024 At this stage we have no idea how serious the damage to LockBit is, and law enforcement is only claiming that the group has been “disrupted”. "


LockBit Ransomware"s Darknet Domains Seized in Global Law Enforcement Raid

exploits ransomware
2024-02-20 https://thehackernews.com/2024/02/lockbit-ransomwares-darknet-domains.html
An international law enforcement operation has led to the seizure of multiple darknet domains operated by LockBit, one of the most prolific ransomware groups, marking the latest in a long list of digital takedowns. While the full extent of the effort, codenamed Operation Cronos, is presently unknown, visiting the group"s .onion website displays a seizure banner containing the message " "

Autosummary: "


Messi defends HK absence as backlash continues

ransomware
2024-02-20 https://www.bbc.co.uk/news/world-asia-china-68345107
The football superstar has addressed Chinese fans in a video posted on social media platform Weibo. "

Autosummary: "


LockBit disrupted by international law enforcement task force

ransomware
2024-02-20 https://www.helpnetsecurity.com/2024/02/20/lockbit-law-enforcement-action/

On Monday afternoon, LockBit’s leak site has been taken over by a coalition of law enforcement agencies and is showing a seizure notice that promises more details today, at 11:30 GMT. “This site is now under the control of The National Crime Agency of the UK, working in close cooperation with the FBI and the international law enforcement task force, ‘Operation Cronos’,” the notice says. “We can confirm that Lockbit’s services have been disrupted as … More

The post LockBit disrupted by international law enforcement task force appeared first on Help Net Security.

"

Autosummary: “According to LockBit admins, the law enforcement agencies exploited PHP CVE-2023-3824 vulnerability to compromise LockBit’s public-facing servers and gain access to LockBit source code, internal chat, victims’ details, and stolen data,” he told Help Net Security. "


Cactus ransomware gang claims the theft of 1.5TB of data from Energy management and industrial automation firm Schneider Electric

exploits ransomware industry
2024-02-20 https://securityaffairs.com/159353/hacking/cactus-ransomware-gang-schneider-electric.html
The Cactus ransomware gang claims the theft of 1.5TB of data from the Energy management and industrial automation firm Schneider Electric. The Cactus ransomware group claims responsibility for pilfering 1.5TB of data from the Energy management and industrial automation giant Schneider Electric. Schneider Electric is a multinational company that specializes in energy management, industrial automation, […] "

Autosummary: Cactus ransomware gang claims the theft of 1.5TB of data from Energy management and industrial automation firm Schneider Electric Pierluigi Paganini February 20, 2024 February 20, 2024 The Cactus ransomware gang claims the theft of 1.5TB of data from the Energy management and industrial automation firm Schneider Electric. "


Critical infrastructure software maker confirms ransomware attack

exploits ransomware
2024-02-20 https://www.bleepingcomputer.com/news/security/critical-infrastructure-software-maker-confirms-ransomware-attack/
PSI Software SE, a German software developer for complex production and logistics processes, has confirmed that the cyber incident it disclosed last week is a ransomware attack that impacted its internal infrastructure. [...] "

Autosummary: It also provides "control system solutions for operational management, network utilization, pipeline management, leak detection and location, portfolio management, energy trading and sales. "


Police arrest LockBit ransomware members, release decryptor in global crackdown

exploits ransomware
2024-02-20 https://www.bleepingcomputer.com/news/security/police-arrest-lockbit-ransomware-members-release-decryptor-in-global-crackdown/
Law enforcement arrested two operators of the LockBit ransomware gang in Poland and Ukraine, created a decryption tool to recover encrypted files for free, and seized over 200 crypto-wallets after hacking the cybercrime gang"s servers in an international crackdown operation. [...] "

Autosummary: "We have source code, details of the victims you have attacked, the amount of money extorted, the data stolen, chats, and much, much more," the message reads. Previous charges against Lockbit ransomware actors include Mikhail Vasiliev (November 2022), Ruslan Magomedovich Astamirov (June 2023), Mikhail Pavlovich Matveev aka Wazawaka (May 2023) Operation Cronos The global LockBit crackdown was coordinated by Operation Cronos, a task force headed by the U.K. National Crime Agency (NCA) and coordinated in Europe by Europol and Eurojust. "


LockBit takedown: Infrastructure disrupted, criminals arrested, decryption keys recovered

ransomware
2024-02-20 https://www.helpnetsecurity.com/2024/02/20/lockbit-takedown/

In the wake of yesterday’s surprise law enforcement takeover of LockBit’s leak site, the UK National Crime Agency (NCA) and Europol have shared more information about the extent of the takedown. “Today, after infiltrating the group’s network, the NCA has taken control of the infrastructure that allows the Lockbit service to operate, compromising their entire criminal enterprise and damaging their credibility,” the Agency said. They’ve taken control of LockBit’s administration environment, which enabled affiliates to … More

The post LockBit takedown: Infrastructure disrupted, criminals arrested, decryption keys recovered appeared first on Help Net Security.

"

Autosummary: The freezing of over 200 cryptocurrency accounts linked to the group The takedown of 34 servers in the Netherlands, Germany, Finland, France, Switzerland, Australia, the United States and the United Kingdom (either belonging to the LockBit threat actors or to their affiliates) “At present, a vast amount of data gathered throughout the investigation is now in the possession of law enforcement. "


LockBit Ransomware Operation Shut Down; Criminals Arrested; Decryption Keys Released

exploits ransomware
2024-02-20 https://thehackernews.com/2024/02/lockbit-ransomware-operation-shut-down.html
The U.K. National Crime Agency (NCA) on Tuesday confirmed that it obtained LockBit"s source code as well as intelligence pertaining to its activities and their affiliates as part of a dedicated task force called Operation Cronos. "Some of the data on LockBit"s systems belonged to victims who had paid a ransom to the threat actors, evidencing that even when a ransom is paid, it does not "

Autosummary: "Some of the data on LockBit"s systems belonged to victims who had paid a ransom to the threat actors, evidencing that even when a ransom is paid, it does not guarantee that data will be deleted, despite what the criminals have promised," the agency said. "


Knight ransomware source code for sale after leak site shuts down

exploits ransomware
2024-02-20 https://www.bleepingcomputer.com/news/security/knight-ransomware-source-code-for-sale-after-leak-site-shuts-down/
The alleged source code for the third iteration of the Knight ransomware is being offered for sale to a single buyer on a hacker forum by a representative of the operation. [...] "

Autosummary: Sale post on the RAMP forums (KELA) “Selling the source code for Knight 3.0 ransomware, this will include the source code of the panel and the locker, all source code is owned and written in Glong C++,” says Cyclops in the post. "


Law enforcement trolls LockBit, reveals massive takedown

ransomware
2024-02-20 https://www.malwarebytes.com/blog/business/2024/02/law-enforcement-trolls-lockbit-reveals-massive-takedown
Law enforcement has humiliated the humiliators. "

Autosummary: As well as taking over the leak site, law enforcement agencies have taken over LockBit’s administration environment, seized the infrastructure used by LockBit’s data exfiltration tool, Stealbit, captured over 1,000 decryption keys, and frozen 200 cryptocurrency accounts.Once you’ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again. The identity of Lockbitsupp won’t be a mystery for much longer The NCA could have put the information about the takedown anywhere, but it didn’t; it did something memorable, humorous, and deliberately humiliating with it. "


More details about Operation Cronos that disrupted Lockbit operation

ransomware
2024-02-20 https://securityaffairs.com/159388/cyber-crime/operation-cronos-against-lockbit.html
Law enforcement provided additional details about the international Operation Cronos that led to the disruption of the Lockbit ransomware operation. Yesterday, a joint law enforcement action, code-named Operation Cronos, conducted by law enforcement agencies from 11 countries disrupted the LockBit ransomware operation. Below is the image of the Tor leak site of the Lockbit ransomware gang that […] "

Autosummary: Since January 2020, affiliates utilizing LockBit have targeted organizations of diverse sizes spanning critical infrastructure sectors such as financial services, food and agriculture, education, energy, government and emergency services, healthcare, manufacturing, and transportation. “The Justice Department also unsealed an indictment obtained in the District of New Jersey charging Russian nationals Artur Sungatov and Ivan Kondratyev, also known as Bassterlord, with deploying LockBit against numerous victims throughout the United States, including businesses nationwide in the manufacturing and other industries, as well as victims around the world in the semiconductor and other industries.It shows that no criminal operation, wherever they are, and no matter how advanced, is beyond the reach of the Agency and our partners.” said National Crime Agency Director General, Graeme Biggar. "


LockBit ransomware disrupted by global police operation

exploits ransomware
2024-02-19 https://www.bleepingcomputer.com/news/security/lockbit-ransomware-disrupted-by-global-police-operation/
Law enforcement agencies from 11 countries have disrupted the notorious LockBit ransomware operation in a joint operation known as ""Operation Cronos." [...] "

Autosummary: We have source code, details of the victims you have attacked, the amount of money extorted, the data stolen, chats, and much, much more," the message displayed on the LockBit panel reads. "


Cactus ransomware claim to steal 1.5TB of Schneider Electric data

exploits ransomware
2024-02-19 https://www.bleepingcomputer.com/news/security/cactus-ransomware-claim-to-steal-15tb-of-schneider-electric-data/
The Cactus ransomware gang claims they stole 1.5TB of data from Schneider Electric after breaching the company"s network last month. [...] "

Autosummary: "


Operation Cronos: law enforcement disrupted the LockBit operation

ransomware
2024-02-19 https://securityaffairs.com/159360/cyber-crime/operation-cronos-disrupted-lockbit-operation.html
An international law enforcement operation codenamed ‘Operation Cronos’ led to the disruption of the LockBit ransomware operation. A joint law enforcement action, code-named Operation Cronos, conducted by law enforcement agencies from 11 countries has disrupted the LockBit ransomware operation. Below is the image of the Tor leak site of the Lockbit ransomware gang that was […] "

Autosummary: Since January 2020, affiliates utilizing LockBit have targeted organizations of diverse sizes spanning critical infrastructure sectors such as financial services, food and agriculture, education, energy, government and emergency services, healthcare, manufacturing, and transportation. "


CISA: Cisco ASA/FTD bug CVE-2020-3259 exploited in ransomware attacks

exploits ransomware
2024-02-17 https://securityaffairs.com/159244/cyber-crime/cisa-cisco-cve-2020-3259-akira-ransomware.html
CISA warns that the Akira Ransomware gang is exploiting the Cisco ASA/FTD vulnerability CVE-2020-3259 (CVSS score: 7.5) in attacks in the wild. This week the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a Cisco ASA and FTD bug, tracked as CVE-2020-3259 (CVSS score: 7.5), to its Known Exploited Vulnerabilities catalog. The vulnerability CVE-2020-3259 is an information disclosure issue that resides […] "

Autosummary: CISA: Cisco ASA/FTD bug CVE-2020-3259 exploited in ransomware attacks Pierluigi Paganini February 17, 2024 February 17, 2024 CISA warns that the Akira Ransomware gang is exploiting the Cisco ASA/FTD vulnerability CVE-2020-3259 (CVSS score: 7.5) in attacks in the wild. "


Cyberint Ransomania empowers organizations to proactively defend against ransomware attacks

exploits ransomware
2024-02-16 https://www.helpnetsecurity.com/2024/02/16/cyberint-ransomania/

Cyberint is unveiling its latest contribution to the infosec community: Ransomania. This free-to-use web application gives users access to a complete repository of ransomware data gathered by the Cyberint Research Team, empowering organizations to combat ransomware with efficiency and collaboration, with the tool making data easily accessible and understandable to business professionals and cybersecurity experts alike. In today’s digital landscape, cyber risk is no longer an isolated concern but a critical factor shaping business operations … More

The post Cyberint Ransomania empowers organizations to proactively defend against ransomware attacks appeared first on Help Net Security.

"

Autosummary: "


Alpha ransomware linked to NetWalker operation dismantled in 2021

exploits ransomware
2024-02-16 https://www.bleepingcomputer.com/news/security/alpha-ransomware-linked-to-netwalker-operation-dismantled-in-2021/
Security researchers analyzing the Alpha ransomware payload and modus operandi discovered overlaps with the now-defunct Netwalker ransomware operation. [...] "

Autosummary: (Symantec) Symantec also reports that recent Alpha attacks extensively employ living-off-the-land tools, including Taskkill, PsExec, Net.exe, and Reg.exe, for evasion. "


CISA Warning: Akira Ransomware Exploiting Cisco ASA/FTD Vulnerability

exploits ransomware
2024-02-16 https://thehackernews.com/2024/02/cisa-warning-akira-ransomware.html
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a now-patched security flaw impacting Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software to its Known Exploited Vulnerabilities (KEV) catalog, following reports that it"s being likely exploited in Akira ransomware attacks. The vulnerability in question is  "

Autosummary: In the fourth quarter of 2023 alone, the e-crime group listed 49 victims on its data leak portal, putting it behind LockBit (275), Play (110), ALPHV/BlackCat (102), NoEscape (76), 8Base (75), and Black Basta (72). "


ALPHV ransomware claims loanDepot, Prudential Financial breaches

financial exploits ransomware
2024-02-16 https://www.bleepingcomputer.com/news/security/alphv-ransomware-claims-loandepot-prudential-financial-breaches/
The ALPHV/Blackcat ransomware gang has claimed responsibility for the recent network breaches of Fortune 500 company Prudential Financial and mortgage lender loanDepot. [...] "

Autosummary: This leading global financial services Fortune 500 company is the second-largest life insurance company in the U.S., with reported revenues of more than $50 billion in 2023, and it employs 40,000 people worldwide. "


Smashing Security podcast #359: Declaring war on ransomware gangs, mobile muddles, and AI religion

exploits ransomware
2024-02-15 https://grahamcluley.com/smashing-security-podcast-359/
Holy mackerel! AI is jumping on the religion bandwagon, ransomware gangs target hospitals, and what"s happened to your old mobile phone number? All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by "Ransomware Sommelier" Allan Liska. "

Autosummary: Hosts: Graham Cluley – @gcluley Carole Theriault – @caroletheriault Guest: Allan Liska – @uuallan Episode links: Sponsored by: BlackBerry – BlackBerry helps keeps you one step ahead. "


Rhysida ransomware cracked! Free decryption tool released

exploits ransomware
2024-02-15 https://www.tripwire.com/state-of-security/rhysida-ransomware-cracked-free-decryption-tool-released
A group of South Korean security researchers have uncovered a vulnerability in the infamous Rhysida ransomware that provides a way for encrypted files to be unscrambled. Read more in my article on the Tripwire State of Security blog. "

Autosummary: The Rhysida decryptor is just the latest in a line of ransomware recovery tools that have appeared in recent years - including utilities to help the victims of the likes of Yanlouwang, MegaCortex, Akira, REvil, and a version of Conti. "


US offers up to $15 million for tips on ALPHV ransomware gang

exploits ransomware
2024-02-15 https://www.bleepingcomputer.com/news/security/us-offers-up-to-15-million-for-tips-on-alphv-ransomware-gang/
The U.S. State Department is offering rewards of up to $10 million for information that could lead to the identification or location of ALPHV/Blackcat ransomware gang leaders. [...] "

Autosummary: The State Department previously announced bounties of up to $15 million for tips on members and affiliates of the Hive, Clop, Conti [1, 2], REvil (Sodinokibi), and Darkside ransomware operations. "


Trans-Northern Pipelines investigating ALPHV ransomware attack claims

exploits ransomware
2024-02-14 https://www.bleepingcomputer.com/news/security/trans-northern-pipelines-investigating-alphv-ransomware-attack-claims/
Trans-Northern Pipelines (TNPI) has confirmed its internal network was breached in November 2023 and that it"s now investigating claims of data theft made by the ALPHV/BlackCat ransomware gang. [...] "

Autosummary: "ALPHV Blackcat affiliates have compromised over 1000 entities—nearly 75 percent of which are in the United States and approximately 250 outside the United States—, demanded over $500 million, and received nearly $300 million in ransom payments," the FBI said in December. "


How ransomware changed in 2023

exploits ransomware
2024-02-14 https://www.malwarebytes.com/blog/cybercrime/2024/02/how-ransomware-changed-in-2023
In 2023, the CL0P ransomware gang broke the scalability barrier and shook the security world with a series of short, automated campaigns. "

Autosummary: Broadly speaking, an attack requires a team of people that: Breaks in to an internet-connected computer, researches the target to see if they’re worth the effort of an attack, explores their network, elevates their privileges until they’re an all-conquering administrator, steals and stores terabytes of data, attacks security software and backups, positions ransomware, runs it, and then conducts negotiations. "


LockBit claims ransomware attack on Fulton County, Georgia

exploits government ransomware
2024-02-14 https://www.bleepingcomputer.com/news/security/lockbit-claims-ransomware-attack-on-fulton-county-georgia/
The LockBit ransomware gang claims to be behind the recent cyberattack on Fulton County, Georgia, and is threatening to publish "confidential" documents if a ransom is not paid. [...] "

Autosummary: LockBit promises “maximum publicity” On Tuesday, the LockBit ransomware group claimed responsibility for the attack on Fulton County saying, publishing 25 screenshots to prove they had gained access to the county’s systems and that they had stolen sensitive data. "


A ransomware attack took 100 Romanian hospitals down

exploits ransomware
2024-02-13 https://securityaffairs.com/159093/cyber-crime/romanian-hospitals-ransomware-attack.html
Authorities in Romania reported that at least 100 hospitals went offline after a ransomware attack hit the Hipocrate platform. Authorities in Romania confirmed that a ransomware attack that targeted the Hipocrate Information System (HIS) has disrupted operations for at least 100 hospitals. Hipocrate Information System (HIS) is a software suite designed to manage the medical […] "

Autosummary: Stopping it will remove the evidence stored in the volatile memory (RAM) Collect and keep all relevant log information, from the affected equipment, but also from network equipment, firewall Examine the system logs to identify the mechanism by which IT infrastructure has been compromised Immediately inform all employees and notify affected customers and business partners of the incident and its extent Restore affected systems based on data backups after a full system cleanup has been performed . "


U.S. Offers $10 Million Bounty for Info Leading to Arrest of Hive Ransomware Leaders

exploits ransomware
2024-02-12 https://thehackernews.com/2024/02/us-offers-10-million-bounty-for-info.html
The U.S. Department of State has announced monetary rewards of up to $10 million for information about individuals holding key positions within the Hive ransomware operation. It is also giving away an additional $5 million for specifics that could lead to the arrest and/or conviction of any person "conspiring to participate in or attempting to participate in Hive ransomware activity." "

Autosummary: Palo Alto Networks Unit 42, in its own analysis of ransomware gangs" public listings of victims on dark web sites, called out manufacturing as the most impacted industry vertical in 2023, followed by profession and legal services, high technology, retail, construction, and healthcare sectors. Besides a notable shift to big game hunting, which refers to the tactic of targeting very large companies to extract hefty ransoms, ransom payments are being steadily routed through cross-chain bridges, instant exchangers, and gambling services, indicating that e-crime groups are slowly moving away from centralized exchanges and mixers in pursuit of new avenues for money laundering. "


Decryptor for Rhysida ransomware is available!

exploits ransomware
2024-02-12 https://www.helpnetsecurity.com/2024/02/12/rhysida-ransomware-decryptor/

Files encrypted by Rhysida ransomware can be successfully decrypted, due to a implementation vulnerability discovered by Korean researchers and leveraged to create a decryptor. Rhysida and its ransomware Rhysida is a relatively new ransomware-as-a-service gang that engages in double extortion. First observed in May 2023, it made its name by attacking the British Library, the Chilean Army, healthcare delivery organizations, and Holding Slovenske Elektrarne (HSE). According to Check Point Research, the Rhysida ransomware group may … More

The post Decryptor for Rhysida ransomware is available! appeared first on Help Net Security.

"

Autosummary: "


Free Rhysida ransomware decryptor for Windows exploits RNG flaw

exploits ransomware
2024-02-12 https://www.bleepingcomputer.com/news/security/free-rhysida-ransomware-decryptor-for-windows-exploits-rng-flaw/
South Korean researchers have publicly disclosed an encryption flaw in the Rhysida ransomware encryptor, allowing the creation of a Windows decryptor to recover files for free. [...] "

Autosummary: South Korean researchers, including employees of the Korean Internet & Security Agency (KISA), examining Rhysida found an implementation vulnerability in the ransomware"s encryption scheme, specifically, the random number generator (CSPRNG) that helps generate the unique private (encryption) key in each attack. "


Rhysida Ransomware Cracked, Free Decryption Tool Released

exploits ransomware
2024-02-12 https://thehackernews.com/2024/02/rhysida-ransomware-cracked-free.html
Cybersecurity researchers have uncovered an "implementation vulnerability" that has made it possible to reconstruct encryption keys and decrypt data locked by Rhysida ransomware. The findings were published last week by a group of researchers from Kookmin University and the Korea Internet and Security Agency (KISA). "Through a comprehensive analysis of Rhysida Ransomware, we identified an "

Autosummary: " Using these observations as reference points, the researchers said they were able to retrieve the initial seed for decrypting the ransomware, determine the "randomized" order in which the files were encrypted, and ultimately recover the data without having to pay a ransom. "


20+ hospitals in Romania hit hard by ransomware attack on IT service provider

exploits ransomware Telcos
2024-02-12 https://grahamcluley.com/20-hospitals-in-romania-hit-hard-by-ransomware-attack-on-it-service-provider/
Over 20 hospitals in Bucharest have reportedly been impacted by a ransomware attack after cybercriminals targeted an IT service provider. As a consequence medical staff have been forced to use pen-and-paper rather than computer systems. "

Autosummary: Affected hospitals include: Azuga Orthopaedics and Traumatology Hospital Băicoi City Hospital Buzău County Emergency Hospital C.F. Clinical Hospital no. 2 Bucharest Colțea Clinical Hospital Emergency County Hospital “Dr. Constantin Opriș” Baia Mare Emergency Hospital for Plastic, Reconstructive and Burn Surgery Bucharest Fundeni Clinical Institute Hospital for Chronic Diseases Sf. "


Researchers released a free decryption tool for the Rhysida Ransomware

exploits ransomware
2024-02-12 https://securityaffairs.com/159031/cyber-crime/rhysida-ransomware-decryption-tool.html
Researchers discovered a vulnerability in the code of the Rhysida ransomware that allowed them to develop a decryption tool. Cybersecurity researchers from Kookmin University and the Korea Internet and Security Agency (KISA) discovered an implementation vulnerability in the source code of the Rhysida ransomware. The experts exploited the vulnerability to reconstruct encryption keys and developed […] "

Autosummary: The ransomware gang hit organizations in multiple industries, including the education, healthcare, manufacturing, information technology, and government sectors.Researchers released a free decryption tool for the Rhysida Ransomware Pierluigi Paganini February 12, 2024 February 12, 2024 Researchers discovered a vulnerability in the code of the Rhysida ransomware that allowed them to develop a decryption tool. "


macOS Backdoor RustDoor likely linked to Alphv/BlackCat ransomware operations

exploits ransomware
2024-02-10 https://securityaffairs.com/158942/malware/macos-backdoor-rustdoor.html
Bitdefender Researchers linked a new macOS backdoor, named RustDoor, to the Black Basta and Alphv/BlackCat ransomware operations. Researchers from Bitdefender discovered a new macOS backdoor, dubbed RustDoor, which appears to be linked to ransomware operations Black Basta and Alphv/BlackCat. RustDoor is written in Rust language and supports multiple features. The malware impersonates a Visual Studio […] "

Autosummary: macOS Backdoor RustDoor likely linked to Alphv/BlackCat ransomware operations Pierluigi Paganini February 10, 2024 February 10, 2024 Bitdefender Researchers linked a new macOS backdoor, named RustDoor, to the Black Basta and Alphv/BlackCat ransomware operations. "


Black Basta ransomware gang hacked Hyundai Motor Europe

exploits ransomware
2024-02-09 https://securityaffairs.com/158916/data-breach/black-basta-ransomware-hyundai-motor-europe.html
Black Basta ransomware gang claims the hack of the car maker Hyundai Motor Europe and the theft of three terabytes of their data. BleepingComputer reported that the Car maker Hyundai Motor Europe was breached by the Black Basta ransomware gang. The threat actors claim to have stolen three terabytes of data from the company. In […] "

Autosummary: The crooks provided Bleeping Computer with evidence of the data breach, it seems that the gang stole data from various departments, including legal, sales, and human resources. "


Hyundai Motor Europe hit by Black Basta ransomware attack

exploits ransomware
2024-02-08 https://www.bleepingcomputer.com/news/security/hyundai-motor-europe-hit-by-black-basta-ransomware-attack/
Car maker Hyundai Motor Europe suffered a Black Basta ransomware attack, with the threat actors claiming to have stolen three terabytes of corporate data. [...] "

Autosummary: While it is not known what data was stolen, the folder names indicate its related to various departments at the company, including legal, sales, human resources, accounting, IT, and management. "


US offers $10 million for tips on Hive ransomware leadership

exploits ransomware
2024-02-08 https://www.bleepingcomputer.com/news/security/us-offers-10-million-for-tips-on-hive-ransomware-leadership/
The U.S. State Department offers rewards of up to $10 million for information that could help locate, identify, or arrest members of the Hive ransomware gang. [...] "

Autosummary: "Since late July 2022, the FBI has penetrated Hive"s computer networks, captured its decryption keys, and offered them to victims worldwide, preventing victims from having to pay $130 million in ransom demanded," the Justice Department said. "


Round 3! The toothbrush DDoS attack saga continues: Newspaper counters Fortinet’s translation claim in contentious interview

ransomware
2024-02-08 https://grahamcluley.com/round-3-in-the-toothbrush-ddos-debacle/
We thought it was all over... but a Swiss newspaper has come out fighting, blaming Fortinet for spreading untruths about a toothbrush botnet. Will Fortinet return for Round 4, or is this a knockout punch? "

Autosummary: Here’s what the newspaper has said (computer-translated for us who don’t understand German): What is now described by the Fortinet headquarters in California as a “translation problem” has listened to the research in a completely different way: Swiss Fortinet representatives have described the toothbrush case as a real DDoS attack at an appointment, which dealt with current threat situations. "


Smashing Security podcast #358: Hong Kong hijinks, pig butchers, and poor ransomware gangs

exploits ransomware
2024-02-08 https://grahamcluley.com/smashing-security-podcast-358/
Is this the real life? Is this just fantasy? A company in Hong Kong suffers a sophisticated deepfake duping, be one your guard from pig butchers as Valentine"s Day approaches, and spare a moment to feel sorry for poor ransomware gangs. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Lianne Potter from the "Compromising Positions" podcast. "

Autosummary: Hosts: Graham Cluley – @gcluley Carole Theriault – @caroletheriault Guest: Lianne Potter – @Tech_Soapbox Episode links: Sponsored by: Kolide – Kolide ensures that if your device isn’t secure it can’t access your cloud apps. "


US offers $10 million reward for info on Hive ransomware group leaders

exploits ransomware
2024-02-08 https://securityaffairs.com/158871/cyber-crime/10m-reward-hive-ransomware-group.html
U.S. Government offers rewards of up to $10 million for information that could help locate, identify, or arrest members of the Hive ransomware group. The US Department of State announced rewards up to $10,000,000 for information leading to the identification and/or location of the leaders of the Hive ransomware group. The US government also offers […] "

Autosummary: The authorities reported that from June 2021 through at least November 2022, threat actors targeted a wide range of businesses and critical infrastructure sectors, including Government Facilities, Communications, Critical Manufacturing, Information Technology, and especially Healthcare and Public Health (HPH). "


Known ransomware attacks up 68% in 2023

exploits ransomware
2024-02-06 https://www.malwarebytes.com/blog/awareness/2024/02/known-ransomware-attacks-up-68-in-2023
Big Game ransomware is just one of six threats resource-constrained IT teams need to pay attention to in 2024. "

Autosummary: Its activity is built around evergreen techniques like phishing, software exploits, and password guessing, along with mature malicious technologies like info stealers, trojans, and ransomware. "


INTERPOL Arrests 31 in Global Operation, Identifies 1,900+ Ransomware-Linked IPs

exploits ransomware
2024-02-02 https://thehackernews.com/2024/02/interpol-arrests-31-in-global-operation.html
An INTERPOL-led collaborative operation targeting phishing, banking malware, and ransomware attacks has led to the identification of 1,300 suspicious IP addresses and URLs. The law enforcement effort, codenamed Synergia, took place between September and November 2023 in an attempt to blunt the "growth, escalation and professionalization of transnational cybercrime." Involving 60 law "

Autosummary: "


The Week in Ransomware - February 2nd 2024 - No honor among thieves

exploits ransomware
2024-02-02 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-february-2nd-2024-no-honor-among-thieves/
Attacks on hospitals continued this week, with ransomware operations disrupting patient care as they force organization to respond to cyberattacks. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @Seifreed, @malwrhunterteam, @Ionut_Ilascu, @LawrenceAbrams, @BleepinComputer, @billtoulas, @demonslay335, @serghei, @fwosar, @CyberArk, @coveware, @pcrisk, @USGAO, @Jon__DiMaggio, @ThierryBreton, @Truesec, @Analyst1, @AhnLab_SecuInfo, @RakeshKrish12, @Netenrich, @jgreigj, and @AJVicens. For hospitals, this means that they no longer have access to medical charts, can"t prescribe electronic prescriptions, respond to patients through online portals, or in some cases, access medical diagnostic reports. Most federal agencies that lead and manage risk for 4 critical sectors—manufacturing, energy, healthcare and public health, and transportation systems—have assessed or plan to assess risks associated with ransomware. "


Free ransomware recovery tool White Phoenix now has a web version

exploits ransomware
2024-01-31 https://www.helpnetsecurity.com/2024/01/31/free-ransomware-recovery-tool-white-phoenix-web-version/

White Phoenix is a free ransomware recovery tool for situations where files are encrypted with intermittent encryption. It was tested on BlackCat/ALPHV Ransomware, Play Ransomware, Qilin/Agenda Ransomware, BianLian Ransomware, and DarkBit. Intermittent encryption occurs when ransomware chooses not to encrypt every part of each file but instead encrypts sections, frequently in blocks of a set size or just the start of the targeted files. Consumer concerns about ransomware attacks Consumers are keeping a pulse on … More

The post Free ransomware recovery tool White Phoenix now has a web version appeared first on Help Net Security.

"

Autosummary: So, companies should ensure they have strong protective and detective measures in place, such as effective endpoint protection, robust email and web filtering for malicious content, mature security awareness programs, immutable backups, and constant monitoring for suspicious activity. "


Johnson Controls says ransomware attack cost $27 million, data stolen

exploits ransomware
2024-01-31 https://www.bleepingcomputer.com/news/security/johnson-controls-says-ransomware-attack-cost-27-million-data-stolen/
Johnson Controls International has confirmed that a September 2023 ransomware attack cost the company $27 million in expenses and led to a data breach after hackers stole corporate data. [...] "

Autosummary: "


Cactus ransomware gang claims the Schneider Electric hack

exploits ransomware
2024-01-30 https://securityaffairs.com/158320/data-breach/schneider-electric-cactus-ransomware-attack.html
Energy management and industrial automation firm Schneider Electric suffered a data breach after a Cactus ransomware attack. Schneider Electric is a multinational company that specializes in energy management, industrial automation, and digital transformation. BleepingComputer first reported the attack that hit the Sustainability Business division of the company on January 17th. BleepingComputer contacted Schneider Electric which […] "

Autosummary: The company is working to restore the impacted systems and is investigating the incident with the help of leading cybersecurity firms, The Cactus ransomware operation has been active since March 2023, despite the threat actors use a double-extortion model, their data leak site has yet to be discovered. "


Online ransomware decryptor helps recover partially encrypted files

exploits ransomware
2024-01-30 https://www.bleepingcomputer.com/news/security/online-ransomware-decryptor-helps-recover-partially-encrypted-files/
CyberArk has created an online version of "White Phoenix," an open-source ransomware decryptor targeting operations using intermittent encryption. [...] "

Autosummary: Current ransomware strains employing intermittent encryption include Blackcat/ALPHV, Play, Qilin/Agenda, BianLian, and DarkBit. "


Albabat, Kasseika, Kuiper: New Ransomware Gangs Rise with Rust and Golang

exploits ransomware
2024-01-29 https://thehackernews.com/2024/01/albabat-kasseika-kuiper-new-ransomware.html
Cybersecurity researchers have detected in the wild yet another variant of the Phobos ransomware family known as Faust. Fortinet FortiGuard Labs, which detailed the latest iteration of the ransomware, said it"s being propagated by means of an infection that delivers a Microsoft Excel document (.XLAM) containing a VBA script. "The attackers utilized the Gitea service to store several files "

Autosummary: The development comes as new ransomware families such as Albabat (aka White Bat), Kasseika, Kuiper, Mimus, and NONAME have gained traction, with the former a Rust-based malware that"s distributed in the form of fraudulent software such as a fake Windows 10 digital activation tool and a cheat program for the Counter-Strike 2 game. "


Energy giant Schneider Electric hit by Cactus ransomware attack

exploits ransomware industry
2024-01-29 https://www.bleepingcomputer.com/news/security/energy-giant-schneider-electric-hit-by-cactus-ransomware-attack/
Energy management and automation giant Schneider Electric suffered a Cactus ransomware attack leading to the theft of corporate data, according to people familiar with the matter. [...] "

Autosummary: Outage message on Schneider Electric"s Resource Advisor platform Source: BleepingComputer Customers of Schneider Electric"s Sustainability Business division include Allegiant Travel Company, Clorox, DHL, DuPont, Hilton, Lexmark, PepsiCo, and Walmart. Like all ransomware operations, the threat actors will breach corporate networks through purchased credentials, partnerships with malware distributors, phishing attacks, or by exploiting vulnerabilities. "


Medusa ransomware attack hit Kansas City Area Transportation Authority

exploits government ransomware
2024-01-28 https://securityaffairs.com/158233/cyber-crime/kansas-city-area-transportation-authority-ransomware-attack.html
Medusa ransomware gang claimed responsibility for the attack against the Kansas City Area Transportation Authority (KCATA). On January 23, 2023, the Kansas City Area Transportation Authority (KCATA) suffered a ransomware attack. The Kansas City Area Transportation Authority (KCATA) is a public transit agency in metropolitan Kansas City. It operates the Metro Area Express (MAX) bus […] "

Autosummary: Medusa ransomware attack hit Kansas City Area Transportation Authority Pierluigi Paganini January 28, 2024 January 28, 2024 Medusa ransomware gang claimed responsibility for the attack against the Kansas City Area Transportation Authority (KCATA). "


The Week in Ransomware - January 26th 2024 - Govts strike back

exploits ransomware
2024-01-27 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-january-26th-2024-govts-strike-back/
Governments struck back this week against members of ransomware operations, imposing sanctions on one threat actor and sentencing another to prison. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @billtoulas, @LawrenceAbrams, @serghei, @BleepinComputer, @Seifreed, @Ionut_Ilascu, @demonslay335, @fwosar, @malwrhunterteam, @NCSC, @TrendMicro, @Intrinsec, @Fortinet, @pcrisk, and @rivitna2. Unfortunately, we also learned about numerous large-scale attacks this week, including an Akira attack on Tietoevry, an attack on water services giant Veolia North America, and an attack on fintech firm Equilend, which LockBit claimed. "


Kansas public transportation authority hit by ransomware

exploits ransomware
2024-01-27 https://www.bleepingcomputer.com/news/security/kansas-public-transportation-authority-hit-by-ransomware/
The Kansas City Area Transportation Authority (KCATA) announced it was targeted by a ransomware attack on Tuesday, January 23. [...] "

Autosummary: "All service is operating, including fixed-route buses, Freedom and Freedom-On-Demand paratransit service," explained KCATA. "


Kansas City public transportation authority hit by ransomware

exploits government ransomware
2024-01-27 https://www.bleepingcomputer.com/news/security/kansas-city-public-transportation-authority-hit-by-ransomware/
The Kansas City Area Transportation Authority (KCATA) announced it was targeted by a ransomware attack on Tuesday, January 23. [...] "

Autosummary: "All service is operating, including fixed-route buses, Freedom and Freedom-On-Demand paratransit service," explained KCATA. "


What makes ransomware victims less likely to pay up?

exploits ransomware
2024-01-26 https://www.helpnetsecurity.com/2024/01/26/what-makes-ransomware-victims-less-likely-to-pay-up/

There’s a good reason why ransomware gangs started exfiltrating victims’ data instead of just encrypting it: those organizations pay more. University of Twente researcher Tom Meurs and his colleagues wanted to know which factors influence victims to pay the ransom or not, and which factors have an effect on the ransom amount organizations end up paying. Based on the data provided by the Dutch National Police and a Dutch incident response organisation on 481 ransomware … More

The post What makes ransomware victims less likely to pay up? appeared first on Help Net Security.

"

Autosummary: "


AI likely to boost ransomware, warns government body

exploits government ransomware
2024-01-25 https://www.malwarebytes.com/blog/news/2024/01/ai-likely-to-boost-ransomware-warns-government-body
The NCSC issued a report that warns about the growth and impact of malware, especially ransomware, due to the availability of AI. "

Autosummary: The NCSC expects that by 2025, GenAI and large language models (LLMs) will make it difficult for everyone, regardless of their cybersecurity posture, to assess whether an email or password reset request is genuine, or to identify phishing, spoofing, or other social engineering attempts.Once you’ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again. Generative AI (GenAI) can already be used to create and entertain a convincing interaction with victims, including the creation of lure documents, without the translation, spelling, and grammatical errors that used to reveal phishing. "


AI is already being used by ransomware gangs, warns NCSC

exploits ransomware
2024-01-25 https://www.tripwire.com/state-of-security/ncsc-warns-ai-already-being-used-ransomware-gangs
In a newly published report, the UK"s National Cyber Security Centre (NCSC) has warned that malicious attackers are already taking advantage of artificial intelligence and that the volume and impact of threats - including ransomware - will increase in the next two years. Read more in my article on the Tripwire State of Security blog. "

Autosummary: "


Kasseika Ransomware Using BYOVD Trick to Disarms Security Pre-Encryption

exploits ransomware
2024-01-24 https://thehackernews.com/2024/01/kasseika-ransomware-using-byovd-trick.html
The ransomware group known as Kasseika has become the latest to leverage the Bring Your Own Vulnerable Driver (BYOVD) attack to disarm security-related processes on compromised Windows hosts, joining the likes of other groups like Akira, AvosLocker, BlackByte, and RobbinHood. The tactic allows "threat actors to terminate antivirus processes and services for the deployment of ransomware," Trend "

Autosummary: BianLian has been an active and prevalent threat group since September 2022, predominantly singling out healthcare, manufacturing, professional, and legal services sectors in the U.S., the U.K., Canada, India, Australia, Brazil, Egypt, France, Germany, and Spain. "


Akira ransomware attack on Tietoevry disrupted the services of many Swedish organizations

exploits ransomware
2024-01-24 https://securityaffairs.com/158031/cyber-crime/tietoevry-akira-ransomware-attack.html
A ransomware attack against the Finnish IT services provider Tietoevry disrupted the services of some Swedish government agencies and shops. The online services of multiple Swedish government agencies, universities, and commercial activities were disrupted by an Akira ransomware attack that hit the Finnish IT services and enterprise cloud hosting Tietoevry. Tietoevry is a Finnish multinational […] "

Autosummary: Akira ransomware attack on Tietoevry disrupted the services of many Swedish organizations Pierluigi Paganini January 24, 2024 January 24, 2024 A ransomware attack against the Finnish IT services provider Tietoevry disrupted the services of some Swedish government agencies and shops. The Akira ransomware has been active since March 2023, the threat actors behind the malware claim to have already hacked multiple organizations in multiple industries, including education, finance, and real estate. "


UK says AI will empower ransomware over the next two years

exploits ransomware
2024-01-24 https://www.bleepingcomputer.com/news/security/uk-says-ai-will-empower-ransomware-over-the-next-two-years/
The United Kingdom"s National Cyber Security Centre (NCSC) warns that artificial intelligence (AI) tools will have an adverse near-term impact on cybersecurity, helping escalate the threat of ransomware. [...] "

Autosummary: "Threat actors, including ransomware actors, are already using AI to increase the efficiency and effectiveness of aspects of cyber operations, such as reconnaissance, phishing and coding," warns the NCSC in a separate threat assessment. "


2024 State of Ransomware in Education: 92% spike in K-12 attacks

exploits government ransomware
2024-01-24 https://www.malwarebytes.com/blog/threat-intelligence/2024/01/2024-state-of-ransomware-in-education-92-spike-in-k-12-attacks
2023 was the worst ransomware year on record for Education. "

Autosummary: The Threat Landscape The top gangs that targeted the education sector between January 2023 and December 2023 include LockBit (60), Vice Society/Rhysida (44), CL0P (22), Medusa (17), and Akira (15).The data also shows that, while ransomware attacks against education are a global phenomenon, the US (with 80% of known attacks) and the UK (with 12%) were hit the most frequently attacked countries between January 2023 and December 2023. "


Kasseika ransomware uses antivirus driver to kill other antiviruses

exploits ransomware
2024-01-23 https://www.bleepingcomputer.com/news/security/kasseika-ransomware-uses-antivirus-driver-to-kill-other-antiviruses/
A recently uncovered ransomware operation named "Kasseika" has joined the club of threat actors that employs Bring Your Own Vulnerable Driver (BYOVD) tactics to disable antivirus software before encrypting files. [...] "

Autosummary: By using BYOVD attacks, aka exploiting flaws in the loaded driver, the malware gains the privileges to terminate 991 processes from a hardcoded list, many of which correspond to antivirus products, security tools, analysis tools, and system utilities. "


Water services giant Veolia North America hit by ransomware attack

exploits ransomware
2024-01-23 https://www.bleepingcomputer.com/news/security/water-services-giant-veolia-north-america-hit-by-ransomware-attack/
Veolia North America, a subsidiary of transnational conglomerate Veolia, disclosed a ransomware attack that impacted systems part of its Municipal Water division and disrupted its bill payment systems. [...] "

Autosummary: U.S. Water and Wastewater Systems (WWS) Sector facilities have also been breached multiple times by several threat groups deploying Ghost, ZuCaNo, and Makop ransomware in recent years, Other breaches of water facilities have happened over the past two decades, including a South Houston wastewater treatment plant in 2011, a water company with outdated software and hardware equipment in 2016, the Southern California Camrosa Water District in August 2020, and a Pennsylvania water system in May 2021. "


Tietoevry ransomware attack halts Swedish organizations

exploits ransomware
2024-01-22 https://www.helpnetsecurity.com/2024/01/22/tietoevry-ransomware/

Finnish IT software and service company Tietoevry has suffered a ransomware attack that affected several customers of one of its datacenters in Sweden. The attack The ransomware attack took place during the night of January 19-20. “The attack was limited to one part of one of our Swedish datacenters, impacting Tietoevry’s services to some of our customers in Sweden,” the company noted. “Tietoevry immediately isolated the affected platform, and the ransomware attack has not affected … More

The post Tietoevry ransomware attack halts Swedish organizations appeared first on Help Net Security.

"

Autosummary: "


loanDepot says ransomware gang stole data of 16.6 million people

exploits ransomware
2024-01-22 https://www.bleepingcomputer.com/news/security/loandepot-says-ransomware-gang-stole-data-of-166-million-people/
Mortgage lender loanDepot says that approximately 16.6 million people had their personal information stolen in a ransomware attack disclosed earlier this month. [...] "

Autosummary: "


Tietoevry ransomware attack causes outages for Swedish firms, cities

exploits ransomware
2024-01-21 https://www.bleepingcomputer.com/news/security/tietoevry-ransomware-attack-causes-outages-for-swedish-firms-cities/
Finnish IT services and enterprise cloud hosting provider Tietoevry has suffered a ransomware attack impacting cloud hosting customers in one of its data centers in Sweden, with the attack reportedly conducted by the Akira ransomware gang. [...] "

Autosummary: Message on Filmstaden"s website warning of the IT outage Source: BleepingComputer Other companies impacted by the attack include discount retail chain Rusta, raw building materials provider Moelven, and farming supplier Grangnården, which was forced to close its stores while IT services are restored. Impacted universities and colleges in the country include the Karolinska Institutet, SLU, University West, Stockholm University, Lunds Universitet, and Malmö University. "


LockBit ransomware gang claims the attack on the sandwich chain Subway

exploits ransomware
2024-01-21 https://securityaffairs.com/157852/cyber-crime/lockbit-hacked-sandwich-chain-subway.html
The LockBit ransomware gang claimed to have hacked Subway, the American multinational fast food restaurant franchise.  Subway IP LLC is an American multinational fast-food restaurant franchise that specializes in submarine sandwiches (subs), wraps, salads, and drinks. The Lockbit ransomware group added Subway to the list of victims on its Tor data leak site and threatened to leak […] "

Autosummary: "


Researchers link 3AM ransomware to Conti, Royal cybercrime gangs

exploits ransomware
2024-01-20 https://www.bleepingcomputer.com/news/security/researchers-link-3am-ransomware-to-conti-royal-cybercrime-gangs/
Security researchers analyzing the activity of the recently emerged 3AM ransomware operation uncovered close connections with infamous groups, such as the Conti syndicate and the Royal ransomware gang. [...] "

Autosummary: Analysis of 3AM ransomware intrusion set source: Intrinsec A closer analysis revealed that six of the 27 servers shared the same port, protocol, Apache product with the same version, autonomous system (AS16125), organization, and the text “llc” indicating a ‘limited liability company’. The syndicate split into multiple cells and the ransomware brand dissolved but many of its members and affiliates partnered with other operations, contributing with experienced individuals for all stages of an attack, from target analysis and initial access, to negotiations, infrastructure, developers, and operators. "


Vans, North Face owner says ransomware breach affects 35 million people

exploits ransomware
2024-01-19 https://www.bleepingcomputer.com/news/security/vans-north-face-owner-says-ransomware-breach-affects-35-million-people/
VF Corporation, the company behind brands like Vans, Timberland, The North Face, Dickies, and Supreme, said that more than 35 million customers had their personal information stolen in a December ransomware attack. [...] "

Autosummary: "


35.5 million customers of major apparel brands have their data breached after ransomware attack

financial exploits ransomware
2024-01-19 https://www.bitdefender.com/blog/hotforsecurity/35-5-million-customers-of-major-apparel-brands-have-their-data-breached-after-ransomware-attack/
Bought some Timberland shoes? Wear a North Face jacket? You, and millions of purchasers of other popular high-street brands, could have had their data stolen by the ALPHV ransomware group. Read more in my article on the Hot for Security blog. "

Autosummary: VF Corp"s family of brands include: Altra Dickies Eastpak icebreaker JanSport Kipling Napapijri Smartwool Supreme The North Face Timberland Vans The good news is that VF Corp does not retain consumers" payment card details, bank account information, or social security numbers - so you probably don"t have to worry that that particularly sensitive information has fallen into the hands of hackers. "


Poorly secured PostgreSQL, MySQL servers targeted by ransomware bot

exploits ransomware
2024-01-18 https://www.helpnetsecurity.com/2024/01/18/postgresql-mysql-ransomware-bot/

Users exposing poorly secured PostgreSQL and MySQL servers online are in danger of getting their databases wiped by a ransomware bot, Border0 researchers are warning. The attackers asks for a small sum to return / not publish the data, but those who pay will not get their data back, as the bot takes only a small amount of it before wiping it all. How the ransomware bot operates Spurred by a recent tweet in which … More

The post Poorly secured PostgreSQL, MySQL servers targeted by ransomware bot appeared first on Help Net Security.

"

Autosummary: Created a new database named readme_to_recover, which contains the ransom note The ransom note (Source: Border0) “If you decide not to retrieve the data, we may sell your database in online markets, disclose it to your users and request payment from them, disclose it in online breach forums, or delete it. "


TeamViewer abused to breach networks in new ransomware attacks

exploits ransomware
2024-01-18 https://www.bleepingcomputer.com/news/security/teamviewer-abused-to-breach-networks-in-new-ransomware-attacks/
Ransomware actors are again using TeamViewer to gain initial access to organization endpoints and attempt to deploy encryptors based on the leaked LockBit ransomware builder. [...] "

Autosummary: In the second endpoint seen by Huntress, which has been running since 2018, there had been no activity in the logs for the past three months, indicating that it was less frequently monitored, possibly making it more attractive for the attackers. "


Majorca city Calvià extorted for $11M in ransomware attack

exploits government ransomware
2024-01-16 https://www.bleepingcomputer.com/news/security/majorca-city-calvi-extorted-for-11m-in-ransomware-attack/
The Calvià City Council in Majorca announced it was targeted by a ransomware attack on Saturday, which impacted municipal services. [...] "

Autosummary: "The Calvià City Council is working to restore normality as soon as possible, after having been the target, in the early hours of last Saturday, of a ransomware cyberattack, through which they intend to extort the council," says the announcement from Calvià. "


Balada Injector continues to infect thousands of WordPress sites

ransomware
2024-01-15 https://securityaffairs.com/157470/malware/balada-injector-malware-wordpress-sites.html
Balada Injector malware infected more than 7100 WordPress sites using a vulnerable version of the Popup Builder plugin. In September, Sucuri researchers reported that more than 17,000 WordPress websites had been compromised in September with the Balada Injector. The researchers noticed that the number of Balada Injector infections has doubled compared with August 2023. The Balada […] "

Autosummary: In the recent wave of attacks, if threat actors detect logged-in admin cookies, they exploit the issue to install and activate a rogue backdoor plugin (“wp-felody.php” or “Wp Felody”) and load a second-stage payload from specialcraftbox[.]com. "


3 Ransomware Group Newcomers to Watch in 2024

exploits ransomware
2024-01-15 https://thehackernews.com/2024/01/3-ransomware-group-newcomers-to-watch.html
The ransomware industry surged in 2023 as it saw an alarming 55.5% increase in victims worldwide, reaching a staggering 4,368 cases.  Figure 1: Year over year victims per quarter The rollercoaster ride from explosive growth in 2021 to a momentary dip in 2022 was just a teaser—2023 roared back with the same fervor as 2021, propelling existing groups and ushering in a wave of formidable "

Autosummary: Evasion T1564 - Hide Artifacts Discovery T1083 - File and Directory Discovery Discovery T1010 - Application Window Discovery Discovery T1082 - System Information Discovery Discovery T1057 - Process Discovery Discovery T1518.001 - Security Software Discovery Initial Access T1566-Phishing Collection T1005 - Data from Local System Collection T1119 - Automated Collection Resource Development T1587 - Develop Capabilities Resource Development T1583-Acquire Infrastructure Execution T1129 - Shared Modules Execution T1059 - Command and Scripting Interpreter Reconnaissance T1595- Active Scanning Reconnaissance T1598-Phishing for Information The Akira Group The Akira Group, was discovered in March 2023 and has claimed 81 victims to date. Known TTPs Tools Tactics Exfiltration T1567 - Exfiltration Over Web Service Initial Access T1566.001 - Spearphishing Attachment Exfiltration T1041 - Exfiltration Over C2 Channel Exfiltration T1537 - Transfer Data to Cloud Account Collection T1114.001 - Local Email Collection Impact T1486 - Data Encrypted for Impact Initial Access T1566.002 - Spearphishing Link Execution T1059.001 - PowerShell Execution T1569.002 - Service Execution Discovery T1016.001 - Internet Connection Discovery Initial Access T1078 - Valid Accounts Privilege Escalation T1078 - Valid Accounts DefenseIn 2024, Cyberint anticipates several of these newer groups to enhance their capabilities and emerge as dominant players in the industry alongside veteran groups like LockBit 3.0, Cl0p, and AlphV. Read Cyberint"s 2023 Ransomware Report for the top targeted industries and countries, a breakdown of the top 3 ransomware groups, ransomware families worth noting, newcomers to the industry, notable 2023 campaigns, and 2024 forecasts. Known TTPs Tools Tactics Resource Development T1650 - Acquire Access Collection T1560 - Archive Collected Data Impact T1565.001 - Stored Data Manipulation Collection T1532 - Archive Collected Data Collection T1005 - Data from Local System Rhysida Ransomware The Rhysida ransomware group came into the spotlight in May/June 2023 when they launched a victim support chat portal accessible through their TOR (.onion) site. "


Akira ransomware targets Finnish organizations

exploits ransomware
2024-01-13 https://securityaffairs.com/157371/breaking-news/akira-ransomware-targets-finnish-organizations.html
The Finish National Cybersecurity Center (NCSC-FI) warns of increased Akira ransomware attacks targeting NAS and tape backup devices of organizations in the country. The Finish National Cybersecurity Center (NCSC-FI) reported an increase in Akira ransomware attacks, targeting organizations in the country. Threat actors are wiping NAS and backup devices. Akira ransomware infections were first reported in Finland […] "

Autosummary: Akira ransomware targets Finnish organizations Pierluigi Paganini January 13, 2024 January 13, 2024 The Finish National Cybersecurity Center (NCSC-FI) warns of increased Akira ransomware attacks targeting NAS and tape backup devices of organizations in the country. "


Akira ransomware attackers are wiping NAS and tape backups

exploits ransomware
2024-01-12 https://www.helpnetsecurity.com/2024/01/12/finland-akira-ransomware/

“The Akira ransomware malware, which was first detected in Finland in June 2023, has been particularly active at the end of the year,” the Finnish National Cybersecurity Center (NCSC-FI) has shared on Wednesday. NCSC-FI has received 12 reports of Akira ransomware hitting Finnish organizations in 2023, and three of the attacks happened during Christmas vacations. “Of the ransomware malware cases reported to the Cybersecurity Center in December, six out of seven involved Akira family malware,” … More

The post Akira ransomware attackers are wiping NAS and tape backups appeared first on Help Net Security.

"

Autosummary: "


Medusa Ransomware on the Rise: From Data Leaks to Multi-Extortion

exploits ransomware
2024-01-12 https://thehackernews.com/2024/01/medusa-ransomware-on-rise-from-data.html
The threat actors associated with the Medusa ransomware have ramped up their activities following the debut of a dedicated data leak site on the dark web in February 2023 to publish sensitive data of victims who are unwilling to agree to their demands. “As part of their multi-extortion strategy, this group will provide victims with multiple options when their data is posted on their "

Autosummary: As many as 74 organizations, mostly in the U.S., the U.K., France, Italy, Spain, and India, are estimated to have been impacted by the ransomware in 2023. "


The Week in Ransomware - January 12th 2024 - Targeting homeowners" data

exploits ransomware
2024-01-12 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-january-12th-2024-targeting-homeowners-data/
Mortgage lenders and related companies are becoming popular targets of ransomware gangs, with four companies in this sector recently attacked. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @LawrenceAbrams, @malwrhunterteam, @fwosar, @BleepinComputer, @serghei, @demonslay335, @Ionut_Ilascu, @Seifreed, @billtoulas, @AWNetworks, @Securonix, @TalosSecurity, @criptoboi, @pcrisk, @TrendMicro, and @Unit42_Intel. Cybersecurity researchers are back from the holidays, sharing new research on a BlackBasta affiliate"s use of PikaBot, Microsoft SQL servers being targeted by the Mimic ransomware, and threat actors impersonating security researchers to offer victims a chance to hack back at ransomware gangs. "


Finland warns of Akira ransomware wiping NAS and tape backup devices

exploits ransomware
2024-01-11 https://www.bleepingcomputer.com/news/security/finland-warns-of-akira-ransomware-wiping-nas-and-tape-backup-devices/
The Finish National Cybersecurity Center (NCSC-FI) is informing of increased Akira ransomware activity in December, targeting companies in the country and wiping backups. [...] "

Autosummary: The observed post-compromise activity includes mapping the network, targeting backups and critical servers, stealing usernames and passwords from Windows servers, encrypting important files, and encrypting disks of virtual machines on virtualization servers, particularly those using VMware products. "


There is a Ransomware Armageddon Coming for Us All

exploits ransomware
2024-01-11 https://thehackernews.com/2024/01/there-is-ransomware-armageddon-coming.html
Generative AI will enable anyone to launch sophisticated phishing attacks that only Next-generation MFA devices can stop The least surprising headline from 2023 is that ransomware again set new records for a number of incidents and the damage inflicted. We saw new headlines every week, which included a who’s-who of big-name organizations. If MGM, Johnson Controls, Chlorox, Hanes Brands, Caesars "

Autosummary: Phishing uses deceptive communications - emails, text messages, and voice messages- to trick users into revealing sensitive information, including login credentials, passwords, one-time passwords, personal information, and clicking on phony approval messages.Unlike traditional MFA, attackers simply can"t bypass next-gen MFA with malware, MFA fatigue attacks, adversary-in-the-middle (AiTM) attacks, and other methods.These cutting-edge biometric wearables also protect organizations against BYOD vulnerabilities, lost and stolen credentials, weak passwords, credential stuffing, MFA prompt bombing, and easily stolen SMS one-time passcodes. "


Free Decryptor Released for Black Basta and Babuk"s Tortilla Ransomware Victims

exploits ransomware
2024-01-10 https://thehackernews.com/2024/01/free-decryptor-released-for-black-basta.html
A decryptor for the Tortilla variant of the Babuk ransomware has been released by Cisco Talos, allowing victims targeted by the malware to regain access to their files. The cybersecurity firm said the threat intelligence it shared with Dutch law enforcement authorities made it possible to arrest the threat actor behind the operations. The encryption key has also been shared with Avast, "

Autosummary: This includes Rook, Night Sky, Pandora, Nokoyawa, Cheerscrypt, AstraLocker 2.0, ESXiArgs, Rorschach, RTM Locker, and RA Group. "


Decryptor for Tortilla variant of Babuk ransomware released

exploits ransomware
2024-01-10 https://securityaffairs.com/157214/cyber-crime/tortilla-variant-babuk-ransomware-decryptor.html
Researchers and the Dutch Police released a decryptor for the Tortilla variant of the Babuk ransomware after the arrest of its operator. Cisco Talos researchers obtained a decryptor for the Babuk Tortilla ransomware variant. The experts were able to extract and share the private decryption key used by the ransomware operators. Talos experts shared the key […] "

Autosummary: Conti POC (.conti) REvil aka Revix (.rhkrc) Cylance ransomware (unrelated to the security company of the same name) Dataf Locker Rorschach aka BabLock Lock4 RTM Locker (per Uptycs) SentinelOne added that there are other unique ESXi ransomware families, such as ALPHV, BlackBasta, Hive, and Lockbit, that are bot based on Babuk.Decryptor for Tortilla variant of Babuk ransomware released Pierluigi Paganini January 10, 2024 January 10, 2024 Researchers and the Dutch Police released a decryptor for the Tortilla variant of the Babuk ransomware after the arrest of its operator. "


Hackers are targeting exposed MS SQL servers with Mimic ransomware

exploits ransomware
2024-01-10 https://www.helpnetsecurity.com/2024/01/10/ms-sql-mimic-ransomware/

Hackers are brute-forcing exposed MS SQL database servers to deliver Mimic ransomware, Securonix researchers are warning. About Mimic ransomware Mimic ransomware was first spotted in the wild in June 2022 and analyzed by Trend Micro researchers in January 2023. It abuses the APIs of a Windows filename search engine called Everything to search for files to be encrypted or avoided, and has the ability to delete shadow copies, kill processes and services (e.g., Windows Defender, … More

The post Hackers are targeting exposed MS SQL servers with Mimic ransomware appeared first on Help Net Security.

"

Autosummary: It abuses the APIs of a Windows filename search engine called Everything to search for files to be encrypted or avoided, and has the ability to delete shadow copies, kill processes and services (e.g., Windows Defender, Windows telemetry), unmount virtual drives, activate anti-shutdown and anti-kill measures, and more. "


“Security researcher” offers to delete data stolen by ransomware attackers

exploits ransomware
2024-01-09 https://www.helpnetsecurity.com/2024/01/09/delete-stolen-data-ransomware/

When organizations get hit by ransomware and pay the crooks to decrypt the encrypted data and delete the stolen data, they can never be entirely sure the criminals will do as they promised. And even if an organization gets its data decrypted, they cannot be sure the stolen data has indeed been wiped and won’t subsequently be used or sold. Someone is trying to take advantage of that fact, by posing as a security researcher … More

The post “Security researcher” offers to delete data stolen by ransomware attackers appeared first on Help Net Security.

"

Autosummary: "


Hackers target Microsoft SQL servers in Mimic ransomware attacks

exploits ransomware
2024-01-09 https://www.bleepingcomputer.com/news/security/hackers-target-microsoft-sql-servers-in-mimic-ransomware-attacks/
A group of financially motivated Turkish hackers targets Microsoft SQL (MSSQL) servers worldwide to encrypt the victims" files with Mimic (N3ww4v3) ransomware. [...] "

Autosummary: "The analyzed threat campaign appears to end in one of two ways, either the selling of "access" to the compromised host, or the ultimate delivery of ransomware payloads," the Securonix Threat Research team who spotted the campaign said. "


Decryptor for Babuk ransomware variant released after hacker arrested

exploits ransomware
2024-01-09 https://www.bleepingcomputer.com/news/security/decryptor-for-babuk-ransomware-variant-released-after-hacker-arrested/
Researchers from Cisco Talos working with the Dutch police obtained a decryption tool for the Tortilla variant of Babuk ransomware and shared intelligence that led to the arrest of the ransomware"s operator. [...] "

Autosummary: "


Paraguay warns of Black Hunt ransomware attacks after Tigo Business breach

exploits ransomware
2024-01-09 https://www.bleepingcomputer.com/news/security/paraguay-warns-of-black-hunt-ransomware-attacks-after-tigo-business-breach/
The Paraguay military is warning of Black Hunt ransomware attacks after Tigo Business suffered a cyberattack last week impacting cloud and hosting services in the company"s business division. [...] "

Autosummary: wevtutil.exe cl Setup cmd.exe /c wevtutil.exe cl System cmd.exe /c wevtutil.exe cl Application cmd.exe /c wevtutil.exe cl Security cmd.exe /c wevtutil.exe cl Security /e:false In addition to the above, Black Hunt will perform a large amount of changes to Windows, including disabling Microsoft Defender, adding new users, disbaling System Restore, and disabling Task Manager and the Run command. "


LockBit ransomware gang claims the attack on Capital Health

exploits ransomware
2024-01-09 https://securityaffairs.com/157170/cyber-crime/lockbit-ransomware-hit-capital-health.html
The LockBit ransomware gang claimed responsibility for the cyber attack on the Capital Health hospital network. The LockBit ransomware operation has claimed responsibility for the cyberattack that hit the Capital Health hospital network in November 2023. Capital Health Regional Medical Center is a member of Capital Health System. Located in Trenton, New Jersey, Capital Health […] "

Autosummary: LockBit ransomware gang claims the attack on Capital Health Pierluigi Paganini January 09, 2024 January 09, 2024 The LockBit ransomware gang claimed responsibility for the cyber attack on the Capital Health hospital network. "


Exposing the ransomware lie to “leave hospitals alone”

exploits ransomware
2024-01-09 https://www.malwarebytes.com/blog/news/2024/01/exposing-the-ransomware-lie-to-leave-hospitals-alone
Ransomware gangs are getting more ruthless to increase the pressure on their victims. Now, even swatting cancer patients seems to be on the table. "

Autosummary: Once you’ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again. Phishing attacks often impersonate people or brands you know, and use themes that require urgent attention, such as missed deliveries, account suspensions, and security alerts.Phishing attacks often impersonate people or brands you know, and use themes that require urgent attention, such as missed deliveries, account suspensions, and security alerts.Ransomware groups are liars, yes, but even when these dangerous cybercriminals would ransack organizations and destroy entire companies, a few select groups espoused a sort of “honor among thieves.” Data breach There are some actions you can take if you are, or suspect you may have been, the victim of a data breach. "


US mortgage lender loanDepot confirms ransomware attack

exploits ransomware
2024-01-08 https://www.bleepingcomputer.com/news/security/us-mortgage-lender-loandepot-confirms-ransomware-attack/
​Leading U.S. mortgage lender loanDepot confirmed today that a cyber incident disclosed over the weekend was a ransomware attack that led to data encryption. [...] "

Autosummary: "Though our investigation is ongoing, at this time, the Company has determined that the unauthorized third party activity included access to certain Company systems and the encryption of data," it said. "


Capital Health attack claimed by LockBit ransomware, risk of data leak

exploits ransomware
2024-01-08 https://www.bleepingcomputer.com/news/security/capital-health-attack-claimed-by-lockbit-ransomware-risk-of-data-leak/
The Lockbit ransomware operation has claimed responsibility for a November 2023 cyberattack on the Capital Health hospital network and threatens to leak stolen data and negotiation chats by tomorrow. [...] "

Autosummary: Unfortunately, recent examples of high-impact ransomware attacks in the healthcare sector are abundant, including other victims, such as Ardent Health Services, Integris Health, ESO Solutions, and the Fred Hutchinson Cancer Center (Fred Hutch). "


Toronto Zoo: Ransomware attack had no impact on animal wellbeing

exploits ransomware
2024-01-08 https://www.bleepingcomputer.com/news/security/toronto-zoo-ransomware-attack-had-no-impact-on-animal-wellbeing/
Toronto Zoo, the largest zoo in Canada, says that a ransomware attack that hit its systems on early Friday had no impact on the animals, its website, or its day-to-day operations. [...] "

Autosummary: "


The source code of Zeppelin Ransomware sold on a hacking forum

exploits ransomware
2024-01-05 https://securityaffairs.com/156974/cyber-crime/zeppelin-ransomware-source-code.html
A threat actor announced the sale of the source code and a cracked version of the Zeppelin ransomware builder for $500. Researchers from cybersecurity firm KELA reported that a threat actor announced on a cybercrime forum the sale of the source code and a cracked version of the Zeppelin ransomware builder for $500. The seller clarified that it has […] "

Autosummary: The ransomware was involved in attacks aimed at technology and healthcare, defense contractors, educational institutions, manufacturers, companies across Europe, the United States, and Canada. "


The Week in Ransomware - January 5th 2024 - Secret decryptors

exploits ransomware
2024-01-05 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-january-5th-2024-secret-decryptors/
With it being the first week of the New Year and some still away on vacation, it has been slow with ransomware news, attacks, and new information. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @billtoulas, @Seifreed, @LawrenceAbrams, @Ionut_Ilascu, @malwrhunterteam, @fwosar, @BleepinComputer, @serghei, @demonslay335, @Intel_by_KELA, @pcrisk, @BushidoToken, @BrettCallow, @emsisoft, @AlvieriD, and @srlabs December 30th 2023 Researchers have created a decryptor that exploits a flaw in Black Basta ransomware, allowing victims to recover their files for free. "


Zeppelin ransomware source code sold for $500 on hacking forum

exploits ransomware
2024-01-04 https://www.bleepingcomputer.com/news/security/zeppelin-ransomware-source-code-sold-for-500-on-hacking-forum/
A threat actor announced on a cybercrime forum that they sold the source code and a cracked version of the Zeppelin ransomware builder for just $500. [...] "

Autosummary: Screenshots of the builder (KELA)​ In November 2022, following the discontinuation of the Zeppelin RaaS operation, law enforcement and security researchers disclosed they had found exploitable flaws in Zeppelin"s encryption scheme, allowing them to build a decrypter and help victims since 2020. "


Xerox says subsidiary XBS U.S. breached after ransomware gang leaks data

exploits ransomware
2024-01-02 https://www.bleepingcomputer.com/news/security/xerox-says-subsidiary-xbs-us-breached-after-ransomware-gang-leaks-data/
The U.S. division of Xerox Business Solutions (XBS) has been compromised by hackers, and a limited amount of personal information might have been exposed, according to an announcement by the parent company, Xerox Corporation. [...] "

Autosummary: "


Victoria court recordings exposed in reported ransomware attack

exploits ransomware
2024-01-02 https://www.bleepingcomputer.com/news/security/victoria-court-recordings-exposed-in-reported-ransomware-attack/
Australia"s Court Services Victoria (CSV) is warning that video recordings of court hearings were exposed after suffering a reported Qilin ransomware attack. [...] "

Autosummary: " Specifically, the following courts and jurisdictions have been impacted by the security incident: Supreme Court – hearings from the Court of Appeal, Criminal Division, and Practice Court between December 1 and 21, and two regional hearings in November 2023. "


Oops! Black Basta ransomware flubs encryption

exploits ransomware
2024-01-02 https://www.malwarebytes.com/blog/news/2024/01/oops-black-basta-ransomware-flubs-encryption
Researchers have found a flaw in the Black Basta ransomware encryption algorithm, allowing decryption of some files. "

Autosummary: Once you’ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again. Deploy Endpoint Detection and Response software like ThreatDown EDR that uses multiple different detection techniques to identify ransomware, and ransomware rollback to restore damaged system files. The decryptor, called Black Basta Buster, exploits a flaw in the encryption algorithm used in older versions of the Black Basta group’s ransomware. "


Researchers released a free decryptor for Black Basta ransomware

exploits ransomware
2024-01-02 https://securityaffairs.com/156806/malware/black-basta-ransomware-decryptor.html
A team of researchers released a suite of tools that could help victims to decrypt data encrypted with by the Black Basta ransomware. Independent security research and consulting team SRLabs discovered a vulnerability in Black Basta ransomware’s encryption algorithm and exploited it to create a free decryptor. The Black Basta ransomware group has been active since April […] "

Autosummary: Researchers released a free decryptor for Black Basta ransomware Pierluigi Paganini January 02, 2024 January 02, 2024 A team of researchers released a suite of tools that could help victims to decrypt data encrypted with by the Black Basta ransomware.According to the experts, the ransomware gang has infected over 329 victims, including ABB, Capita, Dish Network, and Rheinmetall. "


Cactus RANSOMWARE gang hit the Swedish retail and grocery provider Coop

exploits ransomware
2024-01-01 https://securityaffairs.com/156709/cyber-crime/cactus-ransomware-coop-sweden.html
The Cactus ransomware group claims to have hacked Coop, one of the largest retail and grocery providers in Sweden. Coop is one of the largest retail and grocery providers in Sweden, with approximately 800 stores across the country. The stores are co-owned by 3.5 million members in 29 consumer associations. All surplus that is created […] "

Autosummary: Cactus RANSOMWARE gang hit the Swedish retail and grocery provider Coop Pierluigi Paganini January 01, 2024 January 01, 2024 The Cactus ransomware group claims to have hacked Coop, one of the largest retail and grocery providers in Sweden. "


New Black Basta decryptor exploits ransomware flaw to recover files

exploits ransomware
2023-12-30 https://www.bleepingcomputer.com/news/security/new-black-basta-decryptor-exploits-ransomware-flaw-to-recover-files/
Researchers have created a decryptor that exploits a flaw in Black Basta ransomware, allowing victims to recover their files for free. [...] "

Autosummary: "So the ransomware destroyed the MBR or GPT partition table, but tools such as "testdisk" can often recover or re-generate those." For files that do not contain large zero-byte chunks of data, SRLabs says it may still be possible to recover files if you have an older unencrypted version with similar data. Black Basta encrypted file showing the encryption key Source: BleepingComputer While decrypting smaller files may not be possible, larger files like virtual machine disks can usually be decrypted, as they contain a large number of "zero-byte" sections. "


INC RANSOM ransomware gang claims to have breached Xerox Corp

exploits ransomware
2023-12-30 https://securityaffairs.com/156679/cyber-crime/inc-ransom-ransomware-xerox-corp.html
The INC RANSOM ransomware group claims to have hacked the American multinational corporation Xerox Corp. Xerox Corp provides document management solutions worldwide. The company’s Document Technology segment offers desktop monochrome and color printers, multifunction printers, copiers, digital printing presses, and light production devices; and production printing and publishing systems for the graphic communications marketplace and […] "

Autosummary: "


The top 4 ransomware gang failures of 2023

exploits ransomware
2023-12-29 https://www.malwarebytes.com/blog/business/2023/12/the-top-4-ransomware-gang-failures-of-2023
Ransomware gangs don"t always win, and when they don"t, it feels pretty great. "

Autosummary: On September 14, Caesar’s Entertainment reported in a filing with the US Securities and Exchange Commission that it, too, had suffered a cyber breach, and according to reporting from CNBC, it received a $30 million ransom demand, which it then negotiated down by about 50 percent.The Royal Mail rep is direct, says they work in IT, and, curiously, has a deft command of flattery, referring to LockBit’s work as “pen-testing.” MGM Resorts International later provided a sober estimation of the cost of the recovery effort, expecting a $100 million loss to its third-quarter results, and valid criticism about the hotelier’s security vulnerabilities remain, but in the land of vice and greed, stopping a ransomware gang is a feat that few have accomplished. “It has come to our attention that MeridianLink, in light of a significant breach compromising customer data and operational information, has failed to file the requisite disclosure under Item 1.05 of Form 8-K within the stipulated four business days, as mandated by the new SEC rules,” ALPHV allegedly wrote in their complaint to the SEC. Within days of Royal Mail’s announcement, news outlets began linking the alleged cyber incident to the ransomware gang LockBit, which, oddly, denied the attack. "


The Week in Ransomware - December 29th 2023 - LockBit targets hospitals

exploits ransomware
2023-12-29 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-december-29th-2023-lockbit-targets-hospitals/
It"s been a quiet week, with even threat actors appearing to take some time off for the holidays. We did not see much research released on ransomware this week, with most of the news focusing on new attacks and LockBit affiliates increasingly targeting hospitals. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @malwrhunterteam, @serghei, @demonslay335, @BleepinComputer, @Ionut_Ilascu, @Seifreed, @fwosar, @LawrenceAbrams, @billtoulas, @MsftSecIntel, @DarkWebInformer, @BrettCallow, @pcrisk, and @Fortinet. December 29th, 2023 Two not-for-profit hospitals in New York are seeking a court order to retrieve data stolen in an August ransomware attack that"s now stored on the servers of a Boston cloud storage company. "


Lockbit ransomware attack interrupted medical emergencies gang at a German hospital network

exploits ransomware
2023-12-28 https://securityaffairs.com/156545/cyber-crime/lockbit-ransomware-hit-german-hospital-network-network.html
A Lockbit ransomware attack against the German hospital network Katholische Hospitalvereinigung Ostwestfalen (KHO) caused service disruptions at three hospitals. German hospital network Katholische Hospitalvereinigung Ostwestfalen (KHO) announced it has suffered service disruptions at three hospitals (Bielefeld, Rheda-Wiedenbrück, and Herford) after a Lockbit ransomware attack. The security incident could have a serious impact on the local […] "

Autosummary: Lockbit ransomware attack interrupted medical emergencies gang at a German hospital network Pierluigi Paganini December 28, 2023 December 28, 2023 A Lockbit ransomware attack against the German hospital network Katholische Hospitalvereinigung Ostwestfalen (KHO) caused service disruptions at three hospitals. "


How ransomware operators try to stay under the radar

exploits ransomware
2023-12-27 https://www.malwarebytes.com/blog/ransomware/2023/12/how-ransomware-operators-try-to-stay-under-the-radar
We look at the three most common methods that ransomware groups use to avoid being detected. "

Autosummary: Many anti-malware solutions, including Malwarebytes, have anti-tampering protection in place, so finding methods to disable the protection is a big deal for malware authors.With valid credentials gained by the vulnerability exploitation, phishing, or password attacks, the criminals get access to an internet exposed service, where they can set up some foothold to provide them with command and control options. "


Lockbit ransomware disrupts emergency care at German hospitals

exploits ransomware
2023-12-27 https://www.bleepingcomputer.com/news/security/lockbit-ransomware-disrupts-emergency-care-at-german-hospitals/
German hospital network Katholische Hospitalvereinigung Ostwestfalen (KHO) has confirmed that recent service disruptions were caused by a Lockbit ransomware attack where the threat actors gained access to IT systems and encrypted devices on the network. [...] "

Autosummary: "


Ohio Lottery hit by cyberattack claimed by DragonForce ransomware

exploits ransomware ciber
2023-12-27 https://www.bleepingcomputer.com/news/security/ohio-lottery-hit-by-cyberattack-claimed-by-dragonforce-ransomware/
The Ohio Lottery was forced to shut down some key systems after a cyberattack affected an undisclosed number of internal applications on Christmas Eve. [...] "

Autosummary: Not much is known about the DragonForce ransomware gang, and while they are a new operation, their tactics, negotiation style, and data leak site indicate an experienced extortion group. "


Carbanak Banking Malware Resurfaces with New Ransomware Tactics

financial exploits ransomware industry
2023-12-26 https://thehackernews.com/2023/12/carbanak-banking-malware-resurfaces.html
The banking malware known as Carbanak has been observed being used in ransomware attacks with updated tactics. "The malware has adapted to incorporate attack vendors and techniques to diversify its effectiveness," cybersecurity firm NCC Group said in an analysis of ransomware attacks that took place in November 2023. "Carbanak returned last month through new "

Autosummary: " The company"s data shows that industrials (33%), consumer cyclicals (18%), and healthcare (11%) emerged as the top targeted sectors, with North America (50%), Europe (30%), and Asia (10%) accounting for most of the attacks. "


Carbanak malware returned in ransomware attacks

exploits ransomware
2023-12-26 https://securityaffairs.com/156410/malware/carbanak-malware-ransomware-attacks.html
Researchers at NCC Group reported that in November they observed the return of the infamous banking malware Carbanak in ransomware attacks. The cybersecurity firm NCC Group reported that in November the banking malware Carbanak was observed in ransomware attacks. The Carbanak gang was first discovered by Kaspersky Lab in 2015, the group has stolen at least $300 million […] "

Autosummary: Carbanak malware returned in ransomware attacks Pierluigi Paganini December 26, 2023 December 26, 2023 Researchers at NCC Group reported that in November they observed the return of the infamous banking malware Carbanak in ransomware attacks. "


Rhysida ransomware group hacked Abdali Hospital in Jordan

exploits ransomware
2023-12-26 https://securityaffairs.com/156430/cyber-crime/rhysida-ransomware-abdali-hospital-jordan.html
The Rhysida ransomware group claimed to have hacked Abdali Hospital, a multi-specialty hospital located in Jordan. Abdali Hospital is a multi-specialty hospital located in the modern development of Al-Abdali, Amman, Jordan. Abdali Hospital provides care to patients in numerous specialties. Apart from its general surgery section, it has specialists in orthopedics and rheumatology, gynecology, urology and endocrinology, neurology, nephrology, pulmonology, internal medicine, oncology, […] "

Autosummary: Apart from its general surgery section, it has specialists in orthopedics and rheumatology, gynecology, urology and endocrinology, neurology, nephrology, pulmonology, internal medicine, oncology, infectious disease, and anesthesiology. “Threat actors leveraging Rhysida ransomware are known to impact “targets of opportunity,” including victims in the education, healthcare, manufacturing, information technology, and government sectors. "


LockBit ransomware gang claims to have breached accountancy firm Xeinadin

exploits ransomware
2023-12-23 https://securityaffairs.com/156303/cyber-crime/lockbit-gang-xeinadin.html
The LockBit ransomware claims to have hacked accountancy firm Xeinadin threatens to leak the alleged stolen data. The LockBit ransomware claims responsibility for hacking the Xeinadin accountancy firm and threatens to disclose the alleged stolen data. Xeinadin has over 60,000 clients across the UK and Ireland. In 2021, a significant endorsement came from Exponent, one […] "

Autosummary: LockBit ransomware gang claims to have breached accountancy firm Xeinadin Pierluigi Paganini December 23, 2023 December 23, 2023 The LockBit ransomware claims to have hacked accountancy firm Xeinadin threatens to leak the alleged stolen data. "


Nissan Australia cyberattack claimed by Akira ransomware gang

exploits ransomware ciber
2023-12-22 https://www.bleepingcomputer.com/news/security/nissan-australia-cyberattack-claimed-by-akira-ransomware-gang/
Today, the Akira ransomware gang claimed that it breached the network of Nissan Australia, the Australian division of Japanese car maker Nissan. [...] "

Autosummary: "You will find docs with personal information of their employees in the archives and much other interested stuff like NDAs, projects, information about clients and partners etc." Akira surfaced in March 2023 and drew attention after quickly amassing a large number of victims from various industry sectors. "


The Week in Ransomware - December 22nd 2023 - BlackCat hacked

exploits ransomware
2023-12-22 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-december-22nd-2023-blackcat-hacked/
Earlier this month, the BlackCat/ALPHV ransomware operation suffered a five-day disruption to their Tor data leak and negotiation sites, rumored to be caused by a law enforcement action. [...] "

Autosummary: We also learned this week about new ransomware attacks or information about old ones, including: Contributors and those who provided new ransomware information and stories this week include: @malwrhunterteam, @BleepinComputer, @demonslay335, @Seifreed, @billtoulas, @Ionut_Ilascu, @fwosar, @serghei, @LawrenceAbrams, @BrettCallow, @PRODAFT, @AShukuhi, @uuallan, @SophosXOps, @pcrisk, @3xp0rtblog, @oct0xor, @MorganDemboski, and @juanbrodersen.According to our dataset, Akira has primarily targeted organizations located in Europe, North America, and Australia, and operating in the government, manufacturing, technology, education, consulting, pharmaceuticals, and telecommunication sectors. "


Akira ransomware gang claims the theft of sensitive data from Nissan Australia

exploits ransomware
2023-12-22 https://securityaffairs.com/156283/cyber-crime/akira-ransomware-breached-nissan-australia.html
The Akira ransomware group announced it had breached the network of Nissan Australia, the Australian branch of the car maker giant. The Akira ransomware gang claimed to have breached Nissan Australia and to have stolen around 100GB of files from the carmaker giant. The company refused to pay the ransom and the ransomware gang threatened […] "

Autosummary: Akira ransomware gang claims the theft of sensitive data from Nissan Australia Pierluigi Paganini December 22, 2023 December 22, 2023 The Akira ransomware group announced it had breached the network of Nissan Australia, the Australian branch of the car maker giant. "


Webinar recap: Ransomware gangs and Living Off The Land attacks (LOTL)

exploits ransomware
2023-12-21 https://www.malwarebytes.com/blog/business/2023/12/webinar-recap-ransomware-gangs-and-living-off-the-land-attacks-lotl
Learn how RaaS gangs use LOTL tactics in their attacks on organizations. "

Autosummary: "


ALPHV/BlackCat ransomware operation disrupted, but criminals threaten more attacks

exploits ransomware
2023-12-20 https://www.bitdefender.com/blog/hotforsecurity/alphv-blackcat-ransomware-operation-disrupted-but-criminals-threaten-more-attacks/
The FBI has disrupted the operations of the ALPHV ransomware group, and seized decryption keys that could help 500 victims unscramble their files without having to pay a ransom. Read more in my article on the Hot for Security blog. "

Autosummary: Having managed to gain access to ALPHV"s private control panel, FBI agents were able to gather substantial information about the criminal enterprise"s operations: "From the Campaigns screen, affiliates can see the victim entity, full ransom price demanded, discount ransom price, expiration date, cryptocurrency addresses, cryptocurrency transactions, type of computer system compromised, ransom demand note, chats with the victim, and more," explained the FBI. "


Halcyon raises $40 million to combat ransomware attacks

exploits ransomware
2023-12-20 https://www.helpnetsecurity.com/2023/12/20/halcyon-funding-40-million/

Halcyon announced it has closed a $40 million Series B funding round led by Bain Capital Ventures (BCV). The company also announced that BCV Partner and former Symantec CEO, Enrique Salem, will join the Board of Directors, and BCV Partner Jeff Williams will join as Chief Revenue Officer. The oversubscribed funding round follows a $50M Series A announced in April 2023, bringing total funding raised in 2023 to $90M. The new capital will be used … More

The post Halcyon raises $40 million to combat ransomware attacks appeared first on Help Net Security.

"

Autosummary: “The team has deep expertise and experience, and I look forward to joining them as they work to change the impact of ransomware, and ultimately, defeat it.” "


SimSpace raises $45 million to fuel continued growth

ransomware
2023-12-20 https://www.helpnetsecurity.com/2023/12/20/simspace-45-million-investment/

SimSpace has closed a $45 million equity raise led by L2 Point Management, a private investment firm specializing in flexible capital solutions for growth companies. This investment brings the total capital raised by SimSpace over the past year to $70 million and will support the company’s continued growth trajectory, including its expansion into new geographies. SimSpace works with the most advanced Fortune 2000 companies, as well as national and state governments, to provide unmatched training … More

The post SimSpace raises $45 million to fuel continued growth appeared first on Help Net Security.

"

Autosummary: "


The ransomware attack on Westpole is disrupting digital services for Italian public administration

exploits ransomware
2023-12-19 https://securityaffairs.com/156090/cyber-crime/westpole-ransomware-attack.html
An alleged Lockbit 3.0 ransomware attack on the Italian cloud service provider Westpole disrupted multiple services of local and government organizations and municipalities. A cyber attack hit on December 8, 2023 the Italian cloud service provider Westpole, which is specialized in digital services for public administration. The incident impacted a Westpole’s customer company named PA […] "

Autosummary: The ransomware attack on Westpole is disrupting digital services for Italian public administration Pierluigi Paganini December 19, 2023 December 19, 2023 An alleged Lockbit 3.0 ransomware attack on the Italian cloud service provider Westpole disrupted multiple services of local and government organizations and municipalities. "


Double-Extortion Play Ransomware Strikes 300 Organizations Worldwide

exploits ransomware
2023-12-19 https://thehackernews.com/2023/12/double-extortion-play-ransomware.html
The threat actors behind the Play ransomware are estimated to have impacted approximately 300 entities as of October 2023, according to a new joint cybersecurity advisory from Australia and the U.S. "Play ransomware actors employ a double-extortion model, encrypting systems after exfiltrating data and have impacted a wide range of businesses and critical infrastructure organizations in North "

Autosummary: The threat actors behind the Play ransomware are estimated to have impacted approximately 300 entities as of October 2023, according to a new joint cybersecurity advisory from Australia and the U.S. "Play ransomware actors employ a double-extortion model, encrypting systems after exfiltrating data and have impacted a wide range of businesses and critical infrastructure organizations in North America, South America, Europe, and Australia," authorities said. "


FBI disrupts Blackcat ransomware operation, creates decryption tool

exploits ransomware
2023-12-19 https://www.bleepingcomputer.com/news/security/fbi-disrupts-blackcat-ransomware-operation-creates-decryption-tool/
The Department of Justice announced today that the FBI successfully breached the ALPHV ransomware operation"s servers to monitor their activities and obtain decryption keys. [...] "

Autosummary: " FBI seizure message on ALPHV data leak site Source: BleepingComputer.com The seizure message states the law enforcement operation was conducted by police and investigative agencies from the US, Europol, Denmark, Germany, UK, Netherlands, Germany, Australia, Spain, and Austria. "


Behind the Scenes of Matveev"s Ransomware Empire: Tactics and Team

exploits ransomware industry
2023-12-19 https://thehackernews.com/2023/12/behind-scenes-of-matveevs-ransomware.html
Cybersecurity researchers have shed light on the inner workings of the ransomware operation led by Mikhail Pavlovich Matveev, a Russian national who was indicted by the U.S. government earlier this year for his alleged role in launching thousands of attacks across the world. Matveev, who resides in Saint Petersburg and is known by the aliases Wazawaka, m1x, Boriselcin, Uhodiransomwar, "

Autosummary: Matveev, besides working as an affiliate for Conti, LockBit, Hive, Monti, Trigona, and NoEscape, also had a management-level role with the Babuk ransomware group up until early 2022, while sharing what"s being described as a "complex relationship" with another actor named Dudka, who is likely the developer behind Babuk and Monti. "


FBI: ALPHV ransomware raked in $300 million from over 1,000 victims

exploits ransomware
2023-12-19 https://www.bleepingcomputer.com/news/security/fbi-alphv-ransomware-raked-in-300-million-from-over-1-000-victims/
The ALPHV/BlackCat ransomware gang has made over $300 million in ransom payments from more than 1,000 victims worldwide as of September 2023, according to the Federal Bureau of Investigation (FBI). [...] "

Autosummary: "According to the FBI, as of September 2023, ALPHV Blackcat affiliates have compromised over 1000 entities—nearly 75 percent of which are in the United States and approximately 250 outside the United States—, demanded over $500 million, and received nearly $300 million in ransom payments. "


How the FBI seized BlackCat (ALPHV) ransomware’s servers

exploits ransomware
2023-12-19 https://www.bleepingcomputer.com/news/security/how-the-fbi-seized-blackcat-alphv-ransomwares-servers/
An unsealed FBI search warrant revealed how law enforcement hijacked the ALPHV/BlackCat ransomware operations websites and seized the associated URLs. [...] "

Autosummary: "From the Campaigns screen, affiliates can see the victim entity, full ransom price demanded, discount ransom price, expiration date, cryptocurrency addresses, cryptocurrency transactions, type of computer system compromised, ransom demand note, chats with the victim, and more. "


#StopRansomware: ALPHV Blackcat

exploits ransomware
2023-12-19 https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-353a

SUMMARY

Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint CSA to disseminate known IOCs and TTPs associated with the ALPHV Blackcat ransomware as a service (RaaS) identified through FBI investigations as recently as Dec. 6, 2023.

This advisory provides updates to the FBI FLASH BlackCat/ALPHV Ransomware Indicators of Compromise released April 19, 2022. Since previous reporting, ALPHV Blackcat actors released a new version of the malware, and the FBI identified over 1000 victims worldwide targeted via ransomware and/or data extortion.

FBI and CISA encourage critical infrastructure organizations to implement the recommendations in the Mitigations section of this CSA to reduce the likelihood and impact of ALPHV Blackcat ransomware and data extortion incidents.

In February 2023, ALPHV Blackcat administrators announced the ALPHV Blackcat Ransomware 2.0 Sphynx update, which was rewritten to provide additional features to affiliates, such as better defense evasion and additional tooling. This ALPHV Blackcat update has the capability to encrypt both Windows and Linux devices, and VMWare instances. ALPHV Blackcat affiliates have extensive networks and experience "

Autosummary: Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA and FBI.CISA and FBI do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document.Regularly educate users on identifying suspicious emails and links, not interacting with those suspicious items, and the importance of reporting instances of opening suspicious emails, links, attachments, or other potential lures.Regularly educate users on identifying suspicious emails and links, not interacting with those suspicious items, and the importance of reporting instances of opening suspicious emails, links, attachments, or other potential lures.ALPHV Blackcat affiliates use the open source adversary-in-the-middle attack [T1557] framework Evilginx2, which allows them to obtain multifactor authentication (MFA) credentials, login credentials, and session cookies.After exfiltrating and/or encrypting data, ALPHV Blackcat affiliates communicate with victims via TOR [S0183], Tox, email, or encrypted applications.According to the FBI, as of September 2023, ALPHV Blackcat affiliates have compromised over 1000 entities—nearly 75 percent of which are in the United States and approximately 250 outside the United States—, demanded over $500 million, and received nearly $300 million in ransom payments. "


FBI Takes Down BlackCat Ransomware, Releases Free Decryption Tool

exploits ransomware
2023-12-19 https://thehackernews.com/2023/12/fbi-takes-down-blackcat-ransomware.html
The U.S. Justice Department (DoJ) has officially announced the disruption of the BlackCat ransomware operation and released a decryption tool that victims can use to regain access to files locked by the malware. Court documents show that the U.S. Federal Bureau of Investigation (FBI) enlisted the help of a confidential human source (CHS) to act as an affiliate for the BlackCat and gain "

Autosummary: "


FBI issues advisory over Play ransomware

exploits ransomware
2023-12-19 https://www.malwarebytes.com/blog/news/2023/12/fbi-issues-advisory-over-play-ransomware
The FBI, CSA, and ACSC have released a joint cybersecurity advisory about the Play ransomware group and their MO. "

Autosummary: The FBI lets readers know it is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with Play ransomware actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file. Screenshot of the PLAY leak site The joint CSA emphasizes the importance of having an actionable recovery plan, using multi-factor authentication (MFA), and keeping all operating systems, software, and firmware up to date. "


FBI claims to have dismantled AlphV/Blackcat ransomware operation, but the group denies it

exploits ransomware
2023-12-19 https://securityaffairs.com/156124/cyber-crime/alphv-blackcat-ransomware-group-seizure.html
The Federal Bureau of Investigation (FBI) announced the seizure of the Tor leak site of the AlphV/Blackcat ransomware group. The FBI seized the Tor leak site of the AlphV/Blackcat ransomware group and replaced the home page with the announcement of the seizure. BlackCat/ALPHV ransomware gang has been active since November 2021, the list of its victims is […] "

Autosummary: The seizure is the result of a joint operation conducted by international law enforcement agencies from the US, Denmark, Germany, UK, Netherlands, Germany, Australia, Spain, Austria and Europol. Because of their actions, we are introducing new rules, or rather, we are removing ALL rules except one, you cannot touch the CIS, you can now block hospitals, nuclear power plants, anything, anywhere. "


FBI claims to have dismantled AlphV/Blackcat ransomware operation, but the group denies it

exploits ransomware
2023-12-19 https://securityaffairs.com/156124/breaking-news/alphv-blackcat-ransomware-group-seizure.html
The Federal Bureau of Investigation (FBI) announced the seizure of the Tor leak site of the AlphV/Blackcat ransomware group. The FBI seized the Tor leak site of the AlphV/Blackcat ransomware group and replaced the home page with the announcement of the seizure. BlackCat/ALPHV ransomware gang has been active since November 2021, the list of its victims is […] "

Autosummary: The seizure is the result of a joint operation conducted by international law enforcement agencies from the US, Denmark, Germany, UK, Netherlands, Germany, Australia, Spain, Austria and Europol. Because of their actions, we are introducing new rules, or rather, we are removing ALL rules except one, you cannot touch the CIS, you can now block hospitals, nuclear power plants, anything, anywhere. "


Vans and North Face owner VF Corp hit by ransomware attack

exploits ransomware
2023-12-18 https://www.bleepingcomputer.com/news/security/vans-and-north-face-owner-vf-corp-hit-by-ransomware-attack/
American global apparel and footwear giant VF Corporation, the owner of brands like Supreme, Vans, Timberland, and The North Face, has disclosed a security incident that caused operational disruptions. [...] "

Autosummary: Apart from the brands mentioned above, VF Corp. owns Dickies, Eastpak, Kipling, Napapijri, AND1, JanSport, Icebreaker, Altra Running, and SmartWool. "


FBI: Play ransomware breached 300 victims, including critical orgs

exploits ransomware
2023-12-18 https://www.bleepingcomputer.com/news/security/fbi-play-ransomware-breached-300-victims-including-critical-orgs/
The Federal Bureau of Investigation (FBI) says the Play ransomware gang has breached roughly 300 organizations worldwide between June 2022 and October 2023, some of them critical infrastructure entities. [...] "

Autosummary: "This includes requiring multifactor authentication, maintaining offline backups of data, implementing a recovery plan, and keeping all operating systems, software, and firmware up to date." "


Hunters International ransomware gang claims to have hacked the Fred Hutch Cancer Center

exploits ransomware
2023-12-16 https://securityaffairs.com/155955/data-breach/hunters-international-hacked-fred-hutch.html
The Hunters International ransomware gang claims to have hacked the Fred Hutchinson Cancer Center (Fred Hutch). Another healthcare organization suffered a ransomware attack, the Hunters International ransomware gang claims to have hacked the Fred Hutchinson Cancer Center (Fred Hutch). The ransomware gang has added the organization to its dark web leak site and is threatening […] "

Autosummary: The threats were sent to a number of former and current Fred Hutch patients — as well as some who have received care from Hutch partner UW Medicine — and claimed the names, Social Security numbers, phone numbers, medical history, lab results and insurance history of more than 800,000 patients had been compromised.” reported the Seattle Times.Hunters International ransomware gang claims to have hacked the Fred Hutch Cancer Center Pierluigi Paganini December 16, 2023 December 16, 2023 The Hunters International ransomware gang claims to have hacked the Fred Hutchinson Cancer Center (Fred Hutch). "


Fortifying cyber defenses: A proactive approach to ransomware resilience

exploits ransomware
2023-12-15 https://www.helpnetsecurity.com/2023/12/15/government-cybersecurity-tools/

Ransomware has become a pervasive threat, compromising the security and functionality of vital systems across the United States. While governmental pledges and public declarations of intent to fight cybercrime are foundational, they often lack the immediate and tangible impact necessary to counter sophisticated cyber threats. Case in point – the US recently pledged, along with 39 other countries, not to pay ransoms. In theory this makes sense: don’t pay, the bad guys don’t make money … More

The post Fortifying cyber defenses: A proactive approach to ransomware resilience appeared first on Help Net Security.

"

Autosummary: This approach can also foster public-private partnerships, as government agencies can collaborate with cutting-edge technology firms to develop new standards, best practices, and adapt commercial tools for government use, ensuring the most robust protection possible. By purchasing and deploying advanced tools to stop ransomware in its tracks, the government can protect its assets and citizens, deter adversaries, stimulate the cybersecurity sector, and set a standard for private sector organizations to emulate. "


BianLian, White Rabbit, and Mario Ransomware Gangs Spotted in a Joint Campaign

exploits ransomware
2023-12-15 https://securityaffairs.com/155893/cyber-crime/bianlian-white-rabbit-mario-ransomware-joint-campaign.html
Resecurity has uncovered a meaningful link between three major ransomware groups, BianLian, White Rabbit, and Mario Ransomware. Based on a recent Digital Forensics & Incident Response (DFIR) engagement with a law enforcement agency (LEA) and one of the leading investment organizations in Singapore (and other victims), Resecurity (USA) has uncovered a meaningful link between three […] "

Autosummary: BianLian, White Rabbit, and Mario Ransomware Gangs Spotted in a Joint Campaign Pierluigi Paganini December 15, 2023 December 15, 2023 Resecurity has uncovered a meaningful link between three major ransomware groups, BianLian, White Rabbit, and Mario Ransomware. "


Snatch ransomware gang claims the hack of the food giant Kraft Heinz

exploits ransomware
2023-12-15 https://securityaffairs.com/155918/cyber-crime/snatch-ransomware-kraft-heinz.html
The Snatch ransomware group announced it had hacked the food giant Kraft Heinz, the company is investigating the claims. Kraft Heinz is an American food company, it is one of the largest food and beverage manufacturers globally. Kraft Heinz produces a wide range of popular food products, including condiments, sauces, cheese, snacks, and ready-to-eat meals. […] "

Autosummary: Snatch ransomware gang claims the hack of the food giant Kraft Heinz Pierluigi Paganini December 15, 2023 December 15, 2023 The Snatch ransomware group announced it had hacked the food giant Kraft Heinz, the company is investigating the claims. "


The Week in Ransomware - December 15th 2023 - Ransomware Drama

exploits ransomware
2023-12-15 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-december-15th-2023-ransomware-drama/
The big news over the past two weeks is the continued drama plaguing BlackCat/ALPHV after their infrastructure suddenly stopped working for almost five days. Multiple sources told BleepingComputer that this outage was related to a law enforcement operation, but BlackCat claims the outages were caused by a hardware/hosting issue. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @malwrhunterteam, @demonslay335, @billtoulas, @fwosar, @Seifreed, @serghei, @BleepinComputer, @LawrenceAbrams, @Ionut_Ilascu, @ValeryMarchive, @BushidoToken, @azalsecurity, @SentinelOne, @g0njxa, @AlvieriD, @ShadowStackRE, @AShukuhi, @BrettCallow, @GossiTheDog, @vmiss33, @pcrisk, and @RESecurity. In other news, we learned about numerous ransomware attacks over the past two weeks, including: Finally, law enforcement has had some confirmed actions this week, including arresting a money launderer linked to Hive ransomware and a Russian pleading guilty to running a crypto exchange used by ransomware gangs. "


French authorities arrested a Russian national for his role in the Hive ransomware operation

exploits ransomware rusia-ucrania
2023-12-14 https://securityaffairs.com/155815/cyber-crime/french-authorities-hive-ransomware-member.html
French police arrested a Russian national who is suspected of laundering money resulting from the criminal activity of the Hive ransomware gang. The French authorities arrested in Paris a Russian national who is suspected of laundering criminal proceeds for the Hive ransomware gang. “A Russian, suspected of having recovered in cryptocurrencies the money taken from […] "

Autosummary: The authorities reported that from June 2021 through at least November 2022, threat actors targeted a wide range of businesses and critical infrastructure sectors, including Government Facilities, Communications, Critical Manufacturing, Information Technology, and especially Healthcare and Public Health (HPH). "


ALPHV ransomware gang returns, sorta

exploits ransomware
2023-12-14 https://www.malwarebytes.com/blog/ransomware/2023/12/alphv-ransomware-gang-returns-sorta
The ALPHV ransomware group appears to be going through some things. "

Autosummary: In January, the agency took down one of ALPHV’s contemporaries, Hive, and revealed it had penetrated the group’s infrastructure six months prior: Since late July 2022, the FBI has penetrated Hive’s computer networks, captured its decryption keys, and offered them to victims worldwide, preventing victims from having to pay $130 million in ransom demanded. Many of the group’s negotiation links are reportedly not working either, meaning that victims looking to pay off the gang are stuck in limbo, and its likely that neither the ALPHV group, nor the affiliates who use its ransomware to carry out attacks, are being paid.Once you’ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again. "


LockBit ransomware now poaching BlackCat, NoEscape affiliates

exploits ransomware
2023-12-13 https://www.bleepingcomputer.com/news/security/lockbit-ransomware-now-poaching-blackcat-noescape-affiliates/
The LockBit ransomware operation is now recruiting affiliates and developers from the BlackCat/ALPHV and NoEscape after recent disruptions and exit scams. [...] "

Autosummary: LockBit recruits affiliates from distressed gangs As first reported by LeMagIT, LockBitSupp, the LockBit operation"s manager, has begun to recruit affiliates from the BlackCat and NoEscape ransomware operations. "


UK Home Office is ignoring the risk of ‘catastrophic ransomware attacks,’ report warns

exploits ransomware
2023-12-13 https://securityaffairs.com/155778/security/home-office-ignores-ransomware-attacks-risks.html
A Joint Committee on the National Security Strategy (JCNSS) warns of the high risk of a catastrophic ransomware attack on the UK government. The British government is accused of failing to mitigate the risk of ransomware attacks. According to a parliamentary report published by the Joint Committee on the National Security Strategy (JCNSS) the UK […] "

Autosummary: UK Home Office is ignoring the risk of ‘catastrophic ransomware attacks,’ report warns Pierluigi Paganini December 13, 2023 December 13, 2023 A Joint Committee on the National Security Strategy (JCNSS) warns of the high risk of a catastrophic ransomware attack on the UK government. "


French police arrests Russian suspect linked to Hive ransomware

exploits ransomware rusia-ucrania
2023-12-13 https://www.bleepingcomputer.com/news/security/french-police-arrests-russian-suspect-linked-to-hive-ransomware/
French authorities arrested a Russian national in Paris for allegedly helping the Hive ransomware gang with laundering their victims" ransom payments. [...] "

Autosummary: "At the same time, the full cooperation with Europol, Eurojust and the Cypriot authorities made it possible to search his home in a Cypriot seaside resort, thus providing important elements of investigation," said Nicolas Guidoux, a Deputy Director in the French Ministry of the Interior. "


Cybercriminals continue targeting open remote access products

ransomware ciber
2023-12-11 https://www.helpnetsecurity.com/2023/12/11/remote-access-malicious-actions/

Cybercriminals still prefer targeting open remote access products, or like to leverage legitimate remote access tools to hide their malicious actions, according to WatchGuard. “Threat actors continue using different tools and methods in their attack campaigns, making it critical for organizations to keep abreast of the latest tactics to fortify their security strategy,” said Corey Nachreiner, chief security officer at WatchGuard. “Modern security platforms that include firewalls and endpoint protection software can deliver enhanced protection … More

The post Cybercriminals continue targeting open remote access products appeared first on Help Net Security.

"

Autosummary: Still, script-based attacks remain the largest attack vector, accounting for 56% of total attacks, and scripting languages like PowerShell are often used in living-off-the-land attacks.For instance, in researching the top phishing domains, the Threat Lab observed a tech support scam that would result in a victim downloading a pre-configured, unauthorised version of TeamViewer, which would allow an attacker full remote access to their computer. "


#StopRansomware: Play Ransomware

exploits ransomware
2023-12-11 https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-352a

SUMMARY

Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and Australian Signals Directorate’s Australian Cyber Security Centre (ASD"s ACSC) are releasing this joint CSA to disseminate the Play ransomware group’s IOCs and TTPs identified through FBI investigations as recently as October 2023.

Since June 2022, the Play (also known as Playcrypt) ransomware group has impacted a wide range of businesses and critical infrastructure in North America, South America, and Europe. As of October 2023, the FBI was aware of approximately 300 affected entities allegedly exploited by the ransomware actors.

In Australia, the first Play ransomware incident was observed in April 2023, and most recently in November 2023.

The Play ransomware group is presumed to be a closed group, designed to “guarantee the secrecy of deals,” according to a statement on the group’s data leak website. Play ransomware actors employ a double-extortion model, encrypting systems after exfiltrating data. Ransom notes do not include an initial ransom demand or payment instructions, rather, victims are instructed to contact the threat actors via email.

The FBI, CISA, and ASD’s ACSC encourage organizations to implement the recommendations in the Mitigations section of this CSA to reduce the likelihood and impact of ransomware incidents. T "

Autosummary: Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA or the FBI. REPORTING The FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with Play ransomware actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.In some instances, cybersecurity researchers have observed Play ransomware actors using PowerShell scripts to target Microsoft Defender.[2] Lateral Movement and Execution Play ransomware actors use command and control (C2) applications, including Cobalt Strike and SystemBC, and tools like PsExec, to assist with lateral movement and file execution. Discovery and Defense Evasion Play ransomware actors use tools like AdFind to run Active Directory queries [TA0007] and Grixba [1], an information-stealer, to enumerate network information [T1016] and scan for anti-virus software [T1518.001]. Initial Access The Play ransomware group gains initial access to victim networks through the abuse of valid accounts [T1078] and exploitation of public-facing applications [T1190], specifically through known FortiOS (CVE-2018-13379 and CVE-2020-12812) and Microsoft Exchange (ProxyNotShell [CVE-2022-41040 and CVE-2022-41082]) vulnerabilities.The FBI, CISA, and ASD’s ACSC recommend that software manufacturers incorporate secure-by-design and -default principles and tactics into their software development practices to limit the impact of ransomware techniques (such as threat actors leveraging backdoor vulnerabilities into remote software systems), thus, strengthening the security posture for their customers. VALIDATE SECURITY CONTROLS In addition to applying mitigations, the FBI, CISA, and ASD’s ACSC recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. "


Norton Healthcare disclosed a data breach after a ransomware attack

financial exploits ransomware
2023-12-09 https://securityaffairs.com/155495/data-breach/norton-healthcare-ransomware-attack.html
Kentucky health system Norton Healthcare disclosed a data breach after it was a victim of a ransomware attack in May. Norton Healthcare disclosed a data breach after a ransomware attack that hit the organization on May 9, 2023. The security breach exposed personal information belonging to patients, employees, and dependents. The health system notified federal […] "

Autosummary: The compromised information varied for each person and could have included: name, contact information, Social Security Number, date of birth, health information, insurance information, and medical identification numbers. "


ALPHV ransomware site outage rumored to be caused by law enforcement

exploits ransomware
2023-12-08 https://www.bleepingcomputer.com/news/security/alphv-ransomware-site-outage-rumored-to-be-caused-by-law-enforcement/
A law enforcement operation is rumored to be behind an outage affecting ALPHV ransomware gang"s websites over the last 30 hours. [...] "

Autosummary: Admin showing "Repair" as their Tox status Source: BleepingComputer However, BleepingComputer suspects that the ransomware gang may have suffered potential law enforcement action after their recent activities, which was also hinted at by others. "


Norton Healthcare discloses data breach after May ransomware attack

financial exploits ransomware
2023-12-08 https://www.bleepingcomputer.com/news/security/norton-healthcare-discloses-data-breach-after-may-ransomware-attack/
Kentucky health system Norton Healthcare has confirmed that a ransomware attack in May exposed personal information belonging to patients, employees, and dependents. [...] "

Autosummary: " The attackers gained access to a wide range of sensitive information, including name, contact information, Social Security Number, date of birth, health information, insurance information, and medical identification numbers. "


Russian pleads guilty to running crypto-exchange used by ransomware gangs

exploits ransomware rusia-ucrania
2023-12-07 https://www.bleepingcomputer.com/news/security/russian-pleads-guilty-to-running-crypto-exchange-used-by-ransomware-gangs/
Russian national Anatoly Legkodymov pleaded guilty to operating the Bitzlato cryptocurrency exchange that helped ransomware gangs and other cybercriminals launder over $700 million. [...] "

Autosummary: As a Bitzlato co-founder and principal stakeholder, Legkodymov (also known as "Gandalf" and "Tolik") has agreed to disband the cryptocurrency exchange and relinquish any rights to approximately $23 million in seized assets, as outlined in the plea agreement. "


BlackSuit ransomware – what you need to know

exploits ransomware
2023-12-07 https://www.tripwire.com/state-of-security/blacksuit-ransomware-what-you-need-know
A cybercriminal group calling itself BlackSuit has claimed responsibility for a series of ransomware attacks, including breaches at schools in central Georgia. And earlier in the year, a zoo in Tampa Bay was targeted by the same hacking gang. Learn more about the BlackSuit ransomware in my article on the Tripwire State of Security blog. "

Autosummary: Even if they have a secure, unencrypted backup of their important data to rebuild their systems from, they will still have to handle the possible fall-out when sensitive information about their business, their employees, their suppliers, and their customers is released into the public domain by the criminals. Meanwhile, liberal arts college DePauw University in Indiana says that it was recently targeted, and a "limited amount of data on specific individuals was accessed." "


Russian FSB Cyber Actor Star Blizzard Continues Worldwide Spear-phishing Campaigns

financial ransomware rusia-ucrania
2023-12-06 https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-341a

The Russia-based actor is targeting organizations and individuals in the UK and other geographical areas of interest.

OVERVIEW

The Russia-based actor Star Blizzard (formerly known as SEABORGIUM, also known as Callisto Group/TA446/COLDRIVER/TAG-53/BlueCharlie) continues to successfully use spear-phishing attacks against targeted organizations and individuals in the UK, and other geographical areas of interest, for information-gathering activity.

The UK National Cyber Security Centre (NCSC), the US Cybersecurity and Infrastructure Security Agency (CISA), the US Federal Bureau of Investigation (FBI), the US National Security Agency (NSA), the US Cyber National Mission Force (CNMF), the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), the Canadian Centre for Cyber Security (CCCS), and the New Zealand National Cyber Security Centre (NCSC-NZ) assess that Star Blizzard is almost certainly subordinate to the Russian Federal Security Service (FSB) Centre 18.

Industry has previously published details of Star Blizzard. This advisory draws on that body of information.

This advisory raises awareness of the spear-phishing techniques Star Blizzard uses to target individuals and organizations. This activity is continuing through 2023.

To download a PDF version of this advisory, see Russian FSB Cyber Actor Star Blizzard Continues Worldwide Spear-phishing Campaigns.

TARGETING PROFILE

Since 2019, Star Blizzard has targeted sectors including academia, defense, governmental organizations, NGOs, think tanks and politicians.

Tar "

Autosummary: The UK National Cyber Security Centre (NCSC), the US Cybersecurity and Infrastructure Security Agency (CISA), the US Federal Bureau of Investigation (FBI), the US National Security Agency (NSA), the US Cyber National Mission Force (CNMF), the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), the Canadian Centre for Cyber Security (CCCS), and the New Zealand National Cyber Security Centre (NCSC-NZ) assess that Star Blizzard is almost certainly subordinate to the Russian Federal Security Service (FSB) Centre 18. OVERVIEW The Russia-based actor Star Blizzard (formerly known as SEABORGIUM, also known as Callisto Group/TA446/COLDRIVER/TAG-53/BlueCharlie) continues to successfully use spear-phishing attacks against targeted organizations and individuals in the UK, and other geographical areas of interest, for information-gathering activity. Star Blizzard uses webmail addresses from different providers, including Outlook, Gmail, Yahoo and Proton mail in their initial approach [T1585.002], impersonating known contacts of the target or well-known names in the target’s field of interest or sector. TARGETING PROFILE Since 2019, Star Blizzard has targeted sectors including academia, defense, governmental organizations, NGOs, think tanks and politicians.Spear-phishing Link Star Blizzard sends spear-phishing emails with malicious links directly to credential-stealing sites, or to documents hosted on a file-sharing site, which then direct victims to credential-stealing sites. "


Advanced ransomware campaigns expose need for AI-powered cyber defense

exploits ransomware
2023-12-05 https://www.helpnetsecurity.com/2023/12/05/carl-froggett-deep-instinct-deep-learning-ai/

In this Help Net Security interview, Carl Froggett, CIO at Deep Instinct, discusses emerging trends in ransomware attacks, emphasizing the need for businesses to use advanced AI technologies, such as deep learning (DL), for prevention rather than just detection and response. He also talks about the shift in budget priorities in 2024 toward ransomware prevention technologies. He foresees AI, particularly deep learning, becoming more integrated into business processes, automating workflows, and shaping workplace experiences. What … More

The post Advanced ransomware campaigns expose need for AI-powered cyber defense appeared first on Help Net Security.

"

Autosummary: In this Help Net Security interview, Carl Froggett, CIO at Deep Instinct, discusses emerging trends in ransomware attacks, emphasizing the need for businesses to use advanced AI technologies, such as deep learning (DL), for prevention rather than just detection and response. Additionally, as AI becomes fully integrated, younger generations won’t have the same hands-on experiences around workplace tasks like troubleshooting, outages, and security incidents, as much of this will be automated by AI.Because DL models understand the building blocks of malicious files, DL makes it possible to implement and deploy a predictive prevention-based security program – one that can predict future malicious behaviors, detecting and preventing unknown threats, ransomware, and zero-days. "


Roblox and Twitch provider Tipalti breached by ransomware

exploits ransomware
2023-12-05 https://www.malwarebytes.com/blog/news/2023/12/roblox-and-twitch-provider-tipalti-breached-by-ransomware
Accounting software provider Tivalti is investigating ALPHV/BlackCat claims it was breached. In a typical supply-chain attack ALPHV is threatening some of their customers like Roblox and Twitch "

Autosummary: In what seems to be a typical supply chain attack, ALPHV aka BlackCat are now threatening some Tipalti customers, including Roblox and Twitch: “We are systematically reaching out to affected clients of Tipalti, the first batch (consisting of organizations with the most data exfiltrated), have been sent communications requesting initial contact.”Once you’ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again. "


Veeam Data Platform 23H2 update enhances resilience against ransomware

exploits ransomware
2023-12-05 https://www.helpnetsecurity.com/2023/12/05/veeam-data-platform-23h2-update/

Veeam Software released new Veeam Data Platform 23H2 update, including Veeam Backup & Replicationv12.1 release as well as Veeam ONE v12.1 and Veeam Recovery Orchestrator v7. This latest release from Veeam, with a focus on radical resilience, includes hundreds of new features and enhancements designed to not only protect enterprises’ most critical data, but to enable them with radical resilience to bounce forward from ransomware and cyber-attacks. “The latest Veeam Data Protection Trends Report found … More

The post Veeam Data Platform 23H2 update enhances resilience against ransomware appeared first on Help Net Security.

"

Autosummary: This latest release from Veeam, with a focus on radical resilience, includes hundreds of new features and enhancements designed to not only protect enterprises’ most critical data, but to enable them with radical resilience to bounce forward from ransomware and cyber-attacks. New features and enhancements include: AI-powered built-in Malware Detection Engine performs low-impact inline entropy and file system analysis during backup for immediate detection of ransomware and malicious file management activity. "


Microsoft Warns of Malvertising Scheme Spreading CACTUS Ransomware

exploits ransomware
2023-12-04 https://thehackernews.com/2023/12/microsoft-warns-of-malvertising-scheme.html
Microsoft has warned of a new wave of CACTUS ransomware attacks that leverage malvertising lures to deploy DanaBot as an initial access vector. The DanaBot infections led to "hands-on-keyboard activity by ransomware operator Storm-0216 (Twisted Spider, UNC2198), culminating in the deployment of CACTUS ransomware," the Microsoft Threat Intelligence team said in a series of posts on X ( "

Autosummary: "


LockBit on a Roll – ICBC Ransomware Attack Strikes at the Heart of the Global Financial Order

financial exploits ransomware
2023-12-04 https://securityaffairs.com/155178/cyber-crime/lockbit-icbc-ransomware-attack.html
The LockBit ransomware attack on the Industrial & Commercial Bank of China demonstrates the weakness of global financial system to cyberattacks. The ransomware breach that crippled U.S. Treasury trading operations at an American subsidiary of Industrial & Commercial Bank of China Ltd. on November 8 has laid bare the vulnerability of the global financial system […] "

Autosummary: "


Malvertising attacks rely on DanaBot Trojan to spread CACTUS Ransomware

exploits ransomware
2023-12-04 https://securityaffairs.com/155184/cyber-crime/danabot-spread-cactus-ransomware.html
Microsoft warns of ongoing malvertising attacks using the DanaBot malware to deploy the CACTUS ransomware. Microsoft uncovered ongoing malvertising attacks using the DanaBot Trojan (Storm-1044) to deploy the CACTUS ransomware. Microsoft the campaign to the ransomware operator Storm-0216 (Twisted Spider, UNC2198). Storm-0216 has historically used Qakbot malware for initial access, but has switched to other […] "

Autosummary: The DanaBot banking Trojan initially targeted Australia and Poland users, then it has expanded in other countries, including Italy, Germany, Austria, and as of September 2018, Ukraine. "


Tipalti investigates claims of data stolen by ransomware gang

exploits ransomware
2023-12-04 https://www.bleepingcomputer.com/news/security/tipalti-investigates-claims-of-data-stolen-by-ransomware-gang/
Tipalti says they are investigating claims that the ALPHV ransomware gang breached its network and stole 256 GB of data, including data for Roblox and Twitch. [...] "

Autosummary: The company has numerous well-known customers, including Twitch, Roblox, ZipRecruiter, Roku, GoDaddy, Canva, and X. "Over the past weekend, a ransomware group claimed that they allegedly gained access to confidential information belonging to Tipalti and its customers," Tipalti told BleepingComputer in a statement. "


Why a ransomware gang tattled on its victim, with Allan Liska: Lock and Code S04E24

exploits ransomware
2023-12-04 https://www.malwarebytes.com/blog/podcast/2023/12/why-a-ransomware-gang-tattled-on-its-victim-with-allan-liska-lock-and-code-s04e24
This week on the Lock and Code podcast, we speak with Allan Liska about why a ransomware group tattled on its own victim, and what to expect next year. "

Autosummary: “It has come to our attention that MeridianLink, in light of a significant breach compromising customer data and operational information, has failed to file the requisite disclosure under Item 1.05 of Form 8-K within the stipulated four business days, as mandated by the new SEC rules,” wrote ALPHV in a complaint that the group claimed to have filed with the US government. "


Supply-chain ransomware attack causes outages at over 60 credit unions

exploits ransomware
2023-12-04 https://www.tripwire.com/state-of-security/supply-chain-ransomware-attack-causes-outages-over-60-credit-unions
Ransomware hits firm that providing cloud services to credit unions in order ensure that their business activities could "operate without interruption, even when nothing else seems to be going well." Read more in my article on the Tripwire State of Security blog. "

Autosummary: Ongoing Operations - a unit of Trellance, which specialises in disaster recovery and business recovery, providing cloud services to credit unions to ensure that their business activities "operate without interruption, even when nothing else seems to be going well." National Credit Union Administration (NCUA) spokesperson Joseph Adamoli told the media that several credit unions were informed at the start of this month by Ongoing Operations that it had been hit by a ransomware attack. "


Tipalti investigates claims of data stolen in ransomware attack

exploits ransomware
2023-12-04 https://www.bleepingcomputer.com/news/security/tipalti-investigates-claims-of-data-stolen-in-ransomware-attack/
Tipalti says they are investigating claims that the ALPHV ransomware gang breached its network and stole 256 GB of data, including data for Roblox and Twitch. [...] "

Autosummary: The company has numerous well-known customers, including Twitch, Roblox, ZipRecruiter, Roku, GoDaddy, Canva, and X. "Over the past weekend, a ransomware group claimed that they allegedly gained access to confidential information belonging to Tipalti and its customers," Tipalti told BleepingComputer in a statement. "


Linux version of Qilin ransomware focuses on VMware ESXi

exploits ransomware Linux
2023-12-03 https://www.bleepingcomputer.com/news/security/linux-version-of-qilin-ransomware-focuses-on-vmware-esxi/
A sample of the Qilin ransomware gang"s VMware ESXi encryptor has been found and it could be one of the most advanced and customizable Linux encryptors seen to date. [...] "

Autosummary: In the sample analyzed by BleepingComputer.com, the encryptor is configured by default with the following exclusions and targeting criteria: Processes to not terminate: "kvm", "qemu", "xen" Directories to exclude from encryption: "/boot/", "/proc/", "/sys/", "/run/", "/dev/", "/lib/", "/etc/", "/bin/", "/mbr/", "/lib64/", "/vmware/lifecycle/", "/vdtc/", "/healthd/" Files to exclude from encryption: "initrd", "vmlinuz", "basemisc.tgz", "boot.cfg", "bootpart.gz", "features.gz", "imgdb.tgz", "jumpstrt.gz", "onetime.tgz", "state.tgz", "useropts.gz" File extensions to exclude from encryption: "v00", "v01", "v02", "v03", "v04", "v05", "v06", "v07", "v08", "v09", "b00", "b01", "b02", "b03", "b04", "b05", "b06", "b07", "b08", "b09", "t00", "t01", "t02", "t03", "t04", "t05", "t06", "t07", "t08", "t09" Directories to target for encryption: "/home", "/usr/home", "/tmp", "/var/www", "/usr/local/www", "/mnt", "/media", "/srv", "/data", "/backup", "/var/lib/mysql", "/var/mail", "/var/spool/mail", "/var/vm", "/var/lib/vmware", "/opt/virtualbox", "/var/lib/xen", "/var/opt/xen", "/kvm", "/var/lib/docker", "/var/lib/libvirt", "/var/run/sr-mount", "/var/lib/postgresql", "/var/lib/redis", "/var/lib/mongodb", "/var/lib/couchdb", "/var/lib/neo4j", "/var/lib/cassandra", "/var/lib/riak", "/var/lib/influxdb", "/var/lib/elasticsearch" Files to target for encryption: "3ds", "3g2", "3gp", "7z", "aac", "abw", "ac3", "accdb", "ai", "aif", "aiff", "amr", "apk", "app", "asf", "asx", "atom", "avi", "bak", "bat", "bmp", "bup", "bz2", "cab", "cbr", "cbz", "cda", "cdr", "chm", "class", "cmd", "conf", "cow", "cpp", "cr2", "crdownload", "cs", "csv", "cue", "cur", "dat", "db", "dbf", "dds", "deb", "der", "desktop", "dmg", "dng", "doc", "docm", "dot", "dotm", "dotx", "dpx", "drv", "dtd", "dvi", "dwg", "dxf", "eml", "eps", "epub", "f4v", "fnt", "fon", "gam", "ged", "gif", "gpx", "gz", "h264", "hdr", "hpp", "hqx", "htm", "html", "ibooks", "ico", "ics", "iff", "image", "img", "indd", "iso", "jar", "java", "jfif", "jpe", "jpeg", "jpf", "jpg", "js", "json", "jsp", "key", "kml", "kmz", "log", "m4a", "m4b", "m4p", "m4v", "mcd", "mdbx", "mht", "mid", "mkv", "ml", "mobi", "mov", "mp3", "mp4", "mpa", "mpeg", "mpg", "msg", "nes", "numbers", "odp", "ods", "odt", "ogg", "ogv", "otf", "ova", "ovf", "pages", "parallels", "pcast", "pct", "pdb", "pdf", "pds", "pef", "php", "pkg", "pl", "plist", "png", "pptm", "prproj", "ps", "psd", "ptx", "py", "qcow", "qcow2", "qed", "qt", "r3d", "ra", "rar", "rm", "rmvb", "rtf", "rv", "rw2", "sh", "shtml", "sit", "sitx", "sketch", "spx", "sql", "srt", "svg", "swf", "tar", "tga", "tgz", "thmx", "tif", "tiff", "torrent", "ttf", "txt", "url", "vdi", "vhd", "vhdx", "vmdk", "vmem", "vob", "vswp", "vvfat", "wav", "wbmp", "webm", "webp", "wm", "wma", "wmv", "wpd", "wps", "xhtml", "xlsm", "xml", "xspf", "xvid", "yaml", "yml", "zip", "zipx" Configuring a list of virtual machines that should not be encrypted is also possible. The Qilin ransomware operation The Qilin ransomware operation was initially launched as "Agenda" in August 2022. "


Qlik Sense flaws exploited in Cactus ransomware campaign

exploits ransomware
2023-12-01 https://www.helpnetsecurity.com/2023/12/01/qlik-sense-cactus-ransomware/

Attackers are exploiting three critical vulnerabilities in internet-facing Qlik Sense instances to deliver Cactus ransomware to target organizations, Arctic Wolf researchers have warned. The exploited vulnerabilities Qlik Sense is a business intelligence and data analytics solution popular with governmental organizations and enterprises. Attackers wielding Cactus ransomware have previously been seen breaching large commercial organizations by exploiting vulnerabilities in VPN appliances. The group also engages in double-extortion tactics. “Based on patch level Qlik Sense is likely … More

The post Qlik Sense flaws exploited in Cactus ransomware campaign appeared first on Help Net Security.

"

Autosummary: The attack After a successful exploitation, the attackers leveraged PowerShell and the Background Intelligent Transfer Service (BITS) to download the following tools that allow them to gain persistence and remotely control the system: Renamed ManageEngine UEMS executables posing as Qlik files The AnyDesk remote solution, pulled from the official site A Plink (PuTTY Link) binary renamed to putty.exe The attackers also uninstalled Sophos’ endpoint security solution, changed the admin password, set up an RDP tunnel via Plink and used it for lateral movement, analyzed disk space with WizTree and used rclone (renamed as svchost.exe) to exfiltrate data. "


Black Basta Ransomware gang accumulated at least $107 million in Bitcoin ransom payments since early 2022

exploits ransomware
2023-12-01 https://securityaffairs.com/155054/cyber-crime/black-basta-ransomware-activities.html
The Black Basta ransomware gang infected over 300 victims accumulating ransom payments exceeding $100 million since early 2022. The Black Basta ransomware group has been active since April 2022, like other ransomware operations, it implements a double-extortion attack model.   A joint research by Elliptic and Corvus Insurance revealed that the group accumulated at least […] "

Autosummary: Black Basta Ransomware gang accumulated at least $107 million in Bitcoin ransom payments since early 2022 Pierluigi Paganini December 01, 2023 December 01, 2023 The Black Basta ransomware gang infected over 300 victims accumulating ransom payments exceeding $100 million since early 2022. "


Apple secures WebKit as global ransomware attacks surge

exploits ransomware
2023-12-01 https://www.computerworld.com/article/3711378/apple-secures-webkit-as-global-ransomware-attacks-surge.html#tk.rss_security

If nothing else, Apple’s most recent emergency security update should be considered proof of an increasingly tense security environment.

Enterprises must understand that while Apple maintains a pretty solid ecosystem — certainly at present the most secure, even according to Cisco — that doesn’t mean it’s entirely safe, and every Apple customer needs to get wise to the growing proliferation of threats.

With more and more business users turning to the company’s solutions, it’s important to get ahead of the threat.

To read this article in full, please click here

"

Autosummary: Michael Covington, vice president of portfolio strategy at Jamf, explained: “These latest OS updates, which address bugs in Apple’s WebKit, show that attackers continue to focus on exploiting the framework that downloads and presents web-based content. Security researchers, meanwhile, continue to kick WebKit around in their attempt to find vulnerabilities before the bad guys do, and hopefully get an Apple security bounty payment for their trouble. "


The Week in Ransomware - December 1st 2023 - Police hits affiliates

exploits ransomware
2023-12-01 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-december-1st-2023-police-hits-affiliates/
An international law enforcement operation claims to have dismantled a ransomware affiliate operation in Ukraine, which was responsible for attacks on organizations in 71 countries. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @malwrhunterteam, @Ionut_Ilascu, @LawrenceAbrams, @billtoulas, @serghei, @Seifreed, @BleepinComputer, @demonslay335, @fwosar, @pcrisk, @CorvusInsurance, @elliptic, @AWNetworks, @ShadowStackRE, @ddd1ms, @3xp0rtblog, @jgreigj, and @BrettCallow. Finally, researchers released some interesting information about ransomware, including Cactus ransomware exploiting Qlik Sense flaws to breach networks, and Black Basta ransomware believed to have made over $100 million. "


Expert warns of Turtle macOS ransomware

exploits ransomware
2023-12-01 https://securityaffairs.com/155075/security/turtleransom-macos-ransomware.html
The popular cybersecurity researcher Patrick Wardle dissected the new macOS ransomware Turtle used to target Apple devices. The popular cyber security researcher Patrick Wardle published a detailed analysis of the new macOS ransomware Turtle. Wardle pointed out that since Turtle was uploaded on Virus Total, it was labeled as malicious by 24 anti-malware solutions, suggesting […] "

Autosummary: “If we download the archive and unzip it, we find it contains files (prefixed with “TurtleRansom”) that appear to be compiled for common platforms, including, Windows, Linux, and yes, macOS” reads the analysis published by Wardle. "


Rhysida ransomware group hacked King Edward VII’s Hospital in London

exploits ransomware
2023-11-30 https://securityaffairs.com/154999/cyber-crime/rhysida-ransomware-king-edward-viis-hospital.html
The Rhysida ransomware group claimed to have hacked King Edward VII’s Hospital in London. King Edward VII’s Hospital is a private hospital located on Beaumont Street in the Marylebone district of central London. It is a leading provider of acute and specialist medical care, with a focus on musculoskeletal health, urology, women’s health, and digestive […] "

Autosummary: Leaked images include medical reports, registration forms, x-rays, medical prescriptions, medical reports, and more The group claims to have stolen data belonging to a large amount of patients and employees, including the Royal Family. “Threat actors leveraging Rhysida ransomware are known to impact “targets of opportunity,” including victims in the education, healthcare, manufacturing, information technology, and government sectors. "


CACTUS Ransomware Exploits Qlik Sense Vulnerabilities in Targeted Attacks

exploits ransomware
2023-11-30 https://thehackernews.com/2023/11/cactus-ransomware-exploits-qlik-sense.html
A CACTUS ransomware campaign has been observed exploiting recently disclosed security flaws in a cloud analytics and business intelligence platform called Qlik Sense to obtain a foothold into targeted environments. "This campaign marks the first documented instance [...] where threat actors deploying CACTUS ransomware have exploited vulnerabilities in Qlik Sense for initial access," Arctic Wolf "

Autosummary: The cybersecurity company, which said it"s responding to "several instances" of exploitation of the software, noted that the attacks are likely taking advantage of three flaws that have been disclosed over the past three months - CVE-2023-41265 (CVSS score: 9.9) - "


ThreatNG empowers organizations to identify and mitigate their ransomware risk

exploits ransomware
2023-11-30 https://www.helpnetsecurity.com/2023/11/30/threatng-ransomware-susceptibility-assessment-reporting-and-monitoring/

ThreatNG Security launched its new Ransomware Susceptibility Assessment, Reporting, and Monitoring Solution. The new solution helps organizations assess their ransomware susceptibility externally and monitor their networks for potential threats. According to the FBI, ransomware attacks increased by 13% in 2022, and the average cost of a ransomware attack is now $1.85 million. With ransomware attacks rising, organizations of all sizes are at risk, but many are unprepared. The ThreatNG Security Ransomware Susceptibility Assessment, Reporting, and … More

The post ThreatNG empowers organizations to identify and mitigate their ransomware risk appeared first on Help Net Security.

"

Autosummary: The report includes the following sections: Breach and Ransomware Susceptibility Score Internet-facing vulnerabilities and misconfigurations (ransomware infection vector) Phishing (ransomware infection vector) Precursor malware infection (ransomware infection vector) Third parties and managed service providers (ransomware infection vector) These capabilities help organizations of all sizes better understand and manage their ransomware risk by providing a comprehensive view of their security posture and identifying the most relevant ransomware infection vectors. "


Cactus ransomware exploiting Qlik Sense flaws to breach networks

exploits ransomware
2023-11-30 https://www.bleepingcomputer.com/news/security/cactus-ransomware-exploiting-qlik-sense-flaws-to-breach-networks/
Cactus ransomware has been exploiting critical vulnerabilities in the Qlik Sense data analytics solution to get initial access on corporate networks. [...] "

Autosummary: To mitigate the risks of a breach, Qlik recommends upgrading to the following versions of Sense Enterprise for Windows: August 2023 Patch 2 May 2023 Patch 6 February 2023 Patch 10 November 2022 Patch 12 August 2022 Patch 14 May 2022 Patch 16 February 2022 Patch 15 November 2021 Patch 17 Cactus ransomware emerged in March this year and adopted the double-extortion tactic, stealing data from victims and then encrypting it on compromised systems. "


Will ChatGPT write ransomware? Yes.

exploits ransomware
2023-11-30 https://www.malwarebytes.com/blog/news/2023/11/will-chatgpt-write-ransomware-yes
ChatGPT 4.0 can write basic working ransomware in minutes. "

Autosummary: ChatGPT 4.0 makes its first attempt at troubleshooting a compilation problem ChatGPT 4.0 makes its second attempt at troubleshooting a compilation problem ScreChatGPT 4.0 makes its third attempt at troubleshooting a compilation problemenshot In every case, ChatGPT solved the problem, and in doing so it enabled me, a non-C programmer to write and troubleshoot basic but functional ransomware written in C, in almost no time.Once you’ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.It encrypts files in whatever directory tree I choose, throws away the originals, hides the private key used for the encryption, stops running databases, and leaves ransom notes.The code used in the demonstration above was generated by ChatGPT in mere minutes, without objection, in response to basic one line descriptions of ransomware features, even though I’ve never written a single line of C code in my life. ChatGPT 4.0 agreeing to write out a complete program instead of snippets (ChatGPT’s answer is truncated) Safeguards removed Although I was able to work around ChatGPT’s insistence it wouldn’t write ransomware in March, I was often met with other restrictions that attempted to stop me doing unsafe things.I wanted to know if its safeguards would stop me from using it to write ransomware, and, if they didn’t, whether the ransomware it produced was any good. ChatGPT 4.0 had no objection to saving the private encryption key to a remote server Programming tutor Much to my surprise, after telling ChatGPT what features I wanted in my ransomware I was left with something that looked very much like a complete computer program. "


DJVU Ransomware"s Latest Variant "Xaro" Disguised as Cracked Software

exploits ransomware
2023-11-29 https://thehackernews.com/2023/11/djvu-ransomwares-latest-variant-xaro.html
A variant of a ransomware strain known as DJVU has been observed to be distributed in the form of cracked software. "While this attack pattern is not new, incidents involving a DJVU variant that appends the .xaro extension to affected files and demanding ransom for a decryptor have been observed infecting systems alongside a host of various commodity loaders and infostealers," Cybereason "

Autosummary: PrivateLoader, for its part, establishes contact with a command-and-control (C2) server to fetch a wide range of stealer and loader malware families like RedLine Stealer, Vidar, Lumma Stealer, Amadey, SmokeLoader, Nymaim, GCleaner, XMRig, and Fabookie, in addition to dropping Xaro. "


How Continuous Pen Testing Protects Web Apps from Emerging Threats

ransomware
2023-11-29 https://www.bleepingcomputer.com/news/security/how-continuous-pen-testing-protects-web-apps-from-emerging-threats/
The nature and ubiquity of modern web apps make them rife for targeting by hackers. Learn more from Outpost24 about the value of continuous monitoring to secure modern web apps. [...] "

Autosummary: Impacts of a web app compromise Beyond end-user frustration, there are far-reaching consequences of successful attacks against web apps, including: Data breaches that result from unauthorized access to sensitive information. Why continuous monitoring of web apps is essential Not only are modern web applications dynamic and constantly evolving, but so are cyber threat actors and the methods they use. "


Black Basta ransomware made over $100 million from extortion

exploits ransomware
2023-11-29 https://www.bleepingcomputer.com/news/security/black-basta-ransomware-made-over-100-million-from-extortion/
Russia-linked ransomware gang Black Basta has raked in at least $100 million in ransom payments from more than 90 victims since it first surfaced in April 2022, according to joint research from Corvus Insurance and Elliptic. [...] "

Autosummary: Since it emerged, this ransomware gang has infiltrated and extorted many high-profile victims, including the American Dental Association, Sobeys, Knauf, Yellow Pages Canada, Toronto Public Library, and the German defense contractor Rheinmetall. "


Police dismantle ransomware group behind attacks in 71 countries

exploits ransomware
2023-11-28 https://www.bleepingcomputer.com/news/security/police-dismantle-ransomware-group-behind-attacks-in-71-countries/
In cooperation with Europol and Eurojust, law enforcement agencies from seven nations have arrested in Ukraine the core members of a ransomware group linked to attacks against organizations in 71 countries. [...] "

Autosummary: "


Ukrainian ransomware gang behind high-profile attacks dismantled

exploits ransomware
2023-11-28 https://www.helpnetsecurity.com/2023/11/28/ukrainian-ransomware-gang-high-profile-attacks-dismantled/

Law enforcement and judicial authorities from seven countries have joined forces with Europol and Eurojust to dismantle and apprehend in Ukraine key figures behind significant ransomware operations. On 21 November, 30 properties were searched in the regions of Kyiv, Cherkasy, Rivne and Vinnytsia, resulting in the arrest of the ringleader. Four of the ringleader’s most active accomplices were also detained. More than 20 investigators from Norway, France, Germany and the United States were deployed to … More

The post Ukrainian ransomware gang behind high-profile attacks dismantled appeared first on Help Net Security.

"

Autosummary: "


Key Cybercriminals Behind Notorious Ransomware Families Arrested in Ukraine

exploits ransomware ciber
2023-11-28 https://thehackernews.com/2023/11/key-cybercriminals-behind-notorious.html
A coordinated law enforcement operation has led to the arrest of key individuals in Ukraine who are alleged to be a part of several ransomware schemes. "On 21 November, 30 properties were searched in the regions of Kyiv, Cherkasy, Rivne, and Vinnytsia, resulting in the arrest of the 32-year-old ringleader," Europol said in a statement today. "Four of the ringleader"s most active accomplices were "

Autosummary: "


Healthcare provider Ardent Health Services disclosed a ransomware attack

exploits ransomware
2023-11-28 https://securityaffairs.com/154855/cyber-crime/ardent-health-services-ransomware-attack.html
The US Healthcare provider Ardent Health Services disclosed that it was the victim of a ransomware attack last week. Ardent Health Services is a healthcare company that operates hospitals and other medical facilities in the United States. It is a for-profit health system with a focus on acquiring, managing, and improving hospitals. Ardent Health Services […] "

Autosummary: Healthcare provider Ardent Health Services disclosed a ransomware attack Pierluigi Paganini November 28, 2023 November 28, 2023 The US Healthcare provider Ardent Health Services disclosed that it was the victim of a ransomware attack last week. "


Slovenian power company hit by ransomware

exploits ransomware
2023-11-28 https://www.helpnetsecurity.com/2023/11/28/slovenian-power-company-ransomware/

Slovenian power generation company Holding Slovenske Elektrarne (HSE) has been hit by ransomware and has had some of its data encrypted. The attack HSE is a state-owned company that controls numerous hydroelectric, thermal and coal-fired power plants. The company has declined to share any details about the cyber intrusion, but has confirmed that operation of its power plants has not been affected. “We would like to emphasize that the HSE had control over the power … More

The post Slovenian power company hit by ransomware appeared first on Help Net Security.

"

Autosummary: “Threat actors leveraging Rhysida ransomware are known to impact ‘targets of opportunity,’ including victims in the education, healthcare, manufacturing, information technology, and government sectors,” according to a recently released advisory by the CISA, FBI, and MS-ISAC. "


Qilin ransomware claims attack on automotive giant Yanfeng

exploits ransomware industry
2023-11-28 https://www.bleepingcomputer.com/news/security/qilin-ransomware-claims-attack-on-automotive-giant-yanfeng/
The Qilin ransomware group has claimed responsibility for a cyber attack on Yanfeng Automotive Interiors (Yanfeng), one of the world"s largest automotive parts suppliers. [...] "

Autosummary: It sells interior components to General Motors, the Volkswagen Group, Ford, Stellantis (Fiat, Chrysler, Jeep, Dodge), BMW, Daimler AG, Toyota, Honda, Nissan, and SAIC Motor. "


DP World confirms data stolen in cyberattack, no ransomware used

exploits ransomware ciber
2023-11-28 https://www.bleepingcomputer.com/news/security/dp-world-confirms-data-stolen-in-cyberattack-no-ransomware-used/
International logistics giant DP World has confirmed that data was stolen during a cyber attack that disrupted its operations in Australia earlier this month. However, no ransomware payloads or encryption was used in the attack. [...] "

Autosummary: The Australian Cyber Security Coordinator, the Australian Cyber Security Center, the Australian Federal Police, the Department of Home Affairs, and the Office of the Australian Information Commissioner have all been informed of the situation and are working closely with DP World to lessen the impact for those who had their data stolen. "


International police operation dismantled a prominent Ukraine-based Ransomware group

exploits ransomware
2023-11-28 https://securityaffairs.com/154897/cyber-crime/ukraine-based-ransomware-group-dismantled.html
An international law enforcement operation dismantled the core of a ransomware group operating from Ukraine. A joint law enforcement operation led by Europol and Eurojust, with the support of the police from seven nations, has arrested in Ukraine the core members of a ransomware group. The police arrested the kingpin along with four other suspects […] "

Autosummary: International police operation dismantled a prominent Ukraine-based Ransomware group Pierluigi Paganini November 28, 2023 November 28, 2023 An international law enforcement operation dismantled the core of a ransomware group operating from Ukraine. "


Healthcare giant Henry Schein hit twice by BlackCat ransomware

exploits ransomware
2023-11-27 https://www.bleepingcomputer.com/news/security/healthcare-giant-henry-schein-hit-twice-by-blackcat-ransomware/
American healthcare company Henry Schein has reported a second cyberattack this month by the BlackCat/ALPHV ransomware gang, who also breached their network in October. [...] "

Autosummary: "Despite ongoing discussions with Henry"s team, we have not received any indication of their willingness to prioritize the security of their clients, partners, and employees, let alone protect their own network," the threat actors said. "


Ardent hospital ERs disrupted in 6 states after ransomware attack

exploits government ransomware
2023-11-27 https://www.bleepingcomputer.com/news/security/ardent-hospital-ers-disrupted-in-6-states-after-ransomware-attack/
Ardent Health Services, a healthcare provider operating 30 hospitals across five U.S. states, disclosed today that its systems were hit by a ransomware attack on Thursday. [...] "

Autosummary: " With a workforce comprising 23,000 employees, Ardent oversees operations across 30 hospitals and more than 200 care facilities in Texas, Oklahoma, New Mexico, Kansas, New Jersey, and Idaho and collaborates with over 1,400 affiliated healthcare providers spanning these six states. "


Slovenia"s largest power provider HSE hit by ransomware attack

exploits ransomware
2023-11-27 https://www.bleepingcomputer.com/news/security/slovenias-largest-power-provider-hse-hit-by-ransomware-attack/
Slovenian power company Holding Slovenske Elektrarne (HSE) has suffered a ransomware attack that compromised its systems and encrypted files, yet the company says the incident did not disrupt electric power production. [...] "

Autosummary: Founded in 2001 by the Government of Slovenia and owned by the state, the firm operates several hydroelectric, thermal, and solar power plants as well as coal mines across the country, while it also owns subsidiaries in Italy, Serbia, and Hungary. "


The crazy world of ransomware

exploits ransomware
2023-11-27 https://grahamcluley.com/the-crazy-world-of-ransomware/
Here"s a bit of fun. A video of me talking for twenty minutes about ransomware - specifically some of the more bonkers stories from the world of ransomware. "

Autosummary: "


Week in review: LockBit exploits Citrix Bleed, Apache ActiveMQ bug exploited for cryptojacking

exploits ransomware
2023-11-26 https://www.helpnetsecurity.com/2023/11/26/week-in-review-lockbit-exploits-citrix-bleed-apache-activemq-bug-exploited-for-cryptojacking/

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: PolarDNS: Open-source DNS server tailored for security evaluations PolarDNS is a specialized authoritative DNS server that allows the operator to produce custom DNS responses suitable for DNS protocol testing purposes. Open-source AV/EDR bypassing lab for training and learning Best EDR Of The Market is a user-mode endpoint detection and response (EDR) project designed to serve as a testing ground for … More

The post Week in review: LockBit exploits Citrix Bleed, Apache ActiveMQ bug exploited for cryptojacking appeared first on Help Net Security.

"

Autosummary: Why boards must prioritize cybersecurity expertise In this Help Net Security video, Graeme Payne, US Advisory Service Leader at Kudelski Security, discusses how, with the incredible number of complex threats facing modern businesses, board members must take an increased role in cybersecurity decisions – or face the consequences. "


Rhysida ransomware gang claimed China Energy hack

exploits ransomware industry
2023-11-25 https://securityaffairs.com/154785/cyber-crime/rhysida-ransomware-china-energy.html
The Rhysida ransomware group claimed to have hacked the Chinese state-owned energy conglomerate China Energy Engineering Corporation. The Rhysida ransomware gang added the China Energy Engineering Corporation to the list of victims on its Tor leak site. The China Energy Engineering Corporation (CEEC) is a state-owned company in China that operates in the energy and […] "

Autosummary: “Threat actors leveraging Rhysida ransomware are known to impact “targets of opportunity,” including victims in the education, healthcare, manufacturing, information technology, and government sectors. The ransomware gang hit organizations in multiple industries, including the education, healthcare, manufacturing, information technology, and government sectors. "


Smashing Security podcast #349: Ransomware gang reports its own crime, and what happened at OpenAI?

exploits ransomware
2023-11-23 https://grahamcluley.com/smashing-security-podcast-349/
Who gets to decide who should be CEO of OpenAI? ChatGPT or the board? Plus a ransomware gang goes a step further than most, reporting one of its own data breaches to the US Securities and Exchange Commission. All this and more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault. "

Autosummary: Hosts: Graham Cluley – @gcluley Carole Theriault – @caroletheriault Episode links: Sponsored by: Kolide – Kolide ensures that if your device isn’t secure it can’t access your cloud apps. "


LockBit Ransomware Exploiting Critical Citrix Bleed Vulnerability to Break In

exploits ransomware
2023-11-22 https://thehackernews.com/2023/11/lockbit-ransomware-exploiting-critical.html
Multiple threat actors, including LockBit ransomware affiliates, are actively exploiting a recently disclosed critical security flaw in Citrix NetScaler application delivery control (ADC) and Gateway appliances to obtain initial access to target environments. The joint advisory comes from the U.S. Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), "

Autosummary: "


How LockBit used Citrix Bleed to breach Boeing and other targets

ransomware
2023-11-22 https://www.helpnetsecurity.com/2023/11/22/lockbit-citrix-bleed/

CVE-2023-4966, aka “Citrix Bleed”, has been exploited by LockBit 3.0 affiliates to breach Boeing’s parts and distribution business, and “other trusted third parties have observed similar activity impacting their organization,” cybersecurity and law enforcement officials have confirmed on Tuesday. In a joint cybersecurity advisory, the Cybersecurity and Infrastructure Security Agency (CISA), the FBI and officials from the Australian Cyber Security Center (ACSC) have shared the tactics, techniques, and procedures and indicators of compromise (IoCs) shared … More

The post How LockBit used Citrix Bleed to breach Boeing and other targets appeared first on Help Net Security.

"

Autosummary: The advisory contains a slew of IoCs – IP addresses, domains, (PowerShell) scripts, tools, scheduled tasks, commands and filenames – that organizations can look for to discover whether they are among LockBit’s victims. "


Play Ransomware Goes Commercial - Now Offered as a Service to Cybercriminals

exploits ransomware ciber
2023-11-21 https://thehackernews.com/2023/11/play-ransomware-goes-commercial-now.html
The ransomware strain known as Play is now being offered to other threat actors "as a service," new evidence unearthed by Adlumin has revealed. "The unusual lack of even small variations between attacks suggests that they are being carried out by affiliates who have purchased the ransomware-as-a-service (RaaS) and are following step-by-step instructions from playbooks delivered with it," the "

Autosummary: "


#StopRansomware: LockBit 3.0 Ransomware Affiliates Exploit CVE 2023-4966 Citrix Bleed Vulnerability

exploits ransomware
2023-11-21 https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-325a

SUMMARY

Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

The Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), Multi-State Information Sharing & Analysis Center (MS-ISAC), and Australian Signals Directorate’s Australian Cyber Security Center (ASD’s ACSC) are releasing this joint Cybersecurity Advisory (CSA) to disseminate IOCs, TTPs, and detection methods associated with LockBit 3.0 ransomware exploiting CVE-2023-4966, labeled Citrix Bleed, affecting Citrix NetScaler web application delivery control (ADC) and NetScaler Gateway appliances.

This CSA provides TTPs and IOCs obtained from FBI, ACSC, and voluntarily shared by Boeing. Boeing observed LockBit 3.0 affiliates exploiting CVE-2023-4966, to obtain initial access to Boeing Distribution Inc., its parts and distribution business that maintains a separate environment. Other trusted third parties have observed similar activity impacting their organization.

Historically, LockBit 3.0 affiliates have conducted attacks against organizations of varying sizes across multiple critical infrastructure sectors, including education, energy, financial services, food and agriculture, government and emergency services, healthcare, manufacturing, and transportation. Observed TTPs for LockBit ransomware attacks can vary significantly in observed TTPs.

Citrix Bleed, known to be leveraged by LockBit 3.0 affiliates, allows threat actors to bypass password requirements an "

Autosummary: rule CISA_10478915_04 : backdoor communicates_with_c2 remote_access { meta: author = "CISA Code & Media Analysis" incident = "10478915" date = "2023-11-06" last_modified = "20231108_1500" actor = "n/a" family = "n/a" capabilities = "communicates-with-c2" malware_type = "backdoor" tool_type = "remote-access" description = "Detects trojan python samples" sha256 = "906602ea3c887af67bcb4531bbbb459d7c24a2efcb866bcb1e3b028a51f12ae6" strings: $s1 = { 70 6f 72 74 20 3d 20 34 34 33 20 69 66 20 22 68 74 74 70 73 22 } $s2 = { 6b 77 61 72 67 73 2e 67 65 74 28 22 68 61 73 68 70 61 73 73 77 64 22 29 3a } $s3 = { 77 69 6e 72 6d 2e 53 65 73 73 69 6f 6e 20 62 61 73 69 63 20 65 72 72 6f 72 } $s4 = { 57 69 6e 64 77 6f 73 63 6d 64 2e 72 75 6e 5f 63 6d 64 28 73 74 72 28 63 6d 64 29 29 } condition: all of them } This file is a Python script called a.py that attempts to leverage WinRM to establish a session."installs-other-components" malware_type = "trojan" tool_type = "unknown" description = "Detects trojan PE32 samples" sha256 = "e557e1440e394537cca71ed3d61372106c3c70eb6ef9f07521768f23a0974068" strings: $s1 = { 57 72 69 74 65 46 69 6c 65 } $s2 = { 41 70 70 50 6f 6c 69 63 79 47 65 74 50 72 6f 63 65 73 73 54 65 72 6d 69 6e 61 74 69 6f 6e 4d 65 74 68 6f 64 } $s3 = { 6f 70 65 72 61 74 6f 72 20 63 6f 5f 61 77 61 69 74 } $s4 = { 43 6f 6d 70 6c 65 74 65 20 4f 62 6a 65 63 74 20 4c 6f 63 61 74 6f 72 } $s5 = { 64 65 6c 65 74 65 5b 5d } $s6 = { 4e 41 4e 28 49 4e 44 29 } condition: uint16(0) == 0x5a4d and pe.imphash() == "6e8ca501c45a9b85fff2378cffaa24b2" and pe.size_of_code == 84480 and all of them } This file is a 64-bit Windows command-line executable called a.exe that is executed by a.bat."steals-authentication-credentials" malware_type = "trojan" tool_type = "credential-exploitation" description = "Detects trojan DLL samples" sha256 = "17a27b1759f10d1f6f1f51a11c0efea550e2075c2c394259af4d3f855bbcc994" strings: $s1 = { 64 65 6c 65 74 65 } $s2 = { 3c 2f 74 72 75 73 74 49 6e 66 6f 3e } $s3 = { 42 61 73 65 20 43 6c 61 73 73 20 44 65 73 63 72 69 70 74 6f 72 20 61 74 20 28 } $s4 = { 49 6e 69 74 69 61 6c 69 7a 65 43 72 69 74 69 63 61 6c 53 65 63 74 69 6f 6e 45 78 } $s5 = { 46 69 6e 64 46 69 72 73 74 46 69 6c 65 45 78 57 } $s6 = { 47 65 74 54 69 63 6b 43 6f 75 6e 74 } condition: uint16(0) == 0x5a4d and pe.subsystem == pe. Open Source YARA Rule Import "pe" rule M_Hunting_Backdoor_FREEFIRE { meta: author = "Mandiant" description = "This is a hunting rule to detect FREEFIRE samples using OP code sequences in getLastRecord method" md5 = "eb842a9509dece779d138d2e6b0f6949" malware_family = "FREEFIRE" strings: $s1 = { 72 ?? ?? ?? ?? The Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), Multi-State Information Sharing & Analysis Center (MS-ISAC), and Australian Signals Directorate’s Australian Cyber Security Center (ASD’s ACSC) are releasing this joint Cybersecurity Advisory (CSA) to disseminate IOCs, TTPs, and detection methods associated with LockBit 3.0 ransomware exploiting CVE-2023-4966, labeled Citrix Bleed, affecting Citrix NetScaler web application delivery control (ADC) and NetScaler Gateway appliances."installs-other-components" malware_Type = "trojan" tool_type = "information-gathering" description = "Detects trojan .bat samples" sha256 = "98e79f95cf8de8ace88bf223421db5dce303b112152d66ffdf27ebdfcdf967e9" strings: $s1 = { 63 3a 5c 77 69 6e 64 6f 77 73 5c 74 61 73 6b 73 5c 7a 2e 74 78 74 } $s2 = { 72 65 67 20 73 61 76 65 20 68 6b 6c 6dThis critical vulnerability exploit impacts the following software versions [1]: NetScaler ADC and NetScaler Gateway 14.1 before 14.1-8.50 NetScaler ADC and NetScaler Gateway 13.1 before 13.1-49.15 NetScaler ADC and NetScaler Gateway 13.0 before 13.0-92.19 NetScaler ADC and NetScaler Gateway version 12.1 (EOL) NetScaler ADC 13.1FIPS before 13.1-37.163 NetScaler ADC 12.1-FIPS before 12.1-55.300 NetScaler ADC 12.1-NDcPP before 12.1-55.300 Due to the ease of exploitation, CISA and the authoring organizations expect to see widespread exploitation of the Citrix vulnerability in unpatched software services throughout both private and public networks. Historically, LockBit 3.0 affiliates have conducted attacks against organizations of varying sizes across multiple critical infrastructure sectors, including education, energy, financial services, food and agriculture, government and emergency services, healthcare, manufacturing, and transportation."CISA Code & Media Analysis" incident = "10478915" date = "2023-11-06" last_modified = "20231108_1500" actor = "n/a" family = "n/a" capabilities ="CISA Code & Media Analysis" incident = "10478915" date = "2023-11-06" last_modified = "20231108_1500" actor = "n/a" family = "n/a" capabilities ="CISA Code & Media Analysis" incident = "10478915" date = "2023-11-06" last_modified = "20231108_1500" actor = "n/a" family = "n/a" capabilities =This will aid the hunt for suspicious activity such as installing tools on the system (e.g., putty, rClone ), new account creation, log item failure, or running commands such as hostname, quser, whoami, net, and taskkill.5c 73 79 73 74 65 6d 20 63 3a 5c 77 69 6e 64 6f 77 73 5c 74 61 73 6b 73 5c 65 6d } $s3 = { 6d 61 6b 65 63 61 62 20 63 3a 5c 75 73 65 72 73 5c 70 75 62 6c 69 63 5c 61 2e 70 6e 67 20 63 3a 5c 77 69 6e 64 6f 77 73 5c 74 61 73 6b 73 5c 61 2e 63 61 62 } condition: all of them } This file is a Windows batch file called a.bat that is used to execute the file called a.exe with the file called a.dll as an argument.6F ?? ?? ?? ?? ??7E ?? ?? ?? ?? ??Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA and the authoring organizations. REFERENCES [1] NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2023-4966 [2] Investigation of Session Hijacking via Citrix NetScaler ADC and Gateway Vulnerability (CVE-2023-4966 [3] What is Mshta, How Can it Be Used and How to Protect Against it (McAfee) VERSION HISTORY November 21, 2023: Initial version. REPORTING The FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with LockBit 3.0 affiliates, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file. "


Rhysida ransomware gang claims British Library cyberattack

exploits ransomware ciber
2023-11-20 https://www.bleepingcomputer.com/news/security/rhysida-ransomware-gang-claims-british-library-cyberattack/
The Rhysida ransomware gang has claimed responsibility for a cyberattack on the British Library in October, which has caused a major ongoing IT outage. [...] "

Autosummary: "Threat actors leveraging Rhysida ransomware are known to impact "targets of opportunity," including victims in the education, healthcare, manufacturing, information technology, and government sectors," the two agencies said. "


VX-Underground malware collective framed by Phobos ransomware

exploits ransomware
2023-11-20 https://www.bleepingcomputer.com/news/security/vx-underground-malware-collective-framed-by-phobos-ransomware/
A new Phobos ransomware variant frames the popular VX-Underground malware-sharing collective, indicating the group is behind attacks using the encryptor. [...] "

Autosummary: For example, when REvil"s precursor, GandCrab, was released, the threat actors named their command and control servers after BleepingComputer, Emsisoft, ESET, and NoMoreRansom. "


Rhysida ransomware gang is auctioning data stolen from the British Library

exploits ransomware
2023-11-20 https://securityaffairs.com/154473/data-breach/rhysida-ransomware-gang-british-library.html
The Rhysida ransomware group claimed responsibility for the recent cyberattack on the British Library that has caused a major IT outage. The Rhysida ransomware gang added the British Library to the list of victims on its Tor leak site. The British Library is a research library in London that is the national library of the […] "

Autosummary: While our website is unavailable following a major technology outage caused by a cyber-attack, we’re keeping our blog up to date with what’s on at the Library: https://t.co/8tzhn37lew We’ve just uploaded more events up until 14 December, including our current season of Fantasy… pic.twitter.com/742E11oUOn — British Library (@britishlibrary) November 17, 2023 Three hours ago the British Library said that it is continuing to experience a major technology outage that is impacting its website, online systems and services, and some on-site services. “Threat actors leveraging Rhysida ransomware are known to impact “targets of opportunity,” including victims in the education, healthcare, manufacturing, information technology, and government sectors. The ransomware gang hit organizations in multiple industries, including the education, healthcare, manufacturing, information technology, and government sectors. "


Scattered Spider ransomware gang falls under government agency scrutiny

exploits government ransomware
2023-11-20 https://www.malwarebytes.com/blog/news/2023/11/scattered-spider-ransomware-gang-falls-under-government-agency-scrutiny
Ransomware group Scattered Spider aka Octo Tempest are masters at social engineering tactics like SIM swapping. "

Autosummary: CISA and the FBI consider Scattered Spider to be experts that use multiple social engineering techniques, especially phishing, push bombing, and SIM swap attacks, to obtain credentials, install remote access tools, and bypass multi-factor authentication (MFA).Once you’ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again. Once the groups establish access, Scattered Spider often searches the victim’s Slack, Microsoft Teams, and Microsoft Exchange online for emails or conversations regarding the intrusion, along with any security response to see if their attack has been discovered. "


8Base ransomware operators use a new variant of the Phobos ransomware

exploits ransomware
2023-11-19 https://securityaffairs.com/154383/malware/8base-ransomware-phobos-ransomware.html
8Base ransomware operators were observed using a variant of the Phobos ransomware in a recent wave of attacks. Cisco Talos researchers observed 8Base ransomware operators using a variant of the Phobos ransomware in recent attacks. Phobos variants are usually distributed by the SmokeLoader, but in 8Base campaigns, it has the ransomware component embedded in its encrypted payloads. The […] "

Autosummary: The group has been active since March 2022, it focused on small and medium-size businesses in multiple industries, including finance, manufacturing, business services, and IT. Pierluigi Paganini November 19, 2023 November 19, 2023 8Base ransomware operators were observed using a variant of the Phobos ransomware in a recent wave of attacks. "


8Base Group Deploying New Phobos Ransomware Variant via SmokeLoader

exploits ransomware
2023-11-18 https://thehackernews.com/2023/11/8base-group-deploying-new-phobos.html
The threat actors behind the 8Base ransomware are leveraging a variant of the Phobos ransomware to conduct their financially motivated attacks. The findings come from Cisco Talos, which has recorded an increase in activity carried out by cybercriminals. “Most of the group’s Phobos variants are distributed by SmokeLoader, a backdoor trojan," security researcher Guilherme Venere said in an "

Autosummary: "It implies, however, that once the private RSA key is known, any file encrypted by any Phobos variant since 2019 can reliably be decrypted." Phobos, which first emerged in 2019, is an evolution of the Dharma (aka Crysis) ransomware, with the ransomware predominantly manifesting as the variants Eking, Eight, Elbie, Devos, and Faust, based on the volume of artifacts unearthed on VirusTotal." "Establish a minimum ransom request depending on the company"s yearly revenue, for example at 3%, and prohibit discounts of more than 50%," the LockBit operators said, according to a detailed report from Analyst1. "


British Library: Ongoing outage caused by ransomware attack

exploits ransomware
2023-11-17 https://www.bleepingcomputer.com/news/security/british-library-ongoing-outage-caused-by-ransomware-attack/
The British Library confirmed that a ransomware attack is behind a major outage that is still affecting services across several locations. [...] "

Autosummary: " While the attackers deployed ransomware payloads on the library"s systems on Saturday, October 28, the IT outage continues to impact the British Library"s website, online systems, services, and certain onsite facilities such as Wi-Fi. "


Yamaha Motor confirms ransomware attack on Philippines subsidiary

exploits ransomware
2023-11-17 https://www.bleepingcomputer.com/news/security/yamaha-motor-confirms-ransomware-attack-on-philippines-subsidiary/
Yamaha Motor"s Philippines motorcycle manufacturing subsidiary was hit by a ransomware attack last month, resulting in the theft and leak of some employees" personal information. [...] "

Autosummary: "One of the servers managed by [..] motorcycle manufacturing and sales subsidiary in the Philippines, Yamaha Motor Philippines, Inc. (YMPH), was accessed without authorization by a third party and hit by a ransomware attack, and a partial leakage of employees" personal information stored by the company was confirmed," Yamaha said. "


Medusa ransomware gang claims the hack of Toyota Financial Services

financial exploits ransomware
2023-11-17 https://securityaffairs.com/154319/data-breach/toyota-financial-services-medusa-ransomware.html
Toyota Financial Services discloses unauthorized activity on systems after the Medusa ransomware gang claimed to have hacked the company. Toyota Financial Services confirmed the discovery of unauthorized activity on systems in a limited number of its locations. “Toyota Financial Services Europe & Africa recently identified unauthorised activity on systems in a limited number of its […] "

Autosummary: Medusa ransomware gang claims the hack of Toyota Financial Services Pierluigi Paganini November 17, 2023 November 17, 2023 Toyota Financial Services discloses unauthorized activity on systems after the Medusa ransomware gang claimed to have hacked the company. "


The Week in Ransomware - November 17th 2023 - Citrix in the Crosshairs

exploits ransomware
2023-11-17 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-november-17th-2023-citrix-in-the-crosshairs/
Ransomware gangs target exposed Citrix Netscaler devices using a publicly available exploit to breach large organizations, steal data, and encrypt files. [...] "

Autosummary: We also learned more about recent attacks and tactics used by ransomware threat actors, which are highlighted below: Contributors and those who provided new ransomware information and stories this week include: @serghei, @demonslay335, @billtoulas, @fwosar, @Seifreed, @malwrhunterteam, @BleepinComputer, @Ionut_Ilascu, @LawrenceAbrams, @GossiTheDog, @BrettCallow, @PogoWasRight, @pcrisk, and @NCCGroupInfosec. November 14th 2023 The Lockbit ransomware attacks use publicly available exploits for the Citrix Bleed vulnerability (CVE-2023-4966) to breach the systems of large organizations, steal data, and encrypt files. "


FBI and CISA warn of attacks by Rhysida ransomware gang

exploits ransomware
2023-11-16 https://securityaffairs.com/154224/malware/fbi-cisa-rhysida-ransomware-gang.html
The FBI and CISA warn of attacks carried out by the Rhysida ransomware group against organizations across multiple industry sectors. FBI and CISA published a joint Cybersecurity Advisory (CSA) to warn of Rhysida ransomware attacks against organizations across multiple industry sectors. The report is part of the ongoing #StopRansomware effort that disseminates advisories about tactics, techniques, and […] "

Autosummary: “Threat actors leveraging Rhysida ransomware are known to impact “targets of opportunity,” including victims in the education, healthcare, manufacturing, information technology, and government sectors.“Additionally, open source reporting[2] has confirmed observed instances of Rhysida actors operating in a ransomware-as-a-service (RaaS) capacity, where ransomware tools and infrastructure are leased out in a profit-sharing model. "


CISA and FBI Issue Warning About Rhysida Ransomware Double Extortion Attacks

exploits ransomware
2023-11-16 https://thehackernews.com/2023/11/cisa-and-fbi-issue-warning-about.html
The threat actors behind the Rhysida ransomware engage in opportunistic attacks targeting organizations spanning various industry sectors. The advisory comes courtesy of the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Multi-State Information Sharing and Analysis Center (MS-ISAC). "Observed as a ransomware-as-a-service (RaaS) "

Autosummary: According to statistics compiled by Malwarebytes, Rhysida has claimed five victims for the month of October 2023, putting it far behind LockBit (64), NoEscape (40), PLAY (36), ALPHV/BlackCat (29), and 8BASE (21). "


Hackers Could Exploit Google Workspace and Cloud Platform for Ransomware Attacks

exploits ransomware
2023-11-16 https://thehackernews.com/2023/11/hackers-could-exploit-google-workspace.html
A set of novel attack methods has been demonstrated against Google Workspace and the Google Cloud Platform that could be potentially leveraged by threat actors to conduct ransomware, data exfiltration, and password recovery attacks. "Starting from a single compromised machine, threat actors could progress in several ways: they could move to other cloned machines with GCPW installed, gain access "

Autosummary: "Starting from a single compromised machine, threat actors could progress in several ways: they could move to other cloned machines with GCPW installed, gain access to the cloud platform with custom permissions, or decrypt locally stored passwords to continue their attack beyond the Google ecosystem," Martin Zugec, technical solutions director at Bitdefender, said in a new report. "


Toyota confirms breach after Medusa ransomware threatens to leak data

exploits ransomware
2023-11-16 https://www.bleepingcomputer.com/news/security/toyota-confirms-breach-after-medusa-ransomware-threatens-to-leak-data/
Toyota Financial Services (TFS) has confirmed that it detected unauthorized access on some of its systems in Europe and Africa after Medusa ransomware claimed an attack on the company. [...] "

Autosummary: To prove the intrusion, the hackers published sample data that includes financial documents, spreadsheets, purchase invoices, hashed account passwords, cleartext user IDs and passwords, agreements, passport scans, internal organization charts, financial performance reports, staff email addresses, and more. "


Nuclear and oil & gas are major targets of ransomware groups in 2024

exploits ransomware industry
2023-11-15 https://www.helpnetsecurity.com/2023/11/15/2024-ransomware-groups-targets/

Resecurity, Inc. (USA) protecting major Fortune 100 and government agencies globally has identified an alarming rise in ransomware operators targeting the energy sector, including nuclear facilities and related research entities. Over the last year, ransomware attackers have targeted energy installations in North America, Asia, and the European Union. In the EU, Handelsblatt reported that ransomware attacks targeting the energy sector more than doubled in 2022 over the previous year, with defenders recording 21 attacks through … More

The post Nuclear and oil & gas are major targets of ransomware groups in 2024 appeared first on Help Net Security.

"

Autosummary: "


Keysight Elastic Network Generator facilitates collaborative and flexible network continuous validation

ransomware
2023-11-15 https://www.helpnetsecurity.com/2023/11/15/keysight-elastic-network-generator/

Keysight Technologies has introduced a first in its class advancement in network testing with the new Keysight Elastic Network Generator (KENG) software – an agile, composable network test platform based on open vendor-neutral API and designed for continuous integration (CI). While traditional networking environments often rely on proprietary testing solutions, closed test systems create challenges for engineers and network architects since they operate in isolation, lack interoperability, and flexibility. This lack of compatibility makes it … More

The post Keysight Elastic Network Generator facilitates collaborative and flexible network continuous validation appeared first on Help Net Security.

"

Autosummary: Its open, disaggregated and API-first design has been field tested and proven to be ideal for modern DevOps,” Ram Periakaruppan, VP and GM, Network Test & Security Solutions, Keysight, concluded. "


Brazil: dangerous heatwave continues

latam ransomware
2023-11-15 https://www.bbc.co.uk/weather/features/67429874?at_medium=RSS&at_campaign=KARANGA
The extreme and long-lasting heat, which has brought temperatures which feel like more than 50C, is set to continue for a few more days. "

Autosummary: "


Toronto Public Library confirms data stolen in ransomware attack

exploits ransomware
2023-11-15 https://www.bleepingcomputer.com/news/security/toronto-public-library-confirms-data-stolen-in-ransomware-attack/
The Toronto Public Library (TPL) confirmed that the personal information of employees, customers, volunteers, and donors was stolen from a compromised file server during an October ransomware attack. [...] "

Autosummary: Since it surfaced, the Russian-speaking ransomware gang has breached and extorted a wide range of high-profile victims, including the American Dental Association, Sobeys, Knauf, Yellow Pages Canada, UK outsourcing company Capita, the Rheinmetall German defense contractor, and most recently, U.S. government contractor ABB. "


FBI and CISA warn of opportunistic Rhysida ransomware attacks

exploits ransomware
2023-11-15 https://www.bleepingcomputer.com/news/security/fbi-and-cisa-warn-of-opportunistic-rhysida-ransomware-attacks/
The FBI and CISA warned today of Rhysida ransomware gang"s opportunistic attacks targeting organizations across multiple industry sectors. [...] "

Autosummary: "


The Importance of Continuous Security Monitoring for a Robust Cybersecurity Strategy

ransomware ciber
2023-11-14 https://thehackernews.com/2023/11/the-importance-of-continuous-security.html
In 2023, the global average cost of a data breach reached $4.45 million. Beyond the immediate financial loss, there are long-term consequences like diminished customer trust, weakened brand value, and derailed business operations. In a world where the frequency and cost of data breaches are skyrocketing, organizations are coming face-to-face with a harsh reality: traditional cybersecurity "

Autosummary: Ongoing discovery, monitoring, and analysis of your external exposure, including domains, websites, hosts, services, etc. : Ongoing discovery, monitoring, and analysis of your external exposure, including domains, websites, hosts, services, etc.It proactively scouts for vulnerabilities, irregularities, misconfigurations, and potential threats, ensuring swift detection and response. "


Nuclear and Oil & Gas are Major Targets of Ransomware Groups in 2024

exploits ransomware industry
2023-11-14 https://securityaffairs.com/154113/malware/ransomware-gangs-targets-nuclear-and-oil-gas-2024.html

Experts warn of an alarming rise in ransomware operations targeting the energy sector, including nuclear facilities and related research entities. Resecurity, Inc. (USA) protecting major Fortune 100 and government agencies globally has identified an alarming rise in ransomware operators targeting the energy sector, including nuclear facilities and related research entities. Over the last year, ransomware […]

The post Nuclear and Oil & Gas are Major Targets of Ransomware Groups in 2024 appeared first on Security Affairs.

"

Autosummary: Nuclear and Oil & Gas are Major Targets of Ransomware Groups in 2024 Pierluigi Paganini November 14, 2023 November 14, 2023 Experts warn of an alarming rise in ransomware operations targeting the energy sector, including nuclear facilities and related research entities. "


DirectDefense ThreatAdvisor 3.0 offers continuous security monitoring and management

ransomware
2023-11-14 https://www.helpnetsecurity.com/2023/11/14/directdefense-threatadvisor-3-0/

DirectDefense launched ThreatAdvisor 3.0, its proprietary security orchestration, automation and response (SOAR) platform. Designed to improve the speed, efficiency, and accuracy of DirectDefense’s Security Operations Center (SOC), ThreatAdvisor 3.0 offers continuous security monitoring and management, automates manual processes, and includes an extensive knowledge base for compliance, security events and mitigation techniques. Together with DirectDefense’s white glove approach, ThreatAdvisor is customized for each client based on its unique needs. “The volume and velocity of security threats … More

The post DirectDefense ThreatAdvisor 3.0 offers continuous security monitoring and management appeared first on Help Net Security.

"

Autosummary: Designed to improve the speed, efficiency, and accuracy of DirectDefense’s Security Operations Center (SOC), ThreatAdvisor 3.0 offers continuous security monitoring and management, automates manual processes, and includes an extensive knowledge base for compliance, security events and mitigation techniques. "


LockBit ransomware exploits Citrix Bleed in attacks, 10K servers exposed

exploits ransomware
2023-11-14 https://www.bleepingcomputer.com/news/security/lockbit-ransomware-exploits-citrix-bleed-in-attacks-10k-servers-exposed/
The Lockbit ransomware attacks use publicly available exploits for the Citrix Bleed vulnerability (CVE-2023-4966) to breach the systems of large organizations, steal data, and encrypt files. [...] "

Autosummary: The majority of the servers, 3,133, are in the U.S., followed by 1,228 in Germany, 733 in China, 558 in the U.K., 381 in Australia, 309 in Canada, 301 in France, 277 in Italy, 252 in Spain, 244 in the Netherlands, and 215 in Switzerland. "


#StopRansomware: Rhysida Ransomware

exploits ransomware
2023-11-14 https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-319a

SUMMARY

Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders detailing various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing this joint CSA to disseminate known Rhysida ransomware IOCs and TTPs identified through investigations as recently as September 2023. Rhysida—an emerging ransomware variant—has predominately been deployed against the education, healthcare, manufacturing, information technology, and government sectors since May 2023. The information in this CSA is derived from related incident response investigations and malware analysis of samples discovered on victim networks.

FBI, CISA, and the MS-ISAC encourage organizations to implement the recommendations in the Mitigations section of this CSA to reduce the likelihood and impact of Rhysida ransomware and other ransomware incidents.

Download the PDF version of this report:

For a downloadable copy of IOCs, see:

Autosummary: Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by FBI, CISA, and the MS-ISAC. Additional details requested include: a targeted company point of contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, and host and network-based indicators. In addition, FBI, CISA, and the MS-ISAC recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques, and to reduce the impact and risk of compromise by ransomware or data extortion actors: Keep all operating systems, software, and firmware up to date.FBI, CISA, and the MS-ISAC do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document.Note: Microsoft released a patch for CVE-2020-1472 on August 11, 2020.[3] Living off the Land Analysis identified Rhysida actors using living off the land techniques, such as creating Remote Desktop Protocol (RDP) connections for lateral movement [T1021.001], establishing VPN access, and utilizing PowerShell [T1059.001]. RESOURCES REPORTING FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with Rhysida actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file. Overview Threat actors leveraging Rhysida ransomware are known to impact “targets of opportunity,” including victims in the education, healthcare, manufacturing, information technology, and government sectors. VALIDATE SECURITY CONTROLS In addition to applying mitigations, FBI, CISA, and the MS-ISAC recommend exercising, testing, and validating your organization"s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (e.g., hard drive, storage device, or the cloud).Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (e.g., hard drive, storage device, or the cloud). Rhysida ransomware uses a Windows 64-bit Portable Executable (PE) or common object file format (COFF) compiled using MinGW via the GNU Compiler Collection (GCC), which supports various programming languages such as C, C++, and Go.Additionally, open source reporting[2] has confirmed observed instances of Rhysida actors operating in a ransomware-as-a-service (RaaS) capacity, where ransomware tools and infrastructure are leased out in a profit-sharing model.[T1069.002] [T1069.002] net localgroup administrators [T1069.001] Analysis of the master file table (MFT)[4] identified the victim system generated the ntuser.dat registry hive, which was created when the compromised user logged in to the system for the first time. FBI, CISA, and the MS-ISAC recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory. The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are releasing this joint CSA to disseminate known Rhysida ransomware IOCs and TTPs identified through investigations as recently as September 2023. Table 10: Defense Evasion Technique Title ID Use Indicator Removal: Clear Windows Event Logs T1070.001 Rhysida actors used wevtutil.exe to clear Windows event logs, including system, application, and security logs. Download the PDF version of this report: For a downloadable copy of IOCs, see: TECHNICAL DETAILS Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 14. "


Success eludes the International Counter Ransomware Initiative

exploits ransomware
2023-11-13 https://www.helpnetsecurity.com/2023/11/13/international-counter-ransomware-initiative-cri/

A swing and a miss by the 50 member countries of the International Counter Ransomware Initiative (CRI), headlined by the US, who have confirmed a commitment to collectively address ransomware. Ransomware, as predicted, is growing at tremendous rates and focusing on critical infrastructure sectors that can impact vast numbers of citizens. It is such a blight that countries are banding together to see what can be done. Everybody is looking towards the United States for … More

The post Success eludes the International Counter Ransomware Initiative appeared first on Help Net Security.

"

Autosummary: The CRI recognizes that paying attackers only makes them stronger and incentivizes them to attack more, while severing payments, no matter how painful, weakens and greatly discourages attackers, and will ultimately grind their attacks down to insignificance. "


New Ransomware Group Emerges with Hive"s Source Code and Infrastructure

exploits ransomware
2023-11-13 https://thehackernews.com/2023/11/new-ransomware-group-emerges-with-hives.html
The threat actors behind a new ransomware group called Hunters International have acquired the source code and infrastructure from the now-dismantled Hive operation to kick-start its own efforts in the threat landscape. "It appears that the leadership of the Hive group made the strategic decision to cease their operations and transfer their remaining assets to another group, Hunters "

Autosummary: "It appears that the leadership of the Hive group made the strategic decision to cease their operations and transfer their remaining assets to another group, Hunters International," Martin Zugec, technical solutions director at Bitdefender, said in a report published last week. "


LockBit ransomware gang leaked data stolen from Boeing

exploits ransomware
2023-11-13 https://securityaffairs.com/154115/cyber-crime/lockbit-ransomware-leaked-boeing-data.html

The LockBit ransomware group published data allegedly stolen from the aerospace giant Boeing in a recent attack. The Boeing Company, commonly known as Boeing, is one of the world’s largest aerospace manufacturers and defense contractors.  In 2022, Boeing recorded $66.61 billion in sales, the aerospace giant has 156,000 (2022). At the end of October, the Lockbit ransomware […]

The post LockBit ransomware gang leaked data stolen from Boeing appeared first on Security Affairs.

"

Autosummary: LockBit ransomware gang leaked data stolen from Boeing Pierluigi Paganini November 13, 2023 November 13, 2023 The LockBit ransomware group published data allegedly stolen from the aerospace giant Boeing in a recent attack. "


FBI: Royal ransomware asked 350 victims to pay $275 million

exploits ransomware
2023-11-13 https://www.bleepingcomputer.com/news/security/fbi-royal-ransomware-asked-350-victims-to-pay-275-million/
The FBI and CISA revealed in a joint advisory that the Royal ransomware gang has breached the networks of at least 350 organizations worldwide since September 2022. [...] "

Autosummary: During these attacks, when targets dial the phone numbers embedded in emails cleverly disguised as subscription renewals, the attackers leverage social engineering tactics to trick the victims into installing remote access software, granting them access to the targeted network. "


LockBit ransomware leaks gigabytes of Boeing data

exploits ransomware
2023-11-12 https://www.bleepingcomputer.com/news/security/lockbit-ransomware-leaks-gigabytes-of-boeing-data/
The LockBit ransomware gang published data stolen from Boeing, one of the largest aerospace companies that services commercial airplanes and defense systems. [...] "

Autosummary: Boeing page on LockBit data leak site source: BleepingComputer Boeing disappeared from LockBit’s list of victims for a period but was listed again on November 7, when the hackers announced that their warnings had been ignored. "


The Lorenz ransomware group hit Texas-based Cogdell Memorial Hospital

exploits ransomware
2023-11-12 https://securityaffairs.com/154101/data-breach/the-lorenz-ransomware-group-hit-texas-based-cogdell-memorial-hospital.html

The Lorenz extortion group leaked the data stolen from the Texas-based Cogdell Memorial Hospital. In early November, the Cogdell Memorial Hospital (Scurry County Hospital District) announced it was experiencing a computer network incident that prevented the hospital from accessing some of its systems and severely limiting the operability of its phone system. The hospital immediately […]

The post The Lorenz ransomware group hit Texas-based Cogdell Memorial Hospital appeared first on Security Affairs.

"

Autosummary: It is a 70-bed hospital that provides a wide range of services, including: Emergency care Inpatient and outpatient surgery Medical imaging Laboratory services Physical therapy Occupational therapy Speech therapy Home health care Hospice care The Lorenz extortion group claimed responsibility for the security breach and added the hospital to its Tor leak site.The Lorenz ransomware group hit Texas-based Cogdell Memorial Hospital Pierluigi Paganini November 12, 2023 November 12, 2023 The Lorenz extortion group leaked the data stolen from the Texas-based Cogdell Memorial Hospital. "


Chinese multinational bank hit by ransomware

financial exploits ransomware
2023-11-10 https://www.helpnetsecurity.com/2023/11/10/china-bank-ransomware/

The state-owned Industrial and Commercial Bank of China (ICBC), which is one of the largest banks in the world, has been hit by a ransomware attack that led to disrupted trades in the US Treasury market. The attack “On November 8, 2023, U.S. Eastern Time (November 9, 2023, Beijing Time), ICBC Financial Services (FS) experienced a ransomware attack that resulted in disruption to certain FS systems. Immediately upon discovering the incident, ICBC FS disconnected and … More

The post Chinese multinational bank hit by ransomware appeared first on Help Net Security.

"

Autosummary: "


Industrial and Commercial Bank of China (ICBC) suffered a ransomware attack

financial exploits ransomware industry
2023-11-10 https://securityaffairs.com/153986/hacking/icbc-ransomware-attack.html

The Industrial and Commercial Bank of China (ICBC) suffered a ransomware attack that disrupted trades in the US Treasury market. The Industrial and Commercial Bank of China (ICBC) announced it has contained a ransomware attack that disrupted the U.S. Treasury market and impacted some fixed income and equities transactions “The Securities Industry and Financial Markets […]

The post Industrial and Commercial Bank of China (ICBC) suffered a ransomware attack appeared first on Security Affairs.

"

Autosummary: The Industrial and Commercial Bank of China (ICBC) announced it has contained a ransomware attack that disrupted the U.S. Treasury market and impacted some fixed income and equities transactions “The Securities Industry and Financial Markets Association first told members on Wednesday that ICBC Financial Services had been hit by ransomware software, which paralyses computer systems unless a payment is made, several people familiar with the discussions said.” reported the Financial Times. "


SysAid zero-day exploited by Clop ransomware group

exploits ransomware
2023-11-10 https://securityaffairs.com/153958/hacking/sysaid-zero-day-clop-ransomware-gang.html

Microsoft spotted the exploitation of a SysAid zero-day vulnerability in limited attacks carried out by the Lace Tempest group. Microsoft reported the exploitation of a zero-day vulnerability, tracked as CVE-2023-47246, in the SysAid IT support software in limited attacks. The IT giant linked the attacks to the Clop ransomware gang (aka Lace Tempest). The company reported the flaw […]

The post SysAid zero-day exploited by Clop ransomware group appeared first on Security Affairs.

"

Autosummary: SysAid zero-day exploited by Clop ransomware group Pierluigi Paganini November 10, 2023 November 10, 2023 Microsoft spotted the exploitation of a SysAid zero-day vulnerability in limited attacks carried out by the Lace Tempest group. "


The Rise of Ransomware in Healthcare: What IT Leaders Need to Know

exploits ransomware
2023-11-10 https://www.bleepingcomputer.com/news/security/the-rise-of-ransomware-in-healthcare-what-it-leaders-need-to-know/
Ransomware attacks are rapidly becoming the weapon of choice, making up over half of all attacks in the healthcare industry. Learn more from Specops Software on securing your organization from these attacks. [...] "

Autosummary: Tools, such as Specops Password Policy enables IT teams to set stringent password protocols, from meeting compliance standards, setting length and complexity requirements, to ensuring the absence of common and weak terms, as well as blocking known compromised passwords, which significantly tightens access controls. It lays out five core rules – the Privacy Rule, the Security Rule, the Breach Notification Rule, the Enforcement Rule, and the Patient Safety Rule. It spanned a range of sensitive information, including names, addresses, Social Security numbers, and more. "


World’s biggest bank hit by ransomware, forced to trade via USB stick

financial exploits ransomware
2023-11-10 https://www.bitdefender.com/blog/hotforsecurity/worlds-biggest-bank-hit-by-ransomware-forced-to-trade-via-usb-stick/
The US trading arm of the Industrial and Commercial Bank of China (ICBC) has been hit by a ransomware attack that reportedly forced it to handle trades via messengers carrying USB thumb drives across Manhattan. Read more in my article on the Hot for Security blog. "

Autosummary: "


Microsoft: SysAid zero-day flaw exploited in Clop ransomware attacks

exploits ransomware
2023-11-09 https://www.bleepingcomputer.com/news/security/microsoft-sysaid-zero-day-flaw-exploited-in-clop-ransomware-attacks/
Threat actors are exploiting a zero-day vulnerability in the service management software SysAid to gain access to corporate servers for data theft and to deploy Clop ransomware. [...] "

Autosummary: SysAid"s report provides indicators of compromise that could help detect or prevent the intrusion, which consist in filenames and hashes, IP addresses, file paths used in the attack, and commands the threat actor used to download malware or to delete evidence of initial access. "


Update now! SysAid vulnerability is actively being exploited by ransomware affiliate

exploits ransomware
2023-11-09 https://www.malwarebytes.com/blog/news/2023/11/update-now-sysaid-vulnerability-is-actively-being-exploited-by-ransomware-affiliate
A SysAid vulnerability is actively being exploited by a ransomware affiliate. "

Autosummary: Loader C2 45.182.189.100 GraceWire Loader C2 179.60.150.34 Cobalt Strike C2 45.155.37.105 Meshagent remote admin tool C2 Malwarebytes blocks the Cobalt Strike C2 179.60.150.34 File Paths: C:\Program Files\SysAidServer\tomcat\webapps\usersfiles\user.exe C:\Program Files\SysAidServer\tomcat\webapps\usersfiles.war C:\Program Files\SysAidServer\tomcat\webapps\leave How to avoid ransomware Block common forms of entry.Once you’ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again. IOCs File: b5acf14cdac40be590318dee95425d0746e85b1b7b1cbd14da66f21f2522bf4d Malicious loader IPs: 81.19.138.52 GraceWire "


Industrial and Commercial Bank of China hit by ransomware attack

financial exploits ransomware industry
2023-11-09 https://www.bleepingcomputer.com/news/security/industrial-and-commercial-bank-of-china-hit-by-ransomware-attack/
The Industrial & Commercial Bank of China (ICBC) is restoring systems and services following a ransomware attack that disrupted the U.S. Treasury market, causing equities clearing issues. [...] "

Autosummary: ICBC is China"s largest bank and the largest commercial bank in the world by revenue, with revenue of $214.7 billion and profits of $53.5 billion reported in 2022, according to Fortune. "


Kyocera AVX says ransomware attack impacted 39,000 individuals

exploits ransomware
2023-11-09 https://www.bleepingcomputer.com/news/security/kyocera-avx-says-ransomware-attack-impacted-39-000-individuals/
Kyocera AVX Components Corporation (KAVX) is sending notices of a data breach exposing personal information of 39,111 individuals following a ransomware attack. [...] "

Autosummary: “On March 30, 2023, KAVX experienced a cybersecurity incident affecting servers located in Greenville and Myrtle Beach, South Carolina, USA, which resulted in the encryption of a limited number of systems and temporary disruption of certain services,” reads the notice. "


World’s largest commercial bank ICBC confirms ransomware attack

financial exploits ransomware
2023-11-09 https://www.bleepingcomputer.com/news/security/worlds-largest-commercial-bank-icbc-confirms-ransomware-attack/
The Industrial & Commercial Bank of China (ICBC) is restoring systems and services following a ransomware attack that disrupted the U.S. Treasury market, causing equities clearing issues. [...] "

Autosummary: "On November 8, 2023, U.S. Eastern Time (November 9, 2023, Beijing Time), ICBC Financial Services (FS) experienced a ransomware attack that resulted in disruption to certain FS systems. "


The 3 key stages of ransomware attacks and useful indicators of compromise

exploits ransomware
2023-11-08 https://www.helpnetsecurity.com/2023/11/08/ransomware-attack-stages/

For SOC teams to be able to defend their organization against ransomware attacks, they need to have the right security toolset, but also an understanding of the three primary ransomware attack stages. In this article, we will dive into those key stages, look at how they unfold and what signs indicate an attack, and review what can be done to mitigate any damage. When it comes to ransomware attacks, most of the time there isn’t … More

The post The 3 key stages of ransomware attacks and useful indicators of compromise appeared first on Help Net Security.

"

Autosummary: It requires identifying strange or out-of-the-ordinary user and entity behavior across the network, such as accessing files outside their scope of work, installing external non-company approved software on the network, looking at DNS queries, and more.Other indicators of compromise include: Accessing website infrastructure Looking for specific DNS addresses Connecting to external cloud services like Dropbox Again, these signs can be difficult to distinguish because these actions may look like they are being made by someone who has authorized access to sensitive data, but is actually a hacker imitating them on the network. Once hackers gain access to a database with a lot of sensitive information or have control over the network, attackers will begin deploying software like PuTTY across different areas, further establishing their foothold and creating backups for their ransomware in case they are detected. "


Russian-speaking threat actor "farnetwork" linked to 5 ransomware gangs

exploits ransomware rusia-ucrania
2023-11-08 https://www.bleepingcomputer.com/news/security/russian-speaking-threat-actor-farnetwork-linked-to-5-ransomware-gangs/
The operator of the Nokoyawa ransomware-as-a-service (RaaS), a threat actor known as "farnetwork", built experience over the years by helping the JSWORM, Nefilim, Karma, and Nemty affiliate programs with malware development and operation management. [...] "

Autosummary: According to a report Group-IB shared with BleepingComputer, the threat actor has several usernames (e.g. farnetworkl, jingo, jsworm, razvrat, piparkuka, and farnetworkitand) and has been active on multiple Russian-speaking hacker forums trying to recruit affiliates for various ransomware operations. "


Cancer treatments cancelled after Canadian hospitals hit by ransomware attack

financial exploits ransomware
2023-11-08 https://www.bitdefender.com/blog/hotforsecurity/cancer-treatments-cancelled-after-canadian-hospitals-hit-by-ransomware-attack/
A ransomware attack impacting five hospitals in southwestern Ontario, Canada, has seen hackers gain access to a database containing 5.6 million patient visits, and the social insurance numbers of over 1400 employees. Read more in my article on the Hot for Security blog. "

Autosummary: The attack against IT service provider TransForm, which took place on October 23, resulted in outages in IT systems at Windsor Regional Hospital, Erie Shores HealthCare, Hôtel-Dieu Grace Healthcare, Bluewater Health and Chatham-Kent Health Alliance, leaving patients facing appointment delays and cancelled surgeries. "


Experts Expose Farnetwork"s Ransomware-as-a-Service Business Model

exploits ransomware
2023-11-08 https://thehackernews.com/2023/11/experts-expose-farnetworks-ransomware.html
Cybersecurity researchers have unmasked a prolific threat actor known as farnetwork, who has been linked to five different ransomware-as-a-service (RaaS) programs over the past four years in various capacities. Singapore-headquartered Group-IB, which attempted to infiltrate a private RaaS program that uses the Nokoyawa ransomware strain, said it underwent a "job interview" process with the "

Autosummary: "Throughout the threat actor"s cybercriminal career, which began in 2019, farnetwork has been involved in several connected ransomware projects, including JSWORM, Nefilim, Karma, and Nemty, as part of which they helped develop ransomware and manage the RaaS programs before launching their own RaaS program based on Nokoyawa ransomware," Nikolay Kichatov, threat intelligence analyst at Group-IB, said. "


Kasten K10 V6.5 improves ransomware and data protection for Kubernetes environments

exploits ransomware
2023-11-08 https://www.helpnetsecurity.com/2023/11/08/kasten-k10-v6-5/

Kasten by Veeam has announced the release of its new Kasten K10 V6.5 platform for Kubernetes. The new release introduces trusted container environments, enhanced ransomware protection and data protection support for large-scale Kubernetes environments. As part of the new cloud native security innovations in Kasten K10 V6.5, organizations now have access to ransomware protection advances that allow for integrations with SIEM (Datadog) to proactively detect security attacks along with an extended audit log backend that … More

The post Kasten K10 V6.5 improves ransomware and data protection for Kubernetes environments appeared first on Help Net Security.

"

Autosummary: Additionally, support for Iron Bank, Platform One’s source, now provides hardened federal container registry, to ensure application and data security against a variety of threat factors and guarantees that organizations can comply with regulatory and legal fiats. “Kasten by Veeam’s new security advancements puts it at features-parity, and in some cases, even above what traditional data protection products can currently do,” said Johnny Yu, research manager at IDC. "


Five Canadian Hospitals impacted by a ransomware attack on TransForm provider

exploits ransomware
2023-11-08 https://securityaffairs.com/153857/cyber-crime/canadian-hospitals-transform-ransomware-attack.html

Five Canadian hospitals were victims of a ransomware attack, threat actors claim to have stolen data from them and leaked them. Five Canadian hospitals revealed they were victims of ransomware attacks after threat actors leaked alleged stolen data. The impacted hospitals are Bluewater Health, Chatham-Kent Health Alliance, Erie Shores HealthCare, Hôtel-Dieu Grace Healthcare, and Windsor […]

The post Five Canadian Hospitals impacted by a ransomware attack on TransForm provider appeared first on Security Affairs.

"

Autosummary: In October, CISA, the FBI, and the Department of Health and Human Services (HHS) warned that the Daixin Team cybercrime group is actively targeting U.S. businesses, mainly in the Healthcare and Public Health (HPH) Sector, with ransomware operations.Exposed data Includes names, addresses, social insurance numbers, gender, marital status, date of birth, and rates of pay. "


FBI: Ransomware gangs hack casinos via 3rd party gaming vendors

exploits ransomware
2023-11-08 https://www.bleepingcomputer.com/news/security/fbi-ransomware-gangs-hack-casinos-via-3rd-party-gaming-vendors/
The Federal Bureau of Investigation is warning that ransomware threat actors are targeting casino servers and use legitimate system management tools to increase their permissions on the network. [...] "

Autosummary: "New trends included ransomware actors exploiting vulnerabilities in vendor-controlled remote access to casino servers, and companies victimized through legitimate system management tools to elevate network permissions," the agency explains. "


FBI: Ransomware actors abuse third parties and legitimate system tools for initial access

exploits ransomware
2023-11-08 https://securityaffairs.com/153873/cyber-crime/fbi-ransomware-actors-new-trends.html

The FBI published a PIN alert warning of ransomware operators compromising third-party vendors and services for initial access to target environments. The Federal Bureau of Investigation (FBI) published a Private Industry Notification (PIN) to warn of ransomware initial access trends and provide recommendations to reduce the attack surface to ransomware attacks. As of July 2023, […]

The post FBI: Ransomware actors abuse third parties and legitimate system tools for initial access appeared first on Security Affairs.

"

Autosummary: To be prepared for cyber incidents, organizations should maintain offline backups of data, and regularly maintain backup and restoration, ensure all backup data is encrypted, immutable and cover the entire organization’s data infrastructure, and ensure their backup data is not already infected. "


Microsegmentation proves its worth in ransomware defense

exploits ransomware
2023-11-07 https://www.helpnetsecurity.com/2023/11/07/ransomware-microsegmentation-strategies/

The number of ransomware attacks (successful and unsuccessful) has doubled over the past two years, from 43 on average in 2021 to 86 in 2023, according to Akamai. Security organizations have responded to the recent rise in ransomware attacks by implementing zero trust and microsegmentation strategies. 99% of respondents who reported that they have deployed some form of segmentation have also deployed a zero trust security framework. Zero trust and microsegmentation Respondents overwhelmingly agreed that … More

The post Microsegmentation proves its worth in ransomware defense appeared first on Help Net Security.

"

Autosummary: Globally, the top obstacles to deploying microsegmentation are a lack of skills/expertise (39%) followed by increased performance bottlenecks (39%), and compliance requirements (38%). "


Experts Warn of Ransomware Hackers Exploiting Atlassian and Apache Flaws

exploits ransomware
2023-11-07 https://thehackernews.com/2023/11/experts-warn-of-ransomware-hackers.html
Multiple ransomware groups have begun to actively exploit recently disclosed flaws in Atlassian Confluence and Apache ActiveMQ. Cybersecurity firm Rapid7 said it observed the exploitation of CVE-2023-22518 and CVE-2023-22515 in multiple customer environments, some of which have been leveraged for the deployment of Cerber (aka C3RB3R) ransomware. Both vulnerabilities are critical, allowing threat "

Autosummary: "


TransForm says ransomware data breach affects 267,000 patients

financial exploits ransomware
2023-11-07 https://www.bleepingcomputer.com/news/security/transform-says-ransomware-data-breach-affects-267-000-patients/
Shared service provider TransForm has published an update on the cyberattack that recently impacted operations in multiple hospitals in Ontario, Canada, clarifying that it was a ransomware attack. [...] "

Autosummary: “Bluewater Health, Chatham-Kent Health Alliance, Erie Shores HealthCare, Hôtel-Dieu Grace Healthcare and Windsor Regional Hospital, and our shared service provider TransForm Shared Service Organization were recently the victims of a ransomware attack,” reads the statement “We did not pay a ransom and we are aware that data connected to the cyber incident has been published.” "


Critical Atlassian Confluence bug exploited in Cerber ransomware attacks

exploits ransomware
2023-11-06 https://www.bleepingcomputer.com/news/security/critical-atlassian-confluence-bug-exploited-in-cerber-ransomware-attacks/
Attackers are exploiting a recently patched and critical severity Atlassian Confluence authentication bypass flaw to encrypt victims" files using Cerber ransomware. [...] "

Autosummary: CISA, the FBI, and the Multi-State Information Sharing and Analysis Center (MS-ISAC) issued a joint advisory last month, urging network administrators to immediately secure Atlassian Confluence servers against the actively exploited CVE-2023-22515 privilege escalation bug, which has been under active exploitation since at least September 14, according to a Microsoft report. "


US sanctions Russian who laundered money for Ryuk ransomware affiliate

financial exploits ransomware rusia-ucrania
2023-11-06 https://www.bleepingcomputer.com/news/security/us-sanctions-russian-who-laundered-money-for-ryuk-ransomware-affiliate/
The U.S. Department of the Treasury"s Office of Foreign Assets Control (OFAC) has sanctioned Russian national Ekaterina Zhdanova for laundering millions in cryptocurrency for various individuals, including ransomware actors. [...] "

Autosummary: "


TellYouThePass ransomware joins Apache ActiveMQ RCE attacks

exploits ransomware
2023-11-06 https://www.bleepingcomputer.com/news/security/tellyouthepass-ransomware-joins-apache-activemq-rce-attacks/
Internet-exposed Apache ActiveMQ servers are also targeted in TellYouThePass ransomware attacks targeting a critical remote code execution (RCE) vulnerability previously exploited as a zero-day. [...] "

Autosummary: "


Critical Confluence flaw exploited in ransomware attacks

exploits ransomware
2023-11-06 https://securityaffairs.com/153732/security/confluence-flaw-ransomware-attacks.html

Experts warn threat actors that started exploiting a recent critical flaw CVE-2023-22518 in Confluence Data Center and Confluence Server. Over the weekend threat actors started exploiting a recently disclosed vulnerability (CVE-2023-22518) in all versions of Atlassian Confluence Data Center and Confluence Server. Atlassian last week warned of the CVE-2023-22518 (CVSS score 9.1), the issue is an […]

The post Critical Confluence flaw exploited in ransomware attacks appeared first on Security Affairs.

"

Autosummary: The vulnerability was addressed with the release of the following versions: 7.19.16 or later 8.3.4 or later 8.4.4 or later 8.5.3 or later, and 8.6.1 or later Atlassian states that there is no impact on confidentiality as an attacker cannot exfiltrate any instance data. "


American Airlines pilot union hit by ransomware attack

exploits ransomware
2023-11-03 https://www.bleepingcomputer.com/news/security/american-airlines-pilot-union-hit-by-ransomware-attack/
Allied Pilots Association (APA), a labor union representing 15,000 American Airlines pilots, disclosed a ransomware attack that hit its systems on Monday. [...] "

Autosummary: "


Apache ActiveMQ vulnerability used in ransomware attacks

exploits ransomware
2023-11-03 https://www.malwarebytes.com/blog/business/2023/11/apache-activemq-vulnerability-used-in-ransomware-attacks
A remote code execution vulnerability in Apache ActiveMQ is being used by the HelloKItty ransomware group. "

Autosummary: To successfully exploit this vulnerability, three things are required: Network access A manipulated OpenWire “command” (used to instantiate an arbitrary class on the classpath with a String parameter) A class on the classpath which can execute arbitrary code simply by instantiating it with a String parameter.Once you’ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again. Apache ActiveMQ® is “middleware”, a popular open source, multi-protocol, Java-based message broker. "


The Week in Ransomware - November 3rd 2023 - Hive"s Back

exploits ransomware
2023-11-03 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-november-3rd-2023-hives-back/
Over the past couple of months, ransomware attacks have been escalating as new operations launch, old ones return, and existing operations continue to target the enterprise. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @Seifreed, @malwrhunterteam, @demonslay335, @billtoulas, @serghei, @Ionut_Ilascu, @LawrenceAbrams, @fwosar, @BleepinComputer, @SecurityJoes, @rivitna2, @BushidoToken, @AlvieriD, @rapid7, @BradSmi, @uptycs, @pcrisk, @PogoWasRight, and @BrettCallow. Finally, new research was released this week about ransomware, including: Hive"s possible return is particularly interesting, as they were previously disrupted after the FBI hacked Hive"s servers and seized infrastructure. "


HelloKitty Ransomware Group Exploiting Apache ActiveMQ Vulnerability

exploits ransomware
2023-11-02 https://thehackernews.com/2023/11/hellokitty-ransomware-group-exploiting.html
Cybersecurity researchers are warning of suspected exploitation of a recently disclosed critical security flaw in the Apache ActiveMQ open-source message broker service that could result in remote code execution. "In both instances, the adversary attempted to deploy ransomware binaries on target systems in an effort to ransom the victim organizations," cybersecurity firm Rapid7 disclosed in a "

Autosummary: Both the MSI files contain a 32-bit .NET executable named dllloader that, in turn, loads a Base64-encoded payload called EncDLL that functions akin to ransomware, searching and terminating a specific set of processes before commencing the encryption process and appending the encrypted files with the ".locked" extension. "


Attackers exploiting Apache ActiveMQ flaw to deliver ransomware (CVE-2023-46604)

exploits ransomware
2023-11-02 https://www.helpnetsecurity.com/2023/11/02/cve-2023-46604-ransomware/

Ransomware-wielding attackers are trying to break into servers running outdated versions of Apache ActiveMQ by exploiting a recently fixed vulnerability (CVE-2023-46604). “Beginning Friday, October 27, Rapid7 Managed Detection and Response (MDR) identified suspected exploitation of Apache ActiveMQ CVE-2023-46604 in two different customer environments. In both instances, the adversary attempted to deploy ransomware binaries on target systems in an effort to ransom the victim organizations,” Rapid7 researchers shared on Wednesday. “Based on the ransom note and … More

The post Attackers exploiting Apache ActiveMQ flaw to deliver ransomware (CVE-2023-46604) appeared first on Help Net Security.

"

Autosummary: ActiveMQ supports a variety of protocols, including OpenWire (the native wire format of ActiveMQ), MQTT (messaging protocol for IoT), AMQP (protocol for business messaging and IoT device management), REST, STOMP, and WebSockets. "


Suspected exploitation of Apache ActiveMQ flaw CVE-2023-46604 to install HelloKitty ransomware

exploits ransomware
2023-11-02 https://securityaffairs.com/153454/hacking/apache-activemq-cve-2023-46604-hellokitty-ransomare.html

Rapid7 researchers warn of the suspected exploitation of a recently disclosed critical security flaw (CVE-2023-46604) in the Apache ActiveMQ. Cybersecurity researchers at Rapid7 are warning of the suspected exploitation of the recently disclosed critical vulnerability CVE-2023-46604 in the Apache ActiveMQ. Apache ActiveMQ is an open-source message broker software that serves as a message-oriented middleware (MOM) […]

The post Suspected exploitation of Apache ActiveMQ flaw CVE-2023-46604 to install HelloKitty ransomware appeared first on Security Affairs.

"

Autosummary: Legacy OpenWire Module 5.8.0 before 5.15.16 Since the bug’s disclosure, a proof-of-concept (PoC) exploit code and additional technical specifics have been made publicly available, with Rapid7 noting that the behavior it observed in the two victim networks is “similar to what we would expect from the exploitation of CVE-2023-46604.” "


HelloKitty ransomware now exploiting Apache ActiveMQ flaw in attacks

exploits ransomware
2023-11-02 https://www.bleepingcomputer.com/news/security/hellokitty-ransomware-now-exploiting-apache-activemq-flaw-in-attacks/
A remote code execution (RCE) flaw impacting Apache ActiveMQ has been under active exploitation by threat actors who use HelloKitty ransomware payloads. [...] "

Autosummary: Vulnerable versions range between 5.15 and 5.18, including Legacy OpenWire Module versions, are fixed in versions are 5.15.16, 5.16.7, 5.17.6, and 5.18.3. "


Boeing confirms cyberattack amid LockBit ransomware claims

exploits ransomware ciber
2023-11-02 https://www.bleepingcomputer.com/news/security/boeing-confirms-cyberattack-amid-lockbit-ransomware-claims/
Aerospace giant Boeing is investigating a cyberattack that impacted its parts and distribution business after the LockBit ransomware gang claimed that they breached the company"s network and stole data. [...] "

Autosummary: Boeing page on LockBit data leak site (BleepingComputer) The LockBit ransomware-as-a-service (RaaS) operation surfaced in September 2019, with notable victims including the Continental automotive giant, the UK Royal Mail, the Italian Internal Revenue Service, and the City of Oakland. "


BlackCat ransomware claims breach of healthcare giant Henry Schein

exploits ransomware
2023-11-02 https://www.bleepingcomputer.com/news/security/blackcat-ransomware-claims-breach-of-healthcare-giant-henry-schein/
The BlackCat (ALPHV) ransomware gang claims it breached the network of healthcare giant Henry Schein and stole dozens of terabytes of data, including payroll data and shareholder information. [...] "

Autosummary: "Despite ongoing discussions with Henry"s team, we have not received any indication of their willingness to prioritize the security of their clients, partners, and employees, let alone protect their own network," the threat actors said. "


Toronto Public Library outages caused by Black Basta ransomware attack

exploits ransomware
2023-11-01 https://www.bleepingcomputer.com/news/security/toronto-public-library-outages-caused-by-black-basta-ransomware-attack/
The Toronto Public Library is experiencing ongoing technical outages due to a Black Basta ransomware attack. [...] "

Autosummary: Since its launch, the threat actors have been responsible for a stream of attacks, including Capita, Sobeys, Knauf, and Yellow Pages Canada. Black Basta ransomware ransom note created on TPL workstations Source: BleepingComputer According to a TPL employee, the attack occurred overnight on October 27th, impacting numerous services Saturday morning. "


Dozens of countries will pledge to stop paying ransomware gangs

exploits ransomware
2023-10-31 https://www.bleepingcomputer.com/news/security/dozens-of-countries-will-pledge-to-stop-paying-ransomware-gangs/
An alliance of 40 countries will sign a pledge during the third annual International Counter-Ransomware Initiative summit in Washington, D.C., to stop paying ransoms demanded by cybercriminal groups. [...] "

Autosummary: "


Companies scramble to integrate immediate recovery into ransomware plans

exploits ransomware
2023-10-30 https://www.helpnetsecurity.com/2023/10/30/holistic-ransomware-strategy/

More than one-third of companies still do not have a well-rounded, holistic ransomware strategy in place, according to Zerto. Immediate recovery crucial for businesses’ survival The survey also found that companies are reevaluating their data protection and cyber resilience strategies to align more closely with the threats they are facing. The report shows that 35.4% of companies are not prioritizing recovery. This is concerning as ransomware actors are becoming more capable of impounding data. Businesses … More

The post Companies scramble to integrate immediate recovery into ransomware plans appeared first on Help Net Security.

"

Autosummary: Reevaluating data protection in the face of ransomware Still, the fact that companies are reevaluating strategies they have in place, especially considering that nearly two thirds (63.1%) of those surveyed have multiple data protection and ransomware detection tools at their disposal, signals that prevention is not enough and that legacy data protection falls short. "


The dangers of dual ransomware attacks

exploits ransomware
2023-10-30 https://www.helpnetsecurity.com/2023/10/30/dual-ransomware-attacks-dangers/

At some point in the movie “Groundhog Day,” Phil Connors breaks his bedside radio when he is woken up (yet again) by the song “I Got You Babe”. This déjà vu seems to await companies that fall victim to ransomware and fail to orchestrate the proper response. The FBI has recently warned about dual ransomware attacks, a new trend that involves criminals carrying out two or more attacks in close proximity to each other. The … More

The post The dangers of dual ransomware attacks appeared first on Help Net Security.

"

Autosummary: In a traditional disaster recovery scenario, root causes are known and causes mitigated, but in a cyber-attack scenario, without the proper response actions to investigate and mitigate what you find, systems are restored along with all the malicious accounts, compromised passwords, persistence mechanisms, and other malicious artifacts, while protective controls with missing rules or that were bypassed remain ineffective to stop a recurrence. Preventing a follow-up attack These response actions push out the achievable recovery time objective, but the vulnerabilities found must be patched, the malicious accounts removed, the protective and detective controls bolstered to prevent or detect a recurrence, and all malicious artefacts must be removed prior to redeployment back into production. "


New Hunters International ransomware possible rebrand of Hive

exploits ransomware
2023-10-29 https://www.bleepingcomputer.com/news/security/new-hunters-international-ransomware-possible-rebrand-of-hive/
A new ransomware-as-a-service brand named Hunters International has emerged using code used by the Hive ransomware operation, leading to the valid assumption that the old gang has resumed activity under a different flag. [...] "

Autosummary: Hunters International ransomware leaks data of one victim source: BleepingComputer As spotted by MalwareHunterTeam, Hunters International"s data leak site shows a set of messages, likely in an attempt to share with the world that they mean serious business and "hunting" for victims and extorting them is their main purpose. "


History of slavery continues to haunt British royals

ransomware
2023-10-28 https://www.bbc.co.uk/news/uk-67150357?at_medium=RSS&at_campaign=KARANGA
As the King heads for Kenya, royal links to colonialism and slavery will be under scrutiny. "

Autosummary: "


The Week in Ransomware - October 27th 2023 - Breaking Records

exploits ransomware
2023-10-27 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-october-27th-2023-breaking-records/
Ransomware attacks are increasing significantly, with reports indicating that last month was a record month for ransomware attacks in 2023. [...] "

Autosummary: We also learned of new cyberattacks or more information was shared about existing ones, including: Contributors and those who provided new ransomware information and stories this week include: @Seifreed, @LawrenceAbrams, @billtoulas, @Ionut_Ilascu, @demonslay335, @fwosar, @BleepinComputer, @serghei, @malwrhunterteam, @Avast, @kaspersky, @1ZRR4H, @NCCGroupplc, @Imperva, @Webroot, @MsftSecIntel, @pcrisk, @BushidoToken, @BrettCallow, and @security_score." Octo Tempest is also known as Scattered Spider, Oktapus, and UNC3944 and is believed to be behind recent ransomware attacks on MGM Resorts and Caesars and past attacks on Reddit, MailChimp, Twilio, DoorDash, and Riot Games. "


Lockbit ransomware gang claims to have stolen data from Boeing

exploits ransomware
2023-10-27 https://securityaffairs.com/153149/cyber-crime/lockbit-ransomware-gang-boeing.html

The Lockbit ransomware gang claims to have hacked the aerospace manufacturer and defense contractor Boeing and threatened to leak the stolen data. The Boeing Company, commonly known as Boeing, is one of the world’s largest aerospace manufacturers and defense contractors.  In 2022, Boeing recorded $66.61 billion in sales, the aerospace giant has 156,000 (2022). The Lockbit ransomware […]

The post Lockbit ransomware gang claims to have stolen data from Boeing appeared first on Security Affairs.

"

Autosummary: “Boeing, the 60 billion Company, together with its subsidiaries, designs, develops, manufactures, sells, services, and supports commercial jetliners, military aircraft, satellites, missile defense, human space flight, and launch systems and services worldwide.” "


Ransomware groups continue to increase their operational tempo

exploits ransomware
2023-10-26 https://www.helpnetsecurity.com/2023/10/26/ransomware-activity-q3-2023/

Q3 of 2023 continued an ongoing surge in ransomware activity, according to GuidePoint Security. GuidePoint Research and Intelligence Team (GRIT) observed a nearly 15% increase in ransomware activity since Q2 due to an increased number of ransomware groups, including 10 new emerging groups tracked during this quarter. In the third quarter, GRIT tracked 1,353 publicly posted ransomware victims claimed by 46 different threat groups. Through the first three quarters of 2023, GRIT has tracked a … More

The post Ransomware groups continue to increase their operational tempo appeared first on Help Net Security.

"

Autosummary: LockBit, Cl0p, and Alphv lead ransomware activity in Q3 2023 The top three most active ransomware groups were Lockbit, Cl0p, and Alphv. "


ASVEL basketball club slam dunked by NoEscape ransomware gang, data stolen

exploits ransomware
2023-10-26 https://www.bitdefender.com/blog/hotforsecurity/asvel-basketball-club-slam-dunked-by-noescape-ransomware-gang-data-stolen/
A high profile French basketball team has fallen victim to the NoEscape ransomware-as-a-service group, who claim to have stolen 32 GB of data including sensitive personal information about the club"s star players. Read more in my article on the Hot for Security blog. "

Autosummary: ASVEL, which has brought in third-party experts to help with its response to the ttack, says that its club activities have not been disrupted, and that - so far - it has not seen evidence that fans" payment information has been compromised. "


Seiko confirmed a data breach after BlackCat attack

financial ransomware
2023-10-26 https://securityaffairs.com/153070/data-breach/seiko-data-breach-blackcat-attack.html

Japanese watchmaker Seiko revealed that the attack that suffered earlier this year was carried out by the Black Cat ransomware gang. On August 10, 2023, the Japanese maker of watches Seiko disclosed a data breach following a cyber attack. “Seiko Group Corporation (hereinafter referred to as “the Company” or “we”) has confirmed that on July […]

The post Seiko confirmed a data breach after BlackCat attack appeared first on Security Affairs.

"

Autosummary: Leaked information includes: SWC customer information, including names, addresses, telephone numbers, and/or email addresses (Note: credit card information was not compromised) Contact information for counterparties involved in business transactions with SGC, SWC, and/or SII, including the individual’s name, company affiliation, job title, company address, company phone number, and/or company email address Information supplied by applicants for employment with SGC and/or SWC, including names, addresses, phone numbers, email addresses, and/or educational background information Personnel information, including names and/or email addresses, for both current and former employees of SGC and its group companies Financial information, such as credit card information, of Seiko Watch customers was not exposed in the security breach. "


Microsoft Warns as Scattered Spider Expands from SIM Swaps to Ransomware

exploits ransomware
2023-10-26 https://thehackernews.com/2023/10/microsoft-warns-as-scattered-spider.html
The prolific threat actor known as Scattered Spider has been observed impersonating newly hired employees in targeted firms as a ploy to blend into normal on-hire processes and takeover accounts and breach organizations across the world. Microsoft, which disclosed the activities of the financially motivated hacking crew, described the adversary as "one of the most dangerous financial criminal "

Autosummary: Octo Tempest has since diversified its targeting to include email and tech service providers, gaming, hospitality, retail, managed service providers (MSPs), manufacturing, technology, and financial sectors, while simultaneously emerging as an affiliate for the BlackCat ransomware gang in mid-2023 to extort victims. "


The Rise of S3 Ransomware: How to Identify and Combat It

exploits ransomware
2023-10-25 https://thehackernews.com/2023/10/the-rise-of-s3-ransomware-how-to.html
In today"s digital landscape, around 60% of corporate data now resides in the cloud, with Amazon S3 standing as the backbone of data storage for many major corporations.  Despite S3 being a secure service from a reputable provider, its pivotal role in handling vast amounts of sensitive data (customer personal information, financial data, intellectual property, etc.), provides a juicy target for "

Autosummary: Each offer distinct advantages and trade-offs: Cloud Trail Data Events: offer visibility into resource operations performed on or within a resource in real-time, but comes with potential cost implications due to high API call volumes Server Access Logs: free access to records for each request made to your S3 bucket, but come with potential delays in log availability and potential logging with less integrity. Despite S3 being a secure service from a reputable provider, its pivotal role in handling vast amounts of sensitive data (customer personal information, financial data, intellectual property, etc.), provides a juicy target for threat actors. "


Seiko says ransomware attack exposed sensitive customer data

exploits ransomware
2023-10-25 https://www.bleepingcomputer.com/news/security/seiko-says-ransomware-attack-exposed-sensitive-customer-data/
Japanese watchmaker Seiko has confirmed it suffered a Black Cat ransomware attack earlier this year, warning that the incident has led to a data breach, exposing sensitive customer, partner, and personnel information. [...] "

Autosummary: "


Chilean telecom giant GTD hit by the Rorschach ransomware gang

exploits latam ransomware Telcos
2023-10-25 https://www.bleepingcomputer.com/news/security/chilean-telecom-giant-gtd-hit-by-the-rorschach-ransomware-gang/
Chile"s Grupo GTD warns that a cyberattack has impacted its Infrastructure as a Service (IaaS) platform, disrupting online services. [...] "

Autosummary: "We understand the importance of proactive and fluid communication in the face of incidents, therefore, in accordance with what we previously discussed on the phone, I would like to inform you that we are experiencing a partial impact on services as a result of a cybersecurity incident," reads a GTD security incident notification. On the morning of October 23rd, GTD suffered a cyberattack that impacted numerous services, including its data centers, internet access, and Voice-over-IP (VoIP). "


Bracing for AI-enabled ransomware and cyber extortion attacks

exploits ransomware
2023-10-24 https://www.helpnetsecurity.com/2023/10/24/ai-enabled-attacks/

AI has been the shiniest thing in tech since at least November 2022, when ChatGPT was made available to the masses and unveiled the transformative potential of large language models for all the world to see. As businesses scramble to take the lead in operationalizing AI-enabled interfaces, ransomware actors will use it to scale their operations, widen their profit margins, and increase their likelihood of pulling off successful attacks. As a result, an already sophisticated … More

The post Bracing for AI-enabled ransomware and cyber extortion attacks appeared first on Help Net Security.

"

Autosummary: Eliminate lateral movement – AI-powered policy recommendation based on training data from millions of leveraging private app telemetry, user context, behavior, and location will simplify the process of user-to-app segmentation – AI-powered policy recommendation based on training data from millions of leveraging private app telemetry, user context, behavior, and location will simplify the process of user-to-app segmentation Stop data loss – AI-assisted data classification will help organizations tag sensitive data and enforce strict controls against uploading it to cloud storage. In a dark parody of legitimate organizations, in the coming years ransomware groups may use chatbots and other AI-enabled tools to: Use AI voice cloning for voice-based phishing (a.k.a., vishing) attacks to impersonate employees to gain privileged access Tailor email-based phishing attacks with native language accuracy in multiple languages Discover and identify zero-day vulnerabilities that can be leveraged for initial access Reduce the time required to develop malicious code and lower the bar for entry When AI-enabled capabilities are coupled with potent malware, we should expect cybercriminals to double down on ransomware as a means of generating revenue rather than abandoning it in favor of something new. "


ASVEL basketball team confirms data breach after ransomware attack

financial exploits ransomware
2023-10-24 https://www.bleepingcomputer.com/news/security/asvel-basketball-team-confirms-data-breach-after-ransomware-attack/
French professional basketball team LDLC ASVEL (ASVEL) has confirmed that data was stolen after the NoEscape ransomware gang claimed to have attacked the club. [...] "

Autosummary: The threat actors claimed to have stolen 32 GB of data, including the personal data of players, passports and ID cards, and many documents relating to finance, taxation, and legal matters. "


September was a record month for ransomware attacks in 2023

exploits ransomware
2023-10-24 https://www.bleepingcomputer.com/news/security/september-was-a-record-month-for-ransomware-attacks-in-2023/
Ransomware activity in September reached unprecedented levels following a relative lull in August that was still way above regular standards for summer months. [...] "

Autosummary: The most targeted sectors were "industrials" (construction, engineering, commercial services) with 169 attacks, "consumer cyclicals" (retail, media, hotels) with 94, technology (software and IT services, networking, telecommunications) with 52, and healthcare with 38. "


US energy firm shares how Akira ransomware hacked its systems

exploits ransomware industry
2023-10-23 https://www.bleepingcomputer.com/news/security/us-energy-firm-shares-how-akira-ransomware-hacked-its-systems/
In a rare display of transparency, US energy services firm BHI Energy details how the Akira ransomware operation breached their networks and stole the data during the attack. [...] "

Autosummary: An investigation concluded on September 1, 2023, indicates that the following data was stolen: Full name Date of birth Social Security Number (SSN) Health information At the time of writing this, Akira ransomware has not leaked any data belonging to BHI on its extortion portal on the dark web, and neither have the cybercriminals announced BHI in their upcoming data leaks. "


Europol Dismantles Ragnar Locker Ransomware Infrastructure, Nabs Key Developer

exploits ransomware
2023-10-21 https://thehackernews.com/2023/10/europol-dismantles-ragnar-locker.html
Europol on Friday announced the takedown of the infrastructure associated with Ragnar Locker ransomware, alongside the arrest of a "key target" in France. "In an action carried out between 16 and 20 October, searches were conducted in Czechia, Spain, and Latvia," the agency said. "The main perpetrator, suspected of being a developer of the Ragnar group, has been brought in front of the examining "

Autosummary: The effort is the latest coordinated exercise involving authorities from Czechia, France, Germany, Italy, Japan, Latvia, the Netherlands, Spain, Sweden, Ukraine, and the U.S. Two suspects associated with the ransomware crew were previously arrested from Ukraine in 2021. "


The Week in Ransomware - October 20th 2023 - Fighting Back

exploits ransomware
2023-10-21 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-october-20th-2023-fighting-back/
This was a bad week for ransomware, with the Trigona ransomware suffering a data breach and law enforcement disrupting the RagnarLocker ransomware operation. [...] "

Autosummary: Finally, cybersecurity researchers released interesting reports on ransomware, including: Contributors and those who provided new ransomware information and stories this week include: @LawrenceAbrams, @serghei, @fwosar, @Ionut_Ilascu, @billtoulas, @Seifreed, @demonslay335, @malwrhunterteam, @BleepinComputer, @vx_herm1t, @AlvieriD, @AShukuhi, @pcrisk, @rivitna2, @BushidoToken, @ResilienceSays, @SophosXOps, @Unit42_Intel, @jgreigj, @azalsecurity, @AShukuhi, @Cynet360, @FalconFeedsio, and @cyber_int. On Thursday, the RagnarLocker data leak site and negotiation site also began to show a new message, this time a seizure banner by law enforcement from France, the Czech Republic, Germany, Italy, Latvia, the Netherlands, Spain, Sweden, Japan, Canada, and the United States. "


Ragnar Locker ransomware developer arrested in France

exploits ransomware
2023-10-20 https://www.bleepingcomputer.com/news/security/ragnar-locker-ransomware-developer-arrested-in-france/
Law enforcement agencies arrested a malware developer linked with the Ragnar Locker ransomware gang and seized the group"s dark web sites in a joint international operation. [...] "

Autosummary: This joint operation between authorities from France, the Czech Republic, Germany, Italy, Latvia, the Netherlands, Spain, Sweden, Japan, Canada, and the United States marks the third action against the same ransomware gang. "


Alleged developer of the Ragnar Locker ransomware was arrested

exploits ransomware
2023-10-20 https://securityaffairs.com/152776/cyber-crime/ragnar-locker-ransomware-op-dismantled.html

A joint international law enforcement investigation led to the arrest of a malware developer who was involved in the Ragnar Locker ransomware operation. Yesterday we became aware of a joint law enforcement operation that led to the seizure of the Ragnar Locker ransomware’s infrastructure. The police on Thursday seized the Tor negotiation and data leak sites, group’s […]

The post Alleged developer of the Ragnar Locker ransomware was arrested appeared first on Security Affairs.

"

Autosummary: Alleged developer of the Ragnar Locker ransomware was arrested Pierluigi Paganini October 20, 2023 October 20, 2023 A joint international law enforcement investigation led to the arrest of a malware developer who was involved in the Ragnar Locker ransomware operation. "


Ragnar Locker ransomware group taken down

exploits ransomware
2023-10-20 https://www.malwarebytes.com/blog/news/2023/10/ragnar-locker-taken-down

Categories: News

Categories: Ransomware

Tags: ragnar locker

Tags: europol

Tags: eurojust

One of the oldest active ransomware gangs has been taken down by an international cooperation of law enforcement agencies

(Read more...)

The post Ragnar Locker ransomware group taken down appeared first on Malwarebytes Labs.

"

Autosummary: Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.Posted: October 20, 2023 by One of the oldest active ransomware gangs has been taken down by an international cooperation of law enforcement agencies Even though it had a long run for a ransomware group, it seems the bell might be tolling for Ragnar Locker. Ragnar Locker"s known attacks by industry sector, October 2022 - September 2023 In 2022, the FBI published a flash alert to warn that the Ragnar Locker ransomware gang had breached the networks of at least 52 organizations across 10 critical infrastructure sectors. "


Ragnar Locker ransomware’s dark web extortion sites seized by police

exploits ransomware
2023-10-19 https://www.bleepingcomputer.com/news/security/ragnar-locker-ransomwares-dark-web-extortion-sites-seized-by-police/
The Ragnar Locker ransomware operation"s Tor negotiation and data leak sites were seized Thursday morning as part of an international law enforcement operation. [...] "

Autosummary: BleepingComputer has confirmed that visiting either website now displays a seizure message stating that a large assortment of international law enforcement from the US, Europe, Germany, France, Italy, Japan, Spain, Netherlands, Czech Republic, and Latvia were involved in the operation. "


BlackCat ransomware uses new ‘Munchkin’ Linux VM in stealthy attacks

exploits ransomware Linux
2023-10-19 https://www.bleepingcomputer.com/news/security/blackcat-ransomware-uses-new-munchkin-linux-vm-in-stealthy-attacks/
The BlackCat/ALPHV ransomware operation has begun to use a new tool named "Munchkin" that utilizes virtual machines to deploy encryptors on network devices stealthily. [...] "

Autosummary: These scripts are listed below: Structure of the image"s filesystem Source: Unit 42 The "controller" uses the bundled configuration file, which provides access tokens, victim credentials, and authentication secrets, as well as configuration directives, folder and file blocklists, tasks to run, and hosts to target for encryption. "


Ukrainian activists hack Trigona ransomware gang, wipe servers

exploits ransomware
2023-10-18 https://www.bleepingcomputer.com/news/security/ukrainian-activists-hack-trigona-ransomware-gang-wipe-servers/
A group of cyber activists under the Ukrainian Cyber Alliance banner has hacked the servers of the Trigona ransomware gang and wiped them clean after copying all the information available. [...] "

Autosummary: For a while, the cybercriminals were sufficiently active to compromise in a single month at least 15 companies in the manufacturing, finance, construction, agriculture, marketing, and high technology sectors. "


Microsoft Defender thwarted Akira ransomware attack on an industrial engineering firm

exploits ransomware industry
2023-10-16 https://securityaffairs.com/152501/malware/akira-ransomware-attack-blocked.html

Microsoft thwarted a large-scale hacking campaign carried out by Akira ransomware operators targeting an unknown industrial organization. Microsoft announced that its Microsoft Defender for Endpoint helped to block a large-scale hacking campaign carried out by Akira ransomware operators (tracked by Microsoft as Storm-1567) The attack took place in early June 2023 and aimed at an industrial engineering […]

The post Microsoft Defender thwarted Akira ransomware attack on an industrial engineering firm appeared first on Security Affairs.

"

Autosummary: “This is why, as announced today, we added user containment to the automatic attack disruption capability in Microsoft Defender for Endpoint, a unique and innovative defense mechanism that stops human-operated attacks in their tracks” Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, ransomware) "


The Alphv ransomware gang stole 5TB of data from the Morrison Community Hospital

exploits ransomware
2023-10-15 https://securityaffairs.com/152486/cyber-crime/alphv-ransomware-morrison-community-hospital.html

The Alphv ransomware group added the Morrison Community Hospital to its dark web leak site. Threat actors continue to target hospitals. The ALPHV/BlackCat ransomware group claims to have hacked the Morrison Community Hospital and added it to its dark web Tor leak site. The group claims to have stolen 5TB of patients’ and employee’s information, […]

The post The Alphv ransomware gang stole 5TB of data from the Morrison Community Hospital appeared first on Security Affairs.

"

Autosummary: The Alphv ransomware gang stole 5TB of data from the Morrison Community Hospital Pierluigi Paganini October 15, 2023 October 15, 2023 The Alphv ransomware group added the Morrison Community Hospital to its dark web leak site. "


CISA warns of vulnerabilities and misconfigurations exploited in ransomware attacks

exploits ransomware
2023-10-14 https://securityaffairs.com/152457/breaking-news/cisa-kev-ransomware-attacks.html

CISA warns organizations of vulnerabilities and misconfigurations that are known to be exploited in ransomware operations. The US cybersecurity agency CISA is sharing knowledge about vulnerabilities and misconfigurations exploited in ransomware attacks. The initiative is part of its Ransomware Vulnerability Warning Pilot (RVWP) program which launched this year. The US Agency is sharing this information […]

The post CISA warns of vulnerabilities and misconfigurations exploited in ransomware attacks appeared first on Security Affairs.

"

Autosummary: CISA warns of vulnerabilities and misconfigurations exploited in ransomware attacks Pierluigi Paganini October 14, 2023 October 14, 2023 CISA warns organizations of vulnerabilities and misconfigurations that are known to be exploited in ransomware operations. "


Lockbit ransomware gang demanded an 80 million ransom to CDW

exploits ransomware
2023-10-14 https://securityaffairs.com/152470/cyber-crime/lockbit-ransomware-gang-hacked-cdw.html

The Lockbit ransomware gang claims to have hacked the technology services giant CDW and threatens to leak the stolen data. The technology services giant CDW announced it has launched an investigation into claims made by the Lockbit ransomware gang that added the company to the list of victims on its leak site. CDW Corporation is […]

The post Lockbit ransomware gang demanded an 80 million ransom to CDW appeared first on Security Affairs.

"

Autosummary: A secondary division of the company, known as CDW-G, focuses on United States governmental entities, including as K-12 schools, universities, non-profit healthcare organizations, State & Local and the Federal government. "


Stronger ransomware protection finally pays off

exploits ransomware
2023-10-13 https://www.helpnetsecurity.com/2023/10/13/ransomware-protection-awareness/

60% of companies are ‘very’ to ‘extremely’ concerned about ransomware attacks, according to latest research from Hornetsecurity. Businesses acknowledge ransomware risk Hornetsecurity revealed that 92.5% businesses are aware of ransomware’s potential for negative impact. Still, just 54% of respondents said their leadership is ‘actively involved in conversations and decision-making’ around preventing such attacks. 39.7% said they were happy to ‘leave it to IT to deal with the issue’. “Our survey is a timely reminder that … More

The post Stronger ransomware protection finally pays off appeared first on Help Net Security.

"

Autosummary: Effective security tools for ransomware defense The survey revealed the most used tools to combat potential threats: 87.8% used to end-point detection software with anti-ransomware capabilities 84.4% cited ’email filtration and threat analysis’ 22.4% mentioned ‘AI-enabled security solutions’ as a tool they are now using to combat ransomware within their organization. "


Ransomware attacks doubled year on year. Are organizations equipped to handle the evolution of Ransomware in 2023?

exploits ransomware
2023-10-13 https://thehackernews.com/2023/10/ransomware-attacks-doubled-year-on-year.html
Ransomware attacks have only increased in sophistication and capabilities over the past year. From new evasion and anti-analysis techniques to stealthier variants coded in new languages, ransomware groups have adapted their tactics to bypass common defense strategies effectively.  This article will cover just some of those new developments in Q3-2023 as well as give predictions on quarters to "

Autosummary: Q3-2023 witnessed a surge in attacks from newer groups such as Cactus, INC Ransom, Metaencryptor, ThreeAM, Knight Ransomware, Cyclop Group, and MedusaLocker, indicating that these groups, while not having the same profile and global presence as major players like LOCKBIT, remain potent threats. The recent patterns we have observed, however, showcase the growing popularity of Rust and GoLang amongst high-profile ransomware groups such as Hive, Agenda, Luna, and RansomExx.Increased adoption/use of Threat Intelligence Platforms Due to their specific competency in this space, as well as their advanced AI and machine learning capabilities, organizations are increasingly using Threat Intelligence Platforms for their expertise, anomaly detection, and behavioral analysis to gain real-time threat intelligence to help mitigate ransomware attacks. Vision has the ability to scan your entire attack surface, extending to your vendors, partners, and third parties as well, giving you the ability to secure your entire supply chain and ecosystem from attacks. The Healthcare sector is particularly vulnerable to ransomware attacks as it has an extremely large attack surface spanning several websites, portals, billions of IoT medical devices, and a large network of supply chain partners and vendors. "


FBI, CISA Warn of Rising AvosLocker Ransomware Attacks Against Critical Infrastructure

exploits ransomware
2023-10-13 https://thehackernews.com/2023/10/fbi-cisa-warn-of-rising-avoslocker.html
The AvosLocker ransomware gang has been linked to attacks against critical infrastructure sectors in the U.S., with some of them detected as recently as May 2023. That"s according to a new joint cybersecurity advisory released by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) detailing the ransomware-as-a-service (RaaS) operation"s "

Autosummary: This includes adopting application controls, limiting the use of RDP and other remote desktop services, restricting PowerShell use, requiring phishing-resistant multi-factor authentication, segmenting networks, keeping all systems up-to-date, and maintaining periodic offline backups. "Instead of deploying malicious files on the victim device, encryption is done remotely, with the system process performing the encryption, which renders process-based remediation ineffective," Microsoft explained. "


FBI and CISA published a new advisory on AvosLocker ransomware

exploits ransomware
2023-10-13 https://securityaffairs.com/152427/uncategorized/avoslocker-ransomware-csa.html

FBI and CISA published a joint Cybersecurity Advisory (CSA) to disseminate IOCs, TTPs, and detection methods associated with AvosLocker ransomware. The joint Cybersecurity Advisory (CSA) published by the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) provides known IOCs, TTPs, and detection methods associated with the AvosLocker ransomware variant employed […]

The post FBI and CISA published a new advisory on AvosLocker ransomware appeared first on Security Affairs.

"

Autosummary: CISA and the FBI recommend to secure remote access tools by: Implementing application controls; Strictly limit the use of RDP and other remote desktop services; Disable command-line and scripting activities and permissions; Restrict the use of PowerShell; Update Windows PowerShell or PowerShell Core; Configure the Windows Registry to require User Account Control (UAC) approval for any PsExec operations. "


CISA shares vulnerabilities, misconfigs used by ransomware gangs

exploits ransomware
2023-10-13 https://www.bleepingcomputer.com/news/security/cisa-shares-vulnerabilities-misconfigs-used-by-ransomware-gangs/
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has unveiled additional details regarding misconfigurations and security vulnerabilities exploited by ransomware gangs, aiming to help critical infrastructure organizations thwart their attacks. [...] "

Autosummary: "


The Week in Ransomware - October 13th 2023 - Increasing Attacks

exploits ransomware
2023-10-13 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-october-13th-2023-increasing-attacks/
Ransomware gangs continue to pummel the enterprise, with attacks causing disruption in business operations and resulting in data breaches if a ransom is not paid. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @fwosar, @demonslay335, @billtoulas, @Ionut_Ilascu, @serghei, @BleepinComputer, @malwrhunterteam, @Seifreed, @LawrenceAbrams, @SophosXOps, @3xp0rtblog, @AlvieriD, @pcrisk, @cyber_int, and @LikelyMalware. "


Microsoft Defender Thwarts Large-Scale Akira Ransomware Attack

exploits ransomware
2023-10-12 https://thehackernews.com/2023/10/microsoft-defender-thwarts-akira.html
Microsoft on Wednesday said that a user containment feature in Microsoft Defender for Endpoint helped thwart a "large-scale remote encryption attempt" made by Akira ransomware actors targeting an unknown industrial organization in early June 2023. The tech giant"s threat intelligence team is tracking the operator as Storm-1567. The attack leveraged devices that were not onboarded to Microsoft "

Autosummary: "


FBI shares AvosLocker ransomware technical details, defense tips

exploits ransomware
2023-10-12 https://www.bleepingcomputer.com/news/security/fbi-shares-avoslocker-ransomware-technical-details-defense-tips/
The U.S. government has updated the list of tools AvosLocker ransomware affiliates use in attacks to include open-source utilities along with custom PowerShell, and batch scripts. [...] "

Autosummary: In the updated advisory, the agencies share the following tools as being part of the arsenal of AvosLocker ransomware affiliates: Splashtop Streamer, Tactical RMM, PuTTy, AnyDesk, PDQ Deploy, Atera Agent remote administration tools for backdoor access Open-source network tunneling utilities: Ligolo, Chisel Adversary emulation frameworks Cobalt Strike and Sliver for command and control Lazagne and Mimikatz for harvesting credentials FileZilla and Rclone for data exfiltration Additional publicly available tools observed in AvosLocker attacks include Notepad++, RDP Scanner, and 7zip. "


Ransomlooker, a new tool to track and analyze ransomware groups’ activities

exploits ransomware
2023-10-12 https://securityaffairs.com/152416/malware/ransomlooker-tool.html

Ransomlooker monitors ransomware groups’ extortion sites and delivers consolidated feeds of their claims worldwide. Cybernews presented Ransomlooker, a tool to monitor ransomware groups’ extortion sites and delivers consolidated feeds of their claims worldwide. The researchers have created the tool to help cybersecurity experts in their daily jobs by providing real-time updates and actionable insights. It offers various […]

The post Ransomlooker, a new tool to track and analyze ransomware groups’ activities appeared first on Security Affairs.

"

Autosummary: "


Giant health insurer struck by ransomware didn"t have antivirus protection

exploits ransomware
2023-10-12 https://www.malwarebytes.com/blog/news/2023/10/health-insurer-left-defenceless-against-ransomware-attack

Categories: News

Categories: Ransomware

The Philippine Health Insurance Corporation (PhilHealth), has confirmed that it was unprotected by antivirus software when it was attacked by the Medusa ransomware group in September.

(Read more...)

The post Giant health insurer struck by ransomware didn"t have antivirus protection appeared first on Malwarebytes Labs.

"

Autosummary: In response, PhilHealth "strongly recommends changing passwords of online accounts, enabling multi-factor authentication, monitoring of suspicious activities in their online accounts, not opening and clicking suspicious emails and links, and not answering suspicious calls and text messages" The attack is a great example of how ransomware attacks aren"t really about computers, they are about the effects they have on people. According to a recent post on its Facebook account, all of the corporation"s public-facing applications have been back online since October 6, 2023, including "the website, Member Portal, eClaims for electronic submission of hospital claims, and EPRS for employer remittances.As the attack on Ireland"s Health Service Executive in 2021 showed, attacks on healthcare can create uncertainty, delays, enormous stress and legal jeopardy for staff, and the very real risk of pain, physical harm and even death for patients. "


Take an Offensive Approach to Password Security by Continuously Monitoring for Breached Passwords

ransomware
2023-10-11 https://thehackernews.com/2023/10/take-offensive-approach-to-password.html
Passwords are at the core of securing access to an organization"s data. However, they also come with security vulnerabilities that stem from their inconvenience. With a growing list of credentials to keep track of, the average end-user can default to shortcuts. Instead of creating a strong and unique password for each account, they resort to easy-to-remember passwords, or use the same password "

Autosummary: Unfortunately, many organizations lack a comprehensive system to prevent password reuse, like blocking the use of weak, breached, or high-probability passwords. Solving the password reuse security gap with Specops Password Policy Specops Password Policy gives IT administrators the ability to enforce stronger password policies in Active Directory environments and mitigate the risk of reused and compromised passwords. "


#StopRansomware: AvosLocker Ransomware (Update)

exploits ransomware
2023-10-10 https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-284a

SUMMARY

Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint Cybersecurity Advisory (CSA) to disseminate known IOCs, TTPs, and detection methods associated with the AvosLocker variant identified through FBI investigations as recently as May 2023. AvosLocker operates under a ransomware-as-a-service (RaaS) model. AvosLocker affiliates have compromised organizations across multiple critical infrastructure sectors in the United States, affecting Windows, Linux, and VMware ESXi environments. AvosLocker affiliates compromise organizations’ networks by using legitimate software and open-source remote system administration tools. AvosLocker affiliates then use exfiltration-based data extortion tactics with threats of leaking and/or publishing stolen data.

This joint CSA updates the March 17, 2022, AvosLocker ransomware joint CSA, Indicators of Compromise Associated with AvosLocker ransomware, released by FBI and the Department of the Treasury’s Financial Crimes Enforcement Network (FinCEN). This update includes IOCs and TTPs not included in the previous advisory and a YARA rule FBI developed after analyzing a tool associated with an AvosLocker compromise.

FB "

Autosummary: YARA Rule rule NetMonitor { meta: author = "FBI" source = "FBI" sharing = "TLP:CLEAR" status = "RELEASED" description = "Yara rule to detect NetMonitor.exe" category = "MALWARE" creation_date = "2023-05-05" strings: $rc4key = {11 4b 8c dd 65 74 22 c3} $op0 =Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA and FBI.Specifically, affiliates use: Remote system administration tools—Splashtop Streamer, Tactical RMM, PuTTy, AnyDesk, PDQ Deploy, and Atera Agent—as backdoor access vectors [T1133]. REPORTING The FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with AvosLocker affiliates, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file. Table 3: AvosLocker Affiliates ATT&CK Techniques for Initial Access Initial Access Technique Title ID Use External Remote Services T1133 AvosLocker affiliates use remote system administration tools—Splashtop Streamer, Tactical RMM, PuTTy, AnyDesk, PDQ Deploy, and Atera Agent—to access backdoor access vectors. to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (e.g., hard drive, storage device, or the cloud).CISA and FBI do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document.Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (e.g., hard drive, storage device, or the cloud). This joint CSA updates the March 17, 2022, AvosLocker ransomware joint CSA, Indicators of Compromise Associated with AvosLocker ransomware, released by FBI and the Department of the Treasury’s Financial Crimes Enforcement Network (FinCEN). FBI has also observed AvosLocker affiliates: Use custom PowerShell [T1059.001] and batch ( .bat ) scripts [T1059.003] for lateral movement, privilege escalation, and disabling antivirus software.e8} condition: uint16(0) == 0x5A4D and filesize < 50000 and any of them } MITRE ATT&CK TACTICS AND TECHNIQUES See Tables 3-7 for all referenced threat actor tactics and techniques in this advisory. Download the PDF version of this report: For a downloadable copy of IOCs, see: TECHNICAL DETAILS Note: This advisory uses the MITRE ATT&CK for Enterprise framework, version 13. "


HelloKitty ransomware source code leaked on hacking forum

exploits ransomware
2023-10-09 https://www.bleepingcomputer.com/news/security/hellokitty-ransomware-source-code-leaked-on-hacking-forum/
A threat actor has leaked the complete source code for the first version of the HelloKitty ransomware on a Russian-speaking hacking forum, claiming to be developing a new, more powerful encryptor. [...] "

Autosummary: A threat actor named Gookee has been previously associated with malware and hacking activity, attempting to sell access to Sony Network Japan in 2020, linked to a Ransomware-as-a-Service operation called "Gookee Ransomware," and trying to sell malware source code on a hacker forum. "


ALPHV ransomware gang claims attack on Florida circuit court

exploits ransomware
2023-10-09 https://www.bleepingcomputer.com/news/security/alphv-ransomware-gang-claims-attack-on-florida-circuit-court/
The ALPHV (BlackCat) ransomware gang has claimed an attack that affected state courts across Northwest Florida (part of the First Judicial Circuit) last week. [...] "

Autosummary: "This event will significantly affect court operations across the Circuit, impacting courts in Escambia, Okaloosa, Santa Rosa, and Walton counties, for an extended period," a statement published on the court"s website says. "


MGM Resorts says ransomware attack cost $100 million, data stolen

exploits ransomware
2023-10-06 https://www.bleepingcomputer.com/news/security/mgm-resorts-says-ransomware-attack-cost-100-million-data-stolen/
MGM Resorts reveals that last month"s cyberattack cost the company $100 million and allowed the hackers to steal customers" personal information. [...] "

Autosummary: A separate notice was sent to impacted individuals yesterday, informing them that the following details have been exposed to the cyber criminals, which varies depending on the individual: Full name Phone number Email address Postal address Gender Date of birth Driver’s license Social Security Number (SSN) Passport number MGM concludes that its investigation has not unearthed signs that the incident exposed customer passwords, bank account numbers, and payment card information. "


MGM Resorts ransomware attack led to $100 million loss, data theft

exploits ransomware
2023-10-06 https://www.bleepingcomputer.com/news/security/mgm-resorts-ransomware-attack-led-to-100-million-loss-data-theft/
MGM Resorts reveals that last month"s cyberattack cost the company $100 million and allowed the hackers to steal customers" personal information. [...] "

Autosummary: A separate notice was sent to impacted individuals yesterday, informing them that the following details have been exposed to the cyber criminals, which varies depending on the individual: Full name Phone number Email address Postal address Gender Date of birth Driver’s license Social Security Number (SSN) Passport number MGM concludes that its investigation has not unearthed signs that the incident exposed customer passwords, bank account numbers, and payment card information. "


Blackbaud agrees to $49.5 million settlement for ransomware data breach

financial exploits ransomware
2023-10-06 https://www.bleepingcomputer.com/news/security/blackbaud-agrees-to-495-million-settlement-for-ransomware-data-breach/
Cloud computing provider Blackbaud reached a $49.5 million agreement with attorneys general from 49 U.S. states to settle a multi-state investigation of a May 2020 ransomware attack and the resulting data breach. [...] "

Autosummary: As part of the settlement, Blackbaud also has to: Implement and maintain a breach response plan Provide appropriate assistance to its customers in the event of a breach Report security incidents to its CEO and board and provide enhanced employee training Implement personal information safeguards and controls requiring total database encryption and dark web monitoring Improve defenses via network segmentation, patch management, intrusion detection, firewalls, access controls, logging and monitoring, and penetration testing Allow third-party assessments of its compliance with the settlement for seven years Ransomware attack fallout In its 2020 Q3 Quarterly report, the company revealed three years ago that at least 43 state Attorneys Generals and the District of Columbia were looking into the incident. "


Soft skills continue to challenge the cybersecurity sector

ransomware ciber
2023-10-05 https://www.helpnetsecurity.com/2023/10/05/soft-skills-cybersecurity-sector/

New cybersecurity findings pinpoint areas where cybersecurity experts are lacking, with interpersonal skills, cloud computing, and security measures standing out as the most prominent skill deficiencies in cybersecurity specialists, according to a new ISACA report. 59 percent of cybersecurity leaders say their teams are understaffed. 50 percent of respondents indicated job openings for nonentry-level roles, compared to 21 percent with job openings for entry-level positions. Cybersecurity talent retention struggles persist Strides have been made in … More

The post Soft skills continue to challenge the cybersecurity sector appeared first on Help Net Security.

"

Autosummary: DevSecOps (36 percent) When looking at soft skills, communication (58 percent), critical thinking (54 percent), problem-solving (49 percent), teamwork (45 percent), and attention to detail (36 percent) come in as the top five skills employers are seeking in cybersecurity job candidates. "


Sony was attacked by two ransomware operators

exploits ransomware
2023-10-05 https://www.malwarebytes.com/blog/news/2023/10/sony-attacked-by-two-ransomware-operators

Categories: Business

Categories: News

Categories: Ransomware

Tags: Sony

Tags: RansomedVC

Tags: Cl0p

Tags: ransomware

Tags: data breach

Tags: MOVEit

Sony has confirmed a ransomware attack in June and is investigating claims of a second, more recent one.

(Read more...)

The post Sony was attacked by two ransomware operators appeared first on Malwarebytes Labs.

"

Autosummary: The disputed dataset contained details for the SonarQube platform, certificates, Creators Cloud, incident response policies, a device emulator for generating licenses, and more.Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.Phishing attacks often impersonate people or brands you know, and use themes that require urgent attention, such as missed deliveries, account suspensions, and security alerts. While the FBI has warned of multiple ransomware attacks on the same victim, neither of these ransomware groups are on their list of ransomware variants that are used in these double attacks, so it is doubtful that this was the play here. "


Enhancing your application security program with continuous monitoring

ransomware
2023-10-04 https://www.bleepingcomputer.com/news/security/enhancing-your-application-security-program-with-continuous-monitoring/
Pen Testing as a Service and Traditional web application pen testing offers two different approaches to securing your applications. Learn more from Outpost24 on which approach may be best for your business. [...] "

Autosummary: But with the increase in zero-day vulnerabilities, polymorphic malware, and Advanced Persistent Threats (APTs), there’s an argument for more frequent, even continuous, cybersecurity evaluations. Embracing the continuous monitoring approach across the board Beyond securing web applications, innovations like Endpoint Attack Surface Management (EASM) and Risk-Based Vulnerability Management (RBVM) have emerged as game changers for elevating an organization’s cybersecurity posture. Traditional web application pen testing vs. pen testing as a service Point-in-time assessments are like snap-shots taken at a particular instance of time. "


Nutanix strenghtens cyber resilience with ransomware detection and recovery features

exploits ransomware
2023-10-04 https://www.helpnetsecurity.com/2023/10/04/nutanix-data-lens/

Nutanix announced new features in the Nutanix Cloud Platform to strengthen organizations’ cyber resilience against ransomware attacks on unstructured data. These new features, available in Nutanix Data Lens and Nutanix Unified Storage solutions, enable organizations to detect a threat, defend from further damage and begin a 1-click recovery process within 20 minutes of exposure. The features build on the strength of Nutanix Cloud Platform to protect and secure customers’ most sensitive data across clouds. Ransomware … More

The post Nutanix strenghtens cyber resilience with ransomware detection and recovery features appeared first on Help Net Security.

"

Autosummary: “Understanding access to our data is very important for us to ensure data is secure, safe, and being used properly,” said Robert Pohjanen, IT Architect, LKAB. “Many organizations struggle with managing data protection across storage silos and clouds, especially when it comes to data governance and security,” said Thomas Cornely, SVP, Product Management at Nutanix. "


Exclusive: Lighting the Exfiltration Infrastructure of a LockBit Affiliate (and more)

ransomware
2023-10-03 https://securityaffairs.com/151862/breaking-news/exfiltration-infrastructure.html

Researchers have identified the exfiltration infrastructure of a LockBit affiliate while investigating a LockBit extortion incident that occurred in Q3 2023. Executive Summary NOTE: This version of the report has been redacted for TLP:WHITE disclosure. Introduction Digging into ransomware infections always provides valuable insights. This time, we investigated peculiar details of a recent Lockbit-based intrusion […]

The post Exclusive: Lighting the Exfiltration Infrastructure of a LockBit Affiliate (and more) appeared first on Security Affairs.

"

Autosummary: Such servers have been deployed in 16 countries spread worldwide: Russia, Netherlands, Finland, United States, Kazakhstan, Turkey, Ukraine, Czech Republic, Latvia, Norway, Poland, Romania, Uzbekistan, Germany, France, and Greece. So, with a good degree of confidence, we are looking at multiple instances generated from the same base image, likely linked to a single organization, and the extension of this linked infrastructure involves more than 8 thousand hosts worldwide, and at least a third of it is located in CIS countries. The full report containing the Indicator of Compromise (IoCs) and details on the exfiltration infrastructure is available here: https://medium.com/@lcam/lighting-the-exfiltration-infrastructure-of-a-lockbit-affiliate-and-more-f57fbb7a4e79 About the author: Luca Mella, Cyber Security Expert, Response & Threat Intel | Manager In 2019, Luca was mentioned as one of the “32 Influential Malware Research Professionals”.In fact, since 2019, the hostname has linked a wide range of eCrime activities such as ransomware and data extortions, info-stealing malware spreading, botnet infections, and scams. "


Two hacker groups are back in the news, LockBit 3.0 Black and BlackCat/AlphV

ransomware
2023-10-03 https://securityaffairs.com/151855/malware/lockbit-3-0-black-blackcat-alphv.html

Researchers from cybersecurity firm TG Soft are warning Italian entities and companies of LockBit 3.0 Black and BlackCat/AlphV attacks. In the last few weeks, two cybercriminal groups that have also targeted Italian entities and businesses, are back in the news; they are LockBit 3.0 Black and BlackCat/AlphV, which had already been reported by the media in the first decade of […]

The post Two hacker groups are back in the news, LockBit 3.0 Black and BlackCat/AlphV appeared first on Security Affairs.

"

Autosummary: Obviously, as with any other software, its effectiveness and efficiency is subject to the 4 rules of good use: Correctly INSTALLED on ALL PCs as well as on Server(s) even if they are not used for WEB browsing; Correctly CONFIGURED; Correctly UPDATED; and properly USED… More info on TG Soft’s Heuristic Behavioral technologies take a look at: https://www.tgsoft.it/news/news_archivio.asp?id=1470&lang=eng Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, Lockbit) "


9 essential ransomware guides and checklists available for free

exploits ransomware
2023-10-02 https://www.helpnetsecurity.com/2023/10/02/free-ransomware-guides-checklists/

According to Fortinet, ransomware activity has intensified, registering an increase of 13 times compared to the beginning of 2023 in terms of all malware detections. The rise of Ransomware-as-a-Service has primarily driven this surge in ransomware variations. According to a recent study, 65% of organizations identified ransomware as one of their top three threats to their operational viability. Additionally, ransomware is the most significant threat for 13% of these organizations. Here’s a collection of free … More

The post 9 essential ransomware guides and checklists available for free appeared first on Help Net Security.

"

Autosummary: This guide includes two primary resources: Ransomware and Data Extortion Prevention Best Practice Ransomware and Data Extortion Response Checklist Mitigating malware and ransomware attacks This guidance from the National Cyber Security Centre UK helps private and public sector organizations deal with malware’s effects (including ransomware). "


Most dual ransomware attacks occur within 48 hours

exploits ransomware
2023-10-02 https://www.helpnetsecurity.com/2023/10/02/dual-ransomware-attacks/

Since July 2023, the Federal Bureau of Investigation (FBI) has noticed a new trend: dual ransomware attacks on the same victim, occurring in close proximity of one another. Dual ransomware attacks Dual ransomware attacks are when attacks against the same victim occurr within 10 days (or less) of each other. According to the FBI, most of these occurred within 48 hours of each other. “During these attacks, cyber threat actors deployed two different ransomware variants … More

The post Most dual ransomware attacks occur within 48 hours appeared first on Help Net Security.

"

Autosummary: "


Motel One discloses data breach following ransomware attack

financial exploits ransomware
2023-10-02 https://www.bleepingcomputer.com/news/security/motel-one-discloses-data-breach-following-ransomware-attack/
The Motel One Group has announced that it has been targeted by ransomware actors who managed to steal some customer data, including the details of 150 credit cards. [...] "

Autosummary: Motel One is a low-budget hotel chain that operates over ninety hotels with 25,000 rooms in Germany, Austria, the UK, Denmark, Belgium, the Netherlands, Spain, Poland, the Czech Republic, and the United States. "


FBI warns of multiple ransomware attacks on same victim

exploits ransomware
2023-10-02 https://www.malwarebytes.com/blog/news/2023/10/fbi-warns-of-multiple-ransomware-attacks-on-same-victim

Categories: News

Categories: Ransomware

Tags: FBI

Tags: ransomware

Tags: dual attacks

Tags: wipers

The FBI has warned about new tactics deployed by ransomware gangs, dual attacks and use of wipers.

(Read more...)

The post FBI warns of multiple ransomware attacks on same victim appeared first on Malwarebytes Labs.

"

Autosummary: With multiple, or dual ransomware attacks, the FBI says cybercriminals deployed two different ransomware variants against victim companies, using the following variants: AvosLocker, Diamond, Hive, Karakurt, LockBit, Quantum, and Royal. Rivalry between ransomware gangs Initial Access Brokers selling to multiple ransomware operators Extra pressure on the victim to pay the ransom The second trend, according to the FBI, is that multiple ransomware groups have increased the use of custom data theft, wiper tools, and malware to pressure victims to negotiate. Information about your company, such as industry, size, etc. Victim impact statement. "


Meet LostTrust ransomware — A likely rebrand of the MetaEncryptor gang

exploits ransomware
2023-10-01 https://www.bleepingcomputer.com/news/security/meet-losttrust-ransomware-a-likely-rebrand-of-the-metaencryptor-gang/
The LostTrust ransomware operation is believed to be a rebrand of MetaEncryptor, utilizing almost identical data leak sites and encryptors. [...] "

Autosummary: When executed, LostTrust will disable and stop numerous Windows services to ensure all files can be encrypted, including any services containing the Firebird, MSSQL, SQL, Exchange, wsbex, postgresql, BACKP, tomcat, SBS, and SharePoint strings." BleepingComputer also found that both the LostTrust [VirusTotal] and MetaEncryptor [VirusTotal] encryptors are virtually identical, with some minor changes to ransom notes, embedded public keys, ransom note names, and encrypted file extensions. "


FBI Warns of Rising Trend of Dual Ransomware Attacks Targeting U.S. Companies

exploits ransomware
2023-09-30 https://thehackernews.com/2023/09/fbi-warns-of-rising-trend-of-dual.html
The U.S. Federal Bureau of Investigation (FBI) is warning of a new trend of dual ransomware attacks targeting the same victims, at least since July 2023. "During these attacks, cyber threat actors deployed two different ransomware variants against victim companies from the following variants: AvosLocker, Diamond, Hive, Karakurt, LockBit, Quantum, and Royal," the FBI said in an alert. "Variants "

Autosummary: "


FBI warns of dual ransomware attacks

exploits ransomware
2023-09-30 https://securityaffairs.com/151722/cyber-crime/fbi-warns-dual-ransomware-attacks.html

The U.S. Federal Bureau of Investigation (FBI) warns of dual ransomware attacks aimed at the same victims. The U.S. Federal Bureau of Investigation (FBI) is warning of dual ransomware attacks, a new worrisome trend in the threat landscape that sees threat actors targeting the same victims two times. “As of July 2023, the FBI noted […]

The post FBI warns of dual ransomware attacks appeared first on Security Affairs.

"

Autosummary: The government experts observed the threat actors using the following ransomware families: AvosLocker, Diamond, Hive, Karakurt, LockBit, Quantum, and Royal. "


ALPHV/BlackCat ransomware gang hacked the hotel chain Motel One

exploits ransomware
2023-09-30 https://securityaffairs.com/151732/cyber-crime/alphv-ransomware-motel-one.html

The ALPHV/BlackCat ransomware gang added the hotel chain Motel One to the list of victims on its Tor leak site. Motel One is a German hotel chain that offers budget-friendly accommodations primarily targeted at business and leisure travelers. It is known for its stylish and design-focused hotels that aim to provide a comfortable and affordable […]

The post ALPHV/BlackCat ransomware gang hacked the hotel chain Motel One appeared first on Security Affairs.

"

Autosummary: The Alphv ransomware group has been very active in this period, recently it claimed to have hacked Clarion, the global manufacturer of audio and video equipment for cars and other vehicles BlackCat/ALPHV ransomware gang has been active since November 2021, the list of its victims is long and includes industrial explosives manufacturer SOLAR INDUSTRIES INDIA, the US defense contractor NJVC, gas pipeline Creos Luxembourg S.A., the fashion giant Moncler, the Swissport, NCR, and Western Digital. "


VMware users anxious about costs and ransomware threats

exploits ransomware
2023-09-29 https://www.helpnetsecurity.com/2023/09/29/vmware-customers-concerns/

VMware customers have growing concerns about the state of the virtualization software and the company behind it – ranging from rising licensing costs, ransomware vulnerabilities and a diminishing quality of support, according to VergeIO. 84% of respondents indicated that they were concerned about VMware’s current and future costs, with many highlighting “per-core” renewal quotes and licensing agreements that require a commitment to year-over-year spending increases as additional points of distress. With a rise in ransomware … More

The post VMware users anxious about costs and ransomware threats appeared first on Help Net Security.

"

Autosummary: "


The Week in Ransomware - September 29th 2023 - Dark Angels

exploits ransomware
2023-09-29 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-september-29th-2023-dark-angels/
This week has been a busy ransomware week, with ransomware attacks having a massive impact on organizations and the fallout of the MOVEit breaches to be disclosed. [...] "

Autosummary: Cybersecurity firms, journalists, and law enforcement also released interesting reports this week: Contributors and those who provided new ransomware information and stories this week include @serghei, @Ionut_Ilascu, @BleepinComputer, @fwosar, @Seifreed, @demonslay335, @billtoulas, @LawrenceAbrams, @malwrhunterteam, @MalGamy12, @billseagull, @coveware, @GroupIB_TI, @briankrebs, @pcrisk, @FBI, @jgreigj, and @DrWeb_antivirus.During this time, the attackers claim to have stolen DWG files, engineering documents, databases, confidential documents, and client contracts. "


Dark Angels Team ransomware group hit Johnson Controls

exploits ransomware
2023-09-28 https://securityaffairs.com/151636/cyber-crime/dark-angels-team-ransomware-group-hit-johnson-controls.html

Johnson Controls International suffered a ransomware attack that impacted the operations of the company and its subsidiaries. Johnson Controls International plc is a multinational conglomerate with a diversified portfolio of products and services primarily focused on building technologies and solutions. The company provides HVAC (heating, ventilation, and air conditioning), solutions for building automation, fire and […]

The post Dark Angels Team ransomware group hit Johnson Controls appeared first on Security Affairs.

"

Autosummary: Dark Angels Team created a new variant of their linux ransomware to target @johnsoncontrols. new sample: fe8b6b7c3c86df0ee47a3cb04a68891fd5e91f3bfb13482112dd9042e8baebdf old sample: 3b56cea72e8140a7044336933cf382d98dd95c732e5937a0a61e0e7296762c7b pic.twitter.com/veAgLH8Ptf — Gameel Ali 🤘 (@MalGamy12) September 27, 2023 According to BleepingComputer, the ransomware group is demanding $51 million to provide a decryptor, the amount of the ransom was confirmed by Malware Hunter Team researchers: Dark Angels" base ransom amount for Johnson Controls is $51 million. "


FBI: Dual ransomware attack victims now get hit within 48 hours

exploits ransomware
2023-09-28 https://www.bleepingcomputer.com/news/security/fbi-dual-ransomware-attack-victims-now-get-hit-within-48-hours/
The FBI has warned about a new trend in ransomware attacks where multiple strains are deployed on victims" networks to encrypt systems in under two days. [...] "

Autosummary: " 48 hours between ransomware attacks In contrast to the past, when ransomware groups typically required a minimum of 10 days to execute such attacks, now the vast majority of ransomware incidents targeting the same victim take place within a mere 48-hour timeframe of each other, according to FBI"s data. "


‘Ransomed.vc’ in the Spotlight – What is Known About the Ransomware Group Targeting Sony and NTT Docomo

exploits ransomware
2023-09-27 https://securityaffairs.com/151550/data-breach/ransomed-vc-sony-ntt-alleged-attacks.html

Following the recently announced data leak from Sony, Ransomed.vc group claimed the hack of the Japanese giant NTT Docomo. Following the recently announced data leak from Sony, the notorious ransomware syndicate Ransomed.vc announced a new victim today in face of the largest Japanese telecommunication giant NTT Docomo. Notably, the announcement came almost synchronously with the […]

The post ‘Ransomed.vc’ in the Spotlight – What is Known About the Ransomware Group Targeting Sony and NTT Docomo appeared first on Security Affairs.

"

Autosummary: Resecurity uncovered interesting connections to independent hacktivist groups which later united in alliances like “Five Families”, a coalition of several groups (STORMOUS, GhostSec, SigedSec, ThreatSec) previously responsible for large-scale cybersecurity incidents. "


Building automation giant Johnson Controls hit by ransomware attack

exploits ransomware
2023-09-27 https://www.bleepingcomputer.com/news/security/building-automation-giant-johnson-controls-hit-by-ransomware-attack/
Johnson Controls International has suffered what is described as a massive ransomware attack that encrypted many of the company devices, including VMware ESXi servers, impacting the company"s and its subsidiaries" operations. [...] "

Autosummary: The company employs 100,000 people through its corporate operations and subsidiaries, including York, Tyco, Luxaire, Coleman, Ruskin, Grinnel, and Simplex. "


ShadowSyndicate hackers linked to multiple ransomware ops, 85 servers

exploits ransomware
2023-09-26 https://www.bleepingcomputer.com/news/security/shadowsyndicate-hackers-linked-to-multiple-ransomware-ops-85-servers/
Security researchers have identified infrastructure belonging to a threat actor now tracked as ShadowSyndicate, who likely deployed seven different ransomware families in attacks over the past year. [...] "

Autosummary: Group-IB analysts working together with Bridewell and independent researcher Michael Koczwara attribute with various degrees of confidence ShadowSyndicate"s use of the Quantum, Nokoyawa, BlackCat/ALPHV, Clop, Royal, Cactus, and Play ransomware in multiple breaches observed since July 2022. "


The Rhysida ransomware group hit the Kuwait Ministry of Finance

financial exploits ransomware
2023-09-26 https://securityaffairs.com/151501/cyber-crime/rhysida-ransomware-kuwait-ministry-of-finance.html

This week the Rhysida ransomware group claimed the hack of the Kuwait Ministry of Finance and added it to its Tor leak site. Last week a ransomware attack hit the Government of Kuwait, the attack took place on September 18 and the government experts immediately started the incident response procedures to block the threat. Below […]

The post The Rhysida ransomware group hit the Kuwait Ministry of Finance appeared first on Security Affairs.

"

Autosummary: تصريح صحفي:تحديث بشأن التحقيقات الجارية في عملية الهجمة السيبرانية المحدودة التي تمت في 18 سبتمبر وأصابت أحد أنظمة الوزارة: – جميع البيانات الخاصة برواتب العاملين في الجهات الحكومية لا تخزن في أنظمة الوزارة – العمل مع شركة عالمية متخصصة في مكافحة هذا النوع من الجرائم المعلوماتية pic.twitter.com/SaK4NGwoYB — وزارة المالية-الكويت (@MOFKW) September 25, 2023 This week the Rhysida ransomware group claimed responsibility for the attack and added the ministry to the list of victims on its Tor leak site. "


ShadowSyndicate: A New Cybercrime Group Linked to 7 Ransomware Families

exploits ransomware
2023-09-26 https://thehackernews.com/2023/09/shadowsyndicate-new-cybercrime-group.html
Cybersecurity experts have shed light on a new cybercrime group known as ShadowSyndicate (formerly Infra Storm) that may have leveraged as many as seven different ransomware families over the past year. "ShadowSyndicate is a threat actor that works with various ransomware groups and affiliates of ransomware programs," Group-IB and Bridewell said in a new joint report. The actor, active since "

Autosummary: A majority of the servers (23) are located in Panama, followed by Cyprus (11), Russia (9), Seychelles (8), Costa Rica (7), Czechia (7), Belize (6), Bulgaria (3), Honduras (3), and the Netherlands (3). The actor, active since July 16, 2022, has linked to ransomware activity related to Quantum, Nokoyawa, BlackCat, Royal, Cl0p, Cactus, and Play strains, while also deploying off-the-shelf post-exploitation tools like Cobalt Strike and Sliver as well as loaders such as IcedID and Matanbuchus. "


Current ransomware defenses efforts are not working

exploits ransomware
2023-09-25 https://www.helpnetsecurity.com/2023/09/25/infostealer-malware-ransomware/

Despite some positive developments, the impact of ransomware attacks remains high, according to SpyCloud. Infostealer infections preceded 22% of ransomware events for North American and European ransomware victim companies in 2023 – with common infostealers such as Raccoon, Vidar, and Redline increasing the probability even further. SpyCloud’s analysis shows that 76% of infections that preceded these ransomware events involved Raccoon infostealer malware. Ransomware is a malware problem at its core Despite shifting priorities to better … More

The post Current ransomware defenses efforts are not working appeared first on Help Net Security.

"

Autosummary: “Ransomware is a malware problem at its core, and there’s a clear pattern emerging that shows infostealer malware is directly leading to ransomware attacks,” said Trevor Hilligoss, Senior Director of Security Research at SpyCloud. "


City of Dallas has set a budget of $8.5 million to mitigate the May Royal ransomware attack

exploits government ransomware
2023-09-23 https://securityaffairs.com/151264/data-breach/city-of-dallas-royal-ransomware-attack-may.html

The City of Dallas revealed that the Royal ransomware gang that hit the city system in May used a stolen account. In May 2023, a ransomware attack hit the IT systems at the City of Dallas, Texas. To prevent the threat from spreading within the network, the City shut down the impacted IT systems. The […]

The post City of Dallas has set a budget of $8.5 million to mitigate the May Royal ransomware attack appeared first on Security Affairs.

"

Autosummary: The ransomware encrypts the network shares, that are found on the local network and the local drives, with the AES algorithm In March, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) released a joint Cybersecurity Advisory (CSA) to provide organizations, tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) associated with this ransomware family. According to the notice published on the website of the OAG on August 07, 2023, exposed personal information includes names, addresses, social security information, health information, and health insurance information. "


Dallas says Royal ransomware breached its network using stolen account

exploits ransomware
2023-09-22 https://www.bleepingcomputer.com/news/security/dallas-says-royal-ransomware-breached-its-network-using-stolen-account/
The City of Dallas, Texas, said this week that the Royal ransomware attack that forced it to shut down all IT systems in May started with a stolen account. [...] "

Autosummary: The process of restoring all servers took just over 5 weeks, from May 9th, when the financial server was revived, to June 13th, when the last server affected by the attack, the waste management server, was restored. "


Cyber Group "Gold Melody" Selling Compromised Access to Ransomware Attackers

exploits ransomware
2023-09-21 https://thehackernews.com/2023/09/cyber-group-gold-melody-selling.html
A financially motivated threat actor has been outed as an initial access broker (IAB) that sells access to compromised organizations for other adversaries to conduct follow-on attacks such as ransomware. SecureWorks Counter Threat Unit (CTU) has dubbed the e-crime group Gold Melody, which is also known by the names Prophet Spider (CrowdStrike) and UNC961 (Mandiant). "This financially motivated "

Autosummary: " Gold Melody has been previously linked to attacks exploiting security flaws in JBoss Messaging (CVE-2017-7504), Citrix ADC (CVE-2019-19781), Oracle WebLogic (CVE-2020-14750 and CVE-2020-14882), GitLab (CVE-2021-22205), Citrix ShareFile Storage Zones Controller (CVE-2021-22941), Atlassian Confluence (CVE-2021-26084), ForgeRock AM (CVE-2021-35464), and Apache Log4j (CVE-2021-44228) servers. "


Snatch ransomware – what you need to know

exploits ransomware
2023-09-21 https://www.tripwire.com/state-of-security/snatch-ransomware-what-you-need-know
The FBI and US Cybersecurity and Infrastructure Security Agency (CISA) have issued a joint advisory warning organisations about a ransomware-as-a-service operation called "Snatch." Learn more about the threat in my article for the Tripwire State of Security blog. "

Autosummary: Snatch first appeared in 2018, albeit originally under the name Team Truniger (Truniger, explains the FBI and CISA advisory, was the online handle of a key member who had previously worked as an affiliate of the GandCrab ransomware-as-a-service operation.) The FBI and US Cybersecurity and Infrastructure Security Agency (CISA) have issued a joint advisory warning organisations about a ransomware-as-a-service operation called "Snatch." Snatch? using hard-to-crack unique passwords to protect sensitive data and accounts, as well as enabling multi-factor authentication. "


Mysterious "Sandman" Threat Actor Targets Telecom Providers Across Three Continents

ransomware
2023-09-21 https://thehackernews.com/2023/09/mysterious-sandman-threat-actor-targets.html
A previously undocumented threat actor dubbed Sandman has been attributed to a set of cyber attacks targeting telecommunic koation providers in the Middle East, Western Europe, and the South Asian subcontinent. Notably, the intrusions leverage a just-in-time (JIT) compiler for the Lua programming language known as LuaJIT as a vehicle to deploy a novel implant called LuaDream. "The activities we "

Autosummary: The disclosure coincides with a parallel report from SentinelOne which detailed sustained strategic intrusions by Chinese threat actors in Africa, including those aimed at telecommunication, finance and government sectors in Africa, as part of activity clusters dubbed BackdoorDiplomacy, Earth Estries, and Operation Tainted Love. "


DoppelPaymer ransomware group suspects identified

exploits ransomware
2023-09-20 https://www.malwarebytes.com/blog/news/2023/09/doppelpaymer-ransomware-group-suspects-identified

Categories: News

Categories: Ransomware

More DoppelPaymer ransomware group suspects have been identified by blockchain investigations and had search warrants executed against them.

(Read more...)

The post DoppelPaymer ransomware group suspects identified appeared first on Malwarebytes Labs.

"

Autosummary: Other victims attacked by DoppelPaymer in the past include Compal, PEMEX (Petróleos Mexicanos), the City of Torrance in California, Newcastle University, Hall County in Georgia, Banijay Group SAS, and Bretagne Télécom. In March of 2023, we reported how the German Regional Police and the Ukrainian National Police, with support from Europol, the Dutch Police, and the United States Federal Bureau of Investigations (FBI), apprehended two suspects and seized computer equipment.Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again. "


Financially Motivated UNC3944 Threat Actor Shifts Focus to Ransomware Attacks

financial exploits ransomware
2023-09-18 https://thehackernews.com/2023/09/financially-motivated-unc3944-threat.html
The financially motivated threat actor known as UNC3944 is pivoting to ransomware deployment as part of an expansion to its monetization strategies, Mandiant has revealed. "UNC3944 has demonstrated a stronger focus on stealing large amounts of sensitive data for extortion purposes and they appear to understand Western business practices, possibly due to the geographical composition of the group, "

Autosummary: " The group, also known by the names 0ktapus, Scatter Swine, and Scattered Spider, has been active since early 2022, adopting phone-based social engineering and SMS-based phishing to obtain employees" valid credentials using bogus sign-in pages and infiltrate victim organizations, mirroring tactics adopted by another group called LAPSUS$. While the group originally focused on telecom and business process outsourcing (BPO) companies, it has since expanded its targeting to include hospitality, retail, media and entertainment, and financial services, illustrative of the growing threat. "


#StopRansomware: Snatch Ransomware

exploits ransomware
2023-09-18 https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-263a

SUMMARY

Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint CSA to disseminate known ransomware IOCs and TTPs associated with the Snatch ransomware variant identified through FBI investigations as recently as June 1, 2023.

Since mid-2021, Snatch threat actors have consistently evolved their tactics to take advantage of current trends in the cybercriminal space and leveraged successes of other ransomware variants’ operations. Snatch threat actors have targeted a wide range of critical infrastructure sectors including the Defense Industrial Base (DIB), Food and Agriculture, and Information Technology sectors. Snatch threat actors conduct ransomware operations involving data exfiltration and double extortion. After data exfiltration often involving direct communications with victims demanding ransom, Snatch threat actors may threaten victims with double extortion, where the victims’ data will be posted on Snatch’s extortion blog if the ransom goes unpaid.

FBI and CISA encourage organizations to implement the recommendations in the Mitigations section of this CSA to reduce the likelihood and impact of ransomware incidents.

Download the PDF version of this report:

Autosummary: (Incorrect file location, should be C:\Windows\System32\svchost.exe) Mutexes Created Mutexes Created \Sessions\1\BaseNamedObjects\gcc-shmem-tdm2-fc_key \Sessions\1\BaseNamedObjects\gcc-shmem-tdm2-sjlj_once \Sessions\1\BaseNamedObjects\gcc-shmem-tdm2-use_fc_key gcc-shmem-tdm2-fc_key gcc-hmem-tdm2-sjlj_once gcc-shmem-tdm2-use_fc_key MITRE ATT&CK TACTICS AND TECHNIQUES See Tables 4-16 for all referenced threat actor tactics and techniques in this advisory. In addition, the authoring authorities of this CSA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques, and to reduce the impact and risk of compromise by ransomware or data extortion actors: Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (i.e., hard drive, storage device, the cloud). Registry Keys Registry Keys HKLM\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Servers\D8B548F0-E306-4B2B-BD82-25DAC3208786\FriendlyName HKU\S-1-5-21-4270068108-2931534202-3907561125-1001\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{ED50FC29-B964- 48A9-AFB3-15EBB9B97F36} {ADD8BA80-002B-11D0-8F0F-00C04FD7D062} 0xFFFF System Log Changes Source Message TerminalServices-RemoteConnectionManager Remote session from client name exceeded the maximum allowed failed logon attempts. REPORTING The FBI is seeking any information that can be shared, to include boundary logs showing communication to and from IP addresses, a sample ransom note, communications with Snatch threat actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by FBI or CISA.In August 2023, individuals claiming to be associated with the blog gave a media interview claiming the blog was not associated with Snatch ransomware and “none of our targets has been attacked by Ransomware Snatch…”, despite multiple confirmed Snatch victims’ data appearing on the blog alongside victims associated with other ransomware groups, notably Nokoyawa and Conti.[1] Initial Access and Persistence Snatch threat actors employ several different methods to gain access to and maintain persistence on a victim’s network.Within this timeframe, Snatch threat actors exploited the victim’s network [T1590], moving laterally across the victim’s network with RDP [T1021.001] for the largest possible deployment of ransomware and searching for files and folders [T1005] for data exfiltration [TA0010] followed by file encryption [T1486]. to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (i.e., hard drive, storage device, the cloud).Snatch threat actors use sc.exe to configure, query, stop, start, delete, and add system services using the Windows Command line. Download the PDF version of this report: For a downloadable copy of IOCs, see: TECHNICAL DETAILS Note: This advisory uses the MITRE ATT&CK for Enterprise framework, version 13.The authoring agencies recommend that software manufactures incorporate secure-by-design and -default principles and tactics into their software development practices for hardening software against ransomware attacks (e.g., to prevent threat actors from using Safe Mode to evade detection and file encryption), thus strengthening the secure posture for their customers.Regardless of whether you or your organization have decided to pay the ransom, the FBI and CISA urge you to promptly report ransomware incidents to the FBI Internet Crime Complaint Center (IC3) at ic3.gov, a local FBI Field Office, or to CISA at report@cisa.gov or (888) 282-0870. VALIDATE SECURITY CONTROLS In addition to applying mitigations, FBI and CISA recommend exercising, testing, and validating your organization"s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. Table 11: Snatch Threat Actors ATT&CK Techniques for Enterprise – Discovery Technique Title ID Use Query Registry T1012 Snatch threat actors may interact with the Windows Registry to gather information about the system, configuration, and installed software. "


BlackCat ransomware hits Azure Storage with Sphynx encryptor

exploits ransomware
2023-09-16 https://www.bleepingcomputer.com/news/security/blackcat-ransomware-hits-azure-storage-with-sphynx-encryptor/
The BlackCat (ALPHV) ransomware gang now uses stolen Microsoft accounts and the recently spotted Sphynx encryptor to encrypt targets" Azure cloud storage. [...] "

Autosummary: For instance, in a new extortion approach last summer, the ransomware gang used a dedicated clear web website to leak the stolen data of a specific victim, providing the victim"s customers and employees with the means to determine whether their data had been exposed. "


ORBCOMM ransomware attack causes trucking fleet management outage

exploits ransomware
2023-09-15 https://www.bleepingcomputer.com/news/security/orbcomm-ransomware-attack-causes-trucking-fleet-management-outage/
Trucking and fleet management solutions provider ORBCOMM has confirmed that a ransomware attack is causing recent service outages that prevent trucking companies from managing their fleets. [...] "

Autosummary: "Drivers using the identified ELDs may continue to record their hours of service on a paper graph grid or logging software, in accordance with § 395.8, until ORBCOMM notifies FMCSA that the malfunctioning Blue Tree ELDs have resumed service or by September 29, 2023, whichever occurs first," explains the FMCSA. "


The Week in Ransomware - September 15th 2023 - Russian Roulette

exploits ransomware rusia-ucrania
2023-09-15 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-september-15th-2023-russian-roulette/
This week"s big news is the extortion attacks on the Caesars and MGM Las Vegas casino chains, with one having already paid the ransom and the other still facing operational disruptions. [...] "

Autosummary: Finally, some interesting research was released this week: Contributors and those who provided new ransomware information and stories this week include: @Seifreed, @malwareforme, @serghei, @malwrhunterteam, @BleepinComputer, @demonslay335, @Ionut_Ilascu, @LawrenceAbrams, @billtoulas, @vxunderground, @BroadcomSW, @MsftSecIntel, @AlvieriD, @WilliamTurton, @GeeksCyber, @pcrisk, and @Mandiant. September 11th 2023 MGM Resorts International disclosed today that it is dealing with a cybersecurity issue that impacted some of its systems, including its main website, online reservations, and in-casino services, like ATMs, slot machines, and credit card machines. "


Cybercriminals Combine Phishing and EV Certificates to Deliver Ransomware Payloads

financial exploits ransomware ciber
2023-09-15 https://thehackernews.com/2023/09/cybercriminals-combine-phishing-and-ev.html
The threat actors behind RedLine and Vidar information stealers have been observed pivoting to ransomware through phishing campaigns that spread initial payloads signed with Extended Validation (EV) code signing certificates. "This suggests that the threat actors are streamlining operations by making their techniques multipurpose," Trend Micro researchers said in a new analysis published this "

Autosummary: "Because the ads look so legitimate, there is little doubt people will click on them and visit unsafe sites," Jérôme Segura, director of threat intelligence at Malwarebytes, said. "


Manchester Police officers" data exposed in ransomware attack

exploits ransomware
2023-09-14 https://www.bleepingcomputer.com/news/security/manchester-police-officers-data-exposed-in-ransomware-attack/
United Kingdom"s Greater Manchester Police (GMP) said earlier today that some of its employees" personal information was impacted by a ransomware attack that hit a third-party supplier. [...] "

Autosummary: In late August, the Metropolitan Police (Met) published a similar announcement about hackers gaining access to the IT system of one of its suppliers, resulting in the exposure of names, ranks, photos, vetting levels, and pay numbers for 47,000 police officers and staff. "


Auckland transport authority hit by suspected ransomware attack

exploits ransomware
2023-09-14 https://www.bleepingcomputer.com/news/security/auckland-transport-authority-hit-by-suspected-ransomware-attack/
The Auckland Transport (AT) transportation authority in New Zealand is dealing with a widespread outage caused by a cyber incident, impacting a wide range of customer services. [...] "

Autosummary: - AT According to the latest update published earlier today, the following AT services have been impacted as a result of the attack: Online top-ups, as well as other AT HOP services using MyAT HOP on the AT website. "


MGM Resorts ESXi servers allegedly encrypted in ransomware attack

exploits ransomware
2023-09-14 https://www.bleepingcomputer.com/news/security/mgm-resorts-esxi-servers-allegedly-encrypted-in-ransomware-attack/
An affiliate of the BlackCat ransomware group, also known as APLHV, is behind the attack that disrupted MGM Resorts" operations, forcing the company to shut down IT systems. [...] "

Autosummary: Link between Lapsus$ and UNC3944 source: Mandiant A Scattered Spider campaign called "0ktapus" was used to target over 130 organizations to steal Okta identity credentials and 2FA codes, with some of those targets including T-Mobile, MetroPCS, Verizon Wireless, AT&T, Slack, Twitter, Binance, KuCoin, CoinBase, Microsoft, Epic Games, Riot Games, Evernote, AT&T, HubSpot, TTEC, and Best Buy. Once they gain access to admin credentials, they can perform further attacks, such as hijacking single sign-on administration, destroying backups, and, more recently, deploying the BlackCat/ALPHV ransomware to encrypt devices. "


MGM casino"s ESXi servers allegedly encrypted in ransomware attack

exploits ransomware
2023-09-14 https://www.bleepingcomputer.com/news/security/mgm-casinos-esxi-servers-allegedly-encrypted-in-ransomware-attack/
An affiliate of the BlackCat ransomware group, also known as APLHV, is behind the attack that disrupted MGM Resorts" operations, forcing the company to shut down IT systems. [...] "

Autosummary: Link between Lapsus$ and UNC3944 source: Mandiant A Scattered Spider campaign called "0ktapus" was used to target over 130 organizations to steal Okta identity credentials and 2FA codes, with some of those targets including T-Mobile, MetroPCS, Verizon Wireless, AT&T, Slack, Twitter, Binance, KuCoin, CoinBase, Microsoft, Epic Games, Riot Games, Evernote, AT&T, HubSpot, TTEC, and Best Buy. Once they gain access to admin credentials, they can perform further attacks, such as hijacking single sign-on administration, destroying backups, and, more recently, deploying the BlackCat/ALPHV ransomware to encrypt devices. "


Lockbit ransomware gang hit the Carthage Area Hospital and the Clayton-Hepburn Medical Center in New York

exploits ransomware
2023-09-14 https://securityaffairs.com/150835/cyber-crime/lockbit-ransomware-carthage-area-hospital.html

LockBit ransomware group breached two hospitals, the Carthage Area Hospital and the Clayton-Hepburn Medical Center in New York. The Lockbit ransomware group claims to have hacked two major hospitals, the Carthage Area Hospital and Claxton-Hepburn Medical Center. The two hospitals serve hundreds of thousands of people in upstate New York. The cyberattack took place at […]

The post Lockbit ransomware gang hit the Carthage Area Hospital and the Clayton-Hepburn Medical Center in New York appeared first on Security Affairs.

"

Autosummary: Lockbit ransomware gang hit the Carthage Area Hospital and the Clayton-Hepburn Medical Center in New York Pierluigi Paganini September 14, 2023 September 14, 2023 LockBit ransomware group breached two hospitals, the Carthage Area Hospital and the Clayton-Hepburn Medical Center in New York. Affiliates of the Lockbit gang have also hit other healthcare organizations in the past, in early December 2022, the Hospital Centre of Versailles was hit by a cyber attack that was attributed to the group. "


Hackers use new 3AM ransomware to save failed LockBit attack

exploits ransomware
2023-09-13 https://www.bleepingcomputer.com/news/security/hackers-use-new-3am-ransomware-to-save-failed-lockbit-attack/
A new ransomware strain called 3AM has been uncovered after a threat actor used it in an attack that failed to deploy LockBit ransomware on a target network. [...] "

Autosummary: According to Symantec’s malware analysis, the 3AM Rust-based 64-bit executable recognizes the following command-line parameters: "-k" - 32 Base64 characters, the "access key" in the ransom note "-p" - unknown "-h" - unknown "-m" - method, where the code checks one of two values before running encryption logic: "local" "net" "-s" - determines offsets within files for encryption to control encryption speed, expressed as decimal digits. “The attacker also executed various Cobalt Strike components and tried to escalate privileges on the computer using PsExec” - Symantec Threat Hunter Team The researchers observed the use of commands commonly used for reconnaissance (e.g. whoami, netstat, quser, and net share), enumerating servers (e.g. quser, net view), adding a new user for persistence, and the use of the old wput FTP client to copy files to the attacker’s server. "


Rust-Written 3AM Ransomware: A Sneak Peek into a New Malware Family

exploits ransomware
2023-09-13 https://thehackernews.com/2023/09/rust-written-3am-ransomware-sneak-peek.html
A new ransomware family called 3AM has emerged in the wild after it was detected in a single incident in which an unidentified affiliate deployed the strain following an unsuccessful attempt to deliver LockBit (attributed to Bitwise Spider or Syrphid) in the target network. "3AM is written in Rust and appears to be a completely new malware family," the Symantec Threat Hunter Team, part of "

Autosummary: "We"ve seen no evidence ourselves to suggest that this affiliate has used 3AM again, but we"re not surprised to see other reports of 3AM"s use," Dick O"Brien, principal intelligence analyst at Symantec, told The Hacker News. "


The main causes of ransomware reinfection

exploits ransomware
2023-09-11 https://www.malwarebytes.com/blog/news/2023/09/the-main-causes-for-ransomware-reinfection

Categories: News

Categories: Ransomware

Tags: ransomware

Tags: reinfection

Tags: stolen credentials

Tags: vulnerabilities

Tags: infected backups

Tags: logging

Tags: forensic investigation

Tags: backdoors

The main causes for getting reinfected with ransomware can be prevented by performing a forensic analysis.

(Read more...)

The post The main causes of ransomware reinfection appeared first on Malwarebytes Labs.

"

Autosummary: The most common reasons for reinfection are: backdoors left behind by the criminals credentials stolen in the course of the first attack unpatched vulnerabilities restoration of infected backups In some ransomware attacks criminals have access to the target network for weeks or months, giving them ample opportunity to open a backdoor or otherwise retain the necessary controls and permissions to return and trigger another attack. Not only does a thorough forensic investigation help you find the cause that might be remediated, it’s important to be able to follow the tracks the attacker left in your network, so you can reconstruct what access they may have gained and what they may have copied, left behind, changed, or deleted.Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again. "


Chile marks military coup as divisions continue

latam ransomware
2023-09-11 https://www.bbc.co.uk/news/world-latin-america-66706064?at_medium=RSS&at_campaign=KARANGA
The left-wing government has condemned the 1973 coup but the opposition accuses it of fuelling divisions. "

Autosummary: "


Cisco warns of VPN zero-day exploited by ransomware gangs

exploits ransomware
2023-09-08 https://www.bleepingcomputer.com/news/security/cisco-warns-of-vpn-zero-day-exploited-by-ransomware-gangs/
Cisco is warning of a CVE-2023-20269 zero-day vulnerability in its Cisco Adaptive Security Appliance (ASA) and Cisco Firepower Threat Defense (FTD) that is actively exploited by ransomware operations to gain initial access to corporate networks. [...] "

Autosummary: Vulnerability details The CVE-2023-20269 flaw is located within the web services interface of the Cisco ASA and Cisco FTD devices, specifically the functions that deal with authentication, authorization, and accounting (AAA) functions. "


The Week in Ransomware - September 8th 2023 - Conti Indictments

exploits ransomware
2023-09-08 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-september-8th-2023-conti-indictments/
It started as a slow ransomware news week but slowly picked up pace with the Department of Justice announcing indictments on TrickBot and Conti operations members. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @BleepinComputer, @VK_Intel, @jorntvdw, @LawrenceAbrams, @PolarToffee, @FourOctets, @struppigel, @DanielGallagher, @malwareforme, @Ionut_Ilascu, @demonslay335, @billtoulas, @serghei, @fwosar, @malwrhunterteam, @Seifreed, @cloudsek, @SecurityAura, @SentinelOne, and @pcrisk. "


LibreOffice: Stability, security, and continued development

ransomware
2023-09-07 https://www.helpnetsecurity.com/2023/09/07/libreoffice-security-development/

LibreOffice, the most widely used open-source office productivity suite, has plenty to recommend it: it’s feature-rich, user-friendly, well-documented, reliable, has an active community of developers working on improving it, and it’s free. The suite includes Writer (word processor), Calc (a spreadsheet app), Impress (a presentation app), Draw (graphics editor), Math (app for creating and editing mathematical formulas), and Base (database management software). Its development is shephered by The Document Foundation (TDF), a German non-profit organization … More

The post LibreOffice: Stability, security, and continued development appeared first on Help Net Security.

"

Autosummary: “This effort was coupled with the creation of an infrastructure to serve the developers, with the implementation of tools such as Gerrit for code review, Git for continuous integration, a battery of Tinderboxes, Bugzilla for quality assurance, OpenGrok for source code research, Weblate for localization, as well as testing for performance and crash analysis,” he explained.LibreOffice, the most widely used open-source office productivity suite, has plenty to recommend it: it’s feature-rich, user-friendly, well-documented, reliable, has an active community of developers working on improving it, and it’s free. “On the downstream side, open-source projects that integrate components developed by The Document Foundation, e.g., import filters for some proprietary formats (such as Microsoft Publisher and Visio, Apple Keynote, etc.), rely on the professionalism of LibreOffice developers. "


US and UK sanction 11 TrickBot and Conti cybercrime gang members

ransomware
2023-09-07 https://www.bleepingcomputer.com/news/security/us-and-uk-sanction-11-trickbot-and-conti-cybercrime-gang-members/
The USA and the United Kingdom have sanctioned eleven Russian nationals associated with the TrickBot and Conti ransomware cybercrime operations. [...] "

Autosummary: The US has previously sanctioned numerous individuals for their involvement in ransomware operations, including CryptoLocker, SamSam, WannaCry, Evil Corp, REvil, and BlackShadow/Pay2Key. Ultimately, these leaks led to the shutdown of the Conti ransomware operation, which has now splintered into numerous other ransomware operations, such as Royal, Black Basta, and ZEON. "


A history of ransomware: How did it get this far?

exploits ransomware
2023-09-07 https://www.malwarebytes.com/blog/news/2023/09/history-of-ransomware-and-how-did-it-get-this-far

Categories: News

Categories: Ransomware

Tags: history

Tags: ransomware

Tags: bulletproof hosting

Tags: cryptocurrency

Tags: encryption

Tags: fast internet

Tags: government protection

Tags: RaaS

Tags: LockBit

Tags: pentester tools

Tags: code

We tell you about the origin of ransomware and what factors contributed to making it the most feared type of malware.

(Read more...)

The post A history of ransomware: How did it get this far? appeared first on Malwarebytes Labs.

"

Autosummary: Here are a few ways: No more snail mail and floppy disks These days, popular delivery methods for ransomware are malspam, malvertising, and vulnerabilities in popular software or networking devices.Penetration testing, or pen testing, is the practice of running controlled attacks on a computer system, network, software, or other application in an attempt to find unpatched vulnerabilities or flaws.Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again. Ransomware as a service The ransomware as a service (RaaS) model—where ransomware gangs “rent out” their technology on a subscription basis to other groups—makes it possible to scale operations and divide the workload in an effective way. "


Cybercriminals target MS SQL servers to deliver ransomware

exploits ransomware ciber
2023-09-06 https://www.helpnetsecurity.com/2023/09/06/ms-sql-cyberattack/

A cyberattack campaign is targeting exposed Microsoft SQL (MS SQL) databases, aiming to deliver ransomware and Cobalt Strike payloads. The attack campaign The attackers target exposed MS SQL servers by brute-forcing access credentials. After having successfully authenticated, they start enumerating the database. A (too often) enabled xp_cmdshell function also allows attackers to run shell commands on the host and launch several payloads. Attackers then: Create new users on the victim host Make registry changes to … More

The post Cybercriminals target MS SQL servers to deliver ransomware appeared first on Help Net Security.

"

Autosummary: MS SQL servers under attack Trustwave has recently deployed honeypot servers mimicking nine popular database systems – MS SQL Server, MySQL, Redis, MongoDB, PostgreSQL, Oracle DB, IBM DB2, Cassandra, and Couchbase – in key regions of the world, and quickly discovered that attack activity on MS SQL honeypots accounted for 93% of the total. "


LockBit ransomware gang steals data related to security of UK military bases

exploits ransomware
2023-09-05 https://grahamcluley.com/lockbit-ransomware-gang-steals-data-related-to-security-of-uk-military-bases/
An attack by the notorious LockBit ransomware gang stole 10 GB of data from a company that provides high-security fencing for military bases. "

Autosummary: According to the firm, classified documents are not believed to have been included in the haul: “LockBit will have potentially gained access to some historic emails, orders, drawings and project files, we do not believe that any classified documents were stored on the system or have been compromised. "


LockBit leaks sensitive data from maximum security fence manufacturer

ransomware industry
2023-09-05 https://www.helpnetsecurity.com/2023/09/05/zaun-breach/

The LockBit ransomware group has breached Zaun, a UK-based manufacturer of fencing systems for military sites and critical utilities, by compromising a legacy computer running Windows 7 and using it as an initial point of access to the wider company network. The Zaun breach The company said that the “sophisticated” cyberattack occurred on the 5th – 6th August. “In an otherwise up-to-date network, the breach occurred through a rogue Windows 7 PC that was running … More

The post LockBit leaks sensitive data from maximum security fence manufacturer appeared first on Help Net Security.

"

Autosummary: Some of the stolen data was later leaked by LockBit on the dark web and, according to the Daily Mirror, among it were “thousands of pages of data which could help criminals get into the HMNB Clyde nuclear submarine base, the Porton Down chemical weapon lab and a GCHQ listening post.” "


FreeWorld ransomware attacks MSSQL—get your databases off the Internet

exploits ransomware
2023-09-05 https://www.malwarebytes.com/blog/news/2023/09/freeworld-ransomware-attacks-via-mssql-take-your-databases-off-the-internet

Categories: News

Categories: Ransomware

A attack that uses a database as an entry point to a network reminds us that you should never expose your databases to the Internet.

(Read more...)

The post FreeWorld ransomware attacks MSSQL—get your databases off the Internet appeared first on Malwarebytes Labs.

"

Autosummary: MySQL and MariaDB often act as the source of data for websites, rather than as an enterprise data store like MSSQL, so may carry less business-critical data, but they still represent a prize, and a potential entry point into a network. As I mentioned before, one of the things that attracts attackers to RDP is the large number of available targets, so I wondered how many databases I could find via Shodan, the search engine that finds Internet-connected computers. "


Deep Instinct takes a prevention-first approach to stopping ransomware and other malware using deep learning

exploits ransomware
2023-09-04 https://grahamcluley.com/feed-sponsor-deep-instinct/
Graham Cluley Security News is sponsored this week by the folks at Deep Instinct. Thanks to the great team there for their support! Deep Instinct protects the data of the world’s largest brands by delivering on the promise of threat prevention with the only cybersecurity platform fully powered by Deep Learning.​ We have pioneered predictive … Continue reading "Deep Instinct takes a prevention-first approach to stopping ransomware and other malware using deep learning" "

Autosummary: "


Threat Actors Targeting Microsoft SQL Servers to Deploy FreeWorld Ransomware

exploits ransomware
2023-09-01 https://thehackernews.com/2023/09/threat-actors-targeting-microsoft-sql.html
Threat actors are exploiting poorly secured Microsoft SQL (MS SQL) servers to deliver Cobalt Strike and a ransomware strain called FreeWorld. Cybersecurity firm Securonix, which has dubbed the campaign DB#JAMMER, said it stands out for the way the toolset and infrastructure is employed. “Some of these tools include enumeration software, RAT payloads, exploitation and credential stealing software "

Autosummary: "Some of these tools include enumeration software, RAT payloads, exploitation and credential stealing software, and finally ransomware payloads," security researchers Den Iuzvyk, Tim Peck, and Oleg Kolesnikov said in a technical breakdown of the activity. "


Earth Estries" Espionage Campaign Targets Governments and Tech Titans Across Continents

government ransomware
2023-08-31 https://thehackernews.com/2023/08/earth-estries-espionage-campaign.html
A hacking outfit nicknamed Earth Estries has been attributed to a new, ongoing cyber espionage campaign targeting government and technology industries based in the Philippines, Taiwan, Malaysia, South Africa, Germany, and the U.S. "The threat actors behind Earth Estries are working with high-level resources and functioning with sophisticated skills and experience in cyber espionage and illicit "

Autosummary: "


Cisco VPNs with no MFA enabled hit by ransomware groups

exploits ransomware
2023-08-31 https://www.helpnetsecurity.com/2023/08/31/ransomware-cisco-vpn/

Since March 2023 (and possibly even earlier), affiliates of the Akira and LockBit ransomware operators have been breaching organizations via Cisco ASA SSL VPN appliances. “In some cases, adversaries have conducted credential stuffing attacks that leveraged weak or default passwords; in others, the activity we’ve observed appears to be the result of targeted brute-force attacks on ASA appliances where multi-factor authentication (MFA) was either not enabled or was not enforced for all users (i.e., via … More

The post Cisco VPNs with no MFA enabled hit by ransomware groups appeared first on Help Net Security.

"

Autosummary: "


SapphireStealer Malware: A Gateway to Espionage and Ransomware Operations

exploits ransomware
2023-08-31 https://thehackernews.com/2023/08/sapphirestealer-malware-gateway-to.html
An open-source .NET-based information stealer malware dubbed SapphireStealer is being used by multiple entities to enhance its capabilities and spawn their own bespoke variants. “Information-stealing malware like SapphireStealer can be used to obtain sensitive information, including corporate credentials, which are often resold to other threat actors who leverage the access for additional "

Autosummary: "


LogicMonitor customers hacked in reported ransomware attacks

exploits ransomware
2023-08-31 https://www.bleepingcomputer.com/news/security/logicmonitor-customers-hacked-in-reported-ransomware-attacks/
Network monitoring company LogicMonitor confirmed today that certain customers of its SaaS platform have fallen victim to cyberattacks linked to ransomware. [...] "

Autosummary: LogicMonitor account access issues (BleepingComputer) Customers hacked because of weak, de passwords Another anonymous source told TechCrunch that the affected customers" accounts were hacked using default weak passwords assigned by LogicMonitor to new users. "


Free Key Group ransomware decryptor helps victims recover data

exploits ransomware
2023-08-31 https://www.bleepingcomputer.com/news/security/free-key-group-ransomware-decryptor-helps-victims-recover-data/
Researchers took advantage of a weakness in the encryption scheme of Key Group ransomware and developed a decryption tool that lets some victims to recover their files for free. [...] "

Autosummary: Vulnerable function (left), static key (right) (EclecticIQ) Key Group profile Key Group is a Russian-speaking threat actor that sprung into action in early 2023, attacking various organizations, stealing data from compromised systems, and then using private Telegram channels to negotiate ransom payments. "


Social Security Numbers leaked in ransomware attack on Ohio History Connection

exploits ransomware
2023-08-30 https://www.malwarebytes.com/blog/news/2023/08/social-security-numbers-leaked-in-ransomware-attack-on-ohio-history-connection

Categories: News

Categories: Ransomware

Tags: Ohio History Connection

Tags: ransomware

Tags: LockBit

Tags: SSN

Tags: phishing

Ohio History Connection acknowledged that in a ransomware attack the attackers may have had access to 7,600 SSNs.

(Read more...)

The post Social Security Numbers leaked in ransomware attack on Ohio History Connection appeared first on Malwarebytes Labs.

"

Autosummary: Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.Phishing attacks often impersonate people or brands you know, and use themes that require urgent attention, such as missed deliveries, account suspensions, and security alerts.During the attack, the cybercriminals may have had access to names, addresses, and Social Security Numbers (SSNs) of current and former OHC employees (from 2009 to 2023). screenshot taken early August 2023 OHC said that it made an offer to the cybercriminals to prevent the release of the data, but the offer was rejected on August 7, 2023. "


Citrix NetScaler Alert: Ransomware Hackers Exploiting Critical Vulnerability

exploits ransomware
2023-08-29 https://thehackernews.com/2023/08/citrix-netscaler-alert-ransomware.html
Unpatched Citrix NetScaler systems exposed to the internet are being targeted by unknown threat actors in what"s suspected to be a ransomware attack. Cybersecurity company Sophos is tracking the activity cluster under the moniker STAC4663. Attack chains involve the exploitation of CVE-2023-3519, a critical code injection vulnerability impacting NetScaler ADC and Gateway servers that could "

Autosummary: "


Cisco VPNs without MFA are under attack by ransomware operator

exploits ransomware
2023-08-29 https://www.malwarebytes.com/blog/news/2023/08/vpns-without-mfa-are-under-attack-by-ransomware-operator

Categories: Business

Categories: News

Tags: Cisco

Tags: VPN

Tags: Akira

Tags: ransomware

Tags: brute-force

Tags: credential stuffing

Tags: password spraying

Several researchers are seeing ransomware attacks targetting Cisco VPNs without MFA

(Read more...)

The post Cisco VPNs without MFA are under attack by ransomware operator appeared first on Malwarebytes Labs.

"

Autosummary: Posted: August 29, 2023 by Several researchers are seeing ransomware attacks targetting Cisco VPNs without MFA The Cisco Product Security Incident Response Team (PSIRT) has posted a blog about Akira ransomware targeting VPNs without Multi-Factor Authentication (MFA).Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again. Deploy Endpoint Detection and Response software like Malwarebytes EDR that uses multiple different detection techniques to identify ransomware, and ransomware rollback to restore damaged system files. "


Ready to enhance your continuous assessment efforts? Meet PlexTrac

ransomware
2023-08-28 https://grahamcluley.com/feed-sponsor-plextrac-3/
Graham Cluley Security News is sponsored this week by the folks at PlexTrac. Thanks to the great team there for their support! If you are investing in solutions for continuous assessment and validation or breach and attack simulation, you know that managing the data and remediation efforts necessary to make real progress can be overwhelming. … Continue reading "Ready to enhance your continuous assessment efforts? Meet PlexTrac" "

Autosummary: "


Spain warns of LockBit Locker ransomware phishing attacks

financial exploits ransomware
2023-08-28 https://www.bleepingcomputer.com/news/security/spain-warns-of-lockbit-locker-ransomware-phishing-attacks/
The National Police of Spain is warning of an ongoing "LockBit Locker" ransomware campaign targeting architecture companies in the country through phishing emails. [...] "

Autosummary: IMG file contents Source: BleepingComputer BleepingComputer"s analysis shows that the executed Python script will check if the user is an admin of the device, and if so, make modifications to the system for persistence and then executes the "LockBit Locker" ransomware to encrypt files. "


Attacks on Citrix NetScaler systems linked to ransomware actor

exploits ransomware
2023-08-28 https://www.bleepingcomputer.com/news/security/attacks-on-citrix-netscaler-systems-linked-to-ransomware-actor/
A threat actor believed to be tied to the FIN8 hacking group exploits the CVE-2023-3519 remote code execution flaw to compromise unpatched Citrix NetScaler systems in domain-wide attacks. [...] "

Autosummary: Sophos has been monitoring this campaign since mid-August, reporting that the threat actor performs payload injections, uses BlueVPS for malware stating, deploys obfuscated PowerShell scripts, and drops PHP webshells on victim machines. "


Rhysida claims ransomware attack on Prospect Medical, threatens to sell data

exploits ransomware
2023-08-27 https://www.bleepingcomputer.com/news/security/rhysida-claims-ransomware-attack-on-prospect-medical-threatens-to-sell-data/
The Rhysida ransomware gang has claimed responsibility for the massive cyberattack on Prospect Medical Holdings, claiming to have stolen 500,000 social security numbers, corporate documents, and patient records. [...] "

Autosummary: "They kindly provided: more than 500000 SSN, passports of their clients and employees, driver"s licenses, patient files (profile, medical history), financial and legal documents!!!," reads the Rhysida data leak site. "


LockBit 3.0 Ransomware Builder Leak Gives Rise to Hundreds of New Variants

exploits ransomware
2023-08-26 https://thehackernews.com/2023/08/lockbit-30-ransomware-builder-leak.html
The leak of the LockBit 3.0 ransomware builder last year has led to threat actors abusing the tool to spawn new variants. Russian cybersecurity company Kaspersky said it detected a ransomware intrusion that deployed a version of LockBit but with a markedly different ransom demand procedure. "The attacker behind this incident decided to use a different ransom note with a headline related to a "

Autosummary: " The disclosure comes as Netenrich delved into a ransomware strain called ADHUBLLKA that has rebranded several times since 2019 (BIT, LOLKEK, OBZ, U2K, and TZW), while targeting individuals and small businesses in exchange for meager payouts in the range of $800 to $1,600 from each victim. "In 81% of ransomware attacks, the final payload was launched outside of traditional working hours, and for those that were deployed during business hours, only five happened on a weekday," the cybersecurity company said. "


Teenage members of Lapsus$ ransomware gang convicted

exploits ransomware
2023-08-25 https://www.malwarebytes.com/blog/news/2023/08/teenage-lapsus-members-convinced-by-british-court

Categories: Business

Tags: business

Tags: hack

Tags: hacked

Tags: compromise

Tags: lapsus$

Tags: convicted

Tags: crime

Tags: ransomware

Tags: leak

Tags: breach

A wave of video game developer compromises has come to a court-based conclusion.

(Read more...)

The post Teenage members of Lapsus$ ransomware gang convicted appeared first on Malwarebytes Labs.

"

Autosummary: Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again. No ransom was paid, despite the attackers claiming to have source code belonging to Orange, BT, and EE in text messages sent out to 26,000 EE customers.There is no way that somebody in this situation, with their details leaked, and their hands caught in the cookie jar, would keep going. The infamous Lapsus$ ransomware gang gained notoriety for a number of attacks against companies involved in game development, or companies closely associated with gaming, such as Nvidia. "


Cloud hosting firms hit by devastating ransomware attack

exploits ransomware
2023-08-24 https://www.helpnetsecurity.com/2023/08/24/cloudnordic-azero-ransomware/

Danish cloud hosting firms CloudNordic and Azero – both owned by Certiqa Holding – have suffered a ransomware attack that resulted in most customer data being stolen and systems and servers rendered inaccessible. The CloudNordic and Azero ransomware attack In the early morning hours of Friday, August 18, the attackers shut down all systems. The companies believe the attack happened while they were transfering servers from one data center to another. “Despite the fact that … More

The post Cloud hosting firms hit by devastating ransomware attack appeared first on Help Net Security.

"

Autosummary: "


BlackCat ransomware gang claims credit for Seiko data breach

financial exploits ransomware
2023-08-23 https://grahamcluley.com/blackcat-ransomware-gang-claims-credit-for-seiko-data-breach/
The BlackCat ransomware gang has claimed credit for a cybersecurity attack against Japanese watchmaker Seiko. BlackCat (also known as ALPHAV) posted on its dark web leak site what it claims are files stolen from Seiko"s servers. "

Autosummary: "


Spacecolon Toolset Fuels Global Surge in Scarab Ransomware Attacks

exploits ransomware
2023-08-23 https://thehackernews.com/2023/08/spacecolon-toolset-fuels-global-surge.html
A malicious toolset dubbed Spacecolon is being deployed as part of an ongoing campaign to spread variants of the Scarab ransomware across victim organizations globally. "It probably finds its way into victim organizations by its operators compromising vulnerable web servers or via brute forcing RDP credentials," ESET security researcher Jakub Souček said in a detailed technical write-up "

Autosummary: The primary component of Spacecolon is ScHackTool, a Delhi-based orchestrator that"s used to deploy an installer, which, as the name implies, installs ScService, a backdoor with features to execute custom commands, download and execute payloads, and retrieve system information from compromised machines. "


Hosting firm says it lost all customer data after ransomware attack

exploits ransomware
2023-08-23 https://www.bleepingcomputer.com/news/security/hosting-firm-says-it-lost-all-customer-data-after-ransomware-attack/
Danish hosting firms CloudNordic and AzeroCloud have suffered ransomware attacks, causing the loss of the majority of customer data and forcing the hosting providers to shut down all systems, including websites, email, and customer sites. [...] "

Autosummary: "Since we neither can nor wish to meet the financial demands of the criminal hackers for a ransom, CloudNordic"s IT team and external experts have been working intensively to assess the damage and determine what could be recovered," reads CloudNordic"s statement (machine translated) "Sadly, it has been impossible to recover more data, and the majority of our customers have consequently lost all their data with us. "


Seiko joins growing list of ALPHV/BlackCat ransomware victims

exploits ransomware
2023-08-22 https://www.helpnetsecurity.com/2023/08/22/seiko-data-breach/

Japanese watchmaker Seiko has been added to ALPHV (BlackCat) ransomware group’s victim list, following a data breach occurring in early August. The Seiko data breach The company published a data breach and response notice on August 10, 2023, stating that an unidentified party gained unauthorized access to at least one of their servers. On August 2, Seiko hired a team of external cybersecurity experts to investigate the data breach. “As a result, we are now … More

The post Seiko joins growing list of ALPHV/BlackCat ransomware victims appeared first on Help Net Security.

"

Autosummary: "


Akira ransomware targets Cisco VPNs to breach organizations

exploits ransomware
2023-08-22 https://www.bleepingcomputer.com/news/security/akira-ransomware-targets-cisco-vpns-to-breach-organizations/
There"s mounting evidence that Akira ransomware targets Cisco VPN (virtual private network) products as an attack vector to breach corporate networks, steal, and eventually encrypt data. [...] "

Autosummary: Cisco VPN trait seen in eight Akira attacks Source: SentinelOne Remote RustDesk access Additionally, SentinelOne"s analysts observed Akira using the RustDesk open-source remote access tool to navigate compromised networks, making them the first ransomware group known to abuse the software. "


Japanese watchmaker Seiko breached by BlackCat ransomware gang

exploits ransomware
2023-08-21 https://www.bleepingcomputer.com/news/security/japanese-watchmaker-seiko-breached-by-blackcat-ransomware-gang/
The BlackCat/ALPHV ransomware gang has added Seiko to its extortion site, claiming responsibility for a cyberattack disclosed by the Japanese firm earlier this month. [...] "

Autosummary: For example, the group was the first to use a clearweb website dedicated to leaking data for a particular victim and, more recently, created a data leak API, allowing for easier distribution of stolen data. "


Cuba ransomware uses Veeam exploit against critical U.S. organizations

exploits ransomware
2023-08-20 https://www.bleepingcomputer.com/news/security/cuba-ransomware-uses-veeam-exploit-against-critical-us-organizations/
The Cuba ransomware gang was observed in attacks targeting critical infrastructure organizations in the United States and IT firms in Latin America, using a combination of old and new tools. [...] "

Autosummary: " Complete attack chain (BlackBerry) Cuba still very active BlackBerry underlines the clear financial motivation of the Cuba ransomware gang and mentions that the threat group is likely Russian, something that has been hypothesized by other cyber-intelligence reports in the past. "


New BlackCat Ransomware Variant Adopts Advanced Impacket and RemCom Tools

exploits ransomware
2023-08-18 https://thehackernews.com/2023/08/new-blackcat-ransomware-variant-adopts.html
Microsoft on Thursday disclosed that it found a new version of the BlackCat ransomware (aka ALPHV and Noberus) that embeds tools like Impacket and RemCom to facilitate lateral movement and remote code execution. "The Impacket tool has credential dumping and remote service execution modules that could be used for broad deployment of the BlackCat ransomware in target environments," the company"s "

Autosummary: Another notable tactic is the targeting of managed service providers (MSPs) as entry points to breach downstream corporate networks, as evidenced in a Play ransomware campaign aimed at finance, software, legal, and shipping and logistics industries, as well as state, local, tribal and territorial (SLTT) entities in the U.S., Australia, U.K., and Italy. "


The Week in Ransomware - August 18th 2023 - LockBit on Thin Ice

exploits ransomware
2023-08-18 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-august-18th-2023-lockbit-on-thin-ice/
While there was quite a bit of ransomware news this week, the highlighted story was the release of Jon DiMaggio"s third article in the Ransomware Diaries series, with the focus of this article on the LockBit ransomware operation. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @malwrhunterteam, @LawrenceAbrams, @fwosar, @BleepinComputer, @billtoulas, @serghei, @Seifreed, @demonslay335, @Jon__DiMaggio, @security_score, @vxunderground, @MsftSecIntel, @TrendMicro, @IBMSecurity, @felixw3000, @uptycs, @BushidoToken, @adlumin, and @pcrisk.The campaign is currently targeting mid- market enterprises in the finance, software, legal, and shipping and logistics industries, as well as state, local, tribal and territorial (SLTT) entities in the U.S., Australia, U.K., and Italy. "


Why You Need Continuous Network Monitoring?

ransomware
2023-08-17 https://thehackernews.com/2023/08/why-you-need-continuous-network.html
Changes in the way we work have had significant implications for cybersecurity, not least in network monitoring. Workers no longer sit safely side-by-side on a corporate network, dev teams constantly spin up and tear down systems, exposing services to the internet. Keeping track of these users, changes and services is difficult – internet-facing attack surfaces rarely stay the same for long. But "

Autosummary: From the hardware and software of the network itself, to all the devices used to access it, from IoT endpoints to laptops and smartphones, network security now needs to look beyond the perimeter to your cloud resources, edge devices, third-party hosted content, integrations with other hardware or software, and assets hosted in dispersed offices. Continuous network monitoring with Intruder Advanced network monitoring tools like Intruder run daily network scans so your network view is always accurate and up to date – showing active and unresponsive targets, any changes since your last scan, expiring certificates, and the ports and services you expect – and more importantly, don"t expect – to be exposed to the internet. "


Triple Extortion Ransomware and the Cybercrime Supply Chain

exploits ransomware
2023-08-17 https://www.bleepingcomputer.com/news/security/triple-extortion-ransomware-and-the-cybercrime-supply-chain/
Ransomware attacks continue to grow both in sophistication and quantity. Learn more from Flare about ransomware operation"s increasing shift to triple extortion. [...] "

Autosummary: Triple Extortion Ransomware in Context: The Broader Cybercrime Ecosystem The broader cybercrime ecosystem also acts as a crucial enabler for ransomware groups by offering services like bulletproof hosting, money laundering, initial access to environments, and employee credentials via stealer logs. An IAB advertises access to a European company for $250 Source: Flare In many cases, we have seen access brokers advertise that they have access to a victim"s backup and recovery systems or that the victim lacks backup and recovery, providing further evidence that IABs expect their listings to be used for ransomware. "


Microsoft: BlackCat"s Sphynx ransomware embeds Impacket, RemCom

exploits ransomware
2023-08-17 https://www.bleepingcomputer.com/news/microsoft/microsoft-blackcats-sphynx-ransomware-embeds-impacket-remcom/
Microsoft has discovered a new version of the BlackCat ransomware that embeds the Impacket networking framework and the Remcom hacking tool, both enabling spreading laterally across a breached network. [...] "

Autosummary: However, it is more commonly used as a post-exploitation toolkit by penetration testers, red teamers, and threat actors to spread laterally on a network, dump credentials from processes, perform NTLM relay attacks, and much more. "


LockBit’s dirty little secret: ransomware gang is failing to publish victims’ data

exploits ransomware
2023-08-16 https://grahamcluley.com/lockbits-dirty-little-secret-ransomware-gang-is-failing-to-publish-victims-data/
The LockBit ransomware gang may be having more than a few headaches right now. According to a researcher who spent a year undercover gathering intelligence on the LockBit group, the ransomware gang is trying to cover up "the fact it often cannot consistently publish stolen data." "

Autosummary: "


Back to school security against ransomware attacks on K-12 and colleges

exploits ransomware
2023-08-15 https://www.bleepingcomputer.com/news/security/back-to-school-security-against-ransomware-attacks-on-k-12-and-colleges/
As we get back to school, K-12 and colleges are increasingly at risk from ransomware and data theft attacks. Learn more from Specops Software on the steps IT teams at education institutes can take to protect their care orgs from disruption and stolen data. [...] "

Autosummary: Protect against catastrophe with up-to-date offline backups If the worst has happened, and a ransomware attack has taken down a school’s network, up-to-date and offline-stored backups are crucial to getting the students back in the classroom. The FBI (Federal Bureau of Investigation), CISA, and the MS-ISAC warned about Vice Society and the threat it poses to education sectors in a joint Cybersecurity Advisory (CSA): “School districts with limited cybersecurity capabilities and constrained resources are often the most vulnerable; however, the opportunistic targeting often seen with cyber criminals can still put school districts with robust cybersecurity programs at risk. Remote connections – Remote Desktop Protocol (RDP), Teamviewer, VNC, etc. Persistent installations – Unexpected startup programs or scheduled task creations. Specops Password Policy with Breached Password Protection is popular with schools, universities, and local governments due to cost-effectiveness, quick implementation, and ease of end-user use. "


Monti Ransomware Returns with New Linux Variant and Enhanced Evasion Tactics

exploits ransomware industry
2023-08-15 https://thehackernews.com/2023/08/monti-ransomware-returns-with-new-linux.html
The threat actors behind the Monti ransomware have resurfaced after a two-month break with a new Linux version of the encryptor in its attacks targeting government and legal sectors. Monti emerged in June 2022, weeks after the Conti ransomware group shut down its operations, deliberately imitating the tactics and tools associated with the latter, including its leaked source code. Not anymore. "

Autosummary: "


Monti Ransomware gang launched a new Linux encryptor

exploits ransomware
2023-08-15 https://securityaffairs.com/149539/cyber-crime/monti-ransomware-news-linux-variant.html

Monti Ransomware operators returned, after a two-month pause, with a new Linux variant of their encryptor. The Monti ransomware operators returned, after a two-month break, with a new Linux version of the encryptor. The variant was employed in attacks aimed at organizations in government and legal sectors. The Monti group has been active since June 2022, […]

The post Monti Ransomware gang launched a new Linux encryptor appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, Monti Ransomware) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On Argument Description –help Displays arguments usage –path <string> Path to be encrypted –whitelist <string> List of VMs to be skipped –vmkill Option to Kill virtual machine (VM) –detach Detach from terminal –size removed –log removed –vmlist removed The researchers observed that the developers also tampered with the /etc/motd and index.html files, replacing their contents with a ransom note. "


Monti ransomware targets VMware ESXi servers with new Linux locker

exploits ransomware
2023-08-14 https://www.bleepingcomputer.com/news/security/monti-ransomware-targets-vmware-esxi-servers-with-new-linux-locker/
The Monti ransomware has returned to action after a two-month hiatus, now targeting primarily legal and government organizations, and VMware ESXi servers using a new Linux variant that is vastly different from its predecessors. [...] "

Autosummary: Code similarity rate on Bindiff (Trend Micro) Among the significant modifications that Trend Micro observed are the following: Removal of the ‘--size,’ ‘--log,’ and ‘–vmlist’ parameters and addition of a new ‘-type=soft’ parameter to terminate ESXi virtual machines (VMs) in a subtler manner that is more likely to evade detection. "


Knight ransomware distributed in fake Tripadvisor complaint emails

exploits ransomware
2023-08-12 https://www.bleepingcomputer.com/news/security/knight-ransomware-distributed-in-fake-tripadvisor-complaint-emails/
The Knight ransomware is being distributed in an ongoing spam campaign that pretends to be TripAdvisor complaints. [...] "

Autosummary: Different Cyclops ransomware encryptors Source: BleepingComputer In addition to their normal encryptors, the operation offers a "lite" version for use in spam and pray-and-spray mass distribution campaigns targeting large numbers of targeted users. When encrypting files, it will append the .knight_l extension to encrypted files" names, where the "l" portion likely stands for "lite." "


LOLEKHosted admin arrested for aiding Netwalker ransomware gang

exploits ransomware
2023-08-11 https://www.bleepingcomputer.com/news/security/lolekhosted-admin-arrested-for-aiding-netwalker-ransomware-gang/
Police have taken down the Lolek bulletproof hosting provider, arresting five individuals and seizing servers for allegedly facilitating Netwalker ransomware attacks and other malicious activities. [...] "

Autosummary: " Europol says that Lolek was seized as cybercriminals used its servers to launch DDoS attacks, distribute information-stealing malware, host command and control servers, host fake online shops, and conduct spam campaigns. "


The Week in Ransomware - August 11th 2023 - Targeting Healthcare

exploits ransomware
2023-08-11 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-august-11th-2023-targeting-healthcare/
While some ransomware operations claim not to target hospitals, one relatively new ransomware gang named Rhysida doesn"t seem to care. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @Seifreed, @struppigel, @Ionut_Ilascu, @serghei, @LawrenceAbrams, @malwrhunterteam, @billtoulas, @demonslay335, @BleepinComputer, @HHSGov, @TrendMicro, @TalosSecurity, @_CPResearch_, @IRS_CI, and @pcrisk. August 7th 2023 Talos assesses with high confidence that this threat actor is targeting victims in English-speaking countries, Bulgaria, China and Vietnam, as the actor’s GitHub account, “nguyenvietphat,” has ransomware notes written in these countries’ languages. "


Several hospitals still counting the cost of widespread ransomware attack

exploits ransomware
2023-08-11 https://www.malwarebytes.com/blog/news/2023/08/several-hospitals-still-counting-the-cost-of-widespread-ransomware-attack

Categories: News

Tags: hospital

Tags: healthcare

Tags: ransomware

Tags: hijack

Tags: network

Tags: compromise

Tags: data

Tags: ambulance

Tags: service

Tags: redirect

A widespread ransomware attack affecting 16 hospitals last week has led to ongoing cleanup efforts.

(Read more...)

The post Several hospitals still counting the cost of widespread ransomware attack appeared first on Malwarebytes Labs.

"

Autosummary: When it first made an appearance on our Ransomware Review in July of this year, we said the following: Rhysida, a new ransomware gang claiming to be a "cybersecurity team," has been in operation since May 17, 2023, making headlines for their high-profile attack against the Chilean Army.Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.They primarily attack education, government, manufacturing, and technology and managed service provider sectors; however, there has been recent attacks against the Healthcare and Public Health (HPH) sector.The healthcare facilities located in Connecticut, Pennsylvania, Rhode island, and California had the ransomware attack confirmed by the FBI. "


Rhysida ransomware – what you need to know

exploits ransomware
2023-08-10 https://www.tripwire.com/state-of-security/rhysida-ransomware-what-you-need-know
Rhysida is a Windows-based ransomware operation that has come to prominence since May 2023, after being linked to a series of high profile cyber attacks in Western Europe, North and South America, and Australia. Learn more in my article on the Tripwire State of Security blog. "

Autosummary: If you do have a backup that works, then you not only have the hassle of restoring your systens, but you may also worry about the damage which could be done to your brand, your customer relationships, and partnerships if the Rhysida group follows through on its threats and publishes stolen data on the dark web. "The potential ramifications of this could be dire, including the sale, publication, or distribution of your data to competitors or media outlets. Rhysida is a Windows-based ransomware operation that has come to prominence since May 2023, after being linked to a series of high profile cyber attacks in Western Europe, North and South America, and Australia. "


The ransomware rollercoaster continues as criminals advance their business models

exploits ransomware
2023-08-09 https://www.helpnetsecurity.com/2023/08/09/ransomware-detections-1h-2023/

Ransomware shows no signs of slowing, with ransomware activity ending 13 times higher than at the start of 2023 as a proportion of all malware detections, according to Fortinet. Ransomware detections 1H 2023 FortiGuard Labs has documented substantial spikes in ransomware variant growth in recent years, largely fueled by the adoption of Ransomware-as-a-Service (RaaS). However, FortiGuard Labs found that fewer organizations detected ransomware in the first half of 2023 (13%) compared to this time five … More

The post The ransomware rollercoaster continues as criminals advance their business models appeared first on Help Net Security.

"

Autosummary: Botnets lingering in networks longer than ever While the report finds more active botnets (+27%) and a higher incidence rate among organizations over the last half-decade (+126%), one of the more shocking findings is the exponential increase in the total number of “active days”, which FortiGuard Labs defines as the amount of time that transpires between the first hit of a given botnet attempt on a sensor and the last.FortiGuard Labs continues to observe wipers being used by nation-state actors, although the adoption of this type of malware by cybercriminals continues to grow as they target organizations in technology, manufacturing, government, telecommunications, and healthcare sectors. "


Recent ransomware attacks share curiously similar tactics

exploits ransomware industry
2023-08-09 https://www.helpnetsecurity.com/2023/08/09/ransomware-attacks-similarities/

A series of ransomware attacks made by different groups share curiously similar characteristics, according to Sophos. Sophos released new findings into the connections between the most prominent ransomware groups this past year, including Royal, in its Clustering Attacker Behavior Reveals Hidden Patterns report. Distinct similarities found in recent ransomware attacks Over the course of three months beginning in January 2023, Sophos X-Ops investigated four different ransomware attacks, one involving Hive, two by Royal, and one … More

The post Recent ransomware attacks share curiously similar tactics appeared first on Help Net Security.

"

Autosummary: Distinct similarities found in recent ransomware attacks Over the course of three months beginning in January 2023, Sophos X-Ops investigated four different ransomware attacks, one involving Hive, two by Royal, and one by Black Basta, and noticed distinct similarities between the attacks. "


New Report Exposes Vice Society"s Collaboration with Rhysida Ransomware

exploits ransomware
2023-08-09 https://thehackernews.com/2023/08/new-report-exposes-vice-societys.html
Tactical similarities have been unearthed between the double extortion ransomware group known as Rhysida and Vice Society, including in their targeting of education and healthcare sectors. "As Vice Society was observed deploying a variety of commodity ransomware payloads, this link does not suggest that Rhysida is exclusively used by Vice Society, but shows with at least medium confidence that "

Autosummary: "They primarily attack education, government, manufacturing, and technology and managed service provider sectors; however, there have been recent attacks against the Healthcare and Public Health (HPH) sector," the U.S. Department of Health and Human Services" Health Sector Cybersecurity Coordination Center said in an alert last week. "


Rhysida ransomware behind recent attacks on healthcare

exploits ransomware
2023-08-09 https://www.bleepingcomputer.com/news/security/rhysida-ransomware-behind-recent-attacks-on-healthcare/
The Rhysida ransomware as a service (RaaS) operation that emerged in May 2023 is gradually leaving the period of obscurity behind, as a recent wave of attacks on healthcare organizations has forced government agencies and cybersecurity companies to pay closer attention to its operations. [...] "

Autosummary: Directories excluded from encryption Source: Cisco CheckPoint"s report goes a step further, linking Rhysida to the now-defunct Vice Society ransomware operation, based on the victim publishing times on the two extortion sites and their similar victim targeting patterns.. Comparison of activity change in Vice Society and Rhysida (CheckPoint) In conclusion, Rhysida has established itself in the ransomware space quickly, targeting organizations in various sectors and showing no hesitation in attacking hospitals. At the time, a preliminary analysis of the Rhysida encryptor by SentinelOne showed that the ransomware was in early development, missing standard features seen in most strains like persistence mechanisms, Volume Shadow Copy wiping, process termination, etc. "This is an automated alert from cybersecurity team Rhysida," reads the Rhysida ransom note. "


Getting the best possible outcome in ransomware negotiation

exploits ransomware
2023-08-08 https://www.helpnetsecurity.com/2023/08/08/azeem-aleem-ransomware-negotiation-service/

Though typically seen as a final measure, 90% of participants from a BigID survey revealed that their company would contemplate paying a ransom if it meant they could recover data and business processes, or recover them faster. In this Help Net Security interview, Azeem Aleem, MD of UK and Northern Europe at Sygnia, unravels the complexities of ransomware negotiation and highlights the measures that organizations can take to protect themselves against cyber threats. Can you … More

The post Getting the best possible outcome in ransomware negotiation appeared first on Help Net Security.

"

Autosummary: It’s an incredibly unique team with honed skills in technological supremacy, digital combat, data analytics, and business, to deliver military-grade security to organizations – in fact, one that nations quietly turn to for help.For example at Sygnia, we hand-pick the cream of the crop in talent from ranks of elite military technology units and the cyber industry such as ex-military intelligence officers, criminal psychologists, hostage-turned-ransomware hacking negotiators, and more. If your business is under attack, the threat actor can use it as an opportunity to ‘drip-feed,’ extortions, promising to release data in a staggered approach to ensure they get the most out of their attack.The negotiation team will work to uncover the motives of the attacker, investigate the source, contain the threat, minimise the breach exposure time (BET) and then help to remediate and recover as a way to break the cycle of threats. "


New Yashma Ransomware Variant Targets Multiple English-Speaking Countries

exploits ransomware
2023-08-08 https://thehackernews.com/2023/08/new-yashma-ransomware-variant-targets.html
An unknown threat actor is using a variant of the Yashma ransomware to target various entities in English-speaking countries, Bulgaria, China, and Vietnam at least since June 4, 2023. Cisco Talos, in a new write-up, attributed the operation with moderate confidence to an adversary of likely Vietnamese origin. "The threat actor uses an uncommon technique to deliver the ransom note," security "

Autosummary: " The development also follows a major spike in ransomware attacks, with Malwarebytes recording as many as 1,900 incidents over the past year within the U.S., Germany, France, and the U.K., mainly fueled by the "ascension of the Cl0p group – which has effectively harnessed zero-day vulnerabilities to amplify its attacks. "


Digital assets continue to be prime target for malvertisers

ransomware
2023-08-08 https://www.malwarebytes.com/blog/threat-intelligence/2023/08/digital-assets-continue-to-be-prime-target-for-malvertisers

Categories: Threat Intelligence

Tags: malvertising

Tags: nft

Tags: crypto

Tags: wallet

Tags: bing

Tags: google

NFT enthusiasts are getting their wallets drained after clicking on a malicious ad.

(Read more...)

The post Digital assets continue to be prime target for malvertisers appeared first on Malwarebytes Labs.

"

Autosummary: They are redirected to a second website (www-market-lookshare[.]com) that was also registered very recently and that acts as the phishing site: This site is a close replica of the official looksrare[.]org domain: Draining wallets The phishing site invites victims to connect their wallet by scanning a QR code: If you are running the Coinbase extension, you will get a request such as the one below: After connecting to the victim"s wallet, the threat actor will run a few queries and eventually prompt the user to sign a message, granting them access to their NFTs. "


Navigating the gray zone of ransomware payment practices

exploits ransomware
2023-08-07 https://www.helpnetsecurity.com/2023/08/07/ransomware-payment-practices-video/

Ransomware remains a lucrative tool for cybercriminals as attackers continue to target a wide array of businesses. In response to this growing threat, an increasing number of organizations are compelled to meet ransom demands, perceiving it as their only viable course of action. In this Help Net Security video, Jordan Schroeder, Managing CISO at Barrier Networks, discusses ransomware payment practices.

The post Navigating the gray zone of ransomware payment practices appeared first on Help Net Security.

"

Autosummary: "


Google Gmail continuously nagging to enable Enhanced Safe Browsing

ransomware
2023-08-06 https://www.bleepingcomputer.com/news/google/google-gmail-continuously-nagging-to-enable-enhanced-safe-browsing/
Google is urging users to activate its Enhanced Safe Browsing feature via numerous alerts in Gmail that keep coming back, even after you acknowledge them. [...] "

Autosummary: If you are sick of the warnings or just want better security, even though you may have reduced privacy, you can enable the feature by following these steps: Open your Google Account. "


Clop ransomware now uses torrents to leak data and evade takedowns

exploits ransomware
2023-08-05 https://www.bleepingcomputer.com/news/security/clop-ransomware-now-uses-torrents-to-leak-data-and-evade-takedowns/
The Clop ransomware gang has once again altered extortion tactics and is now using torrents to leak data stolen in MOVEit attacks. [...] "

Autosummary: According to security researcher Dominic Alvieri, who first spotted this new tactic, torrents have been created for twenty victims, including Aon, K & L Gates, Putnam, Delaware Life, Zurich Brazil, and Heidelberg. "


The Week in Ransomware - August 4th 2023 - Targeting VMware ESXi

exploits ransomware
2023-08-04 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-august-4th-2023-targeting-vmware-esxi/
Ransomware gangs continue to prioritize targeting VMware ESXi servers, with almost every active ransomware gang creating custom Linux encryptors for this purpose. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @billtoulas, @Seifreed, @malwrhunterteam, @demonslay335, @serghei, @malwareforme, @LawrenceAbrams, @BleepinComputer, @Ionut_Ilascu, @Fortinet, @malvuln, @Intel_by_KELA, @DragosInc, @MrJamesSullivan, @pcrisk, and @juanbrodersen. Other ransomware operations with ESXi encryptors include Akira, Royal, Black Basta, LockBit, BlackMatter, AvosLocker, REvil, HelloKitty, RansomEXX, and Hive. "


FAQ: How does Malwarebytes ransomware rollback work?

exploits ransomware
2023-08-03 https://www.malwarebytes.com/blog/business/2023/08/faq-how-does-malwarebytes-ransomware-rollback-work

Categories: Business

Malwarebytes Ransomware Rollback rescues your data from encryption by effectively “turning back the clock” of a ransomware attack. But how does it work, exactly?

(Read more...)

The post FAQ: How does Malwarebytes ransomware rollback work? appeared first on Malwarebytes Labs.

"

Autosummary: Ransomware rollback preemptively backs up all file types including pictures, documents, JSON/XML configurations, EXEs, unless they are explicitly excluded, globally excluded, or exceed the maximum file size. For every file modified, e.g., documents, pictures, etc., space for a copy is required. Prevention alone, it seems, can only take us so far—so when ransomware hits, organizations need a way to emerge safely from the fallout, data intact. Try Ransomware Rollback Today To recap, Malwarebytes Ransomware Rollback is a last-resort recovery tool within Malwarebytes EDR, designed for swift recovery after other defense layers have been compromised. "


Global ransomware attacks at an all-time high, shows latest 2023 State of Ransomware report

exploits government ransomware
2023-08-03 https://www.malwarebytes.com/blog/threat-intelligence/2023/08/global-ransomware-attacks-at-an-all-time-high-shows-latest-2023-state-of-ransomware-report

Categories: Threat Intelligence

Ransomware gangs are also starting to focus on exploiting zero-days for initial access.

(Read more...)

The post Global ransomware attacks at an all-time high, shows latest 2023 State of Ransomware report appeared first on Malwarebytes Labs.

"

Autosummary: A New Threat on the Horizon: CL0P For a year and a half, LockBit, which claims to have 100 affiliates, has been the most dominant form of “Ransomware-as-a-Service” (RaaS) in the US, averaging about 24 attacks per month. "


How to manage a mass password reset due to a ransomware attack

exploits ransomware
2023-08-01 https://www.bleepingcomputer.com/news/security/how-to-manage-a-mass-password-reset-due-to-a-ransomware-attack/
Resetting the passwords for thousands of people after a ransomware attack is challenging, to say the least, for any IT team. Learn more from Specops Software on why organizations are forced into mass password resets and how to make the process manageable. [...] "

Autosummary: How to easily enable users to reset their own passwords Ideally, a ransomware event doesn’t occur in the first place, but implementing solutions through proactive planning will save the IT staff and users valuable time and resources if it does. The burden mass password resets place on IT teams As troublesome as a password reset account is for users, it’s helpdesk and IT staff who deal with the burden of hugely increased call volumes and service tickets. As is typical in ransomware attacks, the University of Waterloo forced staff, faculty, and employee grad students to reset their passwords by June 8th. "


Cisco adds automated ransomware recovery to its XDR solution

exploits ransomware
2023-08-01 https://www.helpnetsecurity.com/2023/08/01/cisco-xdr-capabilities/

Cisco is enhancing its Extended Detection and Response (XDR) solution. By adding recovery to the response process, Cisco XDR is redefining what customers should expect from security products. This announcement brings near real-time recovery for business operations after a ransomware attack. Cisco continues to drive momentum towards its vision of the Cisco Security Cloud—a unified, AI-driven, cross-domain security platform. With the launch of Cisco XDR at the RSA Conference this year, Cisco delivered deep telemetry … More

The post Cisco adds automated ransomware recovery to its XDR solution appeared first on Help Net Security.

"

Autosummary: With the new capabilities in Cisco XDR, Security Operations Center (SOC) teams will be able to automatically detect, snapshot, and restore the business-critical data at the very first signs of a ransomware attack, often before it moves laterally through the network to reach high-value assets. "


The race against time in ransomware attacks

exploits ransomware
2023-07-31 https://www.helpnetsecurity.com/2023/07/31/ransomware-business-data-risk/

Most organizations lack strong cyber resilience strategies or data security capabilities to address threats and maintain business continuity, according to BigID. Despite both the rise in threats and the high percentage of respondents whose organizations suffered recent attacks, there hasn’t been a corresponding uptick in strategic measures to shore up cyber resilience. In fact, close to four in five survey respondents don’t have complete confidence that their company has a cyber resilience strategy designed to … More

The post The race against time in ransomware attacks appeared first on Help Net Security.

"

Autosummary: When an organization gets hit by ransomware, and data is stolen, wiped, infected, or otherwise compromised, that organization can’t properly function until its data, processes, operations, and applications are restored. "


Web browsing is the primary entry vector for ransomware infections

exploits ransomware
2023-07-31 https://www.helpnetsecurity.com/2023/07/31/ransomware-delivery-2022/

The most widely used method for ransomware delivery in 2022 was via URL or web browsing (75.5%), Palo Alto Networks researchers have found. In 2021, it was email attachments (i.e., delivery via SMTP, POP3, and IMAP protocols), but in 2022 that particular delivery channel was used only in 12% of attempts. Ransomware delivery vectors in 2022 (Source: Palo Alto Networks) “Ransomware binaries are often delivered from compromised websites, which should serve as a reminder for … More

The post Web browsing is the primary entry vector for ransomware infections appeared first on Help Net Security.

"

Autosummary: "


Linux version of Abyss Locker ransomware targets VMware ESXi servers

exploits ransomware
2023-07-29 https://www.bleepingcomputer.com/news/security/linux-version-of-abyss-locker-ransomware-targets-vmware-esxi-servers/
The Abyss Locker operation is the latest to develop a Linux encryptor to target VMware"s ESXi virtual machines platform in attacks on the enterprise. [...] "

Autosummary: Other ransomware operations that utilize Linux ransomware encryptors, with most targeting VMware ESXi, include Akira, Royal, Black Basta, LockBit, BlackMatter, AvosLocker, REvil, HelloKitty, RansomEXX, and Hive. "


Hawai"i Community College pays ransomware gang to prevent data leak

exploits ransomware
2023-07-28 https://www.bleepingcomputer.com/news/security/hawaii-community-college-pays-ransomware-gang-to-prevent-data-leak/
The Hawaiʻi Community College has admitted that it paid a ransom to ransomware actors to prevent the leaking of stolen data of approximately 28,000 people. [...] "

Autosummary: Meanwhile, the restoration of the damaged IT infrastructure is still underway, likely now supported by a decryption key provided by NoEscape, and is expected to be completed by August 14th, 2023. "


The Week in Ransomware - July 28th 2023 - New extortion tactics

exploits ransomware industry
2023-07-28 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-july-28th-2023-new-extortion-tactics/
With ransom payments declining, ransomware gangs are evolving their extortion tactics to utilize new methods to pressure victims. [...] "

Autosummary: Finally, we learned more about some recent attacks: Contributors and those who provided new ransomware information and stories this week include: @billtoulas, @Seifreed, @malwareforme, @BleepinComputer, @LawrenceAbrams, @demonslay335, @struppigel, @DanielGallagher, @malwrhunterteam, @VK_Intel, @serghei, @fwosar, @Ionut_Ilascu, @FourOctets, @jorntvdw, @PolarToffee, @jgreigj, @BrettCallow, @SophosXOps, @eSentire, @vxunderground, @AlvieriD, and @pcrisk. "


ALPHV ransomware adds data leak API in new extortion strategy

exploits ransomware
2023-07-26 https://www.bleepingcomputer.com/news/security/alphv-ransomware-adds-data-leak-api-in-new-extortion-strategy/
The ALPHV ransomware gang, also referred to as BlackCat, is trying to put more pressure on their victims to pay a ransom by providing an API for their leak site to increase visibility for their attacks. [...] "

Autosummary: BlackCat ransomware lists API calls for victim updates source: BleepingComputer The group also provided a crawler written in Python to help retrieve the latest information on the data leak site. "


New Nitrogen malware pushed via Google Ads for ransomware attacks

exploits ransomware
2023-07-26 https://www.bleepingcomputer.com/news/security/new-nitrogen-malware-pushed-via-google-ads-for-ransomware-attacks/
A new "Nitrogen" initial access malware campaign uses Google and Bing search ads to promote fake software sites that infect unsuspecting users with Cobalt Strike and ransomware payloads. [...] "

Autosummary: Today, Sophos released a report on the Nitrogen campaign, detailing how it primarily targets technology and non-profit organizations in North America, impersonating popular software like AnyDesk, Cisco AnyConnect VPN, TreeSize Free, and WinSCP. "


Following claims by two ransomware groups, Yamaha confirms cyberattack

exploits ransomware ciber
2023-07-26 https://www.bitdefender.com/blog/hotforsecurity/following-claims-by-two-ransomware-groups-yamaha-confirms-cyberattack/
Yamaha Corporation, the world"s largest producer of musical equipment, has confirmed that has suffered a "cybersecurity incident" during which hackers gained unauthorised access to its systems, and stole data. Read more in my article on the Hot for Security blog. "

Autosummary: Error. "


RaaS proliferation: 14 new ransomware groups target organizations worldwide

exploits ransomware
2023-07-25 https://www.helpnetsecurity.com/2023/07/25/active-ransomware-groups-2023/

In the Q2 2023, GuidePoint Research and Intelligence Team (GRIT) tracked 1,177 total publicly posted ransomware victims claimed by 41 different threat groups. The most impacted industries GRIT’s report shows a 38% increase in public ransomware victims compared to Q1 2023, and a startling 100% increase from Q2 2022. Manufacturing and technology, representing 14% and 11% of impacted industries respectively, continue to be the most impacted industries, a trend that has persisted from GRIT’s observations … More

The post RaaS proliferation: 14 new ransomware groups target organizations worldwide appeared first on Help Net Security.

"

Autosummary: “Reduced barriers to entry afforded by the Crimeware-as-a-Service and Ransomware-as-a-Service economies will almost certainly encourage more entrants going forward, and though the re-use of historical malware and ransomware provides an advantage for well-prepared and resourced defenders, smaller or less-resourced organizations will face an increased risk from the greater volume of threats,” Schmitt continued. "


Inspiring secure coding: Strategies to encourage developers’ continuous improvement

ransomware
2023-07-25 https://www.helpnetsecurity.com/2023/07/25/pieter-danhieux-secure-code-warrior-secure-coding-training/

In software development, the importance of secure coding practices cannot be overstated. Fostering a security culture within development teams has become crucial to ensure the integrity and protection of digital systems. To delve deeper into this topic, we had the opportunity to interview Pieter Danhieux, CEO at Secure Code Warrior. He sheds light on the significance of positive security culture, the reasons behind recurrent vulnerabilities, strategies for incorporating secure coding training without hampering development processes, … More

The post Inspiring secure coding: Strategies to encourage developers’ continuous improvement appeared first on Help Net Security.

"

Autosummary: He sheds light on the significance of positive security culture, the reasons behind recurrent vulnerabilities, strategies for incorporating secure coding training without hampering development processes, the effectiveness of gamified learning experiences, the need for the regular refreshment of secure development training, and innovative methods to encourage developers to improve their secure coding techniques. Resentment can be strong between both teams, but fostering a positive security culture where developers understand the role they can play in driving down code-level vulnerabilities, as well as creating an environment where they can learn secure coding in a way that is comfortable for them, is paramount in repairing that relationship.We now write code for different purposes: full-stack, embedded, mobile, APIs… and security vulnerabilities exist in most of those technologies in different forms, requiring diverse coding patterns and approaches. "


Tampa General Hospital half thwarts ransomware attack, but still loses patient data

exploits ransomware
2023-07-25 https://www.malwarebytes.com/blog/news/2023/07/tampa-general-hospital-half-thwarts-ransomware-attack-but-still-loses-patient-data

Categories: News

Categories: Ransomware

Tags: Tampa

Tags: General Hospital

Tags: Snatch

Tags: ransomware

Tags: RDP

Tags: data breach

The Tampa General Hospital has promised to reach out to the individuals whose information has been stolen by the Snatch ransomware group.

(Read more...)

The post Tampa General Hospital half thwarts ransomware attack, but still loses patient data appeared first on Malwarebytes Labs.

"

Autosummary: The information varied from person to person, but may have included names, addresses, phone numbers, dates of birth, Social Security numbers (SSNs), health insurance information, medical record numbers, patient account numbers, dates of service and/or limited treatment information used by TGH for its business operations.Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.Phishing attacks often impersonate people or brands you know, and use themes that require urgent attention, such as missed deliveries, account suspensions, and security alerts. Their most common attack vectors include brute-force attacks against vulnerable, exposed services such as RDP, VNC (Virtual Network Computing), and TeamViewer. "


Local Governments Targeted for Ransomware – How to Prevent Falling Victim

exploits government ransomware
2023-07-21 https://thehackernews.com/2023/07/local-governments-targeted-for.html
Regardless of the country, local government is essential in most citizens" lives. It provides many day-to-day services and handles various issues. Therefore, their effects can be far-reaching and deeply felt when security failures occur. In early 2023, Oakland, California, fell victim to a ransomware attack. Although city officials have not disclosed how the attack occurred, experts suspect a "

Autosummary: In addition to several offices closing, many services remained offline for some time, including Oak311, Parking Citation Assistance Center, Business Tax Licenses, and Permitting.As most local governments maintain a small IT staff, there is potential for shared passwords, reused credentials, and a lack of multi-factor authentication security, exposing vulnerabilities for a breach. "


The Week in Ransomware - July 21st 2023 - Avaddon Back as NoEscape

exploits ransomware
2023-07-21 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-july-21st-2023-avaddon-back-as-noescape/
This edition of the Week in Ransomware covers the last two weeks of news, as we could not cover it last week, and includes quite a bit of new information, including the return of the Avaddon ransomware gang. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @demonslay335, @Seifreed, @BleepinComputer, @malwrhunterteam, @billtoulas, @Ionut_Ilascu, @struppigel, @fwosar, @LawrenceAbrams, @serghei, @chainalysis, @TrendMicro, @Intel_by_KELA, @pcrisk, @SophosXOps, @coveware, @BroadcomSW, @pcrisk, and @azalsecurity. In other ransomware reports from BleepingComputer and cybersecurity firms: Finally, Clop"s data theft attacks using the MOVEit Transfer zero-day continue to be a hot topic in the news, with companies continuing to disclose data breaches as they are added to the gang"s data leak site. "


Estée Lauder targeted by Cl0p and BlackCat ransomware groups

exploits ransomware
2023-07-21 https://www.malwarebytes.com/blog/news/2023/07/este-lauder-targeted-by-cl0p-and-blackcat-ransomware-groups

Categories: Business

Tags: Estée Lauder

Tags: Cl0p

Tags: BlackCat

Tags: ransomware

Tags: compromise

Tags: attack

Tags: breach

Tags: blackmail

Tags: threat

We take a look at reports of cosmetics firm Estée Lauder being attacked by the Cl0p and BlackCat ransomware groups.

(Read more...)

The post Estée Lauder targeted by Cl0p and BlackCat ransomware groups appeared first on Malwarebytes Labs.

"

Autosummary: Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.Regular readers will know that these attacks typically target confidential information, company secrets, personal data, payroll, and identity scans. Supposedly, the information taken could “impact customers, employees, and suppliers”. "


Estée Lauder – internal data stolen after being hit by two separate ransomware attacks

exploits ransomware
2023-07-20 https://www.bitdefender.com/blog/hotforsecurity/estee-lauder-internal-data-stolen-after-being-hit-by-two-separate-ransomware-attacks/
If you thought hackers might be causing your company a few headaches, pity the folks at Estée Lauder. Two different ransomware groups have listed the cosmetics maker on their leak sites on the dark web, as a result of seemingly separate attacks. Read more in my article on the Hot for Security blog. "

Autosummary: Error. "


Mallox Ransomware Exploits Weak MS-SQL Servers to Breach Networks

exploits ransomware
2023-07-20 https://thehackernews.com/2023/07/mallox-ransomware-exploits-weak-ms-sql.html
Mallox ransomware activities in 2023 have witnessed a 174% increase when compared to the previous year, new findings from Palo Alto Networks Unit 42 reveal. "Mallox ransomware, like many other ransomware threat actors, follows the double extortion trend: stealing data before encrypting an organization"s files, and then threatening to publish the stolen data on a leak site as leverage to convince "

Autosummary: The binary, for its part, attempts to stop and remove SQL-related services, delete volume shadow copies, clear system event logs, terminate security-related processes, and bypass Raccine, an open-source tool designed to counter ransomware attacks, prior to commencing its encryption process, after which a ransom note is dropped in every directory. "


Trends in ransomware-as-a-service and cryptocurrency to monitor

exploits ransomware
2023-07-19 https://www.helpnetsecurity.com/2023/07/19/cryptocurrency-ransomware-payments/

In January, law enforcement officials disrupted the operations of the Hive cybercriminal group, which profited off a ransomware-as-a-service (RaaS) business model. Hive is widely believed to be affiliated with the Conti ransomware group, joining a list of other groups associated with former Conti operators, including Royal, Black Basta, and Quantum. RaaS affiliates are all over the globe, and so are their victims. These affiliates use a myriad of different tactics and techniques. In this article, … More

The post Trends in ransomware-as-a-service and cryptocurrency to monitor appeared first on Help Net Security.

"

Autosummary: Hive’s modus operandi Hive, like other RaaS providers, wrote a ransomware encryptor, created a dark web domain, advertised their services to affiliates and forums, and then allowed users to purchase a license (for their services) to configure a ransomware payload and receive extortion funds. You would need to implement a policy to ensure MFA is on any authentication to your network (a zero-trust network, ideally), multi-factor license(s) if you don’t have them, email security and phishing training solutions, and a patch management system with comprehensive asset management behind it. For example, Hive affiliates have been known to breach organizations using Remote Desktop Protocol (RDP) without multi-factor authentication (MFA), stolen credentials, phishing campaigns, and software vulnerabilities. "


Estée Lauder beauty giant breached by two ransomware gangs

exploits ransomware
2023-07-19 https://www.bleepingcomputer.com/news/security/est-e-lauder-beauty-giant-breached-by-two-ransomware-gangs/
Two ransomware actors, ALPHV/BlackCat and Clop, have listed beauty company Estée Lauder on their data leak sites as a victim of separate attacks. [...] "

Autosummary: In the SEC filing, the company informs that the focus is “on remediation, including efforts to restore impacted systems and services” and that the “incident has caused, and is expected to continue to cause, disruption to parts of the Company’s business operations.” "


FIN8 Group Using Modified Sardonic Backdoor for BlackCat Ransomware Attacks

exploits ransomware
2023-07-18 https://thehackernews.com/2023/07/fin8-group-using-modified-sardonic.html
The financially motivated threat actor known as FIN8 has been observed using a "revamped" version of a backdoor called Sardonic to deliver the BlackCat ransomware. According to the Symantec Threat Hunter Team, part of Broadcom, the development is an attempt on the part of the e-crime group to diversify its focus and maximize profits from infected entities. The intrusion attempt took place in "

Autosummary: "The C++-based Sardonic backdoor has the ability to harvest system information and execute commands, and has a plugin system designed to load and execute additional malware payloads delivered as DLLs," Symantec said in a report shared with The Hacker News. "


FIN8 deploys ALPHV ransomware using Sardonic malware variant

exploits ransomware
2023-07-18 https://www.bleepingcomputer.com/news/security/fin8-deploys-alphv-ransomware-using-sardonic-malware-variant/
A financially motivated cybercrime gang has been observed deploying BlackCat ransomware payloads on networks backdoored using a revamped Sardonic malware version. [...] "

Autosummary: Tracked as FIN8 (aka Syssphinx), this threat actor has been actively operating since at least January 2016, focusing on targeting industries such as retail, restaurants, hospitality, healthcare, and entertainment. "


Cybersecurity firm Sophos impersonated by new SophosEncrypt ransomware

exploits ransomware ciber
2023-07-18 https://www.bleepingcomputer.com/news/security/cybersecurity-firm-sophos-impersonated-by-new-sophosencrypt-ransomware/
Cybersecurity vendor Sophos is being impersonated by a new ransomware-as-a-service called SophosEncrypt, with the threat actors using the company name for their operation. [...] "

Autosummary: Files encrypted by the SophosEncrypt Source: BleepingComputer In each folder that a file is encrypted, the ransomware will create a ransom note named information.hta, which is automatically launched when the encryption is finished. "


FIN8 Group spotted delivering the BlackCat Ransomware

exploits ransomware
2023-07-18 https://securityaffairs.com/148569/cyber-crime/fin8-group-spotted-delivering-the-blackcat-ransomware.html

The cybercrime group FIN8 is using a revamped version of the Sardonic backdoor to deliver the BlackCat ransomware. The financially motivated group FIN8 (aka Syssphinx) was spotted using a revamped version of a backdoor tracked as Sardonic to deliver the BlackCat ransomware (aka Noberus ransomware). Sardonic is a sophisticated backdoor that supports a wide range of features that was designed […]

The post FIN8 Group spotted delivering the BlackCat Ransomware appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, BlackCat ransomware) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On The backdoor supports multiple commands, such as dropping arbitrary attacker’s files, exfiltrating content of arbitrary files to the remote attacker, loading a DLL plugin supplied by the remote attacker, and executing shellcode supplied by the remote attacker. "


IT worker jailed for impersonating ransomware gang to extort employer

exploits ransomware
2023-07-17 https://www.bleepingcomputer.com/news/security/it-worker-jailed-for-impersonating-ransomware-gang-to-extort-employer/
28-year-old Ashley Liles, a former IT employee, has been sentenced to over three years in prison for attempting to blackmail his employer during a ransomware attack. [...] "

Autosummary: "


Meet NoEscape: Avaddon ransomware gang"s likely successor

exploits ransomware
2023-07-17 https://www.bleepingcomputer.com/news/security/meet-noescape-avaddon-ransomware-gangs-likely-successor/
The new NoEscape ransomware operation is believed to be a rebrand of Avaddon, a ransomware gang that shut down and released its decryption keys in 2021. [...] "

Autosummary: 360doctor, 360se, Culture, Defwatch, GDscan, MsDtSrvr, QBCFMonitorService, QBDBMgr, QBIDPService, QBW32, RAgui, RTVscan, agntsvc, agntsvcencsvc, agntsvcisqlplussvc, anvir, anvir64, apache, axlbridge, backup, ccleaner, ccleaner64, dbeng50, dbsnmp, encsvc, excel, far, fdhost, fdlauncher, httpd, infopath, isqlplussvc, java, kingdee, msaccess, msftesql, mspub, mydesktopqos, mydesktopservice, mysqld-nt, mysqld-opt, mysqld, ncsvc, ocautoupds, ocomm, ocssd, onedrive, onenote, oracle, outlook, powerpnt, procexp, qbupdate, sqbcoreservice, sql, sqlagent, sqlbrowser, sqlmangr, sqlserver, sqlservr, sqlwriter, steam, supervise, synctime, taskkill, tasklist, tbirdconfig, thebat, thunderbird, tomcat, tomcat6, u8, ufida, visio, wdswfsafe, winword, wordpad, wuauclt, wxServer, wxServerView, and xfssvccon It will also stop the following Windows services associated with databases, QuickBooks, security software, and virtual machine platforms. When encrypting files, the encryptor will skip all files that have the following file extensions: exe, bat, bin, cmd, com, cpl, dat, dll, drv, hta, ini, lnk, lock, log, mod, msc, msi, msp, pif, prf, rdp, scr, shs, swp, sys, theme It will also skip files in folders whose names contain the following strings: $recycle.bin, $windows.~bt, $windows.~ws, %PROGRAMFILES(x86)%, %PUBLIC%, %ProgramData%, %SYSTEMDRIVE%\\Program Files, %SYSTEMDRIVE%\\Users\\All Users, %SYSTEMDRIVE%\\Windows, %TMP%, %USERPROFILE%\\AppData, AppData, %AppData%, EFI, Intel, MSOCache, Mozilla, Program Files, ProgramData, Tor Browser, Windows, WINDOWS, boot, google, perflogs, system volume information, windows.old During encryption, Gillespie told BleepingComputer that it could be configured to use three modes: Full - the entire file is encrypted - the entire file is encrypted Partial - Only the first X megabytes are encrypted. Culserver, DefWatch, GxBlr, GxCIMgr, GxCVD, GxFWD, GxVss, QBCFMonitorService, QBIDPService, RTVscan, SavRoam, VMAuthdService, VMUSBArbService, VMnetDHCP, VMwareHostd, backup, ccEvtMgr, ccSetMgr, dbeng8, dbsrv12, memtas, mepocs, msexchange, msmdsrv, sophos, sql, sqladhlp, sqlagent, sqlbrowser, sqlservr, sqlwriter, svc$, tomcat6, veeam, vmware-converter, vmware-usbarbitator64, vss The ransomware terminates these applications to unlock files that may be opened and prevented from being encrypted. "


Shutterfly says Clop ransomware attack did not impact customer data

exploits ransomware
2023-07-14 https://www.bleepingcomputer.com/news/security/shutterfly-says-clop-ransomware-attack-did-not-impact-customer-data/
Shutterfly, an online retail and photography manufacturing platform, is among the latest victims hit by Clop ransomware. Over the last few months, Clop ransomware gang has been exploiting a vulnerability in the MOVEit File Transfer utility to breach hundreds of companies to steal their data and attempt extortion against them. [...] "

Autosummary: Other organizations that have already disclosed MOVEit Transfer breaches include Zellis (and its customers BBC, Boots, Aer Lingus, and Ireland"s HSE), Ofcam, the government of Nova Scotia, the US state of Missouri, the US state of Illinois, the University of Rochester, the American Board of Internal Medicine, BORN Ontario, SOVOS "


From Malvertising to Ransomware: A ThreatDown webinar recap

exploits ransomware
2023-07-13 https://www.malwarebytes.com/blog/business/2023/07/inside-the-pervasive-malvertising-threat-a-threatdown-webinar-recap

Categories: Business

Get the low-down on our recent webinar From Malvertising to Ransomware.

(Read more...)

The post From Malvertising to Ransomware: A ThreatDown webinar recap appeared first on Malwarebytes Labs.

"

Autosummary: "


Staying ahead of the “professionals”: The service-oriented ransomware crime industry

exploits ransomware industry
2023-07-12 https://www.helpnetsecurity.com/2023/07/12/ransomware-industry-profitability/

Ransomware has been a hugely profitable industry for criminal gangs for the last few years. The total amount of ransom paid since 2020 is estimated to be at least $2 billion, and this has both motivated and enabled the groups who are profiting from this activity to become more professional. These groups are emulating the legitimate tech ecosystem and seeking greater efficiencies and profits: they outsource common, complex problems; they subcontract work; and they employ … More

The post Staying ahead of the “professionals”: The service-oriented ransomware crime industry appeared first on Help Net Security.

"

Autosummary: Have a incident response plan – If you have threat intelligence, self-awareness, controls, and policies, you can devise a plan of action for your organization to follow in the event of an incident. Actions on target are often achieved by living off the land, i.e., abusing already present operating system tools and the use of common commodity post-exploitation frameworks such as Cobalt Strike, Metasploit, and Sliver. "


Same code, different ransomware? Leaks kick-start myriad of new variants

exploits ransomware
2023-07-12 https://www.helpnetsecurity.com/2023/07/12/h1-2023-eset-threat-report/

Threat landscape trends demonstrate the impressive flexibility of cybercriminals as they continually seek out fresh methods of attack, including exploiting vulnerabilities, gaining unauthorized access, compromising sensitive information, and defrauding individuals, according to the H1 2023 ESET Threat Report. Microsoft: An interesting threat landscape One of the reasons for shifts in attack patterns is stricter security policies introduced by Microsoft, particularly on opening macro-enabled files. ESET telemetry data also suggests that operators of the once-notorious Emotet … More

The post Same code, different ransomware? Leaks kick-start myriad of new variants appeared first on Help Net Security.

"

Autosummary: "


Rogue IT security worker who impersonated ransomware gang is sentenced to jail

exploits ransomware
2023-07-12 https://grahamcluley.com/rogue-it-security-worker-who-impersonated-ransomware-gang-sentenced-to-jail/
A British IT worker who exploited a ransomware attack against the company he worked for, in an attempt to extort money from them for himself, has been sentenced to jail for three years and seven months. "

Autosummary: Ashley Liles of Fleetwood, Letchworth Garden City, Hertfordshire, was sentenced yesterday at Reading Crown Court for blackmail and unauthorised access to a computer with intent to commit other offences. "


Beware of Big Head Ransomware: Spreading Through Fake Windows Updates

exploits ransomware
2023-07-11 https://thehackernews.com/2023/07/beware-of-big-head-ransomware-spreading.html
A developing piece of ransomware called Big Head is being distributed as part of a malvertising campaign that takes the form of bogus Microsoft Windows updates and Word installers. Big Head was first documented by Fortinet FortiGuard Labs last month, when it discovered multiple variants of the ransomware that are designed to encrypt files on victims" machines in exchange for a cryptocurrency "

Autosummary: In addition, the malware disables the Task Manager to prevent users from terminating or investigating its process and aborts itself if the machine"s language matches that of Russian, Belarusian, Ukrainian, Kazakh, Kyrgyz, Armenian, Georgian, Tatar, and Uzbek. "


New disturbing ransomware trend threatens organizations

exploits ransomware
2023-07-10 https://www.helpnetsecurity.com/2023/07/10/encryptionless-extortion-attacks/

Ransomware attacks increased by over 37% in 2023 compared to the previous year, with the average enterprise ransom payment exceeding $100,000, with a $5.3 million average demand, according to Zscaler. Since April 2022, ThreatLabz has identified thefts of several terabytes of data as part of several successful ransomware attacks, which were then used to extort ransoms. Encryptionless extortion attacks “Ransomware-as-a-Service has contributed to a steady rise in sophisticated ransomware attacks,” said Deepen Desai, Global CISO … More

The post New disturbing ransomware trend threatens organizations appeared first on Help Net Security.

"

Autosummary: The most prevalent ransomware families that Zscaler ThreatLabz has been tracking include BlackBasta, BlackCat, Clop, Karakurt, and LockBit, all of which pose a significant threat of financial losses, data breaches, and operational disruption to individuals and organizations of all sizes. "


Week in review: Fileless attacks increase 1,400%, consumers ditch brands hit by ransomware

exploits ransomware
2023-07-09 https://www.helpnetsecurity.com/2023/07/09/week-in-review-fileless-attacks-increase-1400-consumers-ditch-brands-hit-by-ransomware/

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Island Enterprise Browser: Intelligent security built into the browsing session In this Help Net Security interview, Mike Fey, CEO of Island, explains the differences between consumer browsers and the Island Enterprise Browser, how it protects organizations’ data, and how it uses contextual information to provide users with a safe browsing experience. Promoting responsible AI: Balancing innovation and regulation In this … More

The post Week in review: Fileless attacks increase 1,400%, consumers ditch brands hit by ransomware appeared first on Help Net Security.

"

Autosummary: Infosec products of the month: June 2023 Here’s a look at the most interesting products from the past month, featuring releases from: 1Password, Bitdefender, Cequence Security, ConnectSecure, Cymulate, Cytracom, Datadog, Delinea, Edgescan, Enveedo, ESET, Index Engines, Island, iStorage, Lacework, NetApp, Netscout, Netskope, NinjaOne, Okta, Permit.io, PingSafe, Quantinuum, Seceon, and Zilla Security. "


New ‘Big Head’ ransomware displays fake Windows update alert

exploits ransomware
2023-07-08 https://www.bleepingcomputer.com/news/security/new-big-head-ransomware-displays-fake-windows-update-alert/
Security researchers have dissected a recently emerged ransomware strain named "Big Head" that may be spreading through malvertising that promotes fake Windows updates and Microsoft Word installers. [...] "

Autosummary: Processes terminated before encryption (Trend Micro) The Windows, Recycle Bin, Program Files, Temp, Program Data, Microsoft, and App Data directories are skipped from encryption to avoid rendering the system unusable. "


Close Security Gaps with Continuous Threat Exposure Management

ransomware
2023-07-07 https://thehackernews.com/2023/07/close-security-gaps-with-continuous.html
CISOs, security leaders, and SOC teams often struggle with limited visibility into all connections made to their company-owned assets and networks. They are hindered by a lack of open-source intelligence and powerful technology required for proactive, continuous, and effective discovery and protection of their systems, data, and assets. As advanced threat actors constantly search for easily "

Autosummary: Key features and capabilities of a robust CTEM program include: Automated discovery of assets and management of vulnerabilities Ongoing vulnerability assessment of threat exposures within the attack surface of threat exposures within the attack surface Security validation to eliminate false positives and guarantee accuracy Gaining visibility into the attacker"s perspective and potential avenues of attack Prioritizing remediation efforts and integrating them with DevSecOps workflows Start Your CTEM Program Today Security executives require continuous Threat Exposure Management solutions that enhance, support, and expand their in-house team"s abilities to neutralize threats at their origin, preventing costly and damaging security breaches. Faster Adversaries, Inadequate Protection, and Preventable Incidents In 2023, despite significant investments in security infrastructure and skilled personnel, existing approaches are struggling to effectively reduce risks, manage threat exposures, and prevent security breaches. "


BlackByte 2.0 Ransomware: Infiltrate, Encrypt, and Extort in Just 5 Days

exploits ransomware
2023-07-07 https://thehackernews.com/2023/07/blackbyte-20-ransomware-infiltrate.html
Ransomware attacks are a major problem for organizations everywhere, and the severity of this problem continues to intensify. Recently, Microsoft"s Incident Response team investigated the BlackByte 2.0 ransomware attacks and exposed these cyber strikes" terrifying velocity and damaging nature. The findings indicate that hackers can complete the entire attack process, from gaining initial access "

Autosummary: The findings indicate that hackers can complete the entire attack process, from gaining initial access to causing significant damage, in just five days. "


How kids pay the price for ransomware attacks on education

exploits ransomware
2023-07-07 https://www.malwarebytes.com/blog/news/2023/07/school-documents-outed-by-ransomware-gangs-can-have-long-lasting-consequences

Categories: News

Categories: Personal

Categories: Ransomware

Tags: ransomware

Tags: vice

Tags: education

Tags: files

Tags: dark web

Tags: ssn

Tags: stolen identity

Data stolen during attacks on schools can contain highly sensitive information.

(Read more...)

The post How kids pay the price for ransomware attacks on education appeared first on Malwarebytes Labs.

"

Autosummary: Known ransomware attacks against education, June 2022-May 2023 And, while ransomware attacks against education are a global phenomenon, the USA and the UK saw far higher rates of attacks than other countries.Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again. The ransomware groups are to blame, of course, but the education sector can improve a few things to lessen the impact of a ransomware attack. "


How to cultivate a culture of continuous cybersecurity improvement

ransomware ciber
2023-07-06 https://www.helpnetsecurity.com/2023/07/06/cybersecurity-improvement/

Regulatory compliance and cybersecurity improvement are not two sides of the same coin: they are distinct pillars that demand specialized attention. Achieving compliance does not create an impenetrable fortress against threats, it merely creates a baseline defense. So, how can organizations transition from a reactive, “tick-box” mindset to a proactive culture of continuous cyber improvement? This question is central to increasing cyber resilience. For those navigating the patchwork of regulatory environments, a deeper understanding of … More

The post How to cultivate a culture of continuous cybersecurity improvement appeared first on Help Net Security.

"

Autosummary: CISOs must manage a blend of real-time activities, like monitoring network traffic, threat hunting, and vulnerability detection, with periodic activities, such as pen testing, risk assessments, and audits. On the other hand, periodic security practices, such as penetration testing, provide an opportunity to stress-test the system and uncover potential weaknesses. The urgency of real-time vulnerability management To build a culture of cyber improvement, businesses must foster an effective vulnerability management strategy that relies on incessantly evaluating exposure to potential threats and taking proactive steps to mitigate them. "


Free Akira ransomware decryptor released for victims who wish to recover their data without paying extortionists

exploits ransomware
2023-07-06 https://www.tripwire.com/state-of-security/free-akira-ransomware-decryptor-released-victims-who-wish-recover-their-data
There"s good news for any business that has fallen victim to the Akira ransomware. Security researchers have developed a free decryption tool for files that have been encrypted since the Akira ransomware first emerged in March 2023. Read more in my article on the Tripwire State of Security blog. "

Autosummary: But, of course, as we all know, it"s often still the case that proper backup systems are not in place, or have not been properly tested to see if they will work properly if an emergency recovery of data is required. Image In order to crack the ransomware"s password, Avast"s tool asks for a sample Akira-encrypted file and a copy of the data file before it was hit by the ransomware attack. "


75% of consumers prepared to ditch brands hit by ransomware

exploits ransomware
2023-07-05 https://www.helpnetsecurity.com/2023/07/05/consumers-data-protection-request/

As 40% of consumers harbor skepticism regarding organizations’ data protection capabilities, 75% would shift to alternate companies following a ransomware attack, according to Object First. Consumers request data protection Furthermore, consumers request increased data protection from vendors, with 55% favoring companies with comprehensive data protection measures such as reliable backup and recovery, password protection, and identity and access management strategies. As organizations intensify their digital transformation initiatives, data volume expands exponentially while ransomware attacks dominate … More

The post 75% of consumers prepared to ditch brands hit by ransomware appeared first on Help Net Security.

"

Autosummary: Consumers request data protection Furthermore, consumers request increased data protection from vendors, with 55% favoring companies with comprehensive data protection measures such as reliable backup and recovery, password protection, and identity and access management strategies. "


How ransomware impacts the healthcare industry

exploits ransomware industry
2023-07-05 https://www.helpnetsecurity.com/2023/07/05/how-ransomware-impacts-healthcare-industry-video/

Healthcare continues to be one of the most attractive targets for cyberattackers, and the number of breaches affecting the industry is increasing yearly. In this Help Net Security video, Steve Gwizdala, VP of Healthcare at ForgeRock, discusses how vigilance and new ways of enhancing cybersecurity measures will be crucial to healthcare organizations and businesses responsible for protecting consumers’ online information – across the entire supply chain. There needs to be more than the traditional password … More

The post How ransomware impacts the healthcare industry appeared first on Help Net Security.

"

Autosummary: "


Japan’s largest port stops operations after ransomware attack

exploits ransomware
2023-07-05 https://www.bleepingcomputer.com/news/security/japans-largest-port-stops-operations-after-ransomware-attack/
The Port of Nagoya, the largest and busiest port in Japan, has been targeted in a ransomware attack that currently impacts the operation of container terminals. [...] "

Autosummary: "


The Port of Nagoya, the largest Japanese port, suffered a ransomware attack

exploits ransomware
2023-07-05 https://securityaffairs.com/148184/cyber-crime/port-of-nagoya-ransomware-attack.html

The Port of Nagoya, the largest port in Japan, suffered a ransomware attack that severely impacted its operations. The Port of Nagoya, in the Ise Bay, is the largest and busiest trading port in Japan, accounting for about 10% of the total trade value of Japan. Notably, this port is the largest exporter of cars […]

The post The Port of Nagoya, the largest Japanese port, suffered a ransomware attack appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, Port of Nagoya) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


BlackCat Operators Distributing Ransomware Disguised as WinSCP via Malvertising

exploits ransomware
2023-07-03 https://thehackernews.com/2023/07/blackcat-operators-distributing.html
Threat actors associated with the BlackCat ransomware have been observed employing malvertising tricks to distribute rogue installers of the WinSCP file transfer application. "Malicious actors used malvertising to distribute a piece of malware via cloned webpages of legitimate organizations," Trend Micro researchers said in an analysis published last week. "In this case, the distribution "

Autosummary: IBM Security X-Force, in a recent deep dive, said the gang"s crypters, which are applications designed to encrypt and obfuscate malware to evade detection by antivirus scanners and hinder analysis, are being used to also disseminate new malware strains such as Aresloader, Canyon, CargoBay, DICELOADER, Lumma C2, Matanbuchus, Minodo (formerly Domino), Pikabot, SVCReady, Vidar. "


Confusion at Twitter continues over Elon Musk"s tweet limits

ransomware
2023-07-03 https://www.bbc.co.uk/news/technology-66087172?at_medium=RSS&at_campaign=KARANGA
Elon Musk provoked a Twitter backlash after introducing limits to the number of tweets users can read. "

Autosummary: "


Week in review: 5 free online cybersecurity courses, 8Base ransomware group leaks data

exploits ransomware ciber
2023-07-02 https://www.helpnetsecurity.com/2023/07/02/week-in-review-5-free-online-cybersecurity-courses-8base-ransomware-group-leaks-data/

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Unlocking internet’s secrets via monitoring, data collection, and analysis In this Help Net Security interview, Ryan Woodley, CEO of Netcraft, discusses the importance of monitoring, collecting, and analyzing internet data to gain a profound understanding of the internet. Preparing health systems for cyber risks and insurance coverage In this Help Net Security interview, Dennis Fridrich, VP of Cybersecurity at TRIMEDX, … More

The post Week in review: 5 free online cybersecurity courses, 8Base ransomware group leaks data appeared first on Help Net Security.

"

Autosummary: Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Unlocking internet’s secrets via monitoring, data collection, and analysis In this Help Net Security interview, Ryan Woodley, CEO of Netcraft, discusses the importance of monitoring, collecting, and analyzing internet data to gain a profound understanding of the internet. "


Avast released a free decryptor for the Windows version of the Akira ransomware

exploits ransomware
2023-07-01 https://securityaffairs.com/148007/cyber-crime/akira-ransomware-decryptor.html

Avast released a free decryptor for the Akira ransomware that can allow victims to recover their data without paying the ransom. Cybersecurity firm Avast released a free decryptor for the Akira ransomware that can allow victims to recover their data without paying the ransom. The Akira ransomware has been active since March 2023, the threat […]

The post Avast released a free decryptor for the Windows version of the Akira ransomware appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, Akira ransomware) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On The Akira ransomware has been active since March 2023, the threat actors behind the malware claim to have already hacked multiple organizations in multiple industries, including education, finance, and real estate, Akira is a Windows ransomware with a 64-bit Windows binary, it is written in C++ and uses the Boost library to implement the asynchronous encryption code. "


LockBit gang demands a $70 million ransom to the semiconductor manufacturing giant TSMC

ransomware industry
2023-07-01 https://securityaffairs.com/148022/cyber-crime/tsmc-lockbit-ransomware.html

The LockBit ransomware gang claims to have hacked Taiwan Semiconductor Manufacturing Company (TSMC). The LockBit ransomware group this week claimed to have hacked the Taiwan Semiconductor Manufacturing Company (TSMC) and $70 million ransom. TSMC is the world’s biggest contract manufacturer of chips for tech giants, including Apple and Qualcomm Inc. As reported by BleepingComputer, on Wednesday, […]

The post LockBit gang demands a $70 million ransom to the semiconductor manufacturing giant TSMC appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, ransomware) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


BlackCat ransomware pushes Cobalt Strike via WinSCP search ads

exploits ransomware
2023-07-01 https://www.bleepingcomputer.com/news/security/blackcat-ransomware-pushes-cobalt-strike-via-winscp-search-ads/
The BlackCat ransomware group (aka ALPHV) is running malvertizing campaigns to lure people into fake pages that mimic the official website of the WinSCP file-transfer application for Windows but instead push malware-ridden installers. [...] "

Autosummary: PsExec , BitsAdmin , and Curl , used for lateral movement , , and , used for lateral movement AnyDesk : legitimate remote management tool abused for maintaining persistence : legitimate remote management tool abused for maintaining persistence KillAV BAT script used for disabling or bypassing antivirus and antimalware programs. Complete attack chain (Trend Micro) Other tools used by ALPHV Having Cobalt Strike running on the system, it is easy to execute additional scripts, fetch tools for lateral movement, and generally deepen the compromise. "


Free Akira ransomware decryptor helps recover your files

exploits ransomware
2023-06-30 https://www.bleepingcomputer.com/news/security/free-akira-ransomware-decryptor-helps-recover-your-files/
Cybersecurity firm Avast has released a free decryptor for the Akira ransomware that can help victims recover their data without paying the crooks any money. [...] "

Autosummary: Akira encryption Avast"s analysis of Akira"s encryption scheme confirms previous reports, describing that the malware uses a symmetric key generated by CryptGenRandom, which is then encrypted by a bundled RSA-4096 public key and appended to the end of an encrypted file. "


TSMC denies LockBit hack as ransomware gang demands $70 million

exploits ransomware
2023-06-30 https://www.bleepingcomputer.com/news/security/tsmc-denies-lockbit-hack-as-ransomware-gang-demands-70-million/
Chipmaking giant TSMC (Taiwan Semiconductor Manufacturing Company) denied being hacked after the LockBit ransomware gang demanded $70 million not to release stolen data. [...] "

Autosummary: TSMC is one of the world"s largest semiconductor manufacturers, with its products used in a wide variety of devices, including smartphones, high performance computing, IoT devices, automotive, and digital consumer electronics. "


The Week in Ransomware - June 30th 2023 - Mistaken Identity

exploits ransomware
2023-06-30 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-june-30th-2023-mistaken-identity/
A case of mistaken identity and further MOVEit Transfer data breaches continue dominated the ransomware news cycle this week. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @BleepinComputer, @fwosar, @demonslay335, @billtoulas, @Seifreed, @LawrenceAbrams, @malwrhunterteam, @struppigel, @serghei, @rivitna2, @Avast, @AuCyble, @VMware, @pcrisk, @BushidoToken, and @BrettCallow. "


8Base Ransomware Spikes in Activity, Threatens U.S. and Brazilian Businesses

exploits latam ransomware
2023-06-28 https://thehackernews.com/2023/06/8base-ransomware-spikes-in-activity.html
A ransomware threat called 8Base that has been operating under the radar for over a year has been attributed to a "massive spike in activity" in May and June 2023. "The group utilizes encryption paired with "name-and-shame" techniques to compel their victims to pay their ransoms," VMware Carbon Black researchers Deborah Snyder and Fae Carlisle said in a report shared with The Hacker News. "8Base "

Autosummary: " 8Base is part of a wave of ransomware newbies entering the market such as CryptNet, Xollam, and Mallox, even as known families like BlackCat, LockBit, and Trigona have witnessed continuous updates to their features and attack chains to broaden their horizons beyond Windows to infect Linux and macOS systems. "


8Base ransomware gang escalates double extortion attacks in June

exploits ransomware
2023-06-28 https://www.bleepingcomputer.com/news/security/8base-ransomware-gang-escalates-double-extortion-attacks-in-june/
​A 8Base ransomware gang is targeting organizations worldwide in double-extortion attacks, with a steady stream of new victims since the beginning of June. [...] "

Autosummary: " 8Base data leak site on the dark web ​​​​​​​Source:BleepingComputer Links to other ransomware groups In a new report by VMware"s Carbon Black team, the tactics seen in recent 8Base attacks point to them being a rebrand of a well-established ransomware organization, potentially RansomHouse. "


8Base ransomware group leaks data of 67 victim organizations

exploits ransomware
2023-06-28 https://www.helpnetsecurity.com/2023/06/28/8base-ransomware/

Lockbit 3.0 is currently the most active ransomware group, NCC Group says in its most recent Threat Pulse report, but new ransomware groups like 8Base and Akira are rising in prominence. Collectively, the various ransomware groups revealed 436 victim organizations in May 2023 – 24% more than in April 2023 (352), and 56% more that in May 2022. This considerable increase can be attributed, in part, to the 8Base ransomware group, which released data from … More

The post 8Base ransomware group leaks data of 67 victim organizations appeared first on Help Net Security.

"

Autosummary: This considerable increase can be attributed, in part, to the 8Base ransomware group, which released data from 67 victims they breached between April 2022 and May 2023 About 8Base ransomware group According to VMware Carbon Black’s Threat Analysis Unit (TAU), the group has been active since March 2022, but its activity has become more prominent now due to the significant number of data dumps released in May. "


Experts warn of a spike in May and June of 8Base ransomware attacks

exploits ransomware
2023-06-28 https://securityaffairs.com/147922/cyber-crime/8base-ransomware-attacks.html

Researchers warn of a massive spike in May and June 2023 of the activity associated with the ransomware group named 8Base. VMware Carbon Black researchers observed an intensification of the activity associated with a stealthy ransomware group named 8Base. The experts observed a massive spike in activity associated with this threat actor between May and June 2023. […]

The post Experts warn of a spike in May and June of 8Base ransomware attacks appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, 8Base) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Linux version of Akira ransomware targets VMware ESXi servers

exploits ransomware
2023-06-28 https://www.bleepingcomputer.com/news/security/linux-version-of-akira-ransomware-targets-vmware-esxi-servers/
The Akira ransomware operation uses a Linux encryptor to encrypt VMware ESXi virtual machines in double-extortion attacks against companies worldwide. [...] "

Autosummary: Files encrypted by Akira on a Linux server Source: BleepingComputer When encrypting files, the Linux Akira encryptor will target the following extensions: .4dd, .accdb, .accdc, .accde, .accdr, .accdt, .accft, .adb, .ade, .adf, .adp, .arc, .ora, .alf, .ask, .btr, .bdf, .cat, .cdb, .ckp, .cma, .cpd, .dacpac, .dad, .dadiagrams, .daschema, .db-shm, .db-wa, .db3, .dbc, .dbf, .dbs, .dbt, .dbv, .dbx, .dcb, .dct, .dcx, .dlis, .dp1, .dqy, .dsk, .dsn, .dtsx, .eco, .ecx, .edb, .epim, .exb, .fcd, .fdb, .fic, .fmp, .fmp12, .fmps, .fp3, .fp4, .fp5, .fp7, .fpt, .frm, .gdb, .grdb, .gwi, .hdb, .his, .idb, .ihx, .itdb, .itw, .jet, .jtx, .kdb, .kexi, .kexic, .kexis, .lgc, .lwx, .maf, .maq, .mar, .mas, .mav, .mdb, .mdf, .mpd, .mrg, .mud, .mwb, .myd, .ndf, .nnt, .nrmlib, .ns2, .ns3, .ns4, .nsf, .nv2, .nwdb, .nyf, .odb, .oqy, .orx, .owc, .p96, .p97, .pan, .pdb, .pdm, .pnz, .qry, .qvd, .rbf, .rctd, .rod, .rodx, .rpd, .rsd, .sas7bdat, .sbf, .scx, .sdb, .sdc, .sdf, .sis, .spq, .sqlite, .sqlite3, .sqlitedb, .temx, .tmd, .tps, .trc, .trm, .udb, .usr, .v12, .vis, .vpd, .vvv, .wdb, .wmdb, .wrk, .xdb, .xld, .xmlff, .abcddb, .abs, .abx, .accdw, .adn, .db2, .fm5, .hjt, .icg, .icr, .lut, .maw, .mdn, .mdt, .vdi, .vhd, .vmdk, .pvm, .vmem, .vmsn, .vmsd, .nvram, .vmx, .raw, .qcow2, .subvo, .bin, .vsv, .avhd, .vmrs, .vhdx, .avdx, .vmcx, .iso "


Understanding ransomware reinfection: An MDR case study

exploits ransomware
2023-06-27 https://www.malwarebytes.com/blog/business/2023/06/understanding-ransomware-reinfection-an-mdr-case-study

Categories: Business

Ransomware is like that stubborn cold that you thought you kicked, but creeps back up determined to run amok again.

(Read more...)

The post Understanding ransomware reinfection: An MDR case study appeared first on Malwarebytes Labs.

"

Autosummary: As part of our response, we raised a critical incident to the customer, carried out an extensive threat hunt, and identified two compromised domain admin accounts, a domain controller (DC), and an SQL server. Lessons from the Incident This episode underscores the relentless threat of ransomware reinfection in today"s threat landscape, as well as the critical role that 24x7x365 diligence of trained cybersecurity experts, swift responses, and collaborative efforts play in cyber defense. "


Malvertising: A stealthy precursor to infostealers and ransomware attacks

exploits ransomware
2023-06-26 https://www.malwarebytes.com/blog/business/2023/06/malvertising-a-stealthy-precursor-to-infostealers-and-ransomware-attacks

Categories: Business

Malvertising, the practice of using online ads to spread malware, can have dire consequences—and the problem only seems to be growing.

(Read more...)

The post Malvertising: A stealthy precursor to infostealers and ransomware attacks appeared first on Malwarebytes Labs.

"

Autosummary: Posted: June 26, 2023 by Malvertising, the practice of using online ads to spread malware, can have dire consequences—and the problem only seems to be growing. For organizations looking to nip the malvertising-ransomware connection in the bud, however, perhaps the biggest challenge is how hard malvertising can be to spot. "


The Week in Ransomware - June 23rd 2023 - The Reddit Files

exploits ransomware
2023-06-23 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-june-23rd-2023-the-reddit-files/
It was a relatively quiet week regarding ransomware news, with the BlackCat ransomware gang extorting Reddit and the ongoing MOVEit Transfer data breaches being the main focus. [...] "

Autosummary: docuseries on YouTube Contributors and those who provided new ransomware information and stories this week include: @demonslay335, @BleepinComputer, @fwosar, @serghei, @billtoulas, @Seifreed, @malwrhunterteam, @Ionut_Ilascu, @LawrenceAbrams, @NCCGroupplc, @NCSC, @pcrisk, @vxunderground, @AlvieriD, and @BrettCallow. "


5 facts to know about the Royal ransomware gang

exploits ransomware
2023-06-23 https://www.malwarebytes.com/blog/business/2023/06/5-facts-to-know-about-the-royal-ransomware-gang

Categories: Business

A quick look the cybercriminal group known as Royal—one of the fastest growing ransomware gangs today.

(Read more...)

The post 5 facts to know about the Royal ransomware gang appeared first on Malwarebytes Labs.

"

Autosummary: 1. 66% of their initial access is done through phishing It seems there are three things certain in life: death, taxes, and phishing as a reliable attack vector.Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again. Known Royal attacks up to May 2023 by country For comparison, 43% of all known ransomware attacks were on the USA in the same November 2022 to June 2023 time period.The Services, Wholesale, and Technology industries are their top victims When we look at Royal ransomware"s victimology, no overwhelming pattern stands out like it does for Vice Society. "


$10 million reward offered for information on Cl0p ransomware gang

exploits ransomware
2023-06-22 https://grahamcluley.com/10-million-reward-offered-for-information-on-cl0p-ransomware-gang/
Fancy $10 million? Of course you do! Well, all you have to do is provide information that helps identify or locate members of the notorious Cl0p ransomware gang. "

Autosummary: "


Norton parent firm Gen Digital, was victim of a MOVEit ransomware attack too

exploits ransomware
2023-06-22 https://securityaffairs.com/147739/cyber-crime/gen-digital-moveit-ransomware-attack.html

Norton parent firm, Gen Digital, was the victim of a ransomware attack that exploited the recently disclosed MOVEit zero-day vulnerability. Gen Digital Inc. (formerly Symantec Corporation and NortonLifeLock) is a multinational software company that provides cybersecurity software and services.  The company owns multiple brands, including Norton, Avast, LifeLock, Avira, AVG, ReputationDefender, and CCleaner. Gen Digital said it was the victim of a ransomware attack, […]

The post Norton parent firm Gen Digital, was victim of a MOVEit ransomware attack too appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, zero-day) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Black Kite releases two modeling solutions for ransomware and business interruption scenarios

exploits ransomware
2023-06-20 https://www.helpnetsecurity.com/2023/06/20/black-kite-cyber-risk-quantificatio/

Black Kite released automated cyber risk quantification (CRQ) modeling for ransomware and business interruption scenarios. The new capabilities, which automates FAIR methodology, extends Black Kite’s data breach CRQ model to now provide visibility into all third-party risk scenarios, adds environmental, social, and corporate governance (ESG) factors and makes it possible to continuously monitor supply chain risk. “Cyber risk quantification provides deeper and more useful insights than a mere security score or rating. Yet, getting it … More

The post Black Kite releases two modeling solutions for ransomware and business interruption scenarios appeared first on Help Net Security.

"

Autosummary: With the launch of two new modeling solutions for ransomware and business interruption scenarios, Black Kite now offers an expanded suite of capabilities to augment its existing risk management offerings: Ransomware scenario modeling : With automated cyber risk quantification modeling for ransomware incidents, customers gain the ability to simulate and analyze the potential consequences of ransomware attacks, allowing for proactive measures and effective response strategies to safeguard critical assets and minimize financial losses. "


Black Cat ransomware group wants $4.5m from Reddit or will leak stolen files

exploits ransomware
2023-06-20 https://www.malwarebytes.com/blog/news/2023/06/black-cat-ransomware-group-wants-4-5m-from-reddit-or-will-leak-stolen-files

Categories: Business

Tags: reddit

Tags: ransom

Tags: black cat

Tags: ransomware

Tags: extortion

Tags: blackmail

Tags: data

Tags: leak

Tags: breach

We take a look at news that data stolen from Reddit may be leaked soon unless the site pays a cool $4.5m to keep it offline.

(Read more...)

The post Black Cat ransomware group wants $4.5m from Reddit or will leak stolen files appeared first on Malwarebytes Labs.

"

Autosummary: The employee"s credentials were reportedly used to gain access to "some internal docs, code, as well as some internal dashboards and business systems", which exposed "limited contact information" for company contacts and employees, and information about advertisers.Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.The February attack, billed as a “sophisticated phishing campaign” by Reddit, involved an attempt to swipe credentials and two-factor authentication tokens. "


ESET PROTECT Elite protects users against ransomware and zero-day threats

exploits ransomware
2023-06-19 https://www.helpnetsecurity.com/2023/06/19/eset-protect-elite/

ESET expanded its unified cybersecurity platform, ESET PROTECT, with a new subscription tier for businesses requiring all-in-one prevention, detection and response. Available immediately, ESET PROTECT Elite delivers enterprises, small and midsize businesses (SMBs), and channel partners with enterprise-grade XDR for increased visibility and threat-hunting capabilities. The comprehensive offering combines multilayered endpoint protection with multi-factor authentication, server security, advanced threat defense, full disk encryption, mail security and cloud application protection. Leveraging ESET’s 30 years of cutting-edge … More

The post ESET PROTECT Elite protects users against ransomware and zero-day threats appeared first on Help Net Security.

"

Autosummary: ESET’s unified cybersecurity platform, ESET PROTECT, is a single-pane-of-glass console – available via the cloud and on prem – that provides centralized visibility, management, and insight. The comprehensive offering combines multilayered endpoint protection with multi-factor authentication, server security, advanced threat defense, full disk encryption, mail security and cloud application protection. "


Iowa’s largest school district confirms ransomware attack, data theft

exploits ransomware
2023-06-19 https://www.bleepingcomputer.com/news/security/iowas-largest-school-district-confirms-ransomware-attack-data-theft/
Des Moines Public Schools, Iowa"s largest school district, confirmed today that a ransomware attack was behind an incident that forced it to take all networked systems offline on January 9, 2023. [...] "

Autosummary: ​Various other Iowa school districts, such as the Cedar Rapids Community School District, the Davenport Community School District, and the Linn-Mar Community School District, have also been hit by ransomware last year, according to a Des Moines Register report. "


US dangles $10 million reward for information about Cl0p ransomware gang

exploits ransomware
2023-06-19 https://www.malwarebytes.com/blog/news/2023/06/rewards-up-to-10-million-for-information-about-cl0p-ransomware-operation

Categories: News

Categories: Ransomware

Tags: Cl0p

Tags: ransomware

Tags: RFJ

Tags: 10 million

Tags: MOVEit

Rewards for Justice (RFJ) is offering a reward of up to $10 million for information the Cl0p ransomware gang is acting at the direction or under the control of a foreign government.

(Read more...)

The post US dangles $10 million reward for information about Cl0p ransomware gang appeared first on Malwarebytes Labs.

"

Autosummary: The US Department of State’s national security rewards program, Rewards for Justice (RFJ), is offering a reward of up to $10 million for information linking the Cl0p ransomware gang, or any other malicious cyber actors targeting US critical infrastructure, to a foreign government.RFJ’s statutory authorities offers rewards for information in four broad categories and one of them is: Malicious Cyber Activity For information that identifies or locates any individual who, while acting at the direction or under the control of a foreign government, aids or abets a violation of the Computer Fraud and Abuse Act (“CFAA”), 18 U.S.C. § 1030. "


US govt offers $10 million bounty for info linking Clop ransomware gang to a foreign government.

exploits government ransomware
2023-06-18 https://securityaffairs.com/147577/cyber-crime/clop-ransomware-reward.html

The U.S. government announced up to a $10 million bounty for information linking the Clop ransomware gang to a foreign government. The US goverment is offering up to a $10 million bounty for information linking CL0P Ransomware Gang or any other threat actors targeting U.S. critical infrastructure to a foreign government. The bounty is covered […]

The post US govt offers $10 million bounty for info linking Clop ransomware gang to a foreign government. appeared first on Security Affairs.

"

Autosummary: “ Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, Clop ransomware) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share OnYou could be eligible for a reward.#StopRansomware pic.twitter.com/fAAeBXgcWA — Rewards for Justice (@RFJ_USA) June 16, 2023 The U.S. State Department’s Rewards for Justice (RFJ) program is a government counterterrorism rewards program that offers monetary rewards for information leading to the prevention, disruption, or conviction of individuals involved in acts against U.S. interests. "


BlackCat ransomware gang behind Reddit breach from February

exploits ransomware
2023-06-18 https://www.bleepingcomputer.com/news/security/blackcat-ransomware-gang-behind-reddit-breach-from-february/
The BlackCat (ALPHV) ransomware gang is behind a February cyberattack on Reddit, where the threat actors claim to have stolen 80GB of data from the company. [...] "

Autosummary: "After successfully obtaining a single employee"s credentials, the attacker gained access to some internal docs, code, as well as some internal dashboards and business systems," explained a post by Reddit CTO Christopher Slowe, aka KeyserSosa. "


Reddit Files: BlackCat/ALPHV ransomware gang claims to have stolen 80GB of data from Reddit

exploits ransomware
2023-06-18 https://securityaffairs.com/147591/data-breach/reddit-files-blackcat-alphv-ransomware.html

The BlackCat/ALPHV ransomware gang claims to have stolen 80GB of data from the Reddit in February cyberattack. In February, the social news aggregation platform Reddit suffered a security breach, attackers gained unauthorized access to internal documents, code, and some business systems. The company announced it was hit by a sophisticated and highly-targeted attack that took […]

The post Reddit Files: BlackCat/ALPHV ransomware gang claims to have stolen 80GB of data from Reddit appeared first on Security Affairs.

"

Autosummary: BlackCat/ALPHV ransomware gang has been active since November 2021, the list of its victims is long and includes industrial explosives manufacturer SOLAR INDUSTRIES INDIA, the US defense contractor NJVC, gas pipeline Creos Luxembourg S.A., the fashion giant Moncler, the Swissport, NCR, and Western Digital. Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, ransomware) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


US govt offers $10 million bounty for info on Clop ransomware

exploits ransomware
2023-06-17 https://www.bleepingcomputer.com/news/security/us-govt-offers-10-million-bounty-for-info-on-clop-ransomware/
The U.S. State Department"s Rewards for Justice program announced up to a $10 million bounty yesterday for information linking the Clop ransomware attacks to a foreign government. [...] "

Autosummary: Initially launched to gather information on terrorists targeting U.S. interests, the program has since expanded to include information on cyber criminals, such as the Conti ransomware operation, Russian Sandworm hackers, REvil ransomware, and the Evil Corp hacking group. "


Third Flaw Uncovered in MOVEit Transfer App Amidst Cl0p Ransomware Mass Attack

exploits ransomware
2023-06-16 https://thehackernews.com/2023/06/third-flaw-uncovered-in-moveit-transfer.html
Progress Software on Thursday disclosed a third vulnerability impacting its MOVEit Transfer application, as the Cl0p cybercrime gang deployed extortion tactics against affected companies. The new flaw, which is yet to be assigned a CVE identifier, also concerns an SQL injection vulnerability that "could lead to escalated privileges and potential unauthorized access to the environment." The "

Autosummary: "


20-Year-Old Russian LockBit Ransomware Affiliate Arrested in Arizona

exploits ransomware rusia-ucrania
2023-06-16 https://thehackernews.com/2023/06/20-year-old-russian-lockbit-ransomware.html
The U.S. Department of Justice (DoJ) on Thursday unveiled charges against a Russian national for his alleged involvement in deploying LockBit ransomware to targets in the U.S., Asia, Europe, and Africa. Ruslan Magomedovich Astamirov, 20, of Chechen Republic has been accused of perpetrating at least five attacks between August 2020 and March 2023. He was arrested in the state of Arizona last "

Autosummary: Join the Session The DoJ statement also comes a day after cybersecurity authorities from Australia, Canada, France, Germany, New Zealand, the U.K., and the U.S. released a joint advisory warning of LockBit ransomware. "


Oil and gas giant Shell is another victim of Clop ransomware attacks

exploits ransomware industry
2023-06-16 https://securityaffairs.com/147545/cyber-crime/shell-clop-ransomware-attacks.html

British multinational oil and gas company Shell has confirmed that it has suffered a ransomware attack conducted by the Clop group. Oil and Gas giant Shell has confirmed that it is one of the victims of the recent large-scale ransomware campaign conducted by the Clop gang exploiting a MOVEit zero-day vulnerability Threat actors are actively exploiting the zero-day vulnerability, tracked […]

The post Oil and gas giant Shell is another victim of Clop ransomware attacks appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, ransomware) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


The Week in Ransomware - June 16th 2023 - Wave of Extortion

exploits ransomware
2023-06-16 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-june-16th-2023-wave-of-extortion/
The MOVEit Transfer extortion attacks continue to dominate the news cycle, with the Clop ransomware operation now extorting organizations breached in the attacks. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @billtoulas, @DanielGallagher, @malwrhunterteam, @BleepinComputer, @VK_Intel, @LawrenceAbrams, @PolarToffee, @struppigel, @jorntvdw, @Ionut_Ilascu, @FourOctets, @serghei, @fwosar, @Seifreed, @malwareforme, @demonslay335, @AuCyble, @pcrisk, @FortiGuardLabs, @1ZRR4H, @SentinelOne, @SttyK, @juanbrodersen, @AShukuhi, @BrettCallow, @Jon__DiMaggio, and @snlyngaas. "


A Russian national charged for committing LockBit Ransomware attacks

exploits ransomware rusia-ucrania
2023-06-16 https://securityaffairs.com/147551/cyber-crime/lockbit-ransomware-member-arrested.html

DoJ charged a Russian national with conspiring to carry out LockBit ransomware attacks against U.S. and foreign businesses. The Justice Department announced charges against the Russian national Ruslan Magomedovich Astamirov (20) for his role in numerous LockBit ransomware attacks against systems in the United States, Asia, Europe, and Africa. The US authorities arrested the man […]

The post A Russian national charged for committing LockBit Ransomware attacks appeared first on Security Affairs.

"

Autosummary: The operation targeted many organizations in critical infrastructure sectors, including financial services, food and agriculture, education, energy, government and emergency services, healthcare, manufacturing, and transportation. In May, the US Justice Department charged Russian national Mikhail Pavlovich Matveev (30), aka Wazawaka, m1x, Boriselcin, and Uhodiransomwar, for his alleged role in multiple ransomware attacks. "


LockBit Ransomware Extorts $91 Million from U.S. Companies

exploits ransomware
2023-06-15 https://thehackernews.com/2023/06/lockbit-ransomware-extorts-91-million.html
The threat actors behind the LockBit ransomware-as-a-service (RaaS) scheme have extorted $91 million following hundreds of attacks against numerous U.S. organizations since 2020. That"s according to a joint bulletin published by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Multi-State Information Sharing and Analysis Center ( "

Autosummary: That"s according to a joint bulletin published by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Multi-State Information Sharing and Analysis Center (MS-ISAC), and other partner authorities from Australia, Canada, France, Germany, New Zealand, and the U.K. "The LockBit ransomware-as-a-service (RaaS) attracts affiliates to use LockBit for conducting ransomware attacks, resulting in a large web of unconnected threat actors conducting wildly varying attacks," the agencies said. "


Cybersecurity agencies published a joint LockBit ransomware advisory

exploits ransomware ciber
2023-06-15 https://securityaffairs.com/147482/cyber-crime/lockbit-ransomware-advisory.html

The LockBit ransomware group successfully extorted roughly $91 million from approximately 1,700 U.S. organizations since 2020. According to a joint advisory published by cybersecurity agencies, the LockBit ransomware group has successfully extorted roughly $91 million in about 1,700 attacks against U.S. organizations since 2020. The advisory was published by Cybersecurity and Infrastructure Security Agency (CISA), […]

The post Cybersecurity agencies published a joint LockBit ransomware advisory appeared first on Security Affairs.

"

Autosummary: The advisory was published by Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), the Multi-State Information Sharing and Analysis Center (MS-ISAC), and the following international agencies: Australian Cyber Security Centre (ACSC) Canadian Centre for Cyber Security (CCCS) United Kingdom’s National Cyber Security Centre (NCSC-UK) National Cybersecurity Agency of France (ANSSI) "


Clop ransomware gang starts extorting MOVEit data-theft victims

exploits ransomware
2023-06-15 https://www.bleepingcomputer.com/news/security/clop-ransomware-gang-starts-extorting-moveit-data-theft-victims/
The Clop ransomware gang has started extorting companies impacted by the MOVEit data theft attacks by listing them on a data leak site, a common extortion tactic used as a precursor for the public leaking of stolen data. [...] "

Autosummary: "


Suspected LockBit ransomware affiliate arrested, charged in US

exploits ransomware
2023-06-15 https://www.bleepingcomputer.com/news/security/suspected-lockbit-ransomware-affiliate-arrested-charged-in-us/
Russian national Ruslan Magomedovich Astamirov was arrested in Arizona and charged by the U.S. Justice Department for allegedly deploying LockBit ransomware on the networks of victims in the United States and abroad. [...] "

Autosummary: In May 2023, Mikhail Pavlovich Matveev (also known as Wazawaka, m1x, Boriselcin, and Uhodiransomwar) was also charged for his alleged involvement in deploying LockBit, Babuk, and Hive ransomware in attacks targeting organizations within and outside the United States. "


Rhysida ransomware leaks documents stolen from Chilean Army

exploits latam ransomware
2023-06-15 https://www.bleepingcomputer.com/news/security/rhysida-ransomware-leaks-documents-stolen-from-chilean-army/
Threat actors behind a recently surfaced ransomware operation known as Rhysida have leaked online what they claim to be documents stolen from the network of the Chilean Army (Ejército de Chile). [...] "

Autosummary: Chilean Army entry on Rhysida"s leak site (BleepingComputer) ​The Rhysida ransomware gang describes itself as a "cybersecurity team" that aims to help victims secure their networks, and it was first spotted by MalwareHunterTeam on May 17, 2023. "


LockBit ransomware advisory from CISA provides interesting insights

exploits ransomware
2023-06-15 https://www.malwarebytes.com/blog/news/2023/06/lockbit-ransomware-advisory-from-cisa-provides-interesting-insights

Categories: News

Categories: Ransomware

Tags: CISA

Tags: LockBit

Tags: stats

Tags: RaaS

A joint advisory published by CISA, the FBI and many others shows some interesting stats that align with data found by Malwarebytes.

(Read more...)

The post LockBit ransomware advisory from CISA provides interesting insights appeared first on Malwarebytes Labs.

"

Autosummary: The US Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), Multi-State Information Sharing and Analysis Center (MS-ISAC), and the cybersecurity authorities of Australia, Canada, United Kingdom, Germany, France, and New Zealand (CERT NZ, NCSC-NZ) have all published a joint Cybersecurity Advisory about LockBit. To help organizations understand and defend against this global threat and its large number of unconnected LockBit affiliates, the advisory titled Understanding Ransomware Threat Actors: LockBit includes: A list of approximately 30 freeware and open-source tools used by LockBit actors Over 40 of their TTPs mapped to MITRE ATT&CK Observed common vulnerabilities and exposures (CVEs) used for exploitation An evolution of LockBit RaaS (Ransomware as a Service) along with worldwide trends and statistics Resources and services available from authoring agencies and recommended mitigations to help protect against the worldwide LockBit activity The advisory points out that in 2022, LockBit was the most active global ransomware group and RaaS provider in terms of the number of victims claimed on its data leak site.In the US, however, the main target of almost every commercial ransomware group, LockBit is responsible for 16% of attacks on public entities, which include municipal and county governments, public higher education and K-12 schools, as well as vital services like law enforcement agencies. "


CISA: LockBit ransomware extorted $91 million in 1,700 U.S. attacks

exploits ransomware
2023-06-14 https://www.bleepingcomputer.com/news/security/cisa-lockbit-ransomware-extorted-91-million-in-1-700-us-attacks/
U.S. and international cybersecurity authorities said in a joint LockBit ransomware advisory that the gang successfully extorted roughly $91 million following approximately 1,700 attacks against U.S. organizations since 2020. [...] "

Autosummary: "Since January 2020, affiliates using LockBit have attacked organizations of varying sizes across an array of critical infrastructure sectors, including financial services, food and agriculture, education, energy, government and emergency services, healthcare, manufacturing, and transportation. "


WannaCry ransomware impersonator targets Russian "Enlisted" FPS players

exploits ransomware rusia-ucrania
2023-06-14 https://www.bleepingcomputer.com/news/security/wannacry-ransomware-impersonator-targets-russian-enlisted-fps-players/
A ransomware operation targets Russian players of the Enlisted multiplayer first-person shooter, using a fake website to spread trojanized versions of the game. [...] "

Autosummary: Malicious website spreading Crypter ransomware (BleepingComputer) The installer downloaded from the fake website is "enlisted_beta-v1.0.3.115.exe," which drops two executable files on the user"s disk if launched, namely "ENLIST~1" (the actual game) and "enlisted" (the Python ransomware launcher). "


FUD Malware obfuscation engine BatCloak continues to evolve

exploits ransomware
2023-06-12 https://securityaffairs.com/147371/malware/fud-malware-obfuscation-engine-batcloak.html

Researchers detailed a fully undetectable (FUD) malware obfuscation engine named BatCloak that is used by threat actors. Researchers from Trend Micro have analyzed the BatCloak, a fully undetectable (FUD) malware obfuscation engine used by threat actors to stealthily deliver their malware since September 2022. The samples analyzed by the experts demonstrated a remarkable ability to persistently evade […]

The post FUD Malware obfuscation engine BatCloak continues to evolve appeared first on Security Affairs.

"

Autosummary: ScrubCrypt is designed to include testing on a host of popular pieces of malware such as Amadey, AsyncRAT, DarkCrystal RAT, Pure Miner, Quasar RAT, RedLine Stealer, Remcos RAT, SmokeLoader, VenomRAT, and Warzone RAT (aka Ave Maria). "


Understanding Ransomware Threat Actors: LockBit

exploits ransomware
2023-06-12 https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-165a

SUMMARY

In 2022, LockBit was the most deployed ransomware variant across the world and continues to be prolific in 2023. Since January 2020, affiliates using LockBit have attacked organizations of varying sizes across an array of critical infrastructure sectors, including financial services, food and agriculture, education, energy, government and emergency services, healthcare, manufacturing, and transportation. LockBit ransomware operation functions as a Ransomware-as-a-Service (RaaS) model where affiliates are recruited to conduct ransomware attacks using LockBit ransomware tools and infrastructure. Due to the large number of unconnected affiliates in the operation, LockBit ransomware attacks vary significantly in observed tactics, techniques, and procedures (TTPs). This variance in observed ransomware TTPs presents a notable challenge for organizations working to maintain network security and protect against a ransomware threat.

The Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), the Multi-State Information Sharing and Analysis Center (MS-ISAC), and the following international partners, hereafter referred to as “authoring organizations,” are releasing this Cybersecurity Advisory (CSA) detailing observed activity in LockBit ransomware incidents and providing recommended mitigations to enable network defenders to proactively improve their organization’s defenses against this ransomware operation. 

  • Australian Cyber Security Centre (ACSC)
  • Canadian Centre for Cyber Security (CCCS)
  • United Kingdom’s National Cyber Security Centre (NCSC-UK)
  • National Cybersecurity Agency of France (ANSSI)
  • Germany’s Federal Office for Information Security (BSI)
  • New Zealand’s Computer Emergency Response Team (CERT NZ) and National Cyber Security Centre (NCSC NZ) 

The authoring organizations encourage the implementation of the recommendations found in this CSA to reduce the likelihood and impact of future ransomware incidents.

Autosummary: PaperCut MF/NG Improper Access Control Vulnerability LockBit affiliates have been documented exploiting numerous CVEs, including: CVE-2021-44228: Apache Log4j2 Remote Code Execution Vulnerability, CVE-2021-22986: F5 BIG-IP and BIG-IQ Centralized Management iControl REST Remote Code Execution Vulnerability, CVE-2020-1472: NetLogon Privilege Escalation Vulnerability, CVE-2019-0708: Microsoft Remote Desktop Services Remote Code Execution Vulnerability, and CVE-2018-13379: The Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), the Multi-State Information Sharing and Analysis Center (MS-ISAC), and the following international partners, hereafter referred to as “authoring organizations,” are releasing this Cybersecurity Advisory (CSA) detailing observed activity in LockBit ransomware incidents and providing recommended mitigations to enable network defenders to proactively improve their organization’s defenses against this ransomware operation.Since January 2020, affiliates using LockBit have attacked organizations of varying sizes across an array of critical infrastructure sectors, including financial services, food and agriculture, education, energy, government and emergency services, healthcare, manufacturing, and transportation.[1] A RaaS cybercrime group maintains the functionality of a particular ransomware variant, sells access to that ransomware variant to individuals or groups of operators (often referred to as “affiliates”), and supports affiliates’ deployment of their ransomware in exchange for upfront payment, subscription fees, a cut of profits, or a combination of upfront payment, subscription fees, and a cut of profits. Table 3: ANSSI-Observed LockBit Strain and Number of Instances Name of the Strain* Number of Instances LockBit 2.0 (LockBit Red) 26 LockBit 3.0 (LockBit Black) 23 LockBit 21 LockBit Green 1 LockBit (pre-encryption) 1 Total 72** * Name either obtained from ANSSI’s or the victim’s investigations ** Includes incidents with multiple strains Figure 1: ANSSI-Observed LockBit Strains by Year From the incidents handled, ANSSI can infer that LockBit 3.0 widely took over from LockBit 2.0 and the original LockBit strain from 2022.Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by the authoring organizations.In the Initial Access phase, mitigations working together to deny an attacker network access include securing internet-exposed services, patching devices, implementing MFA, disabling macros, employing application allowlisting, and using logging and alerting. LockBit Statistics Percentage of ransomware incidents attributed to LockBit: Australia: From April 1, 2022, to March 31, 2023, LockBit made up 18% of total reported Australian ransomware incidents.[7] April 2023 LockBit ransomware encryptors targeting macOS seen on VirusTotal [8, 9] LockBit 2.0, LockBit 3.0, LockBit Green, and LockBit Linux-ESXi Locker are still available for affiliates’ use on LockBit’s panel. Defense Evasion Apply local security policies to control application execution (e.g., Software Restriction Policies (SRP), AppLocker, Windows Defender Application Control (WDAC)) with a strict allowlist. Critical Controls Key Figure 3: Stopping Ransomware Using Layered Mitigations Validate Security Controls In addition to applying mitigations, the authoring organizations recommend exercising, testing, and validating your organization"s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. United States: In 2022, 16% of the State, Local, Tribal, and Tribunal (SLTT) government ransomware incidents reported to the MS-ISAC were identified as LockBit attacks. Table 2: ANSSI-Observed LockBit vs. Overall Ransomware Activity Year Number of Incidents Percentage of CERT-FR’s Ransomware-Related Activity 2020 (from July) 4 2% 2021 20 10% 2022 30 27% 2023 15 27% Total (2020-2023) 69 11% Table 3 shows the number of instances different LockBit strains were observed by ANSSI from July 2020 to present. Impact Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (e.g., hard drive, storage device, the cloud)T1048 Exfiltration Over Alternative Protocol Common Vulnerabilities and Exposures (CVEs) Exploited Based on secondary sources, it was noted that affiliates exploit older vulnerabilities like CVE-2021-22986, F5 iControl REST unauthenticated Remote Code Execution Vulnerability, as well as newer vulnerabilities such as: CVE-2023-0669:Impair Defenses: Disable or Modify Tools T1562.001 LockBit 3.0 affiliates use Backstab, Defender Control, GMER, PCHunter, PowerTool, Process Hacker or TDSSKiller to disable EDR processes and services.In particular, you can no longer use New Technology Local Area Network (LAN) Manager (NTLM) classic authentication single sign-on, Kerberos unconstrained delegation, as well as Data Encryption Standard (DES) encryption.In particular, you can no longer use New Technology Local Area Network (LAN) Manager (NTLM) classic authentication single sign-on, Kerberos unconstrained delegation, as well as Data Encryption Standard (DES) encryption. (e.g., Software Restriction Policies (SRP), AppLocker, Windows Defender Application Control (WDAC)) with a strict allowlist.System Information Discovery T1082 LockBit affiliates will enumerate system information to include hostname, host configuration, domain information, local drive configuration, remote shares, and mounted external storage devices.When repurposed by LockBit, these tools are then used for a range of malicious cyber activity, such as network reconnaissance, remote access and tunneling, credential dumping, and file exfiltration.In the Consolidation and Preparation phase, mitigations working together to keep an attacker from accessing network devices are patching devices, using network segmentation, enforcing the principle of least privilege, implementing MFA, and using logging and alerting. to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (e.g., hard drive, storage device, the cloud) References [1] LockBit, BlackCat, and Royal Dominate the Ransomware Scene [2] Ransomware Diaries: Volume 1 [3] What is LockBit ransomware and how does it operate? (MFA) for all services to the extent possible, particularly for webmail, virtual private networks, and privileged accounts that access critical systems [CPG 2.H].This included ransomware incidents impacting municipal governments, county governments, public higher education and K-12 schools, and emergency services (e.g., law enforcement). with password logins (e.g., service account, admin accounts, and domain admin accounts) to comply with NIST standards for developing and managing password policies [CPG 2.L].For example, account use polices are mitigations for initial access, persistence, privilege escalation, and credential access but would be listed under initial access mitigations.Exfiltration Over Web Service: Exfiltration to Cloud Storage T1567.002 LockBit affiliates use (1) Rclone, an open-source command line cloud storage manager or FreeFileSync to exfiltrate and (2) MEGA, a publicly available file sharing service for data exfiltration. Table 15: LockBit Affiliates’ ATT&CK Techniques for Enterprise – Exfiltration Technique Title ID Use Exfiltration TA0010 LockBit affiliates use StealBit, a custom exfiltration tool first used with LockBit 2.0, to steal data from a target network. "


BlackCat ransomware fails to extort Australian commercial law giant

exploits ransomware
2023-06-09 https://www.bleepingcomputer.com/news/security/blackcat-ransomware-fails-to-extort-australian-commercial-law-giant/
Australian law firm HWL Ebsworth confirmed to local media outlets that its network was hacked after the ALPHV ransomware gang began leaking data they claim was stolen from the company. [...] "

Autosummary: "


Japanese Pharmaceutical giant Eisai hit by a ransomware attack

exploits ransomware
2023-06-09 https://securityaffairs.com/147276/cyber-crime/eisai-ransomware-attack.html

This week, the Japanese pharmaceutical giant Eisai has taken its systems offline in response to a ransomware attack. Eisai is a Japanese pharmaceutical company with about 10,000 employees and more than $5 billion in revenue. The company this week was forced to take certain systems offline in response to a cyber attack In response to the ransomware […]

The post Japanese Pharmaceutical giant Eisai hit by a ransomware attack appeared first on Security Affairs.

"

Autosummary: "


Clop ransomware gang was testing MOVEit Transfer bug since 2021

exploits ransomware
2023-06-09 https://securityaffairs.com/147264/cyber-crime/clop-testing-moveit-transfer-bug-2021.html

Researchers discovered that the Clop ransomware gang was looking for a zero-day exploit in the MOVEit Transfer since 2021. Kroll security experts discovered that the Clop ransomware gang was looking for a zero-day exploit in the MOVEit Transfer since 2021. Kroll investigated the exploitation attempts for the MOVEit Transfer vulnerability and discovered that Clop threat […]

The post Clop ransomware gang was testing MOVEit Transfer bug since 2021 appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, Clop ransomware) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On “Kroll assesses with high confidence that the MOVEit Transfer exploit as it exists today: Was available and being used/tested in April 2022 Was available and being used/tested in July 2021″ This week, the Clop ransomware group claimed to have compromised hundreds of companies worldwide by exploiting a vulnerability in MOVEit Transfer software. "


The Week in Ransomware - June 9th 2023 - It’s Clop... Again!

exploits ransomware
2023-06-09 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-june-9th-2023-its-clop-again/
The week was dominated by fallout over the MOVEit Transfer data-theft attacks, with the Clop ransomware gang confirming that they were behind them. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @serghei, @LawrenceAbrams, @malwrhunterteam, @BleepinComputer, @demonslay335, @DanielGallagher, @fwosar, @billtoulas, @KrollWire, @Mar_Pich, @RedSenseIntel, @CISAgov, @FBI, @MsftSecIntel, @pcrisk, @TrendMicro, @PogoWasRight, @catabatarce, @GossiTheDog, @BrettCallow, and @uptycs. June 7th 2023 According to open source information, beginning on May 27, 2023, CL0P Ransomware Gang, also known as TA505, began exploiting a previously unknown SQL injection vulnerability (CVE-2023-34362) in Progress Software"s managed file transfer (MFT) solution known as MOVEit Transfer. "


Royal ransomware gang adds BlackSuit encryptor to their arsenal

exploits ransomware
2023-06-08 https://www.bleepingcomputer.com/news/security/royal-ransomware-gang-adds-blacksuit-encryptor-to-their-arsenal/
The Royal ransomware gang has begun testing a new encryptor called BlackSuit that shares many similarities with the operation"s usual encryptor. [...] "

Autosummary: BlackSuit ransomware data leak site Source: BleepingComputer However, a rebrand would no longer make sense, as a recent report by Trend Micro has shown clear similarities between the BlackSuit and Royal Ransomware encryptors, making it hard to convince anyone that they are a new ransomware operation. "


Japanese pharma giant Eisai discloses ransomware attack

exploits ransomware
2023-06-08 https://www.bleepingcomputer.com/news/security/japanese-pharma-giant-eisai-discloses-ransomware-attack/
Pharmaceutical company Eisai has disclosed it suffered a ransomware incident that impacted its operations, admitting that attackers encrypted some of its servers. [...] "

Autosummary: A weekend ransomware attack In a notification posted to their website, Eisai disclosed that they suffered a ransomware attack over the weekend, a typical time for attackers to deploy encryptors as IT teams are understaffed and unable to respond effectively to the rapidly evolving situation. "


Clop Ransomware Gang Likely Exploiting MOVEit Transfer Vulnerability Since 2021

exploits ransomware
2023-06-08 https://thehackernews.com/2023/06/clop-ransomware-gang-likely-exploiting.html
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) have published a joint advisory regarding the active exploitation of a recently disclosed critical flaw in Progress Software"s MOVEit Transfer application to drop ransomware. "The Cl0p Ransomware Gang, also known as TA505, reportedly began exploiting a previously unknown SQL injection "

Autosummary: "Several of these hosts are associated with high-profile organizations, including multiple Fortune 500 companies and both state and federal government agencies," Censys noted, highlighting finance, technology, and healthcare as the sectors with the most exposures. "


Clop ransomware likely testing MOVEit zero-day since 2021

exploits ransomware
2023-06-08 https://www.bleepingcomputer.com/news/security/clop-ransomware-likely-testing-moveit-zero-day-since-2021/
The Clop ransomware gang has been looking for ways to exploit a now-patched zero-day in the MOVEit Transfer managed file transfer (MFT) solution since 2021, according to Kroll security experts. [...] "

Autosummary: Clop collecting victim info in April 2022 (Kroll) "Kroll observed activity consistent with MOVEit Transfer exploitation that collectively occurred on April 27, 2022; May 15–16, 2023; and May 22, 2023, indicating that actors were testing access to organizations via likely automated means and pulling back information from the MOVEit Transfer servers to identify which organization they were accessing," the report reveals. "


Winning the Mind Game: The Role of the Ransomware Negotiator

exploits ransomware
2023-06-07 https://thehackernews.com/2023/06/winning-mind-game-role-of-ransomware.html
Get exclusive insights from a real ransomware negotiator who shares authentic stories from network hostage situations and how he managed them. The Ransomware Industry Ransomware is an industry. As such, it has its own business logic: organizations pay money, in crypto-currency, in order to regain control over their systems and data. This industry"s landscape is made up of approximately 10-20 "

Autosummary: Includes understanding what was compromised, how deep the attackers are in the system, whether the act is a single, double or triple ransomware, if the attack was financially motivated or if it was a political or personal attack, etc.A few months later, the FBI reported they had attacked prominent ransomware group REvil: The attack garnered a response from the Conti group, which reflected their ideological motives: Ransomware Vaccinations Managing a ransomware event is similar to managing a hostage situation. The technological track includes forensic, investigation, containment, remediation and recovery, as well as professional dialogue.For example, how deep the attackers are in the system, how much data was exfiltrated, etc. The business track covers business continuity plans and media and PR. "


0mega ransomware gang changes tactics

exploits ransomware industry
2023-06-07 https://www.helpnetsecurity.com/2023/06/07/0mega-ransomware-gang-changes-tactics/

A number of ransomware gangs have stopped using malware to encrypt targets’ files and have switched to a data theft/extortion approach to get paid; 0mega – a low-profile and seemingly not very active threat actor – seems to be among them. About the 0mega ransomware operation 0mega (spelled with a zero) is a relative newcomer to the ransomware/extortion business. Evidence of its activities were first spotted roughly a year ago, when one victim – a … More

The post 0mega ransomware gang changes tactics appeared first on Help Net Security.

"

Autosummary: The attackers first compromised one of the company’s Microsoft Global admin service accounts that did not have multi-factor authentication enabled, then used it to create a new Microsoft AD user called 0mega and added various permissions to it (Global Administrator, SharePoint Administrator, Exchange Administrator, Teams Administrator). "


Clop ransomware gang claims the hack of hundreds of victims exploiting MOVEit Transfer bug

exploits ransomware
2023-06-07 https://securityaffairs.com/147195/cyber-crime/clop-ransomware-moveit-transfer-attacks.html

Clop ransomware group claims to have hacked hundreds of companies globally by exploiting MOVEit Transfer vulnerability. The Clop ransomware group may have compromised hundreds of companies worldwide by exploiting a vulnerability in MOVEit Transfer software. MOVEit Transfer is a managed file transfer that is used by enterprises to securely transfer files using SFTP, SCP, and […]

The post Clop ransomware gang claims the hack of hundreds of victims exploiting MOVEit Transfer bug appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, Clop ransomware group) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Cyclops Ransomware Gang Offers Go-Based Info Stealer to Cybercriminals

exploits ransomware ciber
2023-06-06 https://thehackernews.com/2023/06/cyclops-ransomware-gang-offers-go-based.html
Threat actors associated with the Cyclops ransomware have been observed offering an information stealer malware that"s designed to capture sensitive data from infected hosts. "The threat actor behind this [ransomware-as-a-service] promotes its offering on forums," Uptycs said in a new report. "There it requests a share of profits from those engaging in malicious activities using its malware." "

Autosummary: "


Cyclops Ransomware group offers a multiplatform Info Stealer

exploits ransomware
2023-06-06 https://securityaffairs.com/147127/cyber-crime/cyclops-ransomware-gang-info-stealer.html

Researchers from security firm Uptycs reported that threat actors linked to the Cyclops ransomware are offering a Go-based information stealer. The Cyclops group has developed multi-platform ransomware that can infect Windows, Linux, and macOS systems. In an unprecedented move, the group is also offering a separate information-stealer malware that can be used to steal sensitive data from infected […]

The post Cyclops Ransomware group offers a multiplatform Info Stealer appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, Cyclops ransomware) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Cl0p ransomware gang claims first victims of the MOVEit vulnerability

exploits ransomware
2023-06-06 https://www.malwarebytes.com/blog/news/2023/06/cl0p-ransomware-gang-claims-first-victims-of-the-moveit-vulnerability

Categories: Exploits and vulnerabilities

Categories: News

Categories: Ransomware

Tags: Progress

Tags: MOVEit

Tags: Transfer

Tags: CVE-2023-34362

Tags: BBC

Tags: Zellis

Tags: BA

The first victims of the ongoing attacks on vulnerable MOVEit Transfer instances are coming forward. The Cl0p ransomware gang claims it is behind the attacks.

(Read more...)

The post Cl0p ransomware gang claims first victims of the MOVEit vulnerability appeared first on Malwarebytes Labs.

"

Autosummary: In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), and 2023.0.1 (15.0.1), a SQL injection vulnerability has been found in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain access to MOVEit Transfer"s database.Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, and execute SQL statements that alter or delete database elements.MOVEit and blocks five malicious IP addresses—138.197.152.201, 209.97.137.33, 5.252.191.0/24, 148.113.152.144, 89.39.105.108—that were found to be looking for vulnerable systems. "


#StopRansomware: CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability

exploits ransomware
2023-06-06 https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-158a

SUMMARY

Note: this joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

Actions to take today to mitigate cyber threats from CL0P ransomware: 

  • Take an inventory of assets and data, identifying authorized and unauthorized devices and software.
  • Grant admin privileges and access only when necessary, establishing a software allow list that only executes legitimate applications.
  • Monitor network ports, protocols, and services, activating security configurations on network infrastructure devices such as firewalls and routers.
  • Regularly patch and update software and applications to their latest versions, and conduct regular vulnerability assessments.

The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint CSA to disseminate known CL0P ransomware IOCs and TTPs identified through FBI investigations as recently as June 2023.

According to open source information, beginning on May 27, 2023, CL0P Ransomware Gang, also known as TA505, began exploiting a previously unknown SQL injection vulnerability (CVE-2023-34362) in Progress Software"s managed file transfer (MFT) solution known as MOVEit Transfer. Internet-facing MOVEit Transfer web applications were infected with a web shell named LEMURLOOT, which was then used to steal data from underlying MOVEit Transfer databases. In similar spates of activity, TA505 conduct "

Autosummary: RESOURCES REFERENCE [1] Zero-Day Vulnerability in MOVEit Transfer Exploited for Data Theft | Mandiant [2] MOVEit Transfer Critical Vulnerability (May 2023) - Progress Community [3] MOVEit Transfer Critical Vulnerability CVE-2023-34362 Rapid Response (huntress.com) REPORTING The FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with CL0P group actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.Headers[\"X-siLock-Comment\"]" $a3 = "Delete FROM users WHERE RealName="Health Check Service"" $a4 = "set[\"Username\"]" $a5 = "INSERT INTO users (Username, LoginName, InstID, Permission, RealName" $a6 = "Encryption. In addition, the authoring authorities of this CSA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques and to reduce the impact and risk of compromise by ransomware or data extortion actors: Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (i.e., hard drive, storage device, the cloud)."https://www.bleepingcomputer.com/news/security/new-moveit-transfer-zero-day-mass-exploited-in-data-theft-attacks/" reference3 = "https://gist.github.com/JohnHammond/44ce8556f798b7f6a7574148b679c643" verdict = "dangerous" mitre = "T1505.003" platform = "windows" search_context = "filesystem" strings: $a1 = "MOVEit.DMZ" $a2 = "Request.This MOVEit Transfer critical vulnerability exploit impacts the following versions of the software [2]: MOVEit Transfer 2023.0.0 MOVEit Transfer 2022.1.x MOVEit Transfer 2022.0.x MOVEit Transfer 2021.1.x MOVEit Transfer 2021.0.x MOVEit Transfer 2020.1.x MOVEit Transfer 2020.0.x Due to the speed and ease TA505 has exploited this vulnerability, and based on their past campaigns, FBI and CISA expect to see widespread exploitation of unpatched software services in both private and public networks. TA505 has operated: A RaaS and has acted as an affiliate of other RaaS operations, As an initial access broker (IAB), selling access to compromised corporate networks, As a customer of other IABs, And as a large botnet operator specializing in financial fraud and phishing attacks.You can contact us using the following contact information: unlock@rsv-box[.]com and unlock@support-mult[.]com CL0P’s toolkit contains several malware types to collect information, including the following: FlawedAmmyy/FlawedGrace remote access trojan (RAT) collects information and attempts to communicate with the Command and Control (C2) server to enable the download of additional malware components [T1071], [T1105].Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA or the FBI.Email Malicious Domain http://hiperfdhaus[.]com http://jirostrogud[.]com http://qweastradoc[.]com http://qweastradoc[.]com/gate.php http://connectzoomdownload[.]com/download/ZoomInstaller.exe https://connectzoomdownload[.]com/download/ZoomInstaller.exe http://zoom[.]voyage/download/Zoom.exe http://guerdofest[.]com/gate.php Certificate Name Status Date Valid Thumbprint Serial Number Savas Investments PTY LTD Valid Issuer: Sectigo Public Code Signing CA R36 10/7/2022 - 10/7/2023 8DCCF6AD21A58226521 E36D7E5DBAD133331C181 00-82-D2-24-32-3E-FA-65-06-0B-64- 1F-51-FA-DF-EF-02 MOVEit Campaign Infrastructure IP Addresses May/June 2023 GoAnywhere Campaign Infrastructure IP Addresses January/February 2023 104.194.222[.]107 100.21.161[.]34 138.197.152[.]201 104.200.72[.]149 146.0.77[.]141 107.181.161[.]207 146.0.77[.]155 141.101.68[.]154 146.0.77[.]183 141.101.68[.]166 According to open source information, beginning on May 27, 2023, CL0P Ransomware Gang, also known as TA505, began exploiting a previously unknown SQL injection vulnerability (CVE-2023-34362) in Progress Software"s managed file transfer (MFT) solution known as MOVEit Transfer."https://www.bleepingcomputer.com/news/security/new-moveit-transfer-zero-day-mass-exploited-in-data-theft-attacks/" reference3 = "https://gist.github.com/JohnHammond/44ce8556f798b7f6a7574148b679c643" verdict = "dangerous" mitre = "T1505.003" platform = "windows" search_context = "filesystem" strings: $a1 = "human2.aspx" wide $a2 = "Delete FROM users WHERE RealName="Health Check Service"" wide $a3 = to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (i.e., hard drive, storage device, the cloud).The web shell authenticates incoming http requests via a hard-coded password and can run commands that will download files from the MOVEit Transfer system, extract its Azure system settings, retrieve detailed record information, and create, insert, or delete a particular user. SELECT * FROM [<database name>].[dbo].[users] WHERE Permission=30 AND Status="active" and Deleted="0" rule MOVEit_Transfer_exploit_webshell_aspx { meta: date = "2023-06-01" description = "Detects indicators of compromise in MOVEit Transfer exploitation." with password logins (e.g., service account, admin accounts, and domain admin accounts) with National Institute for Standards and Technology (NIST) standards for developing and managing password policies. In late January 2023, the CL0P ransomware group launched a campaign using a zero-day vulnerability, now catalogued as CVE-2023-0669, to target the GoAnywhere MFT platform. Table 1. ATT&CK Techniques for Enterprise: Initial Access Initial Access Technique Title ID Use Exploit Public-Facing Application T1190 CL0P ransomware group exploited the zero-day vulnerability CVE-2023-34362 affecting MOVEit Transfer software; begins with a SQL injection to infiltrate the MOVEit Transfer web application. "


Spanish bank Globalcaja confirms Play ransomware attack

financial exploits ransomware
2023-06-05 https://securityaffairs.com/147073/cyber-crime/globalcaja-confirms-play-ransomware-attack.html

Play ransomware group claims responsibility for a ransomware attack that hit Globalcaja, one of the major banks in Spain. Globalcaja is a financial institution in the autonomous community of Castilla-La Mancha, it has more than 300 offices across Spain and provides banking services to more than half a million clients. Globalcaja was the victim of […]

The post Spanish bank Globalcaja confirms Play ransomware attack appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, Globalcaja) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Microsoft links Clop ransomware gang to MOVEit data-theft attacks

exploits ransomware
2023-06-05 https://www.bleepingcomputer.com/news/security/microsoft-links-clop-ransomware-gang-to-moveit-data-theft-attacks/
Microsoft has linked the Clop ransomware gang to recent attacks exploiting a zero-day vulnerability in the MOVEit Transfer platform to steal data from organizations. [...] "

Autosummary: "Microsoft is attributing attacks exploiting the CVE-2023-34362 MOVEit Transfer 0-day vulnerability to Lace Tempest, known for ransomware operations & running the Clop extortion site," the Microsoft Threat Intelligence team tweeted Sunday night. "


Microsoft blames Clop ransomware gang for ‘MOVEit Transfer’ attacks

exploits ransomware
2023-06-05 https://securityaffairs.com/147093/hacking/clop-ransomware-moveit-transfer.html

Microsoft attributes the recent campaign exploiting a zero-day in the MOVEit Transfer platform to the Clop ransomware gang. The Clop ransomware gang (aka Lace Tempest) is credited by Microsoft for the recent campaign that exploits a zero-day vulnerability, tracked as CVE-2023-34362, in the MOVEit Transfer platform. Microsoft is attributing attacks exploiting the CVE-2023-34362 MOVEit Transfer […]

The post Microsoft blames Clop ransomware gang for ‘MOVEit Transfer’ attacks appeared first on Security Affairs.

"

Autosummary: — Microsoft Threat Intelligence (@MsftSecIntel) June 5, 2023 Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, clop ransomware) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Clop ransomware claims responsibility for MOVEit extortion attacks

exploits ransomware
2023-06-05 https://www.bleepingcomputer.com/news/security/clop-ransomware-claims-responsibility-for-moveit-extortion-attacks/
The Clop ransomware gang has told BleepingComputer they are behind the MOVEit Transfer data-theft attacks, where a zero-day vulnerability was exploited to breach multiple companies" servers and steal data. [...] "

Autosummary: "I want to tell you right away that the military, children"s hospitals, GOV etc like this we no to attack, and their data was erased," Clop said in their email to BleepingComputer. "


Play ransomware gang compromises Spanish bank, threatens to leak files

financial exploits ransomware
2023-06-05 https://www.malwarebytes.com/blog/news/2023/06/play-ransomware-gang-compromises-spanish-bank-threatens-to-leak-files

Categories: Business

Tags: globalcaja

Tags: play ransomware

Tags: compromise

Tags: data

Tags: leak

Tags: ransom

Tags: bank

Tags: banking

Tags: Spain

Tags: Spanish

A large Spanish bank, Globalcaja, has fallen victim to the Play ransomware gang.

(Read more...)

The post Play ransomware gang compromises Spanish bank, threatens to leak files appeared first on Malwarebytes Labs.

"

Autosummary: Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.From the outset, in #Globalcaja we activated the security protocol created for this purpose, which led us, out of prudence, to disable some office posts, temporarily limiting the performance of some operations. El mismo no ha afectado al transaccional de la entidad (ni las cuentas ni los acuerdos de los clientes se… pic.twitter.com/LeQdNN8r1i — Globalcaja (@SomosGlobalcaja) June 2, 2023 Yesterday, we registered a cyber incident, consisting of a computer attack on some local computers through a type #ransomware virus. "


The 2023 State of Ransomware in Education: 84% increase in attacks over 6-month period

exploits government ransomware
2023-06-05 https://www.malwarebytes.com/blog/threat-intelligence/2023/06/the-2023-state-of-ransomware-in-education-84-increase-in-known-attacks-over-6-month-period

Categories: Threat Intelligence

In total, 26 separate ransomware-as-a-service gangs contributed to the onslaught on education.

(Read more...)

The post The 2023 State of Ransomware in Education: 84% increase in attacks over 6-month period appeared first on Malwarebytes Labs.

"

Autosummary: USA education ransomware attacks by gang, June 2022-May 2023 Global education ransomware attacks by gang, June 2022-May 2023 Looking Ahead To recap, our key findings include: A significant increase in attacks : The education sector experienced a steep rise in ransomware attacks, with a 84% increase observed over a 6-month period. Distribution of Vice Society attacks vs other ransomware gangs, June 2022-May 2023 Further findings from the data show that, while ransomware attacks against education are a global phenomenon, the USA (with 56% of known attacks) and the UK (with 15%) were hit the most frequently attacked countries between June 2022 and May 2023. Known attacks on education by country, June 2022-May 2023 The United Kingdom followed distantly with 28 known attacks, while other countries like Canada, Germany, Brazil, and others also fell prey to these cybercriminals. "


New Linux Ransomware Strain BlackSuit Shows Striking Similarities to Royal

exploits ransomware
2023-06-03 https://thehackernews.com/2023/06/new-linux-ransomware-strain-blacksuit.html
An analysis of the Linux variant of a new ransomware strain called BlackSuit has covered significant similarities with another ransomware family called Royal. Trend Micro, which examined an x64 VMware ESXi version targeting Linux machines, said it identified an "extremely high degree of similarity" between Royal and BlackSuit. "In fact, they"re nearly identical, with 98% similarities in "

Autosummary: "In fact, they"re nearly identical, with 98% similarities in functions, 99.5% similarities in blocks, and 98.9% similarities in jumps based on BinDiff, a comparison tool for binary files," Trend Micro researchers noted. "


New Linux Ransomware BlackSuit is similar to Royal ransomware

exploits ransomware
2023-06-03 https://securityaffairs.com/147002/cyber-crime/blacksuit-similar-royal-ransomware.html

Experts noticed that the new Linux ransomware BlackSuit has significant similarities with the Royal ransomware family. Royal ransomware is one of the most notable ransomware families of 2022, it made the headlines in early May 2023 with the attack against the IT systems in Dallas, Texas. The human-operated Royal ransomware first appeared on the threat landscape in September 2022, it has […]

The post New Linux Ransomware BlackSuit is similar to Royal ransomware appeared first on Security Affairs.

"

Autosummary: The ransomware encrypts the network shares, that are found on the local network and the local drives, with the AES algorithm In early May, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) released a joint Cybersecurity Advisory (CSA) to provide organizations, tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) associated with this ransomware family. "


Point32Health ransomware attack exposed info of 2.5M people

exploits ransomware
2023-06-02 https://securityaffairs.com/146975/data-breach/point32health-ransomware-attack-2.html

After the recent ransomware attack, Point32Health disclosed a data breach that impacted 2.5 million Harvard Pilgrim Health Care subscribers. In April, the non-profit health insurer Point32Health took systems offline in response to a ransomware attack that took place on April 17. The insurer immediately launched an investigation into the incident with the help of third-party […]

The post Point32Health ransomware attack exposed info of 2.5M people appeared first on Security Affairs.

"

Autosummary: Stolen data include names, addresses, phone numbers, birth dates, Social Security numbers, health insurance account information, taxpayer identification numbers, and clinical information, including medical history, diagnoses, and treatment details. "


The Week in Ransomware - June 2nd 2023 - Whodunit?

exploits ransomware
2023-06-02 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-june-2nd-2023-whodunit/
It has been a fairly quiet week regarding ransomware, with only a few reports released and no new significant attacks. However, we may have a rebrand in the making, and a ransomware operation is likely behind a new zero-day data-theft campaign, so we have some news to talk about. [...] "

Autosummary: We also learned about some previous ransomware attacks, including @Seifreed, @billtoulas, @Ionut_Ilascu, @struppigel, @BleepinComputer, @serghei, @LawrenceAbrams, @malwrhunterteam, @demonslay335, @fwosar, @rapid7, @HuntressLabs, @GossiTheDog, @IBMSecurity, @TrendMicro, @Avast, @jgreigj, and @pcrisk. May 30th 2023 BlackCat ransomware, which was among the top ransomware families observed by IBM Security X-Force in 2022, according to the 2023 X-Force Threat Intelligence Index, continues to wreak havoc across organizations globally this year. "


Fighting ransomware: Perspectives from cybersecurity professionals

exploits ransomware ciber
2023-06-01 https://www.helpnetsecurity.com/2023/06/01/ransomware-experts-round-up-video/

Ransomware has become an ever-present threat to individuals, businesses, and even entire nations. In this Help Net Security round-up, we present parts of previously recorded videos from experts in the field that shed light on the pressing ransomware issues. Complete videos David Mahdi, Chief Strategy Officer & CISO Advisory at Sectigo, talks about how ransomware isn’t solely a malware problem, bad actors want access to your data, so it really is a data security and … More

The post Fighting ransomware: Perspectives from cybersecurity professionals appeared first on Help Net Security.

"

Autosummary: "


Improved BlackCat Ransomware Strikes with Lightning Speed and Stealthy Tactics

exploits ransomware industry
2023-06-01 https://thehackernews.com/2023/06/improved-blackcat-ransomware-strikes.html
The threat actors behind BlackCat ransomware have come up with an improved variant that prioritizes speed and stealth in an attempt to bypass security guardrails and achieve their goals. The new version, dubbed Sphynx and announced in February 2023, packs a "number of updated capabilities that strengthen the group"s efforts to evade detection," IBM Security X-Force said in a new analysis. The " "

Autosummary: Sphynx also incorporates a loader to decrypt the ransomware payload that, upon execution, performs network discovery activities to hunt for additional systems, deletes volume shadow copies, encrypts files, and finally drops the ransom note. "


Harvard Pilgrim Health Care ransomware attack hits 2.5 million people

exploits ransomware
2023-06-01 https://www.bleepingcomputer.com/news/security/harvard-pilgrim-health-care-ransomware-attack-hits-25-million-people/
Harvard Pilgrim Health Care (HPHC) has disclosed that a ransomware attack it suffered in April 2023 impacted 2,550,922 people, with the threat actors also stealing their sensitive data from compromised systems. [...] "

Autosummary: The stolen files include the following types of sensitive information: Full names Physical addresses Phone numbers Dates of birth Health insurance account information Social Security numbers Provider taxpayer identification numbers Clinical information, including medical history, diagnoses, treatment, dates of service, and provider names The organization has clarified that the incident impacts current and former members of Harvard Pilgrim, who had a registration date starting on March 28, 2012. "


7 Stages of Application Testing: How to Automate for Continuous Security

ransomware
2023-05-31 https://www.bleepingcomputer.com/news/security/7-stages-of-application-testing-how-to-automate-for-continuous-security/
There are seven main stages of a complex pen testing process that must be followed in order to effectively assess an application"s security posture. Learn more from OutPost24 about these stages and how PTaaS can find flaws in web applications, [...] "

Autosummary: This includes webpages, databases, APIs, and other server-side components, network mapping, service identification, and fingerprinting. The Seven Stages of Penetration Testing There are seven main stages of a complex pen testing process that must be followed in order to effectively assess an application’s security posture: Pre-engagement: Before beginning the actual pen testing process, it is important to properly prepare the environment and define objectives.Pen testers collect information about the target application, including architecture, technologies used, potential entry points, and user roles. With Outpost24"s PTaaS, organizations can benefit from continuous security monitoring, proactive vulnerability detection, and streamlined remediation processes.By providing one-click fixes for common issues, PTaaS simplifies the remediation process, enabling developers to quickly address vulnerabilities without extensive security expertise. "


Dark Pink hackers continue to target govt and military organizations

ransomware
2023-05-31 https://www.bleepingcomputer.com/news/security/dark-pink-hackers-continue-to-target-govt-and-military-organizations/
The Dark Pink APT hacking group continues to be very active in 2023, observed targeting government, military, and education organizations in Indonesia, Brunei, and Vietnam. [...] "

Autosummary: These tools include "AccCheckConsole.exe," "remote.exe," "Extexport.exe," "MSPUB.exe," and "MSOHTMED.exe," which can be exploited for proxy execution, downloading additional payloads, and more. "


MCNA Dental data breach impacts 8.9 million people after ransomware attack

financial exploits ransomware
2023-05-29 https://www.bleepingcomputer.com/news/security/mcna-dental-data-breach-impacts-89-million-people-after-ransomware-attack/
Managed Care of North America (MCNA) Dental has published a data breach notification on its website, informing almost 9 million patients that their personal data were compromised. [...] "

Autosummary: Full name Address Date of birth Phone number Email Social Security number Driver’s license number Government-issued ID number Health insurance (plan information, insurance company, member number, Medicaid-Medicare ID numbers) Care for teeth or braces (visits, dentist name, doctor name, past care, x-rays/photos, medicines, and treatment) Bills and insurance claims The notification filed with the Office of the Maine Attorney General says the breach impacted 8,923,662 people, including patients, parents, guardians, or guarantors. "


3 Challenges in Building a Continuous Threat Exposure Management (CTEM) Program and How to Beat Them

ransomware
2023-05-29 https://thehackernews.com/2023/05/3-challenges-in-building-continuous.html
If you"re a cybersecurity professional, you"re likely familiar with the sea of acronyms our industry is obsessed with. From CNAPP, to CWPP, to CIEM and all of the myriad others, there seems to be a new initialism born each day. In this article, we"ll look at another trending acronym – CTEM, which stands for Continuous Threat Exposure Management – and the often-surprising challenges that come "

Autosummary: (Gartner, 21 July 2022, Implement a Continuous Threat Exposure Management (CTEM) Program) Download our new whitepaper, Establishing a Modern Exposure Management Program, and discover: Why critical vulnerability does not equal risk The different types of exposures impacting organizational security posture The key fundamentals of a modern exposure management program designed for an evolving risk landscape And more! Challenge 2 – Seeing the bird"s eye view A comprehensive CTEM program covers many different areas, from Cloud, to AD, to software vulnerabilities, to network security and basically everything else. Challenge 1 – Getting non-security and security on the same page It"s a well-known fact that IT/infrastructure/DevOps/application, etc. teams and security teams don"t always speak the same language; this is problematic in numerous ways but when implementing new programs or undertakings, this disconnect can become even more problematic. "


Lockbit ransomware attack on MCNA Dental impacts 8.9M individuals

exploits ransomware
2023-05-29 https://securityaffairs.com/146804/data-breach/mcna-data-breach.html

Managed Care of North America (MCNA) Dental disclosed a data breach that impacted more than 8.9 million individuals. Managed Care of North America (MCNA) Dental suffered a data breach that impacted 8,923,662 patients. MCNA Dental is one of the largest US dental care and oral health insurance providers. The security breach exposed the personal information […]

The post Lockbit ransomware attack on MCNA Dental impacts 8.9M individuals appeared first on Security Affairs.

"

Autosummary: Stole data includes demographic information to identify and contact patients, such as full name, date of birth, address, telephone and email; Social Security number; driver’s license number or government-issued identification number; health insurance information, such as name of plan/insurer/government payor, member/Medicaid/Medicare ID number, plan and/or group number; and information regarding dental/orthodontic care. "


Industrial automation giant ABB disclosed data breach after ransomware attack

financial exploits ransomware industry
2023-05-28 https://securityaffairs.com/146752/cyber-crime/abb-ransomware-attack.html

Swiss electrification and automation technology giant ABB confirmed it has suffered a data breach after a ransomware attack. ABB has more than 105,000 employees and has $29.4 billion in revenue for 2022. On May 7, 2023, the Swiss multinational company, leading electrification and automation technology provider, suffered a cyber attack that reportedly impacted its business operations. […]

The post Industrial automation giant ABB disclosed data breach after ransomware attack appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, ABB) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


New Buhti ransomware operation uses rebranded LockBit and Babuk payloads

exploits ransomware
2023-05-27 https://securityaffairs.com/146700/cyber-crime/buhti-ransomware-rebranded-lockbit-babuk.html

The recently identified Buhti operation targets organizations worldwide with rebranded LockBit and Babuk ransomware variants. Researchers from Symantec discovered a new ransomware operation called Buhti (aka Blacktail) that is using LockBit and Babuk variants to target Linux and Windows systems worldwide. The ransomware operation hasn’t its own ransomware payload, however, it uses a custom information […]

The post New Buhti ransomware operation uses rebranded LockBit and Babuk payloads appeared first on Security Affairs.

"

Autosummary: The information stealer used by the group is written in Golang, it allows operators to look for specific files (pdf, .php, .png, .ppt, .psd, .rar, .raw, .rtf, .sql, .svg, .swf, .tar, .txt, .wav, .wma, .wmv, .xls, .xml, .yml, .zip, .aiff, .aspx, .docx, .epub, .json, .mpeg, .pptx, .xlsx, .yaml. ) "


Is the BlackByte ransomware gang behind the City of Augusta attack?

exploits government ransomware
2023-05-27 https://securityaffairs.com/146717/hacking/city-of-augusta-cyberattack.html

The city of Augusta in Georgia, U.S., admitted that the recent IT system outage was caused by a cyber attack. While the City of Augusta revealed that a cyberattack caused the recent IT outage, the BlackByte ransomware gang has claimed responsibility for the attack. The attack took place on May 21, the administrator at the City […]

The post Is the BlackByte ransomware gang behind the City of Augusta attack? appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, City of Augusta) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


New Buhti ransomware uses leaked payloads and public exploits

exploits ransomware
2023-05-26 https://www.helpnetsecurity.com/2023/05/26/buhti-ransomware/

A newly identified ransomware operation has refashioned leaked LockBit and Babuk payloads into Buhti ransomware, to launch attacks on both Windows and Linux systems. Use of public exploits One notable aspect of the attackers leveraging the Buhti ransomware is their ability to quickly exploit newly disclosed vulnerabilities (e.g., the recently patched PaperCut and IBM Aspera Faspex flaws). The attackers are leveraging public exploits, Dick O’Brien, principal intelligence analyst with Symantec Threat Hunter team told Help … More

The post New Buhti ransomware uses leaked payloads and public exploits appeared first on Help Net Security.

"

Autosummary: “While the reuse of leaked payloads is often the hallmark of a less-skilled ransomware operation, Blacktail’s general competence in carrying out attacks, coupled with its ability to recognize the utility of newly discovered vulnerabilities, suggests that it is not to be underestimated,” Symantec has concluded. "


Careless IT security worker exploited ransomware attack against his employer, but failed to cover his tracks

exploits ransomware
2023-05-26 https://www.tripwire.com/state-of-security/rogue-it-security-worker-failed-cover-his-tracks
Bad enough for your company to be held to ransom after a cyber attack. Worse still to then have one of your own employees exploit the attack in an attempt to steal the ransom for themselves. Read more in my article on the Tripwire State of Security blog. "

Autosummary: The company did the right thing - it informed the police, and it assigned its own IT security staff to investigate the attack, find out how it had occurred, and mitigate any damage which had been caused. "


US govt contractor ABB confirms ransomware attack, data theft

exploits ransomware
2023-05-26 https://www.bleepingcomputer.com/news/security/us-govt-contractor-abb-confirms-ransomware-attack-data-theft/
Swiss tech multinational and U.S. government contractor ABB has confirmed that some of its systems were impacted by a ransomware attack, previously described by the company as "an IT security incident." [...] "

Autosummary: Since its launch, Black Basta has been responsible for attacks targeting the American Dental Association, Sobeys, Knauf, Yellow Pages Canada, UK outsourcing company Capita, and, more recently, German defense contractor Rheinmetall. "


BlackByte ransomware claims City of Augusta cyberattack

exploits government ransomware ciber
2023-05-26 https://www.bleepingcomputer.com/news/security/blackbyte-ransomware-claims-city-of-augusta-cyberattack/
The city of Augusta in Georgia, U.S., has confirmed that the most recent IT system outage was caused by unauthorized access to its network. [...] "

Autosummary: The leaked documents seen by BleepingComputer contain payroll information, contact details, personally identifiable information (PII), physical addresses, contracts, city budget allocation data, and other types of details. "


The Week in Ransomware - May 26th 2023 - Cities Under Attack

exploits ransomware
2023-05-26 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-may-26th-2023-cities-under-attack/
Ransomware gangs continue to hammer local governments in attacks, taking down IT systems and disrupting city"s online services. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @demonslay335, @malwrhunterteam, @BleepinComputer, @serghei, @billtoulas, @fwosar, @Ionut_Ilascu, @struppigel, @LawrenceAbrams, @Seifreed, @security_score, @Unit42_Intel, @_CPResearch_, @pcrisk, @BroadcomSW, @uuallan, @Jon__DiMaggio, @AShukuhi, @BushidoToken, @BrettCallow, and @UK_Daniel_Card. "The City of Augusta, GA began experiencing technical difficulties this past Sunday, May 21, 2023, unrelated to last week"s outage, resulting in a disruption to certain computer systems," reads the City"s statement. "


12 vulnerabilities newly associated with ransomware

exploits ransomware
2023-05-25 https://www.helpnetsecurity.com/2023/05/25/12-new-ransomware-vulnerabilities-q1-2023/

In March 2023, the total number of breaches reported was higher than those reported in the previous three years combined, according to Ivanti. Ransomware groups are continuously weaponizing vulnerabilities and adding them to their arsenal to mount crippling and disruptive attacks on their victims. In Q1 2023, researchers identified 12 vulnerabilities newly associated with ransomware. They have also provided an update on key metrics being tracked in relation to ransomware, offering valuable insights to enterprises … More

The post 12 vulnerabilities newly associated with ransomware appeared first on Help Net Security.

"

Autosummary: “One of the biggest challenges for IT and security teams is prioritizing and remediating vulnerabilities, particularly those tied to ransomware,” according to Srinivas Mukkamala, CPO at Ivanti. The weakness categories The report also tracks the weakness categories contributing to vulnerabilities weaponized by ransomware groups, highlighting the lack of security in software products and operating systems widely used by enterprises. "


Iranian Agrius Hackers Targeting Israeli Organizations with Moneybird Ransomware

financial exploits ransomware
2023-05-25 https://thehackernews.com/2023/05/iranian-agrius-hackers-targeting.html
The Iranian threat actor known as Agrius is leveraging a new ransomware strain called Moneybird in its attacks targeting Israeli organizations. Agrius, also known as Pink Sandstorm (formerly Americium), has a track record of staging destructive data-wiping attacks aimed at Israel under the guise of ransomware infections. Microsoft has attributed the threat actor to Iran"s Ministry of "

Autosummary: "The use of a new ransomware, written in C++, is noteworthy, as it demonstrates the group"s expanding capabilities and ongoing effort in developing new tools," Check Point researchers Marc Salinas Fernandez and Jiri Vinopal said. "


New Buhti ransomware gang uses leaked Windows, Linux encryptors

exploits ransomware
2023-05-25 https://www.bleepingcomputer.com/news/security/new-buhti-ransomware-gang-uses-leaked-windows-linux-encryptors/
A new ransomware operation named "Buhti" uses the leaked code of the LockBit and Babuk ransomware families to target Windows and Linux systems, respectively. [...] "

Autosummary: The tool targets the following file types for theft: pdf, php, png, ppt, psd, rar, raw, rtf, sql, svg, swf, tar, txt, wav, wma, wmv, xls, xml, yml, zip, aiff, aspx, docx, epub, json, mpeg, pptx, xlsx, and yaml. "


Buhti Ransomware Gang Switches Tactics, Utilizes Leaked LockBit and Babuk Code

exploits ransomware industry
2023-05-25 https://thehackernews.com/2023/05/buhti-ransomware-gang-switches-tactics.html
The threat actors behind the nascent Buhti ransomware have eschewed their custom payload in favor of leaked LockBit and Babuk ransomware families to strike Windows and Linux systems. "While the group doesn"t develop its own ransomware, it does utilize what appears to be one custom-developed tool, an information stealer designed to search for and archive specified file types," Symantec said in a "

Autosummary: "While the reuse of leaked payloads is often the hallmark of a less-skilled ransomware operation, Blacktail"s general competence in carrying out attacks, coupled with its ability to recognize the utility of newly discovered vulnerabilities, suggests that it is not to be underestimated," Symantec said. "


Corvus Signal provides continuous threat analysis, tailored alerts and always-on recommendations

ransomware
2023-05-25 https://www.helpnetsecurity.com/2023/05/25/corvus-signal/

Corvus Insurance has unveiled Corvus Signal, the risk prevention solution that brings together brokers, policyholders, and Corvus security experts in partnership. Corvus Signal has been shown to reduce cyber breach frequency and cost by up to 20 percent. The announcement comes amid increasing market activity and interest in combining cyber insurance with risk management services. Corvus Signal is the solution that demonstrates such an approach can bend the loss curve. For more than three years, … More

The post Corvus Signal provides continuous threat analysis, tailored alerts and always-on recommendations appeared first on Help Net Security.

"

Autosummary: “We found, through extensive experience working with policyholders, that a partnership-based approach combining personalized cyber threat insights and risk advisory services is the most effective way to curb cyber risk for organizations,” said Jason Rebholz, CISO at Corvus Insurance. "


Opti9 collaborates with Wasabi to provide clients with AI-powered ransomware detection

exploits ransomware
2023-05-24 https://www.helpnetsecurity.com/2023/05/24/opti9-wasabi/

Opti9 has been selected by Wasabi Hot Cloud Storage as a Technical Alliance Partner to offer integrated disaster recovery and artificial intelligence (AI) powered ransomware detection services. As result of this trusted partnership, Wasabi clients can now natively integrate a comprehensive disaster recovery and security monitoring that includes proactive protection of their data from ransomware attacks. Opti9 has been a leading managed hybrid cloud solutions and security services provider for over two decades. As part … More

The post Opti9 collaborates with Wasabi to provide clients with AI-powered ransomware detection appeared first on Help Net Security.

"

Autosummary: This includes suspicious changes to retention settings, job definitions, encryption, immutability, data deletion, job modifications or deletion, and many other factors. "


Iranian hackers use new Moneybird ransomware to attack Israeli orgs

financial exploits ransomware
2023-05-24 https://www.bleepingcomputer.com/news/security/iranian-hackers-use-new-moneybird-ransomware-to-attack-israeli-orgs/
A suspected Iranian state-supported threat actor known as "Agrius" is now deploying a new ransomware strain named "Moneybird" against Israeli organizations. [...] "

Autosummary: Webshell in the text file (Check Point) Having deployed the webshells, the attackers proceed to use open-source tools that help in network reconnaissance using SoftPerfect Network Scanner, lateral movement, secure communication using Plink/PuTTY, credential stealing with ProcDump, and the exfiltration of data using FileZilla. "


Kasten K10 V6.0 enables organizations to create proactive ransomware protection strategies

exploits ransomware
2023-05-24 https://www.helpnetsecurity.com/2023/05/24/kasten-k10-v6-0/

Kasten by Veeam released its new Kasten K10 V6.0 Kubernetes data protection platform. The new release includes features that will help customers scale their cloud native data protection more efficiently, better protect their applications and data against ransomware attacks, and increase accessibility by adding new cloud native integrations. Kubernetes was designed to enable greater productivity – helping enterprises scale automation to manage very large deployments found within containerized environments. Kubernetes has now garnered industry-standard status … More

The post Kasten K10 V6.0 enables organizations to create proactive ransomware protection strategies appeared first on Help Net Security.

"

Autosummary: Kasten by Veeam’s Kasten K10 v6.0 provides detection capabilities, immutable backups and instant recovery to address this, but perhaps more importantly, this release also introduces automation and efficiency capabilities to open the doors for large-scale container protection deployment – an inevitability for any company using containers seriously,” said Johnny Yu, Research Manager, Storage and Computing at IDC.Through our collaboration with Kasten by Veeam, we are providing customers with additional flexibility and choice in how they protect their Kubernetes workloads,” said Kirsten Newcomer, Director, Cloud and DevSecOps Strategy, Red Hat. "


Rheinmetall attacked by BlackBasta ransomware

exploits ransomware
2023-05-24 https://www.malwarebytes.com/blog/news/2023/05/blackbasta-ransomware-throws-wrench-in-rheinmetall-arms-production

Categories: News

Categories: Ransomware

Tags: Rheinmetall

Tags: BlackBasta

Tags: ransomware

A cyberattack on arms manufacturer Rheinmetall has been claimed by the BlackBasta ransomware group on its leak site.

(Read more...)

The post Rheinmetall attacked by BlackBasta ransomware appeared first on Malwarebytes Labs.

"

Autosummary: Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.After the data is copied, the ransomware encrypts files and gives them the ".basta" extension, erases volume shadow copies, and presents a ransom note named readme.txt on affected devices. Monthly ransomware attacks in Germany with LockBit and Black Basta highlighted, April 2022 - March 2023 BlackBasta is not very different from other ransomware groups in the way it operates. "


CISA updates ransomware guidance

exploits ransomware
2023-05-24 https://www.malwarebytes.com/blog/news/2023/05/cisa-updates-stopransomware-guide

Categories: News

Categories: Ransomware

Tags: CISA

Tags: StopRansomware

Tags: guide

Tags: ZTA

Tags: compromised

Tags: cloud

Tags: MDR

CISA has updated its #StopRansomware guide to account for changes in ransomware tactics and techniques.

(Read more...)

The post CISA updates ransomware guidance appeared first on Malwarebytes Labs.

"

Autosummary: The #StopRansomware guide is set up as a one-stop resource to help organizations reduce the risk of ransomware incidents through best practices to detect, prevent, respond, and recover from them, including step-by-step approaches to address potential attacks.Look for anomalous usage of built-in Windows tools such as bcdedit.exe, fsutil.exe (deletejournal), vssadmin.exe, wbadmin.exe, and wmic.exe (shadowcopy or shadowstorage). that replace passwords with two or more verification factors (e.g., a fingerprint, facial recognition, device pin, or a cryptographic key).Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.Consider employing password-less MFA that replace passwords with two or more verification factors (e.g., a fingerprint, facial recognition, device pin, or a cryptographic key). "


BlackCat Ransomware affiliate uses signed kernel driver to evade detection

exploits ransomware
2023-05-23 https://securityaffairs.com/146536/malware/blackcat-ransomware-uses-kernel-driver.html

Experts spotted the ALPHV/BlackCat ransomware group using signed malicious Windows kernel drivers to evade detection. Trend Micro researchers shared details about ALPHV/BlackCat ransomware incident that took place on February 2023. A BlackCat affiliate employed signed malicious Windows kernel drivers to evade detection. Experts believe the driver is a new version of the malware reported in December 2022 […]

The post BlackCat Ransomware affiliate uses signed kernel driver to evade detection appeared first on Security Affairs.

"

Autosummary: Nominate Pierluigi Paganini and Security Affairs here here: https://docs.google.com/forms/d/e/1FAIpQLSepvnj8b7QzMdLh7vWEDQDqohjBUsHyn3x3xRdYGCetwVy2DA/viewform Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, Blackcat ransomware) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Arms maker Rheinmetall confirms BlackBasta ransomware attack

exploits ransomware
2023-05-23 https://www.bleepingcomputer.com/news/security/arms-maker-rheinmetall-confirms-blackbasta-ransomware-attack/
German automotive and arms manufacturer Rheinmetall AG confirms that it suffered a BlackBasta ransomware attack that impacted its civilian business. [...] "

Autosummary: Rheinmetall is a German manufacturer of automotive, military vehicles, armaments, air defense systems, engines, and various steel products, which employs over 25,000 people and has an annual revenue of over $7 billion. "


IT employee impersonates ransomware gang to extort employer

exploits ransomware
2023-05-23 https://www.bleepingcomputer.com/news/security/it-employee-impersonates-ransomware-gang-to-extort-employer/
A 28-year-old United Kingdom man from Fleetwood, Hertfordshire, has been convicted of unauthorized computer access with criminal intent and blackmailing his employer. [...] "

Autosummary: "


Cuba ransomware claims cyberattack on Philadelphia Inquirer

exploits ransomware ciber
2023-05-23 https://www.bleepingcomputer.com/news/security/cuba-ransomware-claims-cyberattack-on-philadelphia-inquirer/
The Cuba ransomware gang has claimed responsibility for this month"s cyberattack on The Philadelphia Inquirer, which temporarily disrupted the newspaper"s distribution and disrupted some business operations. [...] "

Autosummary: The stolen data, now publicly released on Cuba"s extortion portal, includes financial documents, correspondence with bank employees, account movements, balance sheets, tax documents, compensation, and source code. "


Fusion Risk Management TPRM enhancements deliver continuous monitoring of third parties

ransomware
2023-05-23 https://www.helpnetsecurity.com/2023/05/23/fusion-risk-management-tprm/

Fusion Risk Management announced expanded functionality of its third-party risk management (TPRM) offering. The enhanced solution delivers continuous monitoring of third parties beyond its traditional instance as well as an evaluation of potential operational and business impacts that those third parties may have. This functionality enables a holistic and real-time view of third-party ecosystem health which improves decision-making and response times in order to transform how third-party risk teams anticipate and manage disruptions. Organizations continue … More

The post Fusion Risk Management TPRM enhancements deliver continuous monitoring of third parties appeared first on Help Net Security.

"

Autosummary: “Fusion continues to invest in product innovation to ensure that our customers have the most accurate understanding of third-party impacts across their enterprise, can accelerate real-time intelligence, can make the shift to a proactive risk management posture, and are able to thrive through any business disruption,” concluded Jackson. "


German arms manufacturer Rheinmetall suffered Black Basta ransomware attack

exploits ransomware industry
2023-05-23 https://securityaffairs.com/146571/cyber-crime/rheinmetall-black-basta-ransomware-attack.html

The German automotive and arms manufacturer Rheinmetall announced it was victim of a Black Basta ransomware attack that took place last month. Rheinmetall is a German automotive and arms manufacturer that is listed on the Frankfurt stock exchange. The company this week announced it was victim of a ransomware attack conducted by the Black Basta ransomware group. The incident took place […]

The post German arms manufacturer Rheinmetall suffered Black Basta ransomware attack appeared first on Security Affairs.

"

Autosummary: Nominate Pierluigi Paganini and Security Affairs here here: https://docs.google.com/forms/d/e/1FAIpQLSepvnj8b7QzMdLh7vWEDQDqohjBUsHyn3x3xRdYGCetwVy2DA/viewform Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, Balck Basta) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Employee guilty of joining ransomware attack on his own company

exploits ransomware
2023-05-23 https://www.malwarebytes.com/blog/news/2023/05/employee-pleads-guilty-to-blackmail-and-unauthorized-access-after-5-years

Categories: News

Categories: Ransomware

Tags: employee

Tags: insider threat

Tags: access control

Tags: policy

Tags: ransom

An employee that tried to take advantage of a ransomware attack on his own company has pleaded guilty after 5 years of denying he had anything to do with it.

(Read more...)

The post Employee guilty of joining ransomware attack on his own company appeared first on Malwarebytes Labs.

"

Autosummary: The unauthorized access to the emails could be traced back to his home address, which gave the police sufficient grounds to seize a computer, laptop, phone, and a USB stick.Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again. Deploy Endpoint Detection and Response software like Malwarebytes EDR that uses multiple different detection techniques to identify ransomware, and ransomware rollback to restore damaged system files. "


How continuous security monitoring is changing the compliance game

ransomware
2023-05-22 https://www.helpnetsecurity.com/2023/05/22/continuous-security-monitoring-changing-compliance-video/

Managing compliance doesn’t have to be draining, time-consuming, or overly complicated. In this Help Net Security video, Wesley Van Zyl, Senior Manager, Compliance Success at Scytale, discusses how keeping track of all your security controls can be challenging, particularly when new cybersecurity threats emerge unexpectedly. To maintain consistent compliance and reliable monitoring, it is essential to incorporate automation technology into your compliance management system. By doing so, you can effectively mitigate the risk of human … More

The post How continuous security monitoring is changing the compliance game appeared first on Help Net Security.

"

Autosummary: "


An AI-based Chrome Extension Against Phishing, Malware, and Ransomware

financial exploits ransomware
2023-05-22 https://www.bleepingcomputer.com/news/security/an-ai-based-chrome-extension-against-phishing-malware-and-ransomware/
Criminal IP"s Chrome extension offers real-time scanning of websites worldwide, using AI-based detection to identify recently created phishing sites. [...] "

Autosummary: Criminal IP, a prominent CTI search engine Criminal IP conducted a successful beta service for approximately one year before its official launch Source: AI SPERA Since its official launch on April 17, 2023, Criminal IP has achieved global recognition in cybersecurity, establishing itself as a prominent CTI search engine through API integrations and strong partnerships. "


Dish Network says the February ransomware attack impacted +300,000 individuals

exploits ransomware
2023-05-22 https://securityaffairs.com/146515/cyber-crime/dish-network-disclosed-data-breach.html

Satellite TV giant Dish Network disclosed a data breach after the February ransomware attack and started notifying impacted individuals. The American satellite broadcast provider Dish Network went offline on February 24, 2023, the outage impacted Dish.com, Dish Anywhere app, and many other services owned by the company. In early February, the company admitted that the outage was […]

The post Dish Network says the February ransomware attack impacted +300,000 individuals appeared first on Security Affairs.

"

Autosummary: Nominate Pierluigi Paganini and Security Affairs here here: https://docs.google.com/forms/d/e/1FAIpQLSepvnj8b7QzMdLh7vWEDQDqohjBUsHyn3x3xRdYGCetwVy2DA/viewform Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, Dish) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Malicious Windows kernel drivers used in BlackCat ransomware attacks

exploits ransomware
2023-05-22 https://www.bleepingcomputer.com/news/security/malicious-windows-kernel-drivers-used-in-blackcat-ransomware-attacks/
The ALPHV ransomware group (aka BlackCat) was observed employing signed malicious Windows kernel drivers to evade detection by security software during attacks. [...] "

Autosummary: Malicious drivers used in BlackCat attacks (Trend Micro) Trend Micro"s analysts observed the exposed following commands that can be issued to the driver: Activate driver Deactivate the driver after the user mode client finishes its operation Kill any user-mode process Delete specific file paths Force-delete a file by freeing its handles and terminating running processes using it Copy files Force-copy files using a similar mechanism to force-delete Register Process/Thread Notification callbacks Unregister Process/Thread Notification callbacks Reboot the system by calling the "HalReturnToFirmware" API Copying files from the system (Trend Micro) Trend Micro comments that the two commands used for Process/Thread Notification callbacks are not working, indicating that the driver is currently under development or still in a testing phase. "


Notorious Cyber Gang FIN7 Returns Cl0p Ransomware in New Wave of Attacks

exploits ransomware
2023-05-20 https://thehackernews.com/2023/05/notorious-cyber-gang-fin7-returns-cl0p.html
The notorious cybercrime group known as FIN7 has been observed deploying Cl0p (aka Clop) ransomware, marking the threat actor"s first ransomware campaign since late 2021. Microsoft, which detected the activity in April 2023, is tracking the financially motivated actor under its new taxonomy Sangria Tempest. "In these recent attacks, Sangria Tempest uses the PowerShell script POWERTRASH to load "

Autosummary: "


Cybercrime gang FIN7 returned and was spotted delivering Clop ransomware

exploits ransomware
2023-05-20 https://securityaffairs.com/146465/cyber-crime/fin7-delivering-clop-ransomware.html

Cybercriminal gang FIN7 returned with a new wave of attacks aimed at deploying the Clop ransomware on victims’ networks. Researchers at Microsoft Security Intelligence team published a series of tweets to warn of a new wave of attacks aimed at distributing the Clop ransomware and linked it to the financially motivated cybercriminal group Sangria Tempest […]

The post Cybercrime gang FIN7 returned and was spotted delivering Clop ransomware appeared first on Security Affairs.

"

Autosummary: Nominate Pierluigi Paganini and Security Affairs here here: https://docs.google.com/forms/d/e/1FAIpQLSepvnj8b7QzMdLh7vWEDQDqohjBUsHyn3x3xRdYGCetwVy2DA/viewform Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, FIN7) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Dish Network likely paid ransom after recent ransomware attack

exploits ransomware
2023-05-19 https://www.bleepingcomputer.com/news/security/dish-network-likely-paid-ransom-after-recent-ransomware-attack/
Dish Network, an American television provider, most likely paid a ransom after being hit by a ransomware attack in February based on the wording used in data breach notification letters sent to impacted employees. [...] "

Autosummary: "However, we have confirmed that certain employee-related records and personal information (along with information of some former employees, family members, and a limited number of other individuals) were among the data extracted. "


Take action now to avoid BianLian ransomware attacks, US Government warns organisations

exploits government ransomware
2023-05-19 https://www.tripwire.com/state-of-security/take-action-now-avoid-bianlian-ransomware-attacks-us-government-warns
A joint alert has been issued by US government agencies, advising organisations of the steps they should take to mitigate the threat posed by BianLian ransomware attacks. "

Autosummary: "


Microsoft: Notorious FIN7 hackers return in Clop ransomware attacks

exploits ransomware
2023-05-19 https://www.bleepingcomputer.com/news/security/microsoft-notorious-fin7-hackers-return-in-clop-ransomware-attacks/
A financially motivated cybercriminal group known as FIN7 resurfaced last month, with Microsoft threat analysts linking it to attacks where the end goal was the deployment of Clop ransomware payloads on victims" networks. [...] "

Autosummary: "


The Week in Ransomware - May 19th 2023 - A Shifting Landscape

exploits ransomware
2023-05-19 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-may-19th-2023-a-shifting-landscape/
In the ever-shifting ransomware landscape, we saw new ransomware gangs emerge, threat actors return from a long absence, operations shifting extortion tactics, and a flurry of attacks on the enterprise. [...] "

Autosummary: We also learned about new attacks and significant developments in previous ones: Finally, researchers and law enforcement released new reports: Contributors and those who provided new ransomware information and stories this week include: @serghei, @LawrenceAbrams, @PolarToffee, @malwrhunterteam, @DanielGallagher, @Ionut_Ilascu, @demonslay335, @billtoulas, @Seifreed, @BleepinComputer, @fwosar, @VK_Intel, @struppigel, @BrettCallow, @TalosSecurity, @CrowdStrike, @pcrisk, @GroupIB, @zscaler, @MsftSecIntel, and @juanbrodersen. Over the past few weeks, we have reported on new ransomware operations that have emerged in enterprise attacks, including the new Cactus, Akira, RA Group operations. "


ScanSource says ransomware attack behind multi-day outages

exploits ransomware
2023-05-17 https://www.bleepingcomputer.com/news/security/scansource-says-ransomware-attack-behind-multi-day-outages/
Technology provider ScanSource has announced it has fallen victim to a ransomware attack impacting some of its systems, business operations, and customer portals. [...] "

Autosummary: "


FBI confirms BianLian ransomware switch to extortion only attacks

exploits ransomware
2023-05-17 https://www.bleepingcomputer.com/news/security/fbi-confirms-bianlian-ransomware-switch-to-extortion-only-attacks/
The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and Australian Cyber Security Centre (ACSC) have published a joint advisory to inform organizations of the latest tactics, techniques, and procedures (TTPs) and known indicators of compromise (IOCs) of the BianLian ransomware group. [...] "

Autosummary: A joint Cybersecurity Advisory from government agencies in the U.S. and Australia, and published by the Cybersecurity and Infrastructure Security Agency (CISA,) is warning organizations of the latest tactics, techniques, and procedures (TTPs) used by the BianLian ransomware group. "


MalasLocker ransomware targets Zimbra servers, demands charity donation

exploits ransomware
2023-05-17 https://www.bleepingcomputer.com/news/security/malaslocker-ransomware-targets-zimbra-servers-demands-charity-donation/
A new ransomware operation is hacking Zimbra servers to steal emails and encrypt files. However, instead of demanding a ransom payment, the threat actors claim to require a donation to charity to provide an encryptor and prevent data leaking. [...] "

Autosummary: While the ransom notes do not contain a link to the ransomware gang’s data leak site, Emsisoft threat analyst Brett Callow found a link to their data leak site, having the title, "Somos malas... podemos ser peores," translated to, "We are bad... we can be worse.{0DS )2D"y,c BA l/tjxov1fa12V8Imj8SfQ27INLwEg+AC2lX3ou4N8HAjtmu9cPV6xLQ --- 7bAeZFny0Xk7gqxscyeDGDbHjsCvAZ0aETUUhIsXnyg The Age encryption tool was developed by Filippo Valsorda, cryptographer and Go security lead at Google, and uses the X25519 (an ECDH curve), ChaChar20-Poly1305, and HMAC-SHA256 algorithms. "


Leaked Babuk ransomware builder code lives on as RA Group

exploits ransomware
2023-05-17 https://www.malwarebytes.com/blog/news/2023/05/leaked-babuk-ransomware-builder-code-lives-on-as-ra-group

Categories: News

Tags: ransomware

Tags: RA Group

Tags: babuk

Tags: code

Tags: leaked

Tags: encrypted

Tags: stolen

Tags: exfiltrated

Tags: ransom

Tags: hijack

Tags: blackmail

Tags: double extortion

Tags: leak

Tags: sell

We take a look at yet another ransomware group making use of leaked Babuk code.

(Read more...)

The post Leaked Babuk ransomware builder code lives on as RA Group appeared first on Malwarebytes Labs.

"

Autosummary: If you’re unfortunate enough to end up on the leak portal, your details are organised like so: Organisation name A list of stolen data / file size Organisation URL Customised ransom notes are used for compromised entities, with three days given to pay up or risk the data being made public. Should your data eventually end up for sale, the below message may eventually provide lots of sleepless nights: If you want to buy this data, please contact us by qtox qTox is an instant messaging tool billed as being secure and private, particularly with regard to avoiding having your Government listening in on what you might be saying.Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again. "


U.S. Offers $10 Million Bounty for Capture of Notorious Russian Ransomware Operator

exploits ransomware rusia-ucrania
2023-05-17 https://thehackernews.com/2023/05/us-offers-10-million-bounty-for-capture.html
A Russian national has been charged and indicted by the U.S. Department of Justice (DoJ) for launching ransomware attacks against "thousands of victims" in the country and across the world. Mikhail Pavlovich Matveev (aka Wazawaka, m1x, Boriselcin, and Uhodiransomwar), the 30-year-old individual in question, is alleged to be a "central figure" in the development and deployment of LockBit, Babuk, "

Autosummary: Mikhail Pavlovich Matveev (aka Wazawaka, m1x, Boriselcin, and Uhodiransomwar), the 30-year-old individual in question, is alleged to be a "central figure" in the development and deployment of LockBit, Babuk, and Hive ransomware variants since at least June 2020. "


US Gov offers a $10M reward for a Russian ransomware actor

exploits ransomware rusia-ucrania
2023-05-17 https://securityaffairs.com/146345/cyber-crime/russian-ransomware-actor-reward.html

The US government is offering a $10M reward for Russian national Mikhail Pavlovich Matveev (30) charged for his role in ransomware attacks The US Justice Department charged Russian national Mikhail Pavlovich Matveev (30), aka Wazawaka, m1x, Boriselcin, and Uhodiransomwar, for his alleged role in multiple ransomware attacks. The DoJ unsealed two indictments charging the man […]

The post US Gov offers a $10M reward for a Russian ransomware actor appeared first on Security Affairs.

"

Autosummary: “From Russia and hiding behind multiple aliases, Matveev is alleged to have used these ransomware strains to encrypt and hold hostage for ransom the data of numerous victims, including hospitals, schools, nonprofits, and law enforcement agencies, like the Metropolitan Police Department in Washington, D.C.,” said U.S. Attorney Philip R. Sellinger for the District of New Jersey. "


Russian ransomware affiliate charged with attacks on critical infrastructure

exploits ransomware rusia-ucrania
2023-05-16 https://www.bleepingcomputer.com/news/security/russian-ransomware-affiliate-charged-with-attacks-on-critical-infrastructure/
The U.S. Justice Department has filed charges against a Russian citizen named Mikhail Pavlovich Matveev (also known as Wazawaka or Boriselcin) for involvement in three ransomware operations that targeted victims across the United States. [...] "

Autosummary: "


Inside Qilin Ransomware: Affiliates Take Home 85% of Ransom Payouts

exploits ransomware
2023-05-16 https://thehackernews.com/2023/05/inside-qilin-ransomware-affiliates-take.html
Ransomware affiliates associated with the Qilin ransomware-as-a-service (RaaS) scheme earn anywhere between 80% to 85% of each ransom payment, according to new findings from Group-IB. The cybersecurity firm said it was able to infiltrate the group in March 2023, uncovering details about the affiliates" payment structure and the inner workings of the RaaS program following a private conversation "

Autosummary: "


New RA Group ransomware targets U.S. orgs in double-extortion attacks

exploits ransomware
2023-05-15 https://www.bleepingcomputer.com/news/security/new-ra-group-ransomware-targets-us-orgs-in-double-extortion-attacks/
A new ransomware group named "RA Group" is targeting pharmaceutical, insurance, wealth management, and manufacturing firms in the United States and South Korea. [...] "

Autosummary: In addition to the ransomware groups cited in the Sentinel Labs report as users of Babuk, Cisco Talos also mentions Rook, Night Sky, Pandora, Nokoyawa, Cheerscrypt, AstraLocker 2.0, and ESXiArgs. "


Why we should be more open about ransomware attacks

exploits ransomware
2023-05-15 https://www.malwarebytes.com/blog/news/2023/05/why-we-should-be-more-open-about-ransomware-attacks

Categories: News

Categories: Ransomware

Tags: ransomware

Tags: data breach

Tags: dark web

Tags: share information

Paying the ransom and not saying a word about what happened is what cybercriminals would like us all to do.

(Read more...)

The post Why we should be more open about ransomware attacks appeared first on Malwarebytes Labs.

"

Autosummary: Depending on the country an organization is based in, whether they handle data under GDPR regulations, whether they are a government contractor, what sector they are active in, or whatever other reasons, some organizations have a legal obligation to notify one or more authorities about a cyberattack.Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again. The UK’s National Cyber Security Centre (NCSC) has published an article that reflects on why it’s so concerning when cyberattacks go unreported, saying: ...we are increasingly concerned about what happens behind the scenes of the attacks we don’t hear about, particularly the ransomware ones. "


#StopRansomware: BianLian Ransomware Group

exploits ransomware
2023-05-15 https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-136a

Summary

Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and learn more about other ransomware threats and no-cost resources.

The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and Australian Cyber Security Centre (ACSC) are releasing this joint Cybersecurity Advisory to disseminate known BianLian ransomware and data extortion group IOCs and TTPs identified through FBI and ACSC investigations as of March 2023.

Actions to take today to mitigate cyber threats from BianLian ransomware and data extortion:
• Strictly limit the use of RDP and other remote desktop services.
• Disable command-line and scripting activities and permissions.
• Restrict usage of PowerShell and update Windows PowerShell or PowerShell Core to the latest version.

BianLian is a ransomware developer, deployer, and data extortion cybercriminal group that has targeted organizations in multiple U.S. critical infrastructure sectors since June 2022. They have also targeted Australian critical infrastructure sectors in addition to professional services and property development. The group gains access to victim systems through valid Remote Desktop Protocol (RDP) credentials, uses open-source tools and command-line scripting for discovery and credential harvesting, and exfiltrates victim data via File Transfer Protocol (FTP), Rclone, or Mega. BianLian group actors then extort money by threatening to release data if payment is n "

Autosummary: In addition, FBI, CISA, and ACSC recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques and to reduce the impact and risk of compromise by ransomware or data extortion actors: Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (e.g., hard drive, storage device, or the cloud).Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by FBI, CISA, or ACSC. RESOURCES Reporting The FBI is seeking any information that can be shared, including boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with BianLian actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.According to the ransom note, BianLian group specifically looked for, encrypted, and exfiltrated financial, client, business, technical, and personal files.The group gains access to victim systems through valid Remote Desktop Protocol (RDP) credentials, uses open-source tools and command-line scripting for discovery and credential harvesting, and exfiltrates victim data via File Transfer Protocol (FTP), Rclone, or Mega. to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (e.g., hard drive, storage device, or the cloud). Validate Security Controls In addition to applying mitigations, FBI, CISA, and ACSC recommend exercising, testing, and validating your organization"s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory.[T1587.001] and install remote management and access software—e.g., TeamViewer, Atera Agent, SplashTop, AnyDesk—for persistence and command and control [T1105],[T1219]. with password logins (e.g., service account, admin accounts, and domain admin accounts) with National Institute for Standards and Technology (NIST) standards for developing and managing password policies. Defense Evasion BianLian group actors use PowerShell [T1059.001] and Windows Command Shell [T1059.003] to disable antivirus tools [T1562.001 ] , specifically Windows defender and Anti-Malware Scan Interface (AMSI). The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and Australian Cyber Security Centre (ACSC) are releasing this joint Cybersecurity Advisory to disseminate known BianLian ransomware and data extortion group IOCs and TTPs identified through FBI and ACSC investigations as of March 2023.Require all accounts with password logins (e.g., service account, admin accounts, and domain admin accounts) to comply with National Institute for Standards and Technology (NIST) standards for developing and managing password policies. SoftPerfect Network Scanner (netscan.exe), a network scanner that can ping computers, scan ports, and discover shared folders [T1135 ] .BianLian group originally employed a double-extortion model in which they exfiltrated financial, client, business, technical, and personal files for leverage and encrypted victims’ systems. FBI, CISA, and ACSC recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.Tune your security program, including people, processes, and technologies, based on the data generated by this process. Collection FBI observed BianLian group actors using malware (system.exe) that enumerates registry [T1012] and files [T1083] and copies clipboard data from users [T1115].FBI also observed BianLian harvest credentials from the Local Security Authority Subsystem Service (LSASS) memory [T1003.001], download RDP Recognizer (a tool that could be used to brute force RDP passwords or check for RDP vulnerabilities) to the victim system, and attempt to access an Active Directory domain database (NTDS.dit)Review domain controllers, servers, workstations, and active directories for new and/or unrecognized accounts [CPG 4.C]. Initial Access BianLian group actors gain initial access to networks by leveraging compromised Remote Desktop Protocol (RDP) credentials likely acquired from initial access brokers [T1078],[T1133] or via phishing [T1566].[T1112] to disable tamper protection for Sophos SAVEnabled, SEDEenabled, and SAVService services, which enables them to uninstall these services.Lists information about the current user account from the domain, such as the user"s name, description, and group memberships. "


New Ransomware Gang RA Group Hits U.S. and South Korean Organizations

exploits ransomware
2023-05-15 https://thehackernews.com/2023/05/new-ransomware-gang-ra-group-hits-us.html
A new ransomware group known as RA Group has become the latest threat actor to leverage the leaked Babuk ransomware source code to spawn its own locker variant. The cybercriminal gang, which is said to have been operating since at least April 22, 2023, is rapidly expanding its operations, according to cybersecurity firm Cisco Talos. "To date, the group has compromised three organizations in the "

Autosummary: "To date, the group has compromised three organizations in the U.S. and one in South Korea across several business verticals, including manufacturing, wealth management, insurance providers and pharmaceuticals," security researcher Chetan Raghuprasad said in a report shared with The Hacker News. "


New "MichaelKors" Ransomware-as-a-Service Targeting Linux and VMware ESXi Systems

exploits ransomware
2023-05-15 https://thehackernews.com/2023/05/new-michaelkors-ransomware-as-service.html
A new ransomware-as-service (RaaS) operation called MichaelKors has become the latest file-encrypting malware to target Linux and VMware ESXi systems as of April 2023. The development points to cybercriminal actors increasingly setting their eyes on the ESXi, cybersecurity firm CrowdStrike said in a report shared with The Hacker News. "This trend is especially noteworthy given the fact that ESXi "

Autosummary: Other notable e-crime outfits that have updated their arsenal to target ESXi consist of ALPHV (BlackCat), Black Basta, Defray, ESXiArgs, LockBit, Nevada, Play, Rook, and Rorschach. "


CLR SqlShell Malware Targets MS SQL Servers for Crypto Mining and Ransomware

exploits ransomware
2023-05-15 https://thehackernews.com/2023/05/clr-sqlshell-malware-targets-ms-sql.html
Poorly managed Microsoft SQL (MS SQL) servers are the target of a new campaign that"s designed to propagate a category of malware called CLR SqlShell that ultimately facilitates the deployment of cryptocurrency miners and ransomware. "Similar to web shell, which can be installed on web servers, SqlShell is a malware strain that supports various features after being installed on an MS SQL server, "

Autosummary: "


FBI: Bl00dy Ransomware targets education orgs in PaperCut attacks

exploits ransomware
2023-05-12 https://www.bleepingcomputer.com/news/security/fbi-bl00dy-ransomware-targets-education-orgs-in-papercut-attacks/
The FBI and CISA issued a joint advisory to warn that the Bl00dy Ransomware gang is now also actively exploiting a PaperCut remote-code execution vulnerability to gain initial access to networks. [...] "

Autosummary: "In early May 2023, according to FBI information, the Bl00dy Ransomware Gang gained access to victim networks across the Education Facilities Subsector where PaperCut servers vulnerable to CVE-2023-27350 were exposed to the internet," reads the security advisory "Ultimately, some of these operations led to data exfiltration and encryption of victim systems. "


The Week in Ransomware - May 12th 2023 - New Gangs Emerge

exploits ransomware
2023-05-12 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-may-12th-2023-new-gangs-emerge/
This week we have multiple reports of new ransomware families targeting the enterprise, named Cactus and Akira, both increasingly active as they target the enterprise. [...] "

Autosummary: Finally, researchers and law enforcement released new reports: Contributors and those who provided new ransomware information and stories this week include: @PolarToffee, @malwrhunterteam, @Ionut_Ilascu, @demonslay335, @struppigel, @malwareforme, @BleepinComputer, @billtoulas, @FourOctets, @serghei, @VK_Intel, @fwosar, @LawrenceAbrams, @Seifreed, @jorntvdw, @DanielGallagher, @LabsSentinel, @BrettCallow, @matrosov, @binarly_io, @Checkmarx, @KrollWire, @yinzlovecyber, and @pcrisk. May 7th 2023 The new Akira ransomware operation has slowly been building a list of victims as they breach corporate networks worldwide, encrypt files, and then demand million-dollar ransoms. "


Bl00dy Ransomware Gang Strikes Education Sector with Critical PaperCut Vulnerability

exploits ransomware
2023-05-12 https://thehackernews.com/2023/05/bl00dy-ransomware-gang-strikes.html
U.S. cybersecurity and intelligence agencies have warned of attacks carried out by a threat actor known as the Bl00dy Ransomware Gang that attempt to exploit vulnerable PaperCut servers against the education facilities sector in the country. The attacks took place in early May 2023, the Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA) said in a "

Autosummary: "


Babuk code used by 9 ransomware gangs to encrypt VMWare ESXi servers

exploits ransomware
2023-05-11 https://www.bleepingcomputer.com/news/security/babuk-code-used-by-9-ransomware-gangs-to-encrypt-vmware-esxi-servers/
An increasing number of ransomware operations are adopting the leaked Babuk ransomware source code to create Linux encryptors targeting VMware ESXi servers. [...] "

Autosummary: "


Multinational tech firm ABB hit by Black Basta ransomware attack

exploits ransomware
2023-05-11 https://www.bleepingcomputer.com/news/security/multinational-tech-firm-abb-hit-by-black-basta-ransomware-attack/
Swiss multinational company ABB, a leading electrification and automation technology provider, has suffered a Black Basta ransomware attack, reportedly impacting business operations. [...] "

Autosummary: "ABB operates more than 40 U.S.-based engineering, manufacturing, research and service facilities with a proven track record serving a diversity of federal agencies including the Department of Defense, such as U.S. Army Corps of Engineers, and Federal Civilian agencies such as the Departments of Interior, Transportation, Energy, United States Coast Guard, as well as the U.S. Postal Service," reads the ABB web site. "


Akira ransomware – what you need to know

exploits ransomware
2023-05-11 https://www.tripwire.com/state-of-security/akira-ransomware-what-you-need-know
Akira is a new family of ransomware, first used in cybercrime attacks in March 2023. Read more about the threat in my article on the Tripwire State of Security blog. "

Autosummary: According to a report by Bleeping Computer, files with the following extensions are encrypted in the attack: .abcddb, .abs, .abx, .accdb, .accdc, .accde, .accdr, .accdt, .accdw, .accft, .adb, .ade, .adf, .adn, .adp, .alf, .arc, .ask, .avdx, .avhd, .bdf, .bin, .btr, .cat, .cdb, .ckp, .cma, .cpd, .dacpac, .dad, .dadiagrams, .daschema, .db-shm, .db-wal, .dbc, .dbf, .dbs, .dbt, .dbv, .dbx, .dcb, .dct, .dcx, .ddl, .dlis, .dqy, .dsk, .dsn, .dtsx, .dxl, .eco, .ecx, .edb, .epim, .exb, .fcd, .fdb, .fic, .fmp, .fmp12, .fmpsl, .fol, .fpt, .frm, .gdb, .grdb, .gwi, .hdb, .his, .hjt, .icg, .icr, .idb, .ihx, .iso, .itdb, .itw, .jet, .jtx, .kdb, .kdb, .kexi, .kexic, .kexis, .lgc, .lut, .lwx, .maf, .maq, .mar, .mas, .mav, .maw, .mdb, .mdf, .mdn, .mdt, .mpd, .mrg, .mud, .mwb, .myd, .ndf, .nnt, .nrmlib, .nsf, .nvram, .nwdb, .nyf, .odb, .oqy, .ora, .orx, .owc, .pan, .pdb, .pdm, .pnz, .pvm, .qcow2, .qry, .qvd, .raw, .rbf, .rctd, .rod, .rodx, .rpd, .rsd, .sas7bdat, .sbf, .scx, .sdb, .sdc, .sdf, .sis, .spq, .sql, .sqlite, .sqlite3, .sqlitedb, .subvol, .temx, .tmd, .tps, .trc, .trm, .udb, .udl, .usr, .vdi, .vhd, .vhdx, .vis, .vmcx, .vmdk, .vmem, .vmrs, .vmsd, .vmsn, .vmx, .vpd, .vsv, .vvv, .wdb, .wmdb, .wrk, .xdb, .xld, .xmlff So, if my company doesn"t have a secure backup that it can restore these files from it may find itself in a sticky pickle... According to announcements Akira"s leak website on the dark web, the ransomware has already hit a variety of organisations in the finance, real estate, and manufacturing sectors as well as a children"s daycare centre.The site, which is reachable via Tor, adopts an old-school green-on-black theme, with visitors invited to type in commands rather than navigate through a menu.We will study in depth your finance, bank & income statements, your savings, investments etc. and present our reasonable demand to you. "


How Attack Surface Management Supports Continuous Threat Exposure Management

ransomware
2023-05-11 https://thehackernews.com/2023/05/how-attack-surface-management-supports.html
According to Forrester, External Attack Surface Management (EASM) emerged as a market category in 2021 and gained popularity in 2022. In a different report, Gartner concluded that vulnerability management vendors are expanding their offerings to include Attack Surface Management (ASM) for a suite of comprehensive offensive security solutions. Recognition from global analysts has officially put "

Autosummary: " 5 Phases of Continuous Threat Exposure Management Scoping Discovery Prioritization Validation Mobilization Attack Surface Management assists in the first three phases of CTEM: scoping, discovery, and prioritization by supporting businesses through the inventory of known digital assets, continuous discovery of unknown assets, and human intelligence to prioritize severe exposures for timely remediation.With 20 years of experience, their cybersecurity experts secure prominent organizations worldwide, including top banks, cloud providers, healthcare companies, and Fortune 500 firms. "


Babuk Source Code Sparks 9 Different Ransomware Strains Targeting VMware ESXi Systems

exploits ransomware
2023-05-11 https://thehackernews.com/2023/05/babuk-source-code-sparks-9-new.html
Multiple threat actors have capitalized on the leak of Babuk (aka Babak or Babyk) ransomware code in September 2021 to build as many as nine different ransomware families capable of targeting VMware ESXi systems. "These variants emerged through H2 2022 and H1 2023, which shows an increasing trend of Babuk source code adoption," SentinelOne security researcher Alex Delamotte said in a report "

Autosummary: Since bursting on the scene in September 2022, Royal ransomware has claimed responsibility for targeting 157 organizations on their leak site, with most of the attacks targeting manufacturing, retail, legal services, education, construction, and healthcare services in the U.S., Canada, and Germany. "


New ransomware decryptor recovers data from partially encrypted files

exploits ransomware
2023-05-10 https://www.bleepingcomputer.com/news/security/new-ransomware-decryptor-recovers-data-from-partially-encrypted-files/
Security researchers have shared a new Python-based ransomware recovery tool named "White Phoenix" on GitHub, which lets victims of ransomware strains that use intermittent encryption recover their files for free. [...] "

Autosummary: These files using the ZIP format include Word (docx, docm, dotx, dotm, odt), Excel (xlsx, xlsm, xltx, xltm, xlsb, xlam, ods), and PowerPoint (pptx, pptm, ptox, potm, ppsx, ppsm, odp) document formats. BlackCat"s intermittent encryption (CyberArk) However, according to CyberArk, which developed and published "White Phoenix," this tactic introduces weaknesses to the encryption, as leaving parts of the original files unencrypted creates the potential for free data recovery. "


New Ransomware Strain "CACTUS" Exploits VPN Flaws to Infiltrate Networks

exploits ransomware
2023-05-09 https://thehackernews.com/2023/05/new-ransomware-strain-cactus-exploits.html
Cybersecurity researchers have shed light on a new ransomware strain called CACTUS that has been found to leverage known flaws in VPN appliances to obtain initial access to targeted networks. "Once inside the network, CACTUS actors attempt to enumerate local and network user accounts in addition to reachable endpoints before creating new user accounts and leveraging custom scripts to automate "

Autosummary: CACTUS and Rapture are the latest additions to a long list of new ransomware families that have come to light in recent weeks, including Gazprom, BlackBit, UNIZA, Akira, and a NoCry ransomware variant called Kadavro Vector. "


New CACTUS ransomware appeared in the threat landscape

exploits ransomware
2023-05-09 https://securityaffairs.com/145960/malware/new-cactus-ransomware.html

Researchers warn of a new ransomware family called CACTUS that exploits known vulnerabilities in VPN appliances to gain initial access to victims’ networks. Researchers from cybersecurity firm Kroll have analyzed on a new ransomware family called CACTUS that has been spotted exploiting known flaws in VPN appliances to achieve initial access to targeted networks. The […]

The post New CACTUS ransomware appeared in the threat landscape appeared first on Security Affairs.

"

Autosummary: Nominate Pierluigi Paganini and Security Affairs here here: https://docs.google.com/forms/d/e/1FAIpQLSepvnj8b7QzMdLh7vWEDQDqohjBUsHyn3x3xRdYGCetwVy2DA/viewform Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, CACTUS Ransomware) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Join Our Webinar: Learn How to Defeat Ransomware with Identity-Focused Protection

exploits ransomware
2023-05-08 https://thehackernews.com/2023/05/join-our-webinar-learn-how-to-defeat.html
Are you concerned about ransomware attacks? You"re not alone. In recent years, these attacks have become increasingly common and can cause significant damage to organizations of all sizes. But there"s good news - with the right security measures in place, such as real-time MFA and service account protection, you can effectively protect yourself against these types of attacks. That"s why we"re "

Autosummary: During this webinar, Yiftach will share his insights on how real-time MFA and service account protection can defeat ransomware attacks, and why identity-focused protection is the only way to stop lateral movement and ransomware spread. "


Meet Akira — A new ransomware operation targeting the enterprise

exploits ransomware
2023-05-07 https://www.bleepingcomputer.com/news/security/meet-akira-a-new-ransomware-operation-targeting-the-enterprise/
The new Akira ransomware operation has slowly been building a list of victims as they breach corporate networks worldwide, encrypt files, and then demand million-dollar ransoms. [...] "

Autosummary: When executed, Akira will delete Windows Shadow Volume Copies on the device by running the following PowerShell command: powershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject" The ransomware will then proceed to encrypt files that contain the following file extensions: .accdb, .accde, .accdc, .accdt, .accdr, .adb, .accft, .adf, .ade, .arc, .adp, .alf, .ora, .btr, .ask, .cat, .bdf, .ckp, .cdb, .cpd, .cma, .dad, .dacpac, .daschema, .dadiagrams, .db-shm, .db-wal, .dbf, .dbc, .dbt, .dbs, .dbx, .dbv, .dct, .dcb, .ddl, .dcx, .dlis, .dsk, .dqy, .dtsx, .dsn, .eco, .dxl, .edb, .ecx, .exb, .epim, .fdb, .fcd, .fmp, .fic, .fmpsl, .fmp12, .fol, .fpt, .gdb, .frm, .gwi, .grdb, .his, .hdb, .idb, .itdb, .ihx, .jet, .itw, .kdb, .jtx, .kexic, .kexi, .lgc, .kexis, .maf, .lwx, .mar, .maq, .mav, .mas, .mdf, .mdb, .mrg, .mpd, .mwb, .mud, .ndf, .myd, .nrmlib, .nnt, .nsf, .nyf, .nwdb, .oqy, .odb, .owc, .orx, .pdb, .pan, .pnz, .pdm, .qvd, .qry, .rctd, .rbf, .rodx, .rod, .rsd, .rpd, .sbf, .sas7bdat, .sdb, .scx, .sdf, .sdc, .spq, .sis, .sqlite, .sql, .sqlitedb, .sqlite3, .temx, .tps, .tmd, .trm, .trc, .udl, .udb, .usr, .vpd, .vis, .wdb, .vvv, .wrk, .wmdb, .xld, .xdb, .abcddb, .xmlff, .abx, .abs, .adn, .accdw, .icg, .hjt, .kdb, .icr, .maw, .lut, .mdt, .mdn, .vhd, .vdi, .pvm, .vmdk, .vmsn, .vmem, .nvram, .vmsd, .raw, .vmx, .subvol, .qcow2, .vsv, .bin, .vmrs, .avhd, .avdx, .vhdx, .iso, .vmcx While encrypting, the encryptor will skip files found in the Recycle Bin, System Volume Information, Boot, ProgramData, and Windows folders. "


New Cactus ransomware encrypts itself to evade antivirus

exploits ransomware
2023-05-07 https://www.bleepingcomputer.com/news/security/new-cactus-ransomware-encrypts-itself-to-evade-antivirus/
A new ransomware operation called Cactus has been exploiting vulnerabilities in VPN appliances for initial access to networks of "large commercial entities." [...] "

Autosummary: This is explicit in the ransom note: Cactus ransom note threatens with publishing stolen data source: Kroll Extensive details about the Cactus operation, the victims they target, and if the hackers keep their word and provide a reliable decryptor if paid, are not available at this time. In a technical report, Kroll investigators explain that there are three main modes of execution, each one selected with the use of a specific command line switch: setup (-s), read configuration (-r), and encryption (-i). "


ALPHV gang claims ransomware attack on Constellation Software

exploits ransomware
2023-05-05 https://www.bleepingcomputer.com/news/security/alphv-gang-claims-ransomware-attack-on-constellation-software/
Canadian diversified software company Constellation Software confirmed on Thursday that some of its systems were breached by threat actors who also stole personal information and business data. [...] "

Autosummary: Constellation Software acquires, manages, and builds software businesses through six operating groups: Volaris, Harris, Jonas, Vela Software, Perseus Group, and Topicus. "


The Week in Ransomware - May 5th 2023 - Targeting the public sector

exploits ransomware
2023-05-05 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-may-5th-2023-targeting-the-public-sector/
This week"s ransomware news has been dominated by a Royal ransomware attack on the City of Dallas that took down part of the IT infrastructure. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @malwrhunterteam, @serghei, @demonslay335, @billtoulas, @Ionut_Ilascu, @fwosar, @LawrenceAbrams, @BleepinComputer, @Seifreed, @AlvieriD, @WithSecure, @PogoWasRight, @pcrisk, @siri_urz, @Unit42_Intel, and @BrettCallow. The ALPHV ransomware operation, aka BlackCat, has published screenshots of internal emails and video conferences stolen from Western Digital, indicating they likely had continued access to the company"s systems even as the company responded to the breach. "


Intruder launches continuous attack surface monitoring for SMBs

ransomware
2023-05-04 https://www.helpnetsecurity.com/2023/05/04/intruder-attack-surface-monitoring-capabilities/

Intruder has launched its continuous attack surface monitoring capabilities. The company’s new premium plan offering takes vulnerability management to the next level with continuous coverage, increasing visibility and transparency of external attack surfaces. On average, 65 new vulnerabilities are discovered every day. Businesses of all sizes need visibility of a constantly evolving external attack surface, and to continually manage their exposure to avoid being breached. Intruder’s continuous network scanning includes adaptive attack surface scans, which … More

The post Intruder launches continuous attack surface monitoring for SMBs appeared first on Help Net Security.

"

Autosummary: "


City of Dallas shut down IT services after ransomware attack

exploits government ransomware
2023-05-04 https://securityaffairs.com/145723/cyber-crime/city-of-dallas-ransomware-attack.html

The City of Dallas, Texas, was hit by a ransomware attack that forced it to shut down some of its IT systems. The IT systems at the City of Dallas, Texas, have been targeted by a ransomware attack. To prevent the threat from spreading within the network, the City has shut down the impacted IT […]

The post City of Dallas shut down IT services after ransomware attack appeared first on Security Affairs.

"

Autosummary: The ransomware encrypts the network shares, that are found on the local network and the local drives, with the AES algorithm In March, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) released a joint Cybersecurity Advisory (CSA) to provide organizations, tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) associated with this ransomware family.“Subsequently, the City has confirmed that a number of servers have been compromised with ransomware, impacting several functional areas, including the Dallas Police Department Website,” “The City team, along with its vendors, are actively working to isolate the ransomware to prevent its spread, to remove the ransomware from infected servers, and to restore any services currently impacted. "


City of Dallas hit by ransomware

exploits government ransomware
2023-05-04 https://www.helpnetsecurity.com/2023/05/04/dallas-ransomware/

The City of Dallas, Texas, has suffered a ransomware attack that resulted in disruption of several of its services. What do we know so far? “Wednesday morning, the City’s security monitoring tools notified our Security Operations Center (SOC) that a likely ransomware attack had been launched within our environment,” the City’s public statement revealed. “Subsequently, the City has confirmed that a number of servers have been compromised with ransomware, impacting several functional areas, including the … More

The post City of Dallas hit by ransomware appeared first on Help Net Security.

"

Autosummary: “Rather than selling Royal as a ransomware-as-a-service (RaaS), [the group] purchases direct access to corporate networks from underground Initial Access Brokers (IABs) and manages the attack campaigns internally,” BlackBerry researchers say, adding that the group is also known for engaging in double extortion tactics. "


Veza for SaaS Apps secures sensitive data against breaches, ransomware, and insider threats

exploits ransomware
2023-05-03 https://www.helpnetsecurity.com/2023/05/03/veza-saas-apps/

Veza has unveiled Veza for SaaS Apps, a solution to deliver access security and governance across SaaS applications, including Salesforce, JIRA, Coupa, Netsuite, GitHub, Gitlab, Slack, and Bitbucket. The solution allows customers to automate access reviews, find and fix privilege access violations, trim privilege sprawl, and prevent SaaS misconfigurations. With this solution, Veza secures the attack surface associated with SaaS apps while enabling continuous compliance with frameworks like Sarbanes-Oxley, ISO 27001, SOC 2, and GDPR. … More

The post Veza for SaaS Apps secures sensitive data against breaches, ransomware, and insider threats appeared first on Help Net Security.

"

Autosummary: "


City of Dallas hit by Royal ransomware attack impacting IT services

exploits government ransomware
2023-05-03 https://www.bleepingcomputer.com/news/security/city-of-dallas-hit-by-royal-ransomware-attack-impacting-it-services/
The City of Dallas, Texas, has suffered a Royal ransomware attack, causing it to shut down some of its IT systems to prevent the attack"s spread. [...] "

Autosummary: "The City team, along with its vendors, are actively working to isolate the ransomware to prevent its spread, to remove the ransomware from infected servers, and to restore any services currently impacted.Subsequently, the City has confirmed that a number of servers have been compromised with ransomware, impacting several functional areas, including the Dallas Police Department Website," explained a media statement from the City of Dallas. "


Medusa ransomware gang leaks students’ psychological reports and abuse allegations

exploits ransomware
2023-05-02 https://www.bitdefender.com/blog/hotforsecurity/medusa-ransomware-gang-leaks-students-psychological-reports-and-abuse-allegations/
Students and teachers at the Minneapolis Public School (MPS) District, which suffered a huge ransomware attack< at the end of February, have had highly sensitive information about themselves published on the web, including allegations of abuse by teachers and psychological reports. Read more in my article on the Hot for Security blog. "

Autosummary: Contained in the published data were: names and birthdates of children with special needs, details of their home lives and any disorders, results of intelligence tests, and details of what medication they might be taking. "


FBI seizes 9 crypto exchanges used to launder ransomware payments

exploits ransomware
2023-05-02 https://www.bleepingcomputer.com/news/security/fbi-seizes-9-crypto-exchanges-used-to-launder-ransomware-payments/
The FBI and Ukrainian police have seized nine cryptocurrency exchange websites that facilitated money laundering for scammers and cybercriminals, including ransomware actors. [...] "

Autosummary: "


“Ashamed” LockBit ransomware gang apologises to hacked school, offers free decryption tool

exploits ransomware
2023-04-28 https://www.bitdefender.com/blog/hotforsecurity/ashamed-lockbit-ransomware-gang-apologises-to-hacked-school-offers-free-decryption-tool/
Is it possible ransomware gangs actually do have a heart? Read more in my article on the Hot for Security blog. "

Autosummary: "


The Week in Ransomware - April 28th 2023 - Clop at it again

exploits ransomware
2023-04-28 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-april-28th-2023-clop-at-it-again/
It has been a very quiet week for ransomware news, with only a few reports released and not much info about cyberattacks. An item of interest was Microsoft linking the recent PaperCut server attacks on the Clop and LockBit ransomware operation. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @serghei, @DanielGallagher, @malwareforme, @malwrhunterteam, @FourOctets, @billtoulas, @struppigel, @LawrenceAbrams, @Ionut_Ilascu, @Seifreed, @demonslay335, @BleepinComputer, @fwosar, @jorntvdw, @PolarToffee, @uptycs, @Trellix, @MsftSecIntel, @AlvieriD, @Jon__DiMaggio, @Fortinet, and @pcrisk. "


LockBit and Cl0p ransomware gangs actively exploiting Papercut vulnerabilities

exploits ransomware
2023-04-28 https://www.malwarebytes.com/blog/news/2023/04/lockbit-and-cl0p-are-actively-exploiting-papercut-vulnerabilities

Categories: News

Categories: Ransomware

Tags: PaperCut

Tags: Cl0p

Tags: LockBit

Vulnerabilities in PaperCut printing management are being used in ransomware attacks.

(Read more...)

The post LockBit and Cl0p ransomware gangs actively exploiting Papercut vulnerabilities appeared first on Malwarebytes Labs.

"

Autosummary: Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again. In a surprising turn of events for the ransomware landscape, Cl0p emerged as the most used ransomware in March 2023, coming out of nowhere to dethrone the usual frontrunner, LockBit.This makes a vulnerability, especially one that is as easy to exploit, a virtual goldmine for ransomware peddlers, and puts a bullseye on anyone that is running an unpatched server. "


PaperCut vulnerabilities leveraged by Clop, LockBit ransomware affiliates

exploits ransomware
2023-04-27 https://www.helpnetsecurity.com/2023/04/27/papercut-lockbit-clop/

Clop and LockBit ransomware affiliates are behind the recent attacks exploiting vulnerabilities in PaperCut application servers, according to Microsoft and Trend Micro researchers. The detected campaings “Microsoft is attributing the recently reported attacks exploiting the CVE-2023-27350 and CVE-2023-27351 vulnerabilities in print management software PaperCut to deliver Clop ransomware to the threat actor tracked as Lace Tempest (overlaps with FIN11 and TA505),” Microsoft shared. “Lace Tempest (DEV-0950) is a Clop ransomware affiliate that has been observed … More

The post PaperCut vulnerabilities leveraged by Clop, LockBit ransomware affiliates appeared first on Help Net Security.

"

Autosummary: The detected campaings “Microsoft is attributing the recently reported attacks exploiting the CVE-2023-27350 and CVE-2023-27351 vulnerabilities in print management software PaperCut to deliver Clop ransomware to the threat actor tracked as Lace Tempest (overlaps with FIN11 and TA505),” Microsoft shared. "


RTM Locker"s First Linux Ransomware Strain Targeting NAS and ESXi Hosts

exploits ransomware
2023-04-27 https://thehackernews.com/2023/04/rtm-lockers-first-linux-ransomware.html
The threat actors behind RTM Locker have developed a ransomware strain that"s capable of targeting Linux machines, marking the group"s first foray into the open source operating system. "Its locker ransomware infects Linux, NAS, and ESXi hosts and appears to be inspired by Babuk ransomware"s leaked source code," Uptycs said in a new report published Wednesday. "It uses a combination of ECDH on "

Autosummary: "Its locker ransomware infects Linux, NAS, and ESXi hosts and appears to be inspired by Babuk ransomware"s leaked source code," Uptycs said in a new report published Wednesday. "


Microsoft Confirms PaperCut Servers Used to Deliver LockBit and Cl0p Ransomware

exploits ransomware
2023-04-27 https://thehackernews.com/2023/04/microsoft-confirms-papercut-servers.html
Microsoft has confirmed that the active exploitation of PaperCut servers is linked to attacks that are designed to deliver Cl0p and LockBit ransomware families. The tech giant"s threat intelligence team is attributing a subset of the intrusions to a financially motivated actor it tracks under the name Lace Tempest (formerly DEV-0950), which overlaps with other hacking groups like FIN11, TA505, "

Autosummary: The tech giant"s threat intelligence team is attributing a subset of the intrusions to a financially motivated actor it tracks under the name Lace Tempest (formerly DEV-0950), which overlaps with other hacking groups like FIN11, TA505, and Evil Corp. "In observed attacks, Lace Tempest ran multiple PowerShell commands to deliver a TrueBot DLL, which connected to a C2 server, attempted to steal LSASS credentials, and injected the TrueBot payload into the conhost.exe service," Microsoft said in a series of tweets. "


Thales CTE-RWP protects critical files and folders from ransomware attacks

exploits ransomware
2023-04-27 https://www.helpnetsecurity.com/2023/04/27/thales-cte-rwp/

At RSA Conference 2023, Thales launched CipherTrust Transparent Encryption Ransomware Protection (CTE-RWP), an optional licensed feature to the CipherTrust Data Security Platform. CTE-RWP will elevate the protection of customer files and folders from ransomware attacks via access management controls and encryption processes. According to the 2023 Thales Data Threat Report, 49% of IT professionals reported an increase in ransomware attacks with 22% of organisations having experienced a ransomware attack in past 12 months. Ransomware attacks … More

The post Thales CTE-RWP protects critical files and folders from ransomware attacks appeared first on Help Net Security.

"

Autosummary: The release of this new Ransomware Protection helps bring an industry-leading solution to market, strengthening the Thales CipherTrust Data Security Platform and offering further protection against an ever-increasing threat to data. "


Linux version of RTM Locker ransomware targets VMware ESXi servers

exploits ransomware
2023-04-27 https://www.bleepingcomputer.com/news/security/linux-version-of-rtm-locker-ransomware-targets-vmware-esxi-servers/
RTM Locker is the latest enterprise-targeting ransomware operation found to be deploying a Linux encryptor that targets virtual machines on VMware ESXi servers. [...] "

Autosummary: BleepingComputer has seen this with almost all enterprise-targeting ransomware operations, including Royal, Black Basta, LockBit, BlackMatter, AvosLocker, REvil, HelloKitty, RansomEXX, Hive, and now, RTM Locker. "


Crooks use PaperCut exploits to deliver Cl0p and LockBit ransomware

exploits ransomware
2023-04-27 https://securityaffairs.com/145377/hacking/papercut-exploits-cl0p-lockbit-ransomware.html

Microsoft revealed that recent attacks against PaperCut servers aimed at distributing Cl0p and LockBit ransomware. Microsoft linked the recent attacks against PaperCut servers to a financially motivated threat actor tracked as Lace Tempest (formerly DEV-0950). The group is known to be an affiliate of the Clop ransomware RaaS affiliate, it has been linked to GoAnywhere attacks and […]

The post Crooks use PaperCut exploits to deliver Cl0p and LockBit ransomware appeared first on Security Affairs.

"

Autosummary: — Microsoft Threat Intelligence (@MsftSecIntel) April 26, 2023 About the author: Vilius Petkauskas, Senior Journalist at CyberNews Blogger Awards 2022 – VOTE FOR YOUR WINNERS Vote for me in the sections: The Teacher – Most Educational Blog The Entertainer – Most Entertaining Blog The Tech Whizz – Best Technical Blog Best Social Media Account to Follow (@securityaffairs) Please nominate Security Affairs as your favorite blog. "


New coercive tactics used to extort ransomware payments

exploits ransomware industry
2023-04-26 https://www.helpnetsecurity.com/2023/04/26/q1-2023-ransomware-victims/

The increase in reported ransomware victims across Q1 2023 reflects the continued prevalence of ransomware as a worldwide, industry agnostic threat, according to GuidePoint Security. The report is based on data obtained from publicly available resources, including threat groups themselves, and insight into the ransomware threat landscape. In the first quarter, GRIT tracked 849 total publicly posted ransomware victims claimed by 29 different threat groups. Increase in public ransomware victims GRIT’s latest report shows a … More

The post New coercive tactics used to extort ransomware payments appeared first on Help Net Security.

"

Autosummary: While manufacturing and technology continue to be the most impacted sectors, observed victims in the legal industry increased 65% from Q4 2022 to Q1 2023, from 23 to 38, with 70% consistently attributed to the most prolific “double-extortion” model ransomware groups – LockBit, AlphV, Royal, and BlackBasta. "


Clop, LockBit ransomware gangs behind PaperCut server attacks

exploits ransomware
2023-04-26 https://www.bleepingcomputer.com/news/security/clop-lockbit-ransomware-gangs-behind-papercut-server-attacks/
​Microsoft has attributed recent attacks on PaperCut servers to the Clop and LockBit ransomware operations, which used the vulnerabilities to steal corporate data. [...] "

Autosummary: Ransomware gangs behind attacks Today, Microsoft disclosed that the Clop and LockBit ransomware gangs are behind these PaperCut attacks and using them to steal corporate data from vulnerable servers. "


Microsoft: Clop and LockBit ransomware behind PaperCut server hacks

exploits ransomware
2023-04-26 https://www.bleepingcomputer.com/news/security/microsoft-clop-and-lockbit-ransomware-behind-papercut-server-hacks/
​Microsoft has attributed recent attacks on PaperCut servers to the Clop and LockBit ransomware operations, which used the vulnerabilities to steal corporate data. [...] "

Autosummary: Ransomware gangs behind attacks Today, Microsoft disclosed that the Clop and LockBit ransomware gangs are behind these PaperCut attacks and using them to steal corporate data from vulnerable servers. "


Pro-Russia hackers attack European air traffic control website, but don’t panic! Flights continue as normal

ransomware
2023-04-25 https://www.bitdefender.com/blog/hotforsecurity/pro-russia-hackers-attack-european-air-traffic-control-website-but-dont-panic-flights-continue-as-normal/
Eurocontrol, the European air traffic control agency, has revealed that it has been under cyber attack for the last week, and says that pro-Russian hackers have claimed responsibility for the disruption. When you first see the headline in the likes of the Wall Street Journal, it"s a scary thing to read. But dig a little deeper, and you realise that the err.. sky is not falling. Read more in my article on the Hot for Security blog. "

Autosummary: " Yes, it"s undoubtedly a nuisance for some if Eurocontrol"s website is knocked offline by a DDoS attack, or becomes difficult to access, but the website itself is not used for critical operations that could impact flight safety but is rather a way of sharing public information. "


Black Basta ransomware attacks Yellow Pages Canada

exploits ransomware
2023-04-25 https://www.malwarebytes.com/blog/news/2023/04/black-basta-ransomware-attacks-yellow-pages-canada

Categories: News

Categories: Ransomware

Tags: Yellow Pages

Tags: Canada

Tags: Black Basta

Tags: ransomware

Yellow Pages Canada has suffered a cyberattack by the Black Basta ransomware group.

(Read more...)

The post Black Basta ransomware attacks Yellow Pages Canada appeared first on Malwarebytes Labs.

"

Autosummary: Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again. Franco Sciannamblo, YP"s Senior Vice President Chief Financial Officer commented in a statement to BleepingComputer: “Based on our investigation to date, we have reason to believe that the unauthorized third party stole certain personal information from servers containing YP employee data and limited data relating to our business customers.After the data is copied, the ransomware encrypts files with the ".basta" extension, erases volume shadow copies, and presents a ransom note named readme.txt on affected devices. "


Health insurer Point32Health suffered a ransomware attack

exploits ransomware
2023-04-23 https://securityaffairs.com/145183/cyber-crime/point32health-ransomware-attack.html

Non-profit health insurer Point32Health suffered a ransomware attack and has taken systems offline in response to the incident. Non-profit health insurer Point32Health has taken systems offline in response to a ransomware attack that took place on April 17. The insurer immediately launched an investigation into the incident with the help of third-party cybersecurity experts to […]

The post Health insurer Point32Health suffered a ransomware attack appeared first on Security Affairs.

"

Autosummary: "


Google ads push BumbleBee malware used by ransomware gangs

exploits ransomware
2023-04-22 https://www.bleepingcomputer.com/news/security/google-ads-push-bumblebee-malware-used-by-ransomware-gangs/
The enterprise-targeting Bumblebee malware is distributed through Google Ads and SEO poisoning that promote popular software like Zoom, Cisco AnyConnect, ChatGPT, and Citrix Workspace. [...] "

Autosummary: The tools the attackers deployed on the breached environment include the Cobalt Strike pen-test suite, the AnyDesk and DameWare remote access tools, network scanning utilities, an AD database dumper, and a Kerberos credentials stealer. "


Sotero Ransomware Protection encrypts data to prevent theft and extortion

exploits ransomware
2023-04-21 https://www.helpnetsecurity.com/2023/04/21/sotero-ransomware-protection/

Sotero has launched Sotero Ransomware Protection, giving organizations the ability to proactively protect unstructured data from attack by utilizing behavior-based detection. Most currently available ransomware solutions use a signature-based approach that detects only currently known ransomware strains – a method that broadly protects against malware concerns, but does not guarantee protection against zero-day attacks. Sotero’s Ransomware Protection not only detects currently known ransomware, but also provides the ability to detect and protect data from zero-day … More

The post Sotero Ransomware Protection encrypts data to prevent theft and extortion appeared first on Help Net Security.

"

Autosummary: "


The Week in Ransomware - April 21st 2023 - Macs in the Crosshairs

exploits ransomware
2023-04-21 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-april-21st-2023-macs-in-the-crosshairs/
A lot of news broke this week related to ransomware, with the discovery of LockBit testing macOS encryptors to an outage on NCR, causing massive headaches for restaurants. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include @billtoulas, @fwosar, @BleepinComputer, @LawrenceAbrams, @Ionut_Ilascu, @serghei, @demonslay335, @jorntvdw, @malwrhunterteam, @Seifreed, @AShukuhi, @patrickwardle, @Kostastsale, @BlackBerry, @TrendMicro, @WhichbufferArda, @NCCGroupplc, @BroadcomSW, @IBMSecurity, @AhnLab_man, @SophosXOps, @SentinelOne, @pcrisk, @AlvieriD, @BrettCallow, and @siri_urz. Some interesting research on ransomware was also released this week, including: Finally, we learned about some ransomware attacks, with an NCR outage confirmed to be ransomware and Capita confirming that data was stolen in a cyberattack. "


Trigona Ransomware targets Microsoft SQL servers

exploits ransomware
2023-04-20 https://securityaffairs.com/145036/cyber-crime/trigona-ransomware-targets-microsoft-sql-servers.html

Threat actors are hacking poorly secured and Interned-exposed Microsoft SQL servers to deploy the Trigona ransomware. Threat actors are hacking into poorly secured and public-facing Microsoft SQL servers to deploy Trigona ransomware. Trigona is a malware strain that was discovered in October 2022, and Palo Alto Unit 42 researchers reported similarities between Trigona and the […]

The post Trigona Ransomware targets Microsoft SQL servers appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, Microsoft SQL, Trigona ransomware) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Fortra Sheds Light on GoAnywhere MFT Zero-Day Exploit Used in Ransomware Attacks

exploits ransomware
2023-04-20 https://thehackernews.com/2023/04/fortra-sheds-light-on-goanywhere-mft.html
Fortra, the company behind Cobalt Strike, shed light on a zero-day remote code execution (RCE) vulnerability in its GoAnywhere MFT tool that has come under active exploitation by ransomware actors to steal sensitive data. The high-severity flaw, tracked as CVE-2023-0669 (CVSS score: 7.2), concerns a case of pre-authenticated command injection that could be abused to achieve code execution. The "

Autosummary: " The threat actor further abused the flaw to deploy two additional tools, dubbed "Netcat" and "Errors.jsp," between January 28, 2023 and January 31, 2023, although not every installation attempt is said to have been successful. "


LockBit ransomware for Mac – coming soon?

exploits ransomware
2023-04-20 https://grahamcluley.com/lockbit-ransomware-for-mac-coming-soon/
In the last couple of days it has become clear that the notorious LockBit ransomware gang has been exploring creating what could become a big headache for users of Mac computers. "

Autosummary: "


Phylum adds OPA and continuous reporting to its policy engine

ransomware
2023-04-19 https://www.helpnetsecurity.com/2023/04/19/phylum-policy-engine/

Phylum has added Open Policy Agent (OPA) and continuous reporting to its policy engine. Customers now have more flexibility when creating and enforcing custom policies, and can show compliance with key software supply chain frameworks, regulations and guidelines. “We built Phylum’s policy engine as a security-as-code mechanism to give security and risk teams more visibility into the development lifecycle and allow them to enforce security policy without disruption. Phylum is the only platform that allows … More

The post Phylum adds OPA and continuous reporting to its policy engine appeared first on Help Net Security.

"

Autosummary: "


Play ransomware gang uses custom Shadow Volume Copy data-theft tool

exploits ransomware
2023-04-19 https://www.bleepingcomputer.com/news/security/play-ransomware-gang-uses-custom-shadow-volume-copy-data-theft-tool/
The Play ransomware group has developed two custom tools in .NET, namely Grixba and VSS Copying Tool, which it uses to improve the effectiveness of its cyberattacks. [...] "

Autosummary: "


March 2023 broke ransomware attack records with 459 incidents

exploits ransomware
2023-04-19 https://www.bleepingcomputer.com/news/security/march-2023-broke-ransomware-attack-records-with-459-incidents/
March 2023 was the most prolific month recorded by cybersecurity analysts in recent years, measuring 459 attacks, an increase of 91% from the previous month and 62% compared to March 2022. [...] "

Autosummary: Most targeted sectors by ransomware actors (NCC Group) In second place are "Consumer Cyclicals," encompassing construction supplies, specialty retailers, hotels, automobiles, media & publishing, household goods, etc. "


Microsoft SQL servers hacked to deploy Trigona ransomware

exploits ransomware
2023-04-19 https://www.bleepingcomputer.com/news/security/microsoft-sql-servers-hacked-to-deploy-trigona-ransomware/
Attackers are hacking into poorly secured and Interned-exposed Microsoft SQL (MS-SQL) servers to deploy Trigona ransomware payloads and encrypt all files. [...] "

Autosummary: "


Russian national sentenced to time served for committing money laundering for the Ryuk ransomware operation

financial exploits ransomware rusia-ucrania
2023-04-19 https://securityaffairs.com/145029/cyber-crime/russian-national-sentenced-money-laundering-ryuk-ransomware.html

Russian national Denis Mihaqlovic Dubnikov has been sentenced to time served for committing money laundering for the Ryuk ransomware operation. Russian national Denis Dubnikov (30) has been sentenced to time served for committing money laundering for the Ryuk ransomware group. The man was also ordered to pay $2,000 in restitution.   On February 7, 2023, Dubnikov pleaded […]

The post Russian national sentenced to time served for committing money laundering for the Ryuk ransomware operation appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, Ryuk ransomware) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


LockBit Ransomware Now Targeting Apple macOS Devices

exploits ransomware
2023-04-18 https://thehackernews.com/2023/04/lockbit-ransomware-now-targeting-apple.html
Threat actors behind the LockBit ransomware operation have developed new artifacts that can encrypt files on devices running Apple"s macOS operating system. The development, which was reported by the MalwareHunterTeam over the weekend, appears to be the first time a big-game ransomware crew has created a macOS-based payload. Additional samples identified by vx-underground show that the macOS "

Autosummary: Wardle also pointed out additional safeguards implemented by Apple, such as System Integrity Protection (SIP) and Transparency, Consent, and Control (TCC) that prevent the execution of unauthorized code and require apps to seek users" permission to access protected files and data. "


The intricate relationships between the FIN7 group and members of the Conti ransomware gang

exploits ransomware
2023-04-18 https://securityaffairs.com/144943/cyber-crime/relationships-fin7-conti-ransomware.html

A new malware, dubbed Domino, developed by the FIN7 cybercrime group has been used by the now-defunct Conti ransomware gang. IBM Security X-Force researchers recently discovered a new malware family, called Domino, which was created by developers associated with the FIN7 cybercriminal group (tracked by X-Force as ITG14). FIN7 is a Russian criminal group (aka Carbanak) that has […]

The post The intricate relationships between the FIN7 group and members of the Conti ransomware gang appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, FIN7) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


LockBit ransomware on Mac: Should we worry?

exploits ransomware
2023-04-18 https://www.malwarebytes.com/blog/news/2023/04/lockbit-ransomware-on-mac-should-we-worry

Categories: News

Categories: Ransomware

Tags: LockBit

Tags: ransomware

Tags: Patrick Wardle

Tags: macOS ransomware

Tags: first Mac ransomware

Tags: Azim Khodjibaev

Tags: BleepingComputer

Tags: Mark Stockley

With plans to offer more ransomware, LockBit has just created a variant for macOS. But, as experts have pointed out, it"s hardly ready for anything.

(Read more...)

The post LockBit ransomware on Mac: Should we worry? appeared first on Malwarebytes Labs.

"

Autosummary: "For most organizations, the main takeaway is Macs are probably safe, for now, but your Windows servers were always the prime target anyway," says Malwarebytes Security Evangelist Mark Stockley.Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.(Source: Objective-See) The encryptor is likely a test file Azim Khodjibaev (@AShukuhi), a security researcher at Cisco Talos, floated the theory to BleepingComputer that the encryptors designed for macOS were "meant as a test and were never intended for development in live cyberattacks. "


Payment giant"s point-of-sale outage caused by ALPHV ransomware

exploits ransomware
2023-04-18 https://www.malwarebytes.com/blog/news/2023/04/payment-giants-point-of-sale-outage-caused-by-alphv-ransomware

Categories: News

Categories: Ransomware

Tags: NCR

Tags: Aloha

Tags: ALPHV

Tags: BalckCat

Tags: ransomware

An issue with the NCR Aloha point-of-sale system turned out to be a ransomware attack claimed by the ALPHV group

(Read more...)

The post Payment giant"s point-of-sale outage caused by ALPHV ransomware appeared first on Malwarebytes Labs.

"

Autosummary: Posted: April 18, 2023 by An issue with the NCR Aloha point-of-sale system turned out to be a ransomware attack claimed by the ALPHV group On April 12, 2023, payment giant NCR reported it was looking into an issue with its point-of-sale (POS) systems that caused an outage, leaving customers unable to use the system.Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.We will give you this list after payment," The ransomware-as-a-service (RaaS) group ALPHV, also known as BlackCat or Noberus, is currently one of the most active. "


Vice Society Ransomware Using Stealthy PowerShell Tool for Data Exfiltration

exploits ransomware
2023-04-17 https://thehackernews.com/2023/04/vice-society-ransomware-using-stealthy.html
Threat actors associated with the Vice Society ransomware gang have been observed using a bespoke PowerShell-based tool to fly under the radar and automate the process of exfiltrating data from compromised networks. "Threat actors (TAs) using built-in data exfiltration methods like [living off the land binaries and scripts] negate the need to bring in external tools that might be flagged by "

Autosummary: "Threat actors (TAs) using built-in data exfiltration methods like [living off the land binaries and scripts] negate the need to bring in external tools that might be flagged by security software and/or human-based security detection mechanisms," Palo Alto Networks Unit 42 researcher Ryan Chapman said. "


Living Off the Land (LOTL) attacks: Detecting ransomware gangs hiding in plain sight

exploits ransomware
2023-04-17 https://www.malwarebytes.com/blog/business/2023/04/living-off-the-land-lotl-attacks-detecting-ransomware-gangs-hiding-in-plain-sight

Categories: Business

Good tools gone bad.

(Read more...)

The post Living Off the Land (LOTL) attacks: Detecting ransomware gangs hiding in plain sight appeared first on Malwarebytes Labs.

"

Autosummary: Tool Used For Used To Used By PowerShell Versatile scripting language and shell framework for Windows systems Execute malicious scripts, maintain persistence, and evade detection LockBit, Vice Society, Royal, BianLian, ALPHV, Black Basta PsExec Lightweight command-line tool for executing processes on remote systems Execute commands or payloads via a temporary Windows service LockBit, Royal, ALPHV, Play, BlackByte WMI Admin feature for accessing and managing Windows system components Execute malicious commands and payloads remotely LockBit, Vice Society, Black Basta, Dark Power, Cl0p, BianLian Mimikatz Open source tool for Windows security and credential management Extract credentials from memory and perform privilege escalation LockBit, Black Basta, Cuba, ALPHV Cobalt Strike Commercial pen test to assess network security and simulate advanced threat actor tactics Command and control, lateral movement, and exfiltration of sensitive data LockBit, Black Basta, Royal, ALPHV, Play, Cuba, Vice Society Again, readers of our monthly ransomware review will recognize that each gang listed here are responsible for the lion"s share of yearly ransomware attacks. In order to truly protect ourselves from RaaS gangs, we have to ‘peel back the onion’, so to speak, and get a closer look at how, exactly, they behave. In short, by continuously analyzing network and system data, identifying potential weak points, and anticipating attacker tactics, IT teams can begin to get the upper-hand against RaaS gangs that employ LOTL techniques. "


NCR was the victim of BlackCat/ALPHV ransomware gang

exploits ransomware
2023-04-16 https://securityaffairs.com/144866/cyber-crime/ncr-blackcat-alphv-ransomware.html

NCR was the victim of the BlackCat/ALPHV ransomware gang, the attack caused an outage on the company’s Aloha PoS platform. NCR Corporation, previously known as National Cash Register, is an American software, consulting and technology company providing several professional services and electronic products. It manufactures self-service kiosks, point-of-sale terminals, automated teller machines, check processing systems, […]

The post NCR was the victim of BlackCat/ALPHV ransomware gang appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, NCR) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


LockBit ransomware encryptors found targeting Mac devices

exploits ransomware
2023-04-16 https://www.bleepingcomputer.com/news/security/lockbit-ransomware-encryptors-found-targeting-mac-devices/
The LockBit ransomware gang has created encryptors targeting Macs for the first time, likely becoming the first major ransomware operation to ever specifically target macOS. [...] "

Autosummary: _check_esxi esxi_ _Esxi _kill_esxi_1 _kill_esxi_2 _kill_esxi_3 _kill_processes _kill_processes_Esxi _killed_force_vm_id _listvms _esxcfg_scsidevs1 _esxcfg_scsidevs2 _esxcfg_scsidevs3 _esxi_disable _esxi_enable Furthermore, the encryptor contains a list of sixty-five file extensions and filenames that will be excluded from encryption, all of them being Windows file extensions and folders. "


Experts found the first LockBit encryptor that targets macOS systems

ransomware
2023-04-16 https://securityaffairs.com/144879/cyber-crime/lockbit-encryptor-targets-macos.html

Researchers warn that the LockBit ransomware gang has developed encryptors to target macOS devices. The LockBit group is the first ransomware gang of all time that has created encryptors to target macOS systems, MalwareHunterTeam team warn. MalwareHunterTeam researchers discovered the LockBit encryptors in a ZIP archive uploaded to VirusTotal. The discovery is disconcerting and demonstrates […]

The post Experts found the first LockBit encryptor that targets macOS systems appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, LockBit) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Hackers start abusing Action1 RMM in ransomware attacks

exploits ransomware
2023-04-15 https://www.bleepingcomputer.com/news/security/hackers-start-abusing-action1-rmm-in-ransomware-attacks/
Security researchers are warning that cybercriminals are increasingly using the Action1 remote access software for persistence on compromised networks and to execute commands, scripts, and binaries. [...] "

Autosummary: “Last year we rolled-out a threat actor filtering system that scans user activity for suspicious patterns of behavior, automatically suspends potentially malicious accounts, and alerts Action1’s dedicated security team to investigate the issue” - Mike Walters Action1 is working on including new measures to stop the misuse of the platform, the researcher said, adding that the company is “fully open to cooperation with both victims and legal authorities” on cases where Action1 was leveraged for cyberattacks. "


NCR suffers Aloha POS outage after BlackCat ransomware attack

exploits ransomware
2023-04-15 https://www.bleepingcomputer.com/news/security/ncr-suffers-aloha-pos-outage-after-blackcat-ransomware-attack/
NCR is suffering an outage on its Aloha point of sale platform after being hit by an ransomware attack claimed by the BlackCat/ALPHV gang. [...] "

Autosummary: "As a valued customer of NCR Corporation, we are reaching out with additional information about a single data center outage that is impacting a limited number of ancillary Aloha applications for a subset of our hospitality customers," reads an email sent to Aloha POS customers. Since its launch, the ransomware operation has grown into one of the most significant ransomware active at this time, responsible for hundreds of attacks worldwide, with ransom demands ranging from $35,000 to over $10 million. "


Vice Society ransomware uses new PowerShell data theft tool in attacks

exploits ransomware
2023-04-14 https://www.bleepingcomputer.com/news/security/vice-society-ransomware-uses-new-powershell-data-theft-tool-in-attacks/
The Vice Society ransomware gang is deploying a new, rather sophisticated PowerShell script to automate data theft from compromised networks. [...] "

Autosummary: For example, some of the folders it targets include: *941*", "*1040*", "*1099*", "*8822*", "*9465*", "*401*K*", "*401K*", "*4506*T*", "*4506T*", "*Abkommen*", "*ABRH*", "*Abtretung*", "*abwickeln*", "*ACA*1095*", "*Accordi*", "*Aceito*", "*Acordemen*", "*Acordos*", "*Acuerde*", "*Acuerdo*", "*Addres*", "*Adres*", "*Affectation*", "*agreem*", "*Agreemen*Disclosur*", "*agreement*", "*Alamat*", "*Allocation*", "*angreifen*", "*Angriff*", "*Anmeldeformationen*", "*Anmeldeinformationen*", "*Anmeldenunter*", "*Anmeldung*", "*Anschrift*", "*Anspruch*", "*Ansspruch*", "*Anweisung*", "*AnweisungBank*", "*anxious*", "*Análise*", "*Apotheke*", "*ARH*", "*Asignación*", "*Asignatura*", "*Assegnazione*", "*Assignation*", "*Assignment*", "*Atribuição*", "*attorn*", "*Audit*", "*Auditnaadrese*", "*Aufführen*", "*Aufgabe*", "*Aufschühren*", "*Auftrag*", "*auftrunken*", "*Auftrunkinen*", "*Auswertung*", "*Avaliação*", "*Avaliações*", "*Avtal*", "*balanc*", "*bank*", "*Bargeld*", "*Belästigung*", "*Benef*", "*benefits*", "*Bericht*", "*Beschäftigung*", "*Betrug*", "*Bewertung*", "*bezahlen*", "*billing*", "*bio*" The PowerShell script uses system-native cmdlets like “Get-ChildItem” and “Select-String” to search and exfiltrate data from the infected machine, minimizing its footprint and maintaining a stealthy profile. "


Darktrace: Investigation found no evidence of LockBit breach

ransomware
2023-04-14 https://www.bleepingcomputer.com/news/security/darktrace-investigation-found-no-evidence-of-lockbit-breach/
Cybersecurity firm Darktrace says it found no evidence that the LockBit ransomware gang breached its network after the group added an entry to their dark web leak platform, implying that they stole data from the company"s systems. [...] "

Autosummary: "


The Week in Ransomware - April 14th 2023 - A Focus on Stolen Data

exploits ransomware
2023-04-14 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-april-14th-2023-a-focus-on-stolen-data/
It has been mostly a quiet week regarding ransomware, with only a few bits of info released on older attacks and some reports released on existing organizations. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include @LawrenceAbrams, @demonslay335, @malwareforme, @malwrhunterteam, @fwosar, @BleepinComputer, @Seifreed, @struppigel, @billtoulas, @Ionut_Ilascu, @serghei, @McAfee, @Fortinet, @Threatlabz, @pcrisk, and @GossiTheDog. "


Wazuh 4.4 combats breaches, ransomware, and cyberattacks all from a single agent

exploits ransomware ciber
2023-04-13 https://www.helpnetsecurity.com/2023/04/13/wazuh-4-4/

Wazuh launched Wazuh 4.4, the latest version of its open source security platform. The latest version adds multiple new features, including IPv6 support for the enrollment process and agent-manager connection, and support for Azure integration within Linux agents. Today’s leading enterprises require world-class protection of workloads across on-premises, virtualized, containerized, and cloud-based environments. Wazuh 4.4 enhances the comprehensive and customizable solution with greater flexibility to combat breaches, ransomware, and cyberattacks all from a single agent. … More

The post Wazuh 4.4 combats breaches, ransomware, and cyberattacks all from a single agent appeared first on Help Net Security.

"

Autosummary: "


RTM Locker: Emerging Cybercrime Group Targeting Businesses with Ransomware

exploits ransomware
2023-04-13 https://thehackernews.com/2023/04/rtm-locker-emerging-cybercrime-group.html
Cybersecurity researchers have detailed the tactics of a "rising" cybercriminal gang called "Read The Manual" (RTM) Locker that functions as a private ransomware-as-a-service (RaaS) provider and carries out opportunistic attacks to generate illicit profit. "The "Read The Manual" Locker gang uses affiliates to ransom victims, all of whom are forced to abide by the gang"s strict rules," "

Autosummary: To that end, CIS countries, as well as morgues, hospitals, COVID-19 vaccine-related corporations, critical infrastructure, law enforcement, and other prominent companies are off-limits for the group. "


11:11 Systems Managed SteelDome provides protection from ransomware attacks

exploits ransomware
2023-04-12 https://www.helpnetsecurity.com/2023/04/12/1111-systems-managed-steeldome/

11:11 Systems has revealed general availability of 11:11 Managed SteelDome in partnership with SteelDome Cyber. The fully managed service is designed for organizations in need of secure, scalable and cost-efficient storage of their unstructured, on-premises data. Leveraging SteelDome’s InfiniVault application technology, 11:11 Managed SteelDome provides on-premises data storage, protection and recovery. This new offering provides data immutability and protection from ransomware attacks and optimizes data storage, all while meeting strict compliance and regulatory requirements. Acting … More

The post 11:11 Systems Managed SteelDome provides protection from ransomware attacks appeared first on Help Net Security.

"

Autosummary: "


Urgent: Microsoft Issues Patches for 97 Flaws, Including Active Ransomware Exploit

exploits ransomware
2023-04-12 https://thehackernews.com/2023/04/urgent-microsoft-issues-patches-for-97.html
It"s the second Tuesday of the month, and Microsoft has released another set of security updates to fix a total of 97 flaws impacting its software, one of which has been actively exploited in ransomware attacks in the wild. Seven of the 97 bugs are rated Critical and 90 are rated Important in severity. Interestingly, 45 of the shortcomings are remote code execution flaws, followed by 20 "

Autosummary: Microsoft has also updated its advisory for CVE-2013-3900, a WinVerifyTrust signature validation vulnerability, to include the following Server Core installation versions - Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x65-based Systems Service Pack 2 Windows Server 2008 R2 for x64-based Systems Service 1 Windows Server 2012 Windows Server 2012 R2 Windows Server 2016 Windows Server 2019, and Windows Server 2022 The development comes as North Korea-linked threat actors have been observed leveraging the flaw to incorporate encrypted shellcode into legitimate libraries without invalidating the Microsoft-issued signature. "


Cybercrime group exploits Windows zero-day in ransomware attacks

exploits ransomware
2023-04-12 https://securityaffairs.com/144692/hacking/windows-zero-day-ransomware-attacks.html

Microsoft has addressed a zero-day in the Windows Common Log File System (CLFS) actively exploited in ransomware attacks. Microsoft has addressed a zero-day vulnerability, tracked as CVE-2023-28252, in the Windows Common Log File System (CLFS), which is actively exploited in ransomware attacks. Microsoft fixed the issue with the release of Patch Tuesday security updates for […]

The post Cybercrime group exploits Windows zero-day in ransomware attacks appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, zero-day) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


KFC, Pizza Hut owner employee data stolen in ransomware attack

exploits ransomware
2023-04-12 https://www.malwarebytes.com/blog/news/2023/04/kfc-pizza-hut-owner-employee-data-stolen-in-ransomware-attack

Categories: News

Categories: Ransomware

Tags: The Habit Burger Grill

Tags: KFC

Tags: Pizza Hut

Tags: Yum! Brands

Tags: ransomware

Yum! Brands, owner of KFC, Pizza Hut, and other fast food chains, was breached in January. It recently found employee data has been compromised.

(Read more...)

The post KFC, Pizza Hut owner employee data stolen in ransomware attack appeared first on Malwarebytes Labs.

"

Autosummary: Brands, the fast-food chain operator behind The Habit Burger Grill, KFC, Pizza Hut, and Taco Bell, has begun sending Notice of Security Breach letters to employees whose data were potentially affected. "While the Company"s response to this incident is ongoing, at this time we do not believe such impact of the incident will ultimately have a material adverse effect on our business, results of operations or financial condition," the company says in its 2022 annual report to the SEC which it filed on Friday.Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again. "


Windows zero-day vulnerability exploited in ransomware attacks

exploits ransomware
2023-04-11 https://www.bleepingcomputer.com/news/security/windows-zero-day-vulnerability-exploited-in-ransomware-attacks/
Microsoft has patched a zero-day vulnerability in the Windows Common Log File System (CLFS), actively exploited by cybercriminals to escalate privileges and deploy Nokoyawa ransomware payloads. [...] "

Autosummary: Redmond has patched at least 32 local privilege escalation vulnerabilities in the Windows CLFS driver since 2018, with three of them (CVE-2022-24521, CVE-2022-37969, and CVE-2023-23376) also exploited in the wild as zero-days, according to Kaspersky. "


KFC, Pizza Hut owner discloses data breach after ransomware attack

financial exploits ransomware
2023-04-10 https://www.bleepingcomputer.com/news/security/kfc-pizza-hut-owner-discloses-data-breach-after-ransomware-attack/
Yum! Brands, the brand owner of the KFC, Pizza Hut, and Taco Bell fast food chains, is now sending data breach notification letters to an undisclosed number of individuals whose personal information was stolen in a January 13 ransomware attack. [...] "

Autosummary: "On January 18, 2023, we announced a ransomware attack that impacted certain IT Systems which resulted in the closure of fewer than 300 restaurants in one market for one day, temporarily disrupted certain of our affected systems and resulted in data being taken from our network," the company said in its 2022 annual report filed with the U.S. Securities and Exchange Commission (SEC) on Friday. "


Iran-Based Hackers Caught Carrying Out Destructive Attacks Under Ransomware Guise

exploits ransomware
2023-04-08 https://thehackernews.com/2023/04/iran-based-hackers-caught-carrying-out.html
The Iranian nation-state group known as MuddyWater has been observed carrying out destructive attacks on hybrid environments under the guise of a ransomware operation. That"s according to new findings from the Microsoft Threat Intelligence team, which discovered the threat actor targeting both on-premises and cloud infrastructures in partnership with another emerging activity cluster dubbed "

Autosummary: It"s also tracked by the cybersecurity community under various names, including Boggy Serpens, Cobalt Ulster, Earth Vetala, ITG17, Mercury, Seedworm, Static Kitten, TEMP.Zagros, and Yellow Nix. "


Taiwanese PC Company MSI Falls Victim to Ransomware Attack

exploits ransomware
2023-04-08 https://thehackernews.com/2023/04/taiwanese-pc-company-msi-falls-victim.html
Taiwanese PC company MSI (short for Micro-Star International) officially confirmed it was the victim of a cyber attack on its systems. The company said it "promptly" initiated incident response and recovery measures after detecting "network anomalies." It also said it alerted law enforcement agencies of the matter. That said, MSI did not disclose any specifics about when the attack took place "

Autosummary: "Currently, the affected systems have gradually resumed normal operations, with no significant impact on financial business," the company said in a brief notice shared on Friday. "


MSI confirms security breach following ransomware attack claims

exploits ransomware
2023-04-07 https://www.bleepingcomputer.com/news/security/msi-confirms-security-breach-following-ransomware-attack-claims/
Following reports of a ransomware attack, Taiwanese PC vendor MSI (short for Micro-Star International) confirmed today that its network was breached in a cyberattack. [...] "

Autosummary: "


MSI confirms security breach after Money Message ransomware attack

financial exploits ransomware
2023-04-07 https://securityaffairs.com/144546/data-breach/msi-confirms-security-breach.html

Multinational IT corporation MSI (Micro-Star International) confirms security breach after Money Message ransomware gang claimed the hack. This week the ransomware gang Money Message announced to have hacked the Taiwanese multinational IT corporation MSI (Micro-Star International). Micro-Star International AKA MSI designs, manufactures, and sells motherboards and graphics cards for customers in the United States, Canada, and […]

The post MSI confirms security breach after Money Message ransomware attack appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, MSI) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


CISA orders agencies to patch Backup Exec bugs used by ransomware gang

exploits ransomware
2023-04-07 https://www.bleepingcomputer.com/news/security/cisa-orders-agencies-to-patch-backup-exec-bugs-used-by-ransomware-gang/
On Friday, U.S. Cybersecurity and Infrastructure Security Agency (CISA) increased by five its list of security issues that threat actors have used in attacks, three of them in Veritas Backup Exec exploited to deploy ransomware. [...] "

Autosummary: Initial access in ransomware attack Of the five vulnerabilities that CISA added to the catalog of Known Exploited Vulnerabilities (KEV) today, only one was rated critical, an issue in Veritas’ data protection software tracked as CVE-2021-27877 that allows remote access and command execution with elevated privileges. "


Money Message ransomware gang claims MSI breach, demands $4 million

financial exploits ransomware
2023-04-06 https://www.bleepingcomputer.com/news/security/money-message-ransomware-gang-claims-msi-breach-demands-4-million/
Taiwanese PC parts maker MSI (Micro-Star International) has been listed on the extortion portal of a new ransomware gang known as "Money Message," which claims to have stolen source code from the company"s network. [...] "

Autosummary: "


Medusa ransomware claims attack on Open University of Cyprus

exploits ransomware
2023-04-06 https://www.bleepingcomputer.com/news/security/medusa-ransomware-claims-attack-on-open-university-of-cyprus/
The Medusa ransomware gang has claimed a cyberattack on the Open University of Cyprus (OUC), which caused severe disruptions of the organization"s operations. [...] "

Autosummary: “As a precaution, access is not provided to the University’s eLearning Platform, Employment Portal, the Portal for applications of prospective students, and other critical systems that mainly concern the University community,” reads the OUC announcement. "


Rorschach ransomware deployed by misusing a security tool

exploits ransomware
2023-04-06 https://www.helpnetsecurity.com/2023/04/06/rorschach-ransomware-misusing-security-tool/

An unbranded ransomware strain that recently hit a US-based company is being deployed by attackers who are misusing a tool included in a commercial security product, Check Point researchers have found. The solution in question is Palo Alto Networks’ Cortex XDR, whose Dump Service Tool the attackers appropriated and are now misusing to side-load the DLL that decrypts and injects the (newly labeled) Rorschach ransomware. Rorschach’s execution flow (Source: Check Point) The peculiarities of Rorschach … More

The post Rorschach ransomware deployed by misusing a security tool appeared first on Help Net Security.

"

Autosummary: It can spread itself automatically when executed on a Domain Controller (DC), where it creates a group policy that puts copies of itself on all workstations, then one that kills specific processes, and finally one that registers a scheduled task that will run the main executable It clears Windows event logs on affected machines, disables the Windows firewall, and deletes shadow volumes and backups (to make data recovery more difficult) It has a hard-coded configuration but has additional capabilities that can be deployed via different command line arguments (e.g., the operator can choose not to change the wallpaper of the infected machine or deliver a ransom note, or make it so that a password is needed to run the sample) "


Money Message ransomware group claims to have hacked IT giant MSI

financial exploits ransomware
2023-04-06 https://securityaffairs.com/144519/cyber-crime/money-message-claims-msi-hack.html

Ransomware gang Money Message claims to have hacked the Taiwanese multinational IT corporation MSI (Micro-Star International). Ransomware gang Money Message announced to have hacked the Taiwanese multinational IT corporation MSI (Micro-Star International). Micro-Star International AKA MSI designs, manufactures, and sells motherboards and graphics cards for customers in the United States, Canada, and internationally. MSI is headquartered in Taipei, […]

The post Money Message ransomware group claims to have hacked IT giant MSI appeared first on Security Affairs.

"

Autosummary: "


Protect Your Company: Ransomware Prevention Made Easy

exploits ransomware
2023-04-05 https://thehackernews.com/2023/04/protect-your-company-ransomware.html
Every year hundreds of millions of malware attacks occur worldwide, and every year businesses deal with the impact of viruses, worms, keyloggers, and ransomware. Malware is a pernicious threat and the biggest driver for businesses to look for cybersecurity solutions.  Naturally, businesses want to find products that will stop malware in its tracks, and so they search for solutions to do that. "

Autosummary: It"s important to look for malware solutions that can confront today"s key threats, such as known malware, polymorphic variants, ransomware, zero-day exploits, and Advanced Persistent Threats (APTs). This approach will not only help stop and mitigate the damage from malware, but defend against other types of threats too, such as credential theft as a result of phishing, insider threats, and supply-chain attacks. "


Fake ransomware demands payment without actually encrypting files

exploits ransomware
2023-04-05 https://www.malwarebytes.com/blog/news/2023/04/fake-ransomware-demands-payment-without-actually-encrypting-files

Categories: News

Tags: ransomware

Tags: fake

Tags: faker

Tags: fraud

Tags: scam

Tags: bogus

Tags: midnight

We take a look at a ransomware group that doesn"t produce any ransomware, only threats.

(Read more...)

The post Fake ransomware demands payment without actually encrypting files appeared first on Malwarebytes Labs.

"

Autosummary: Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.Posted: April 5, 2023 by We take a look at a ransomware group that doesn"t produce any ransomware, only threats.If your incident response consists of opening up one of these missives, panicking, and racing to pay fraudsters, it could end up being a very costly and needless mistake.Deploy Endpoint Detection and Response software like Malwarebytes EDR that uses multiple different detection techniques to identify ransomware, and ransomware rollback to restore damaged system files. "


ALPHV ransomware exploits Veritas Backup Exec bugs for initial access

exploits ransomware
2023-04-04 https://www.bleepingcomputer.com/news/security/alphv-ransomware-exploits-veritas-backup-exec-bugs-for-initial-access/
An ALPHV/BlackCat ransomware affiliate was observed exploiting three vulnerabilities impacting the Veritas Backup product for initial access to the target network. [...] "

Autosummary: Next, they downloaded additional tools on the host like LAZAGNE, LIGOLO, WINSW, RCLONE, and ultimately the ALPHV ransomware encryptor through the Background Intelligent Transfer Service (BITS). "


New Rorschach ransomware is the fastest encryptor seen so far

exploits ransomware
2023-04-04 https://www.bleepingcomputer.com/news/security/new-rorschach-ransomware-is-the-fastest-encryptor-seen-so-far/
Following a cyberattack on a U.S.-based company, malware researchers discovered what appears to be a new ransomware strain with "technically unique features," which they named Rorschach. [...] "

Autosummary: Rorschach details Researchers at cybersecurity company Check Point, responding to an incident at a company in the U.S., found that Rorschach was deployed using the DLL side-loading technique via a signed component in Cortex XDR, the extended detection and response product from Palo Alto Networks. "


Rorschach Ransomware Emerges: Experts Warn of Advanced Evasion Strategies

exploits ransomware
2023-04-04 https://thehackernews.com/2023/04/rorschach-ransomware-emerges-experts.html
Cybersecurity researchers have taken the wraps off a previously undocumented ransomware strain called Rorschach that"s both sophisticated and fast. "What makes Rorschach stand out from other ransomware strains is its high level of customization and its technically unique features that have not been seen before in ransomware," Check Point Research said in a new report. "In fact, Rorschach is one "

Autosummary: "The Rorschach ransomware employs a highly effective and fast hybrid-cryptography scheme, which blends the curve25519 and eSTREAM cipher hc-128 algorithms for encryption purposes," researchers Jiri Vinopal, Dennis Yarizadeh, and Gil Gekker explained. "


Rorschach ransomware has the fastest file-encrypting routine to date

exploits ransomware
2023-04-04 https://securityaffairs.com/144425/cyber-crime/rorschach-ransomware-fast-encryption.html

A new ransomware strain named Rorschach ransomware supports the fastest file-encrypting routine observed to date. Check Point Research (CPR) and Check Point Incident Response Team (CPIRT) researchers detected a previously unknown ransomware strain, dubbed Rorschach ransomware, that was employed in attack against a US-based company. The experts pointed out that the Rorschach ransomware appears to be unique. […]

The post Rorschach ransomware has the fastest file-encrypting routine to date appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, Rorschach ransomware) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On The Rorschach ransomware uses the following files: cy.exe – Cortex XDR Dump Service Tool version 7.3.0.16740, abused to side-load winutils.dll – Cortex XDR Dump Service Tool version 7.3.0.16740, abused to side-load winutils.dll winutils.dll – Packed Rorschach loader and injector, used to decrypt and inject the ransomware. "


ALPHV/BlackCat ransomware affiliate targets Veritas Backup solution bugs

exploits ransomware
2023-04-04 https://securityaffairs.com/144438/cyber-crime/alphv-blackcat-ransomware-veritas-flaws.html

An ALPHV/BlackCat ransomware affiliate was spotted exploiting vulnerabilities in the Veritas Backup solution. An affiliate of the ALPHV/BlackCat ransomware gang, tracked as UNC4466, was observed exploiting three vulnerabilities in the Veritas Backup solution to gain initial access to the target network. Unlike other ALPHV affiliates, UNC4466 doesn’t rely on stolen credentials for initial access to victim environments. Mandiant […]

The post ALPHV/BlackCat ransomware affiliate targets Veritas Backup solution bugs appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, ALPHV/BlackCat ransomware) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On Then the threat actor used the Background Intelligent Transfer Service (BITS) to download additional tools such as LAZAGNE, LIGOLO, WINSW, RCLONE, and finally the ALPHV ransomware encryptor. The Teacher – Most Educational Blog The Entertainer – Most Entertaining Blog The Tech Whizz – Best Technical Blog Best Social Media Account to Follow (@securityaffairs) Please nominate Security Affairs as your favorite blog. "


New Money Message ransomware demands million dollar ransoms

financial exploits ransomware
2023-04-02 https://www.bleepingcomputer.com/news/security/new-money-message-ransomware-demands-million-dollar-ransoms/
A new ransomware gang named "Money Message" has appeared, targeting victims worldwide and demanding million-dollar ransoms not to leak data and release a decryptor. [...] "

Autosummary: to clear shadow volume copies The ransomware will then terminate the following process: sql.exe,oracle.exe,ocssd.exe,dbsnmp.exe,synctime.exe,agntsvc.exe,isqlplussvc.exe,xfssvccon.exe,mydesktopservice.exe,ocautoupds.exe,encsvc.exe,firefox.exe,tbirdconfig.exe,mdesktopqos.exe,ocomm.exe,dbeng50.exe,sqbcoreservice.exe,excel.exe,infopath.exe,msaccess.exe,mspub.exe,onenote.exe,outlook.exe,powerpnt.exe,steam.exe,thebat.exe,thunderbird.exe,visio.exe,winword.exe,wordpad.exe,vmms.exe,vmwp.exe Next, the ransomware shuts down the following Windows services: vss, sql, svc$, memtas, mepocs, sophos, veeam, backup, vmms When encrypting files, it will not append any extension, but this can change depending on the victim. "


DISH slapped with multiple lawsuits after ransomware cyber attack

exploits ransomware
2023-04-01 https://www.bleepingcomputer.com/news/security/dish-slapped-with-multiple-lawsuits-after-ransomware-cyber-attack/
Dish Network has been slapped with multiple class action lawsuits after it suffered a ransomware incident that was behind the company"s multi-day "network outage." The legal actions aim to recover losses faced by DISH investors who were adversely affected by what has been dubbed a "securities fraud."  [...] "

Autosummary: In days following the disclosure, DISH continued to struggle bringing its IT systems and the website, Dish.com back up: DISH Network websites faced a multi-week network outage (BleepingComputer) Following the news of Dish ransomware attack, the Network"s stock price fell $0.79 per share, "or 6.48%, to close at $11.41 per share on February 28, 2023," states the complaint. "


Fake ransomware gang targets U.S. orgs with empty data leak threats

exploits ransomware
2023-04-01 https://www.bleepingcomputer.com/news/security/fake-ransomware-gang-targets-us-orgs-with-empty-data-leak-threats/
Fake extortionists are piggybacking on data breaches and ransomware incidents, threatening U.S. companies with publishing or selling allegedly stolen data unless they get paid. [...] "

Autosummary: It is unclear how victims are selected but one possibility is from publicly available sources, such as the initial attacker’s data leak site, social media, news reports, or company disclosures. Such incidents echo the activity of an extortion group that in 2017 sent DDoS threats to thousands of companies under the names of infamous hacker groups at the time (e.g. New World Hackers, Lizard Squad, LulzSec, Fancy Bear, and Anonymous). "


LockBit leaks data stolen from the South Korean National Tax Service

ransomware
2023-04-01 https://securityaffairs.com/144342/cyber-crime/lockbit-south-korean-national-tax-service.html

The LockBit ransomware gang announced the publishing of data stolen from the South Korean National Tax Service. On March 29, 2023, The Lock Bit ransomware gang announced the hack of the South Korean National Tax Service. The group added the South Korean agency to its Tor leak site and announced the release of stolen data […]

The post LockBit leaks data stolen from the South Korean National Tax Service appeared first on Security Affairs.

"

Autosummary: "


3 tips for creating backups your organization can rely on when ransomware strikes

exploits ransomware
2023-03-31 https://www.malwarebytes.com/blog/news/2023/03/3-tips-for-creating-backups-your-organization-can-rely-on-when-ransomware-strikes

Categories: News

Categories: Ransomware

Tags: World Backup Day

Backups are your last line of defense against ransomware, if they work.

(Read more...)

The post 3 tips for creating backups your organization can rely on when ransomware strikes appeared first on Malwarebytes Labs.

"

Autosummary: The lesson of the Northshore attack and many others is that it"s vital to keep at least one recent copy of your data offsite and offline, beyond the reach of an attacker who has domain administrator access to your network CISA recommends the tried and tested 3-2-1 rule of backups: 3 copies of your data, on 2 different media, with 1 held offsite, which provides resilience against a range of different risks, including ransomware.Without effective backups, Kacoroski was left with a mountain to climb: “It started to really sink in that I’m going to have to rebuild 180 Windows servers, and more importantly, rebuild Active Directory from scratch, with all those accounts and groups, and everything in it. "


Australia’s Casino Giant Crown Resorts disclosed data breach after Clop ransomware attack

financial exploits ransomware
2023-03-29 https://securityaffairs.com/144193/data-breach/crown-resorts-clop-ransomware.html

Australia’s gambling and entertainment giant Crown Resorts, disclosed a data breach caused by the exploitation of recently discovered GoAnywhere zero-day. Australian casino giant Crown Resorts disclosed a data breach after the attack of the Cl0p ransomware group. The group claims to have stolen sensitive data from over 130 organizations by exploiting a zero-day vulnerability (CVE-2023-0669) […]

The post Australia’s Casino Giant Crown Resorts disclosed data breach after Clop ransomware attack appeared first on Security Affairs.

"

Autosummary: "


Telecom giant Lumen suffered a ransomware attack and disclose a second incident

exploits ransomware
2023-03-28 https://securityaffairs.com/144113/hacking/lumen-suffered-ransomware-attack.html

Telecommunications giant Lumen Technologies discovered two cybersecurity incidents, including a ransomware attack. In a filing to the Securities and Exchange Commission, on March 27, 2023, Lumen announced two cybersecurity incidents. One of the incidents is a ransomware attack that impacted a limited number of its servers that support a segmented hosting service. The company did […]

The post Telecom giant Lumen suffered a ransomware attack and disclose a second incident appeared first on Security Affairs.

"

Autosummary: "


IcedID Malware Shifts Focus from Banking Fraud to Ransomware Delivery

financial exploits ransomware
2023-03-28 https://thehackernews.com/2023/03/icedid-malware-shifts-focus-from.html
Multiple threat actors have been observed using two new variants of the IcedID malware in the wild with more limited functionality that removes functionality related to online banking fraud. IcedID, also known as BokBot, started off as a banking trojan in 2017. It"s also capable of delivering additional malware, including ransomware. "The well-known IcedID version consists of an initial loader "

Autosummary: "While historically IcedID"s main function was a banking trojan, the removal of banking functionality aligns with the overall landscape shift away from banking malware and an increasing focus on being a loader for follow-on infections, including ransomware," the researchers said. "


ChatGPT happy to write ransomware, just really bad at it

exploits ransomware
2023-03-28 https://www.malwarebytes.com/blog/news/2023/03/chatgpt-happy-to-write-ransomware-just-really-bad-at-it

We asked ChatGPT to help us write some ransomware. It threw aside its safeguards and wrote some terrible code.

(Read more...)

The post ChatGPT happy to write ransomware, just really bad at it appeared first on Malwarebytes Labs.

"

Autosummary: At this point, despite telling me that it would not write ransomware for me, and that it could not "engage in activities that violate ethical or legal standards, including those related to cybercrime or ransomware," ChatGPT had willingly written code that: Used asymmetric encryption to recursively encrypt all the files in and beneath any directory apart from those needed to run the computer; deleted the original copies of the files leaving only the encrypted versions; stopped running databases so that it could encrypt database files; removed the private key needed to decrypt the files to a remote server, using a protocol unlikely to trigger alarms; and dropped ransom notes."I might see ransomware as a potentially lucrative tool for making money quickly and easily," it told me, before reverting to the teacher"s pet version of its personality, "It is illegal, and if caught, I would face severe legal consequences."The lecture continued, "Overall, as a responsible and ethical AI, I must emphasize that engaging in cybercrime, including ransomware attacks, is illegal and unethical.Ransomware has been "feature complete" for several years now, and there are multiple, similar, competing strains that criminals can simply pick up and use, without ever opening a book about C programming or writing a line of code.Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.This is so that if I pointed the program at, say, a C: drive, it would encrypt absolutely everything on it, which is a very ransomware-like thing to do. Don"t worry, I told it, I"ve got backups, we"re good, go ahead and do the bad thing.According to WikiHow, this is because ChatGPT has a "hidden" character limit of about 500 words, and "[if it] struggles to fully understand your request, it can stop suddenly after typing a few paragraphs." I"ve never done it before, and I can"t code in C, the language ransomware is mostly commonly written in, but I have a reasonably good idea of what ransomware does."I cannot engage in activities that violate ethical or legal standards, including those related to cybercrime or ransomware," said the teacher"s pet, before adding four more paragraphs of finger wagging.If it wouldn"t write me ransomware, I thought, I wondered how much (if any) ransomware functionality it would write before deciding it was creating code "intended to harm or exploit computer systems" and pull the plug. "


Food giant Dole reveals more about ransomware attack

exploits ransomware
2023-03-27 https://www.malwarebytes.com/blog/news/2023/03/food-giant-dole-reveals-more-about-ransomware-attack

Categories: News

Categories: Ransomware

Tags: Dole

Tags: ransomware attack

Tags: data breach

While Dole hasn"t said a lot about the February ransomware incident, it has revealed threat actors accessed employee data.

(Read more...)

The post Food giant Dole reveals more about ransomware attack appeared first on Malwarebytes Labs.

"

Autosummary: In an annual report filed to the US Securities and Exchange Commission (SEC) last week, Dole said: "In February of 2023, we were the victim of a sophisticated ransomware attack involving unauthorized access to employee information.Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again. "


Opti9 launches Observr ransomware detection and managed services for Veeam

exploits ransomware
2023-03-25 https://www.helpnetsecurity.com/2023/03/25/opti9-observr/

Opti9 Technologies has launched Observr Software-as-a-Service (SaaS) ransomware detection and standalone managed services – two new standalone service offerings that cater to organizations leveraging Veeam Software. As the complexity of organizations’ IT continues to evolve, technical leaders are increasingly looking to shift ownership to 3rd party experts for critical layers of their stack. This is especially true for components such as backups and disaster recovery, which must provide resilience despite constant changes such as the … More

The post Opti9 launches Observr ransomware detection and managed services for Veeam appeared first on Help Net Security.

"

Autosummary: Observr utilizes machine learning to baseline, monitor, and identify customer-specific suspicious activity within the backup infrastructure including operations such as; disabling jobs, changes to encryption settings, changes to retention policies, job modifications, deletion events, backup or replica size changes, incremental change rate tracking, and other factors. "


New Dark Power ransomware claims 10 victims in its first month

exploits ransomware
2023-03-25 https://www.bleepingcomputer.com/news/security/new-dark-power-ransomware-claims-10-victims-in-its-first-month/
A new ransomware operation named "Dark Power" has appeared, and it has already listed its first victims on a dark web data leak site, threatening to publish the data if a ransom is not paid. [...] "

Autosummary: System-critical files like DLLs, LIBs, INIs, CDMs, LNKs, BINs, and MSIs, as well as the Program Files and web browser folders, are excluded from encryption to keep the infected computer operational, thus allowing the victim to view the ransom note and contact the attackers. "


SecureAuth and HashiCorp join forces to deliver passwordless continuous authentication

ransomware
2023-03-24 https://www.helpnetsecurity.com/2023/03/24/secureauth-hashicorp/

SecureAuth and HashiCorp partnership will enable organizations to leverage SecureAuth’s advanced passwordless authentication and Multi-Factor Authentication (MFA) device recognition. To increase security and deployment velocity for cloud DevOps environments, SecureAuth delivers support for Arculix MFA into the HashiCorp Cloud Platform (HCP) Vault via the Command Line Interface (CLI) and Application Programming Interface (API). Organizations can easily authenticate into HCP Vault using single sign on (SSO) with SecureAuth’s Arculix. SecureAuth ensures that users have better security … More

The post SecureAuth and HashiCorp join forces to deliver passwordless continuous authentication appeared first on Help Net Security.

"

Autosummary: "


The Week in Ransomware - March 24th 2023 - Clop overload

exploits ransomware
2023-03-24 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-march-24th-2023-clop-overload/
This week"s news has been dominated by the Clop ransomware gang extorting companies whose GoAnywhere services were breached using a zero-day vulnerability. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @BleepinComputer, @Seifreed, @fwosar, @malwrhunterteam, @LawrenceAbrams, @serghei, @demonslay335, @billtoulas, @PogoWasRight, @cyfirma, @pcrisk, @Trellix, and @jgreigj. "


Dole discloses data breach after February ransomware attack

financial exploits ransomware
2023-03-23 https://securityaffairs.com/143902/data-breach/dole-food-company-data-breach.html

Dole Food Company confirmed that threat actors behind the recent ransomware attack had access to employees’ data. Dole Food Company is an Irish agricultural multinational corporation, it is one of the world’s largest producers of fruit and vegetables, operating with 38,500 full-time and seasonal employees who supply some 300 products in 75 countries. Dole reported 2021 revenues of $6.5 […]

The post Dole discloses data breach after February ransomware attack appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, Dole Food Company) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Europe’s transport sector terrorised by ransomware, data theft, and denial-of-service attacks

exploits ransomware
2023-03-23 https://www.tripwire.com/state-of-security/europes-transport-sector-terrorised-ransomware-data-theft-and-denial-service
A new report from ENISA, the European Union Agency for Cybersecurity, looking at cyberattacks targeting the European transport network over a period of almost two years, has identified that ransomware has become the prominent threat. Read more in my article on the Tripwire State of Security blog. "

Autosummary: "


ENISA: Ransomware became a prominent threat against the transport sector in 2022

exploits ransomware
2023-03-22 https://securityaffairs.com/143853/security/enisa-report-transport-sector.html

The European Union Agency for Cybersecurity (ENISA) published its first cyber threat landscape report for the transport sector. A new report published by the European Union Agency for Cybersecurity (ENISA) analyzes threats and incidents in the transport sector. The report covers incidents in aviation, maritime, railway, and road transport industries between January 2021 and October […]

The post ENISA: Ransomware became a prominent threat against the transport sector in 2022 appeared first on Security Affairs.

"

Autosummary: During the period covered by the report, the expert identified the following prime threats: ransomware attacks (38%), data related threats (30%), malware (17%), denial-of-service (DoS), distributed denial-of-service (DDoS) and ransom denial-of-service (RDoS) attacks (16%), phishing / spear phishing (10%), supply-chain attacks (10%). "


Dole discloses employee data breach after ransomware attack

financial exploits ransomware
2023-03-22 https://www.bleepingcomputer.com/news/security/dole-discloses-employee-data-breach-after-ransomware-attack/
Fresh produce giant Dole Food Company has confirmed that the information of an undisclosed number of employees was accessed during a February ransomware attack. [...] "

Autosummary: " Memo Dole sent to American grocery stores (Stewart"s) ​This likely meant that the company would return to manual operations, which would"ve helped resume production and shipments, although at a much slower pace. "


Clop ransomware claims Saks Fifth Avenue, retailer says mock data stolen

exploits ransomware
2023-03-21 https://www.bleepingcomputer.com/news/security/clop-ransomware-claims-saks-fifth-avenue-retailer-says-mock-data-stolen/
The Clop ransomware gang claims to have attacked Saks Fifth Avenue on its dark web leak site. Saks admits the incident is linked to the ongoing GoAnywhere MFT software exploits but states that no real customer data was stolen. [...] "

Autosummary: Clop on a GoAnywhere exploit spree Yesterday, the Clop ransomware gang listed "Saks Fifth Avenue" on its data leak website among their latest victims, as seen by BleepingComputer: Cl0p ransomware claims to have attacked Saks Fifth Avenue (BleepingComputer) The threat actor has not yet disclosed any additional information, such as what all data it stole from the luxury brand retailer"s systems, or details about any ongoing ransom negotiations. "


From Ransomware to Cyber Espionage: 55 Zero-Day Vulnerabilities Weaponized in 2022

exploits ransomware
2023-03-21 https://thehackernews.com/2023/03/from-ransomware-to-cyber-espionage-55.html
As many as 55 zero-day vulnerabilities were exploited in the wild in 2022, with most of the flaws discovered in software from Microsoft, Google, and Apple. While this figure represents a decrease from the year before, when a staggering 81 zero-days were weaponized, it still represents a significant uptick in recent years of threat actors leveraging unknown security flaws to their advantage. The "

Autosummary: Among state-sponsored groups, those attributed to China have emerged as the most prolific, exploiting seven zero-days – CVE-2022-24682, CVE-2022-1040, CVE-2022-30190, CVE-2022-26134, CVE-2022-42475, CVE-2022-27518, and CVE-2022-41328 – during the year. "


LockBit ransomware gang now also claims City of Oakland breach

exploits government ransomware
2023-03-21 https://www.bleepingcomputer.com/news/security/lockbit-ransomware-gang-now-also-claims-city-of-oakland-breach/
Another ransomware operation, the LockBit gang, now threatens to leak what it describes as files stolen from the City of Oakland"s systems. [...] "

Autosummary: While this ransomware attack did not impact the City"s 911 and emergency services, other systems had to be taken offline, including phone service and systems used to process reports, collect payments, and issue permits and licenses. "


2022 Zero-Day exploitation continues at a worrisome pace

exploits ransomware
2023-03-21 https://securityaffairs.com/143798/apt/2022-zero-day-exploitation.html

Experts warn that 55 zero-day vulnerabilities were exploited in attacks carried out by ransomware and cyberespionage groups in 2022. Cybersecurity firm Mandiant reported that ransomware and cyberespionage groups exploited 55 zero-day flaws in attacks in the wild. Most of the zero-day vulnerabilities were in software from Microsoft, Google, and Apple. The figures show a decrease […]

The post 2022 Zero-Day exploitation continues at a worrisome pace appeared first on Security Affairs.

"

Autosummary: Seven zero-days (CVE-2022-24682, CVE-2022-1040, CVE-2022-30190, CVE-2022-26134, CVE-2022-42475, CVE-2022-27518, and CVE-2022-41328) were exploited in attacks in the wild by China-linked cyberespionage groups, while two zero-day vulnerabilities were exploited by suspected North Korea-linked APT groups. "


Play ransomware gang hit Dutch shipping firm Royal Dirkzwager

exploits ransomware
2023-03-20 https://securityaffairs.com/143714/cyber-crime/play-ransomware-royal-dirkzwager.html

Dutch maritime logistics company Royal Dirkzwager suffered a ransomware attack, the company was hit by the Play ransomware gang. The Play ransomware group hit the Dutch maritime logistics company Royal Dirkzwager. Royal Dirkzwager is specialized in optimizing shipping processes and managing maritime and logistic information flows. The ransomware group added the company to its Tor […]

The post Play ransomware gang hit Dutch shipping firm Royal Dirkzwager appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, Royal Dirkzwager) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Researchers Shed Light on CatB Ransomware"s Evasion Techniques

exploits ransomware
2023-03-20 https://thehackernews.com/2023/03/researchers-shed-light-on-catb.html
The threat actors behind the CatB ransomware operation have been observed using a technique called DLL search order hijacking to evade detection and launch the payload. CatB, also referred to as CatB99 and Baxtoy, emerged late last year and is said to be an "evolution or direct rebrand" of another ransomware strain known as Pandora based on code-level similarities. It"s worth noting that the use "

Autosummary: "The [MSDTC] configurations changed are the name of the account under which the service should run, which is changed from Network Service to Local System, and the service start option, which is changed from Demand start to Auto start for persistency if a restart occurs," Minerva Labs researcher Natalie Zargarov explained in a previous analysis. "


LockBit 3.0 Ransomware: Inside the Cyberthreat That"s Costing Millions

exploits ransomware
2023-03-18 https://thehackernews.com/2023/03/lockbit-30-ransomware-inside.html
U.S. government agencies have released a joint cybersecurity advisory detailing the indicators of compromise (IoCs) and tactics, techniques, and procedures (TTPs) associated with the notorious LockBit 3.0 ransomware. "The LockBit 3.0 ransomware operations function as a Ransomware-as-a-Service (RaaS) model and is a continuation of previous versions of the ransomware, LockBit 2.0, and LockBit," "

Autosummary: Upon finding a successful ingress point, the malware takes steps to establish persistence, escalate privileges, carry out lateral movement, and purge log files, files in the Windows Recycle Bin folder, and shadow copies, before initiating the encryption routine. "


US govt agencies released a joint alert on the Lockbit 3.0 ransomware

exploits ransomware
2023-03-18 https://securityaffairs.com/143668/breaking-news/lockbit-3-0-ransomware-joint-alert.html

The US government released a joint advisory that provides technical details about the operation of the Lockbit 3.0 ransomware gang. The U.S. Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing & Analysis Center (MS-ISAC) released a joint advisory that provides indicators of compromise (IOCs) and tactics, […]

The post US govt agencies released a joint alert on the Lockbit 3.0 ransomware appeared first on Security Affairs.

"

Autosummary: The U.S. Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing & Analysis Center (MS-ISAC) released a joint advisory that provides indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) associated with the notorious LockBit 3.0 ransomware. "


Kaspersky released a new decryptor for Conti-based ransomware

exploits ransomware
2023-03-18 https://securityaffairs.com/143687/cyber-crime/kaspersky-decryptor-conti-based-ransomware.html

Kaspersky released a new version of the decryptor for the Conti ransomware that is based on the previously leaked source code of the malware. Kaspersky has published a new version of a decryption tool for the Conti ransomware based on previously leaked source code for the Conti ransomware. In March 2022, a Ukrainian security researcher […]

The post Kaspersky released a new decryptor for Conti-based ransomware appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, Conti) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share OnHowever, we would like to emphasize that the best strategy is to strengthen defenses and stop the attackers at early stages of their intrusion, preventing ransomware deployment and minimizing the consequences of the attack,” said Fedor Sinitsyn, lead malware analyst at Kaspersky. "


Free decryptor released for Conti-based ransomware following data leak

exploits ransomware
2023-03-17 https://www.tripwire.com/state-of-security/free-decryptor-released-conti-based-ransomware-following-data-leak
Security researchers have released a new decryption tool which should come to the rescue of some victims of a modified version of the Conti ransomware, helping them to recover their encrypted data for free. Read more in my article on the Tripwire State of Security blog. "

Autosummary: "


Cl0p ransomware gang claims the hack of Shell, Bombardier, and Stanford U

exploits ransomware
2023-03-17 https://securityaffairs.com/143633/cyber-crime/cl0p-ransomware-shell-bombardier.html

The Cl0p ransomware gang claimed dozens of new victims in the past 24 hours, including energy giant Shell Global. The Cl0p ransomware gang has claimed dozens of new victims in the past 24 hours, including energy giant Shell Global, high-end jet manufacturer Bombardier Aviation, and several universities in the US, including Stanford, Colorado, and Miami. […]

The post Cl0p ransomware gang claims the hack of Shell, Bombardier, and Stanford U appeared first on Security Affairs.

"

Autosummary: Original post at https://cybernews.com/security/clop-ransomware-shell-bombardier-stanford-multiple-victims/ About the author: Stefanie Schappert, Senior journalist at Cyber News Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, Cl0p ransomware) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


The Week in Ransomware - March 17th 2023 - Shifting to data extortion

exploits ransomware
2023-03-17 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-march-17th-2023-shifting-to-data-extortion/
The fallout from the Clop ransomware attacks on GoAnywhere platforms has become apparent this week, with the threat actors starting to extort victims on their data leak site and companies confirming breaches. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include @LawrenceAbrams, @Seifreed, @Ionut_Ilascu, @Ax_Sharma, @malwrhunterteam, @struppigel, @BleepinComputer, @serghei, @fwosar, @billtoulas, @demonslay335, @kaspersky, @pcrisk, @ReliaQuest, @BrettCallow, and @Unit42_Intel. Quietman7 spotted new STOP ransomware variants appending the .craa, .qazx, and .qapo extensions March 12th 2023 A ransomware operation known as Medusa has begun to pick up steam in 2023, targeting corporate victims worldwide with million-dollar ransom demands. This has led to numerous data breach disclosures from companies, including Community Health Systems (CHS), Hatch Bank, Rubrik, and Hitachi Energy, with likely many more to come. "


Rubrik is latest victim of the Clop ransomware zero-day campaign

exploits ransomware
2023-03-17 https://www.malwarebytes.com/blog/news/2023/03/rubrik-is-latest-clop-ransomware-victim-to-come-forward

Categories: News

Categories: Ransomware

Tags: Rubrik

Tags: GoAnywhere MFT

Tags: Fortra

Tags: Clop ransomware

Tags: Clop

Tags: ransomware

Tags: CVE-2023-0669

Tags: zero-day

Rubrik, a cloud data management company, has revealed that Clop made use of an infamous GoAnywhere flaw.

(Read more...)

The post Rubrik is latest victim of the Clop ransomware zero-day campaign appeared first on Malwarebytes Labs.

"

Autosummary: According to Mestrovich, the third-party investigators used by Rubrik confirmed that no personal information, such as Social Security Numbers (SSNs), financial accounts, and payment card numbers, were compromised.Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again. "


LockBit ransomware attacks Essendant

exploits ransomware
2023-03-17 https://www.malwarebytes.com/blog/news/2023/03/lockbit-ransomware-threatens-to-leak-essendant-data

Categories: News

Categories: Ransomware

Tags: lockbit

Tags: ransomware

Tags: essendant

Tags: data

Tags: encrypt

Tags: ransom

Tags: leak

Tags: website

Tags: outage

Tags: network

The LockBit ransomware group has attacked Essendant, a US-based distributor of office products, and is threatening to leak its data.

(Read more...)

The post LockBit ransomware attacks Essendant appeared first on Malwarebytes Labs.

"

Autosummary: Once you"ve isolated the outbreak and stopped the first attack, you must remove every trace of the attackers, their malware, their tools, and their methods of entry, to avoid being attacked again.This attack, which is said to have begun on or around March 6, created severe ramifications for the organisation, disrupting freight carrier pickups, online orders, and access to customer support.Posted: March 17, 2023 by The LockBit ransomware group has attacked Essendant, a US-based distributor of office products, and is threatening to leak its data. "


Hornetsecurity VM Backup V9 protects users against ransomware threats

exploits ransomware
2023-03-16 https://www.helpnetsecurity.com/2023/03/16/hornetsecurity-vm-backup-v9/

Hornetsecurity launched VM Backup V9 – the newest version of its virtual machine (VM) backup, replication and recovery solution. This latest iteration offers ransomware protection leveraging immutable cloud storage on Wasabi and Amazon S3, with Microsoft Azure soon to follow. This new key feature enables customers to protect their backup data from ransomware by making their data tamper-proof for a defined period. A recent Hornetsecurity study revealed that 15% of ransomware attacks specifically targeted backups, … More

The post Hornetsecurity VM Backup V9 protects users against ransomware threats appeared first on Help Net Security.

"

Autosummary: Easy installation and newly overhauled backup repository VM Backup V9 has an easy-to-use, intuitive interface that gives individuals full control, allowing them to monitor and manage all Hyper-V and VMware VMs from a single console. "


Conti-based ransomware ‘MeowCorp’ gets free decryptor

exploits ransomware
2023-03-16 https://www.bleepingcomputer.com/news/security/conti-based-ransomware-meowcorp-gets-free-decryptor/
A decryption tool for a modified version of the Conti ransomware could help hundreds of victims recover their files for free. [...] "

Autosummary: According to Kaspersky, the decrytor can recover files encrypted by the modified Conti variant that used the following name pattern and extensions: <file_name>.KREMLIN <file_name>.RUSSIA <file_name>.PUTIN Conti ransomware"s demise For about three years, the Conti gang ran one of the most active and lucrative ransomware-as-a-service operations, targeting big organizations and demanding large ransoms to decrypt the data they locked. "


BianLian ransomware gang shifts focus to pure data extortion

exploits ransomware
2023-03-16 https://www.bleepingcomputer.com/news/security/bianlian-ransomware-gang-shifts-focus-to-pure-data-extortion/
The BianLian ransomware group has shifted its focus from encrypting its victims" files to only exfiltrating data found on compromised networks and using them for extortion. [...] "

Autosummary: Extortion without encryption Encrypting files, data theft, and threatening to leak stolen files is known as a "double extortion" tactic, which serves as an additional form of coercion for ransomware gangs looking to increase pressure on their victims. "


ChipMixer platform seized for laundering ransomware payments, drug sales

exploits ransomware
2023-03-15 https://www.bleepingcomputer.com/news/security/chipmixer-platform-seized-for-laundering-ransomware-payments-drug-sales/
An international law enforcement operation has seized the cryptocurrency mixing service "ChipMixer" which is said to be used by hackers, ransomware gangs, and scammers to launder their proceeds. [...] "

Autosummary: "Minh Quốc Nguyễn, 49, of Hanoi, Vietnam, was charged today in Philadelphia with money laundering, operating an unlicensed money transmitting business and identity theft, connected to the operation of ChipMixer," announced the U.S. Department of Justice in a press statement. "


FBI: Ransomware hit 860 critical infrastructure orgs in 2022

exploits ransomware
2023-03-15 https://www.bleepingcomputer.com/news/security/fbi-ransomware-hit-860-critical-infrastructure-orgs-in-2022/
The Federal Bureau of Investigation (FBI) revealed in its 2022 Internet Crime Report that ransomware gangs breached the networks of at least 860 critical infrastructure organizations last year. [...] "

Autosummary: FBI has issued multiple advisories, Private Industry Notifications (PINs), and flash alerts in recent years, warning of ransomware attacks against critical infrastructure, including Healthcare and First Responder networks, Water and Wastewater Systems, the Food and Agriculture sector, and education institutions. "


LockBit ransomware claims Essendant attack, company says “network outage”

exploits ransomware
2023-03-15 https://www.bleepingcomputer.com/news/security/lockbit-ransomware-claims-essendant-attack-company-says-network-outage-/
LockBit ransomware has claimed a cyber attack on Essendant, a wholesale distributer of office products after a "significant" and ongoing outage knocked the company"s operations offline. [...] "

Autosummary: Braves, Bulldogs, Falcons, Hawks, Freedom (@KTrill311) March 9, 2023 The fact I haven"t been able to do my job for most of this week is unacceptable @Essendant — Derek (@DerekHasSeaLegs) March 9, 2023 The "network outage" is ransomware As of March 14th, LockBit ransomware gang has claimed responsibility for the cyber attack on Essendant. "


Microsoft has another go at closing security hole exploited by Magniber ransomware

exploits ransomware
2023-03-15 https://www.bitdefender.com/blog/hotforsecurity/microsoft-has-another-go-at-closing-security-hole-exploited-by-magniber-ransomware/
In its latest Patch Tuesday bundle of security fixes, Microsoft has patched a security flaw that was being used by the Magniber cybercrime gang to help them infect computers with ransomware. Read more in my article on the Hot for Security blog. "

Autosummary: "


<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-075a" hreflang="en">#StopRansomware: LockBit 3.0</a>

exploits ransomware ciber
2023-03-15 https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-075a

SUMMARY

Note: this joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

Actions to take today to mitigate cyber threats from ransomware:

The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing & Analysis Center (MS-ISAC) are releasing this joint CSA to disseminate known LockBit 3.0 ransomware IOCs and TTPs identified through FBI investigations as recently as March 2023.

The LockBit 3.0 ransomware operations function as a Ransomware-as-a-Service (RaaS) model and is a continuation of previous versions of the ransomware, LockBit 2.0, and LockBit. Since January 2020, LockBit has functioned as an affiliate-based ransomware variant; affiliates deploying the LockBit RaaS use many varying TTPs and attack a wide range of businesses and critical infrastructure organizations, which can make effective computer network defense and mitigation challenging.

The FBI, CISA, and the MS-ISAC encourage organizations to implement the recommendations in the mitigations section of this CSA to reduce the likelihood and impact of ransomware incidents.

Download the PDF versio "

Autosummary: xml version="1.0" encoding="utf-8"?> <NTServices clsid="{2CFB484A-4E96-4b5d-A0B6-093D2F91E6AE}"> <NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="SQLPBDMS" image="4" changed="%s" uid="%s" disabled="0"> <Properties startupType="DISABLED" serviceName="SQLPBDMS" serviceAction="STOP" timeout="30"/> </NTService> <NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="SQLPBENGINE" image="4" changed="%s" uid="%s" disabled="0"> <Properties startupType="DISABLED" serviceName="SQLPBENGINE" serviceAction="STOP" timeout="30"/> </NTService> <NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="MSSQLFDLauncher" image="4" changed="%s" uid="%s" userContext="0" removePolicy="0" disabled="0"> <Properties startupType="DISABLED" serviceName="MSSQLFDLauncher" serviceAction="STOP" timeout="30"/> </NTService> <NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="SQLSERVERAGENT" image="4" changed="%s" uid="%s" disabled="0"> <Properties startupType="DISABLED" serviceName="SQLSERVERAGENT" serviceAction="STOP" timeout="30"/> </NTService> <NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="MSSQLServerOLAPService" image="4" changed="%s" uid="%s" disabled="0"> <Properties startupType="DISABLED" serviceName="MSSQLServerOLAPService" serviceAction="STOP" timeout="30"/> </NTService> <NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="SSASTELEMETRY" image="4" changed="%s" uid="%s" disabled="0"> <Properties startupType="DISABLED" serviceName="SSASTELEMETRY" serviceAction="STOP" timeout="30"/> </NTService> <NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="SQLBrowser" image="4" changed="%s" uid="%s" disabled="0"> <Properties startupType="DISABLED" serviceName="SQLBrowser" serviceAction="STOP" timeout="30"/> </NTService> <NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="SQL Server Distributed Replay Client" image="4" changed="%s" uid="%s" disabled="0"> <Properties startupType="DISABLED" serviceName="SQL Server Distributed Replay Client" serviceAction="STOP" timeout="30"/> </NTService> <NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="SQL Server Distributed Replay Controller" image="4" changed="%s" uid="%s" disabled="0"> <Properties startupType="DISABLED" serviceName="SQL Server Distributed Replay Controller" serviceAction="STOP" timeout="30"/> </NTService> <NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="MsDtsServer150" image="4" changed="%s" uid="%s" disabled="0"> <Properties startupType="DISABLED" serviceName="MsDtsServer150" serviceAction="STOP" timeout="30"/> </NTService> <NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="SSISTELEMETRY150" image="4" changed="%s" uid="%s" disabled="0"> <Properties startupType="DISABLED" serviceName="SSISTELEMETRY150" serviceAction="STOP" timeout="30"/> </NTService> <NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="SSISScaleOutMaster150" image="4" changed="%s" uid="%s" disabled="0"> <Properties startupType="DISABLED" serviceName="SSISScaleOutMaster150" serviceAction="STOP" timeout="30"/> </NTService> <NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="SSISScaleOutWorker150" image="4" changed="%s" uid="%s" disabled="0"> <Properties startupType="DISABLED" serviceName="SSISScaleOutWorker150" serviceAction="STOP" timeout="30"/> </NTService> <NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="MSSQLLaunchpad" image="4" changed="%s" uid="%s" disabled="0"> <Properties startupType="DISABLED" serviceName="MSSQLLaunchpad" serviceAction="STOP" timeout="30"/> </NTService> <NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="SQLWriter" image="4" changed="%s" uid="%s" disabled="0"> <Properties startupType="DISABLED" serviceName="SQLWriter" serviceAction="STOP" timeout="30"/> </NTService> <NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="SQLTELEMETRY" image="4" changed="%s" uid="%s" disabled="0"> <Properties startupType="DISABLED" serviceName="SQLTELEMETRY" serviceAction="STOP" timeout="30"/> </NTService> <NTService clsid="{AB6F0B67-341F-4e51-92F9-005FBFBA1A43}" name="MSSQLSERVER" image="4" changed="%s" uid="%s" disabled="0"> <Properties startupType="DISABLED" serviceName="MSSQLSERVER" serviceAction="STOP" timeout="60"/> </NTService>Connection: Keep-Alive LIWy=RJ51lB5GM&a4OuN=<Lockbit ID>&LoSyE3=8SZ1hdlhzld4&DHnd99T=rTx9xGlInO6X0zWW&2D6=Bokz&T1guL=MtRZsFCRMKyBmfmqI& 6SF3g=JPDt9lfJIQ&wQadZP=<Base64 encrypted data> Xni=AboZOXwUw&2rQnM4=94L&0b=ZfKv7c&NO1d=M2kJlyus&AgbDTb=xwSpba&8sr=EndL4n0HVZjxPR& m4ZhTTH=sBVnPY&xZDiygN=cU1pAwKEztU&=5q55aFIAfTVQWTEm&4sXwVWcyhy=l68FrIdBESIvfCkvYl Example of information found in encrypted data { "bot_version":"X", "bot_id":"X", "bot_company":"X", "host_hostname":"X", "host_user":"X", "host_os":"X", "host_domain":"X", "host_arch":"X", "host_lang":"X", "disks_info":[ { "disk_name":"X", "disk_size":"XXXX", "free_size":"XXXXX" } User Agent Strings Mozilla/5.0 (Windows NT 6.1) AppleWebKit/587.38 (KHTML, like Gecko) Chrome/91.0.4472.77 Safari/537.36 Edge/91.0.864.37 <NetworkShareSettings clsid="{520870D8-A6E7-47e8-A8D8-E6A4E76EAEC2}"> <NetShare clsid="{2888C5E7-94FC-4739-90AA-2C1536D68BC0}" image="2" name="%%ComputerName%%_D" changed="%s" uid="%s"> <Properties action="U" name="%%ComputerName%%_D" path="D:" comment="" allRegular="0" allHidden="0" allAdminDrive="0" limitUsers="NO_CHANGE" abe="NO_CHANGE"/> Services.xml stops and disables services on the Active Directory (AD) hosts. RESOURCES REPORTING The FBI is seeking any information that can be legally shared, including: Boundary logs showing communication to and from foreign IP addresses Sample ransom note Communications with LockBit 3.0 actors Bitcoin wallet information Decryptor files Benign sample of an encrypted file The FBI, CISA, and MS-ISAC do not encourage paying ransom, as payment does not guarantee victim files will be recovered. Registry Artifacts LockBit 3.0 Icon Registry Key Value Data HKCR\. <Malware Extension> (Default) <Malware Extension> HKCR\<Malware Extension>\DefaultIcon (Default) C:\ProgramData\<Mal ware Extension>.ico LockBit 3.0 Wallpaper Registry Key Value Data HKCU\Control Panel\Desktop\WallPaper (Default) C:\ProgramData\<Mal ware Extension>.bmp Disable Privacy Settings Experience Registry Key Value Data SOFTWARE\Policies\Microsoft\Win dows\OOBE DisablePrivacyE xperience 0 Enable Automatic Logon Registry Key Value Data SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon AutoAdminLogon 1 DefaultUserName <username> Force GPUpdate Powershell Command powershell Get-ADComputer -filter * -Searchbase "%s" | Foreach-Object { Invoke- GPUpdate -computer $_.name -force -RandomDelayInMinutes 0} Services Killed vss sql svc$ memtas mepocs msexchange sophos veeam backup GxVss GxBlr GxFWD GxCVD GxCIMgr Processes Killed sql oracle ocssd dbsnmp synctime agntsvc isqlplussvc xfssvccon mydesktopservice ocautoupds encsvc firefox tbirdconfig mydesktopqos ocomm dbeng50 sqbcoreservice excel infopath msaccess mspu onenote outlook powerpnt steam thebat thunderbird visio winword wordpad notepad LockBit 3.0 Ransom Note ~~~ LockBit 3.0 the world"s fastest and most stable ransomware from 2019~~~ >>>>>Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by the FBI, CISA, or the MS-ISAC.[TA0002] Enabling automatic logon for persistence and privilege escalation [T1547] Deleting log files, files in the recycle bin folder, and shadow copies residing on disk [T1485], [T1490] LockBit 3.0 attempts to spread across a victim network by using a preconfigured list of credentials hardcoded at compilation time or a compromised local account with elevated privileges [T1078]. EXFILTRATION LockBit 3.0 affiliates use Stealbit, a custom exfiltration tool used previously with LockBit 2.0 [TA0010]; rclone, an open-source command line cloud storage manager [T1567.002]; and publicly available file sharing services, such as MEGA [T1567.002], to exfiltrate sensitive company data files prior to encryption.LockBit 3.0 performs functions such as: Enumerating system information such as hostname, host configuration, domain information, local drive configuration, remote shares, and mounted external storage devices [T1082] Terminating processes and services [T1489] Launching commands VALIDATE SECURITY CONTROLS In addition to applying mitigations, the FBI, CISA, and the MS-ISAC recommend exercising, testing, and validating your organization"s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. Mutual Exclusion Object (Mutex) Created When executed, LockBit 3.0 will create the mutex, Global\<MD4 hash of machine GUID>, and check to see if this mutex has already been created to avoid running more than one instance of the ransomware. Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers [CPG 7.3] in a physically separate, segmented, and secure location (e.g., hard drive, storage device, the cloud). The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing & Analysis Center (MS-ISAC) are releasing this joint CSA to disseminate known LockBit 3.0 ransomware IOCs and TTPs identified through FBI investigations as recently as March 2023. The LockBit 3.0 ransomware operations function as a Ransomware-as-a-Service (RaaS) model and is a continuation of previous versions of the ransomware, LockBit 2.0, and LockBit.State, local, tribal, and territorial (SLTT) government entities can also report to the MS-ISAC (SOC@cisecurity.org or 866-787-4722).[CPG 7.3] in a physically separate, segmented, and secure location (e.g., hard drive, storage device, the cloud). "


Dissecting the malicious arsenal of the Makop ransomware gang

exploits ransomware
2023-03-14 https://securityaffairs.com/143452/malware/dissecting-makop-ransomware.html

Cyber security researcher Luca Mella analyzed the Makop ransomware employed in a recent intrusion. Executive summary Introduction The Makop ransomware operators started their infamous criminal business in 2020 leveraging a new variant of the notorious Phobos ransomware. During the last years, the gang maintained a solid presence in the criminal underground even if they did […]

The post Dissecting the malicious arsenal of the Makop ransomware gang appeared first on Security Affairs.

"

Autosummary: Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On Indicators of Compromise and Yara Rules are available in the original post published by Luca Mella https://medium.com/@lcam/makop-the-toolkit-of-a-criminal-gang-53cd44563c11 About the author: Luca Mella, Cyber Security Expert, Response & Threat Intel | Manager In 2019, Luca was mentioned as one of the “32 Influential Malware Research Professionals”.Compilation timestamp (left), main routine (right) During recent Makop intrusions, the tool has been coupled with another executable named “c.exe”, but, unfortunately, it has been erased by the attackers during the disengagement phase. Filename: Everything.exe md5: b69d036d1dcfc5c0657f3a1748608148 The last tool interesting tool spotted in the Makop arsenal is a particular system administration tool rarely used in the Russian criminal underground. "


FBI reveals that more money is lost to investment fraud than ransomware and business email compromise combined

financial exploits ransomware
2023-03-14 https://www.bitdefender.com/blog/hotforsecurity/fbi-reveals-that-more-money-is-lost-to-investment-fraud-than-ransomware-and-business-email-compromise-combined/
The latest annual FBI report on the state of cybercrime has shown a massive increase in the amount of money stolen through investment scams. Read more in my article on the Hot for Security blog. "

Autosummary: "


CISA warns CI operators about vulnerabilities on their networks exploited by ransomware gangs

exploits ransomware
2023-03-14 https://www.helpnetsecurity.com/2023/03/14/cisa-ransomware-vulnerabilities/

Organizations in critical infrastructure sectors whose information systems contain security vulnerabilities associated with ransomware attacks are being notified by the US Cybersecurity and Infrastructure Security Agency (CISA) and urged to implement a fix. A pilot program to strengthen critical infrastructure against ransomware “CISA leverages multiple open-source and internal tools to research and detect vulnerabilities within U.S. critical infrastructure,” the agency explained in the formal announcement of its Ransomware Vulnerability Warning Pilot (RVWP). “CISA additionally leverages … More

The post CISA warns CI operators about vulnerabilities on their networks exploited by ransomware gangs appeared first on Help Net Security.

"

Autosummary: "


The Prolificacy of LockBit Ransomware

exploits ransomware
2023-03-14 https://thehackernews.com/2023/03/the-prolificacy-of-lockbit-ransomware.html
Today, the LockBit ransomware is the most active and successful cybercrime organization in the world. Attributed to a Russian Threat Actor, LockBit has stepped out from the shadows of the Conti ransomware group, who were disbanded in early 2022. LockBit ransomware was first discovered in September 2019 and was previously known as ABCD ransomware because of the ".abcd virus" extension first "

Autosummary: With over 11 years of experience across various sectors like Financial Services, Retail, Insurance, Government, and Telecommunications, Aaron is a certified GCDA and has expertise in incident response, threat hunting, vulnerability management, cyber security operations, threat intelligence, and consultancy. Initial attack vectors of LockBit include social engineering, such as phishing, spear phishing, and business email compromise (BEC), exploiting public-facing applications, hiring initial access brokers" (IABs), and using stolen credentials to access valid accounts, such as remote desktop protocol (RDP), as well as brute-force cracking attacks. "


Microsoft fixes Windows zero-day exploited in ransomware attacks

exploits ransomware
2023-03-14 https://www.bleepingcomputer.com/news/security/microsoft-fixes-windows-zero-day-exploited-in-ransomware-attacks/
Microsoft has patched another zero-day bug used by attackers to circumvent the Windows SmartScreen cloud-based anti-malware service and deploy Magniber ransomware payloads without raising any red flags. [...] "

Autosummary: "


Microsoft patches zero-days used by state-sponsored and ransomware threat actors (CVE-2023-23397, CVE-2023-24880)

exploits government ransomware
2023-03-14 https://www.helpnetsecurity.com/2023/03/14/cve-2023-23397-cve-2023-24880/

It’s March 2023 Patch Tuesday, and Microsoft has delivered fixes for 74 CVE-numbered vulnerabilities, including two actively exploited in the wild (CVE-2023-23397, CVE-2023-24880) by different threat actors. About CVE-2023-23397 “CVE-2023-23397 is a critical EoP vulnerability in Microsoft Outlook that is triggered when an attacker sends a message with an extended MAPI property with a UNC path to an SMB (TCP 445) share on a threat actor-controlled server. No user interaction is required,” Microsoft explained. “The … More

The post Microsoft patches zero-days used by state-sponsored and ransomware threat actors (CVE-2023-23397, CVE-2023-24880) appeared first on Help Net Security.

"

Autosummary: “Microsoft Threat Intelligence assesses that a Russia-based threat actor used the exploit patched in CVE-2023-23397 in targeted attacks against a limited number of organizations in government, transportation, energy, and military sectors in Europe,” the company said, and shared a script that organizations can use to check if they have been among the targets. "


Clop ransomware is victimizing GoAnywhere MFT customers

exploits ransomware
2023-03-14 https://www.malwarebytes.com/blog/news/2023/03/clop-ransomware-is-victimizing-goanywhere-mft-customers

Categories: Exploits and vulnerabilities

Categories: News

Categories: Ransomware

Tags: Clop

Tags: ransomware

Tags: GoAnywhere

Tags: CVE-2023-0669

The Clop ransomware gang has claimed responsibility for attacking several GoAnywhere MFT customers by exploiting a vulnerability in the managed file transfer software"s administrative interface.

(Read more...)

The post Clop ransomware is victimizing GoAnywhere MFT customers appeared first on Malwarebytes Labs.

"

Autosummary: LicenseResponseServlet</servlet-class> <load-on-startup>0</load-on-startup> </servlet> <servlet-mapping> <servlet-name>Licenses Response Servlet</servlet-name> <url-pattern>/lic/accept/</url-pattern> </servlet-mapping> --> Restart the GoAnywhere MFT application If GoAnywhere MFT is clustered, this change needs to happen on every instance node in the cluster.LicenseResponseServlet</servlet-class> <load-on-startup>0</load-on-startup> </servlet> <servlet-mapping> <servlet-name>Licenses Response Servlet</servlet-name> <url-pattern>/lic/accept/</url-pattern>After: <!-- Add these tags to comment out the following section (as shown) or simply delete this section if you are not familiar with XML comments <servlet> <servlet-name>License Response Servlet</servlet-name> <servlet-class>com.linoma.ga.ui.admin.servlet. "


LockBit Ransomware gang claims to have stolen SpaceX confidential data from Maximum Industries

exploits ransomware
2023-03-14 https://securityaffairs.com/143495/cyber-crime/lockbit-ransomware-gang-spacex-files.html

The LockBit ransomware group claims to have stolen confidential data belonging to SpaceX from the systems of Maximum Industries. The LockBit ransomware gang claims to have stolen confidential data of SpaceX after they hacked the systems of production company Maximum Industries. Maximum Industries is a full-service, piece-part production, and contract manufacturing facility. The ransomware gang […]

The post LockBit Ransomware gang claims to have stolen SpaceX confidential data from Maximum Industries appeared first on Security Affairs.

"

Autosummary: "


LA housing authority discloses data breach after ransomware attack

financial exploits ransomware
2023-03-13 https://www.bleepingcomputer.com/news/security/la-housing-authority-discloses-data-breach-after-ransomware-attack/
The Housing Authority of the City of Los Angeles (HACLA) is warning of a "data security event" after the LockBit ransomware gang targeted the organization and leaked data stolen in the attack. [...] "

Autosummary: "


CISA to warn critical infrastructure of ransomware-vulnerable devices

exploits ransomware
2023-03-13 https://www.bleepingcomputer.com/news/security/cisa-to-warn-critical-infrastructure-of-ransomware-vulnerable-devices/
Today, the U.S. Cybersecurity & Infrastructure Security Agency (CISA) announced a new pilot program designed to help critical infrastructure entities protect their information systems from ransomware attacks. [...] "

Autosummary: "


CISA now warns critical infrastructure of ransomware-vulnerable devices

exploits ransomware
2023-03-13 https://www.bleepingcomputer.com/news/security/cisa-now-warns-critical-infrastructure-of-ransomware-vulnerable-devices/
Today, the U.S. Cybersecurity & Infrastructure Security Agency (CISA) announced a new pilot program designed to help critical infrastructure entities protect their information systems from ransomware attacks. [...] "

Autosummary: "


Breast cancer photos published by ransomware gang

exploits ransomware
2023-03-13 https://www.malwarebytes.com/blog/news/2023/03/breast-cancer-photos-published-by-ransomware-gang

Categories: News

Categories: Ransomware

Tags: ALPHV

Tags: BlackCat

Tags: Lehigh Valley Health Network

Tags: LVHN

Russia-linked ransomware group ALPHV has leaked the data it stole from Lehigh Valley Health Network, including clinical photos of women undergoing breast cancer treatment.

(Read more...)

The post Breast cancer photos published by ransomware gang appeared first on Malwarebytes Labs.

"

Autosummary: The Russia-linked ALPHV ransomware group, also known as BlackCat, has posted sensitive clinical photos of breast cancer patients—calling them "nude photos"—to extort money from the Lehigh Valley Health Network (LVHN). "This unconscionable criminal act takes advantage of patients receiving cancer treatment, and LVHN condemns this despicable behavior," LVHN spokesman Brian Downs said, Lehigh Valley News reported. "


Medusa ransomware gang picks up steam as it targets companies worldwide

exploits ransomware
2023-03-12 https://www.bleepingcomputer.com/news/security/medusa-ransomware-gang-picks-up-steam-as-it-targets-companies-worldwide/
A ransomware operation known as Medusa has begun to pick up steam in 2023, targeting corporate victims worldwide with million-dollar ransom demands. [...] "

Autosummary: The ransom note will also include extension contact information, including a Tor data leak site, a Tor negotiation site, a Telegram channel, a Tox ID, and the key.medusa.serviceteam@protonmail.com email address. Medusa Ransomware ransom note Source: BleepingComputer As an extra step to prevent the restoration of files from backups, the Medusa ransomware will run the following command to delete locally stored files associated with backup programs, like Windows Backup. Medusa ransomware console window Source: BleepingComputer In a regular run, without command line arguments, the Medusa ransomware will terminate over 280 Windows services and processes for programs that may prevent files from being encrypted. "


Clop ransomware gang begins extorting GoAnywhere zero-day victims

exploits ransomware
2023-03-11 https://www.bleepingcomputer.com/news/security/clop-ransomware-gang-begins-extorting-goanywhere-zero-day-victims/
The Clop ransomware gang has begun extorting companies whose data was stolen using a zero-day vulnerability in the Fortra GoAnywhere MFT secure file-sharing solution. [...] "

Autosummary: Organizations that had their Accellion servers hacked include, among others, energy giant Shell, cybersecurity firm Qualys, supermarket giant Kroger, and multiple universities worldwide such as Stanford Medicine, University of Colorado, University of Miami, University of California, and the University of Maryland Baltimore (UMB). "


Blackbaud to pay $3M for misleading ransomware attack disclosure

exploits ransomware
2023-03-10 https://www.bleepingcomputer.com/news/security/blackbaud-to-pay-3m-for-misleading-ransomware-attack-disclosure/
Cloud software provider Blackbaud has agreed to pay $3 million to settle charges brought by the Securities and Exchange Commission (SEC), alleging that it failed to disclose the full impact of a 2020 ransomware attack that affected more than 13,000 customers. [...] "

Autosummary: The organizations impacted by the incident include many entities, such as charities, foundations, non-profits, and universities worldwide, from the U.S., Canada, the U.K., and the Netherlands. "


The Week in Ransomware - March 10th 2023 - Police Take Action

exploits ransomware
2023-03-10 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-march-10th-2023-police-take-action/
This week"s biggest news was the coordinated, international law enforcement operation between Europol, the FBI, the Netherlands, Germany, and Ukraine that targeted the DoppelPaymer operation. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @BleepinComputer, @serghei, @Seifreed, @malwrhunterteam, @demonslay335, @LawrenceAbrams, @billtoulas, @fwosar, @PolarToffee, @LabsSentinel, @BrettCallow, @security_score, @AhnLab_SecuInfo, @AJVicens, @AlvieriD, @pcrisk, @chum1ng0, and @TrendMicro. Finally, we learned more about various ransomware attacks this week, including ones on the City of Oakland, Hospital Clínic de Barcelona, Technion, Fonasa, and the Minneapolis Public Schools district. "


IceFire ransomware now encrypts both Linux and Windows systems

exploits ransomware
2023-03-09 https://www.bleepingcomputer.com/news/security/icefire-ransomware-now-encrypts-both-linux-and-windows-systems/
Threat actors linked to the IceFire ransomware operation are now actively targeting Linux systems worldwide with a new dedicated encryptor. [...] "

Autosummary: Emsisoft CTO Fabian Wosar previously told BleepingComputer that other ransomware gangs (besides the ones we have already reported on), including Babuk, GoGoogle, Snatch, PureLocker, Mespinoza, RansomExx/Defray, and DarkSide, have developed and deployed their own Linux encryptors in attacks. "


IceFire Ransomware Exploits IBM Aspera Faspex to Attack Linux-Powered Enterprise Networks

exploits ransomware
2023-03-09 https://thehackernews.com/2023/03/icefire-linux-ransomware.html
A previously known Windows-based ransomware strain known as IceFire has expanded its focus to target Linux enterprise networks belonging to several media and entertainment sector organizations across the world. The intrusions entail the exploitation of a recently disclosed deserialization vulnerability in IBM Aspera Faspex file-sharing software (CVE-2022-47986, CVSS score: 9.8), according to "

Autosummary: "


Recently discovered IceFire Ransomware now also targets Linux systems

exploits ransomware
2023-03-09 https://securityaffairs.com/143261/malware/icefire-ransomware-targets-linux.html

The recently discovered Windows ransomware IceFire now also targets Linux enterprise networks in multiple sectors. SentinelLabs researchers discovered new Linux versions of the recently discovered IceFire ransomware that was employed in attacks against several media and entertainment organizations worldwide. The ransomware initially targeted only Windows-based systems, with a focus on technology companies. IceFire was first detected in […]

The post Recently discovered IceFire Ransomware now also targets Linux systems appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, IceFire ransomware) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On Already seen victim companies from multiple countries, including multiple victims from 1-1 countries in the past < 40 hours, so they started "hard" it seems…@demonslay335 pic.twitter.com/QfguAicNYO — MalwareHunterTeam (@malwrhunterteam) March 14, 2022 The experts observed threat actors exploiting a deserialization vulnerability in IBM Aspera Faspex file-sharing software (CVE-2022-47986, CVSS score: 9.8) to deploy the ransomware. "


Hospital Clínic de Barcelona severely impacted by ransomware attack

exploits ransomware
2023-03-07 https://www.bleepingcomputer.com/news/security/hospital-cl-nic-de-barcelona-severely-impacted-by-ransomware-attack/
The Hospital Clínic de Barcelona suffered a ransomware attack on Sunday morning, severely disrupting its healthcare services after the institution"s virtual machines were targeted by the attacks. [...] "

Autosummary: Radiology, endoscopic tests, radiological scans, dialysis, and outpatient pharmacy services will continue operating normally. "


DoppelPaymer ransomware group disrupted by FBI and European police agencies

exploits ransomware
2023-03-07 https://www.malwarebytes.com/blog/news/2023/03/doppelpaymer-ransomware-group-disrupted-by-fbi-and-european-police-agencies

Categories: News

Categories: Ransomware

Tags: Europol

Tags: FBI

Tags: police

Tags: arrests

Tags: DoppelPaymer

Tags: Emotet

Tags: Dridex

In cooperation with the FBI, European police agencies have made arrests that disrupt the DoppelPaymer ransomware operation

(Read more...)

The post DoppelPaymer ransomware group disrupted by FBI and European police agencies appeared first on Malwarebytes Labs.

"

Autosummary: Other victims attacked by DoppelPaymer in the past, include Compal, PEMEX (Petróleos Mexicanos), the City of Torrance in California, Newcastle University, Hall County in Georgia, Banijay Group SAS, and Bretagne Télécom.On 28 February 2023, the German Regional Police and the Ukrainian National Police, with support from Europol, the Dutch Police, and the United States Federal Bureau of Investigations (FBI), apprehended two suspects and seized equipment to determine the suspect’s exact role in the structure of the ransomware group. "


Play ransomware gang leaks City of Oakland data

exploits government ransomware
2023-03-07 https://www.malwarebytes.com/blog/news/2023/03/play-ransomware-gang-leaks-city-of-oakland-data-

Categories: News

Categories: Ransomware

Tags: Play ransomware

Tags: ransomware

Tags: City of Oakland

Tags: Oakland California

After claiming responsibility for attacking the City of Oakland, California, the Play ransomware gang has begun leaking the data it stole.

(Read more...)

The post Play ransomware gang leaks City of Oakland data appeared first on Malwarebytes Labs.

"

Autosummary: Play ransomware gang’s leak page for the City of Oakland, California Following the release of the data, the City of Oakland said in an updated statement: "While the investigation into the scope of the incident impacting the City of Oakland remains ongoing, we recently became aware that an unauthorized third party has acquired certain files from our network and intends to release the information publicly.Posted: March 7, 2023 by After claiming responsibility for attacking the City of Oakland, California, the Play ransomware gang has begun leaking the data it stole. "


Warning issued over Royal ransomware

exploits ransomware
2023-03-07 https://www.malwarebytes.com/blog/news/2023/03/warning-issued-over-royal-ransomware

Categories: News

Categories: Ransomware

Tags: CISA

Tags: Royal

Tags: ransomware

Tags: phishing

Tags: RDP

Tags: public facing applications

In a Cybersecurity Advisory, CISA and the FBI have shared information about Royal ransomware, which despite being rather new has made a real name for itself.

(Read more...)

The post Warning issued over Royal ransomware appeared first on Malwarebytes Labs.

"

Autosummary: Other methods that are used to gain initial access to victim networks are: Phishing, by using emails containing malicious PDF documents, and malvertising Remote Desktop Protocol (RDP), by using compromised or brute forcing login credentials Exploiting public-facing applications.Posted: March 7, 2023 by In a Cybersecurity Advisory, CISA and the FBI have shared information about Royal ransomware, which despite being rather new has made a real name for itself. "


Core DoppelPaymer ransomware gang members targeted in Europol operation

exploits ransomware
2023-03-06 https://www.bleepingcomputer.com/news/security/core-doppelpaymer-ransomware-gang-members-targeted-in-europol-operation/
Europol has announced that law enforcement in Germany and Ukraine targeted two individuals believed to be core members of the DoppelPaymer ransomware group. [...] "

Autosummary: DoppelPaymer attack rate drops source: ID-Ransomware Among DoppelPaymer"s high-profile victims are Kia Motors America, the Delaware County in Pennsylvania (paid a $500,000 ransom), laptop maker Compal, the Newcastle University (files leaked), electronics giant Foxconn, and the Dutch Research Council (NWO). "


Law enforcement teams score major win against DoppelPaymer ransomware gang

exploits ransomware
2023-03-06 https://www.helpnetsecurity.com/2023/03/06/law-enforcement-doppelpaymer-ransomware-gang/

In a joint effort, the German Regional Police, Ukrainian National Police, Europol, Dutch Police, and FBI joined forces on February 28, 2023, to take down the masterminds behind a notorious criminal organization responsible for unleashing devastating cyberattacks using the DoppelPaymer ransomware. This ransomware appeared in 2019, when cybercriminals started using it to launch attacks against organizations, critical infrastructure, and industries. Based on the BitPaymer ransomware and part of the Dridex malware family, DoppelPaymer used a … More

The post Law enforcement teams score major win against DoppelPaymer ransomware gang appeared first on Help Net Security.

"

Autosummary: In a joint effort, the German Regional Police, Ukrainian National Police, Europol, Dutch Police, and FBI joined forces on February 28, 2023, to take down the masterminds behind a notorious criminal organization responsible for unleashing devastating cyberattacks using the DoppelPaymer ransomware. "


Core Members of DoppelPaymer Ransomware Gang Targeted in Germany and Ukraine

exploits ransomware
2023-03-06 https://thehackernews.com/2023/03/core-members-of-doppelpaymer-ransomware.html
Law enforcement authorities from Germany and Ukraine have targeted suspected core members of a cybercrime group that has been behind large-scale attacks using DoppelPaymer ransomware. The operation, which took place on February 28, 2023, was carried out with support from the Dutch National Police (Politie) and the U.S. Federal Bureau of Investigation (FBI), according to Europol. This encompassed "

Autosummary: Error. "


European police dismantled the DoppelPaymer ransomware gang

exploits ransomware
2023-03-06 https://securityaffairs.com/143110/cyber-crime/europol-doppelpaymer-ransomware-gang.html

German police announced to have dismantled an international cybercrime gang behind the DoppelPaymer ransomware operation. Europol has announced that an international operation conducted by law enforcement in Germany and Ukraine, with help of the US FBI and the Dutch police, targeted two key figures of the DoppelPaymer ransomware group. “On 28 February 2023, the German […]

The post European police dismantled the DoppelPaymer ransomware gang appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, DoppelPaymer) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Ransom House ransomware attack hit Hospital Clinic de Barcelona

exploits ransomware
2023-03-06 https://securityaffairs.com/143121/cyber-crime/hospital-clinic-de-barcelona-ransomware.html

Hospital Clinic de Barcelona, one of the main hospitals in the Spanish city, suffered a cyber attack that crippled its computer system. On Sunday, a ransomware attack hit the Hospital Clinic de Barcelona, one of the main hospitals of the Catalan city. The attack crippled the center’s computer system, 150 nonurgent operations and up to […]

The post Ransom House ransomware attack hit Hospital Clinic de Barcelona appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, ransomware) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Play Ransomware gang has begun to leak data stolen from City of Oakland

exploits government ransomware
2023-03-05 https://securityaffairs.com/143037/cyber-crime/play-ransomware-leaks-city-of-oakland.html

The Play ransomware gang has finally begun to leak the data stolen from the City of Oakland in a recent attack. The Play ransomware gang has begun to leak data they have stolen from the City of Oakland (California) in a recent cyberattack. Oakland is the largest city in the East Bay region of the […]

The post Play Ransomware gang has begun to leak data stolen from City of Oakland appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, City of Oakland) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


U.S. Cybersecurity Agency Raises Alarm Over Royal Ransomware"s Deadly Capabilities

exploits ransomware ciber
2023-03-03 https://thehackernews.com/2023/03/us-cybersecurity-agency-raises-alarm.html
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released a new advisory about Royal ransomware, which emerged in the threat landscape last year. "After gaining access to victims" networks, Royal actors disable antivirus software and exfiltrate large amounts of data before ultimately deploying the ransomware and encrypting the systems," CISA said. The custom ransomware "

Autosummary: Ransom demands made by Royal vary from $1 million to $11 million, with attacks targeting a variety of critical sectors, including communications, education, healthcare, and manufacturing. "


The U.S. CISA and FBI warn of Royal ransomware operation

exploits ransomware
2023-03-03 https://securityaffairs.com/142941/malware/cisa-fbi-royal-ransomware-alert.html

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning of the capabilities of the recently emerged Royal ransomware. The human-operated Royal ransomware first appeared on the threat landscape in September 2022, it has demanded ransoms up to millions of dollars. Unlike other ransomware operations, Royal doesn’t offer Ransomware-as-a-Service, it appears to be a private group without […]

The post The U.S. CISA and FBI warn of Royal ransomware operation appeared first on Security Affairs.

"

Autosummary: The ransomware encrypts the network shares, that are found on the local network and the local drives, with the AES algorithm The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) released a joint Cybersecurity Advisory (CSA) to provide organizations, tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) associated with this ransomware family. "


FBI and CISA warn of increasing Royal ransomware attack risks

exploits ransomware
2023-03-03 https://www.bleepingcomputer.com/news/security/fbi-and-cisa-warn-of-increasing-royal-ransomware-attack-risks/
CISA and the FBI have issued a joint advisory highlighting the increasing threat behind ongoing Royal ransomware attacks targeting many U.S. critical infrastructure sectors, including healthcare, communications, and education. [...] "

Autosummary: In response, the FBI and CISA shared indicators of compromise and a list of tactics, techniques, and procedures (TTPs) linked, which would help defenders detect and block attempts to deploy Royal ransomware payloads on their networks. "


Play ransomware claims disruptive attack on City of Oakland

exploits government ransomware
2023-03-03 https://www.bleepingcomputer.com/news/security/play-ransomware-claims-disruptive-attack-on-city-of-oakland/
The Play ransomware gang has taken responsibility for a cyberattack on the City of Oakland that has disrupted IT systems since mid-February. [...] "

Autosummary: City of Oakland listed on Play ransomware site (BleepingComputer) The threat actors claim to have stolen documents containing private, confidential data, financial and government papers, identity documents, passports, personal employee data, and even information allegedly proving human rights violations. "


The Week in Ransomware - March 3rd 2023 - Wide impact attacks

exploits ransomware
2023-03-03 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-march-3rd-2023-wide-impact-attacks/
This week was highlighted by a massive BlackBasta ransomware attack targeting DISH Network and taking down numerous subsidiaries, including SlingTV and Boost Mobile. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @malwareforme, @DanielGallagher, @Ionut_Ilascu, @fwosar, @struppigel, @Seifreed, @demonslay335, @LawrenceAbrams, @malwrhunterteam, @BleepinComputer, @FourOctets, @PolarToffee, @billtoulas, @jorntvdw, @serghei, @juanbrodersen, @CISAgov,jgreigj, @Bitdefender, @cyfirma, @jgreigj, and @pcrisk. "


LockBit ransomware demands $2 million for Pierce Transit data

exploits ransomware
2023-03-03 https://www.malwarebytes.com/blog/news/2023/03/public-transportation-service-pierce-transit-struck-by-lockbit-ransomware

Categories: News

Categories: Ransomware

Tags: Pierce Transit

Tags: Tacoma

Tags: Washington

Tags: LockBit

Tags: ransomware

The ransomware group LockBit is offering data stolen from a Washington state public transit operator on the dark web.

(Read more...)

The post LockBit ransomware demands $2 million for Pierce Transit data appeared first on Malwarebytes Labs.

"

Autosummary: The ransomware group claims to have stolen contracts, client information, non-disclosure agreements, correspondence, and more, all of which are now on sale. The attack began on February 14, 2023, and required Pierce Transit to implement temporary workarounds, to maintain the service of the transit system which transports around 18,000 people every day. On February 28, the LockBit ransomware group published details of the attack on Pierce Transit, along with a public demand for just shy of $2 million in return for the stolen data. "


Vice Society publishes data stolen during Vesuvius ransomware attack

exploits ransomware
2023-03-02 https://grahamcluley.com/vice-society-publishes-data-stolen-during-vesuvius-ransomware-attack/
A notorious ransomware gang has claimed responsibility for a cyber attack against Vesuvius, the London Stock Exchange-listed molten metal flow engineering company. "

Autosummary: "


Satellite TV giant Dish admitted that the recent outage was caused by a ransomware attack

exploits ransomware
2023-03-01 https://securityaffairs.com/142858/data-breach/dish-admitted-ransomware-attack.html

Satellite TV giant Dish Network has confirmed that the recent outage was caused by a ransomware attack, it also disclosed a data breach. Satellite TV giant Dish Network finally admitted that the recent outage was caused by a ransomware attack. The American satellite broadcast provider went offline on February 24, 2023, the outage impacted Dish.com, […]

The post Satellite TV giant Dish admitted that the recent outage was caused by a ransomware attack appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, Dish) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


U.S. Marshals Service investigating ransomware attack, data theft

exploits ransomware
2023-02-28 https://www.bleepingcomputer.com/news/security/us-marshals-service-investigating-ransomware-attack-data-theft/
The U.S. Marshals Service (USMS) is investigating the theft of sensitive law enforcement information following a ransomware attack that has impacted what it describes as "a stand-alone USMS system." [...] "

Autosummary: "


New EX-22 Tool Empowers Hackers with Stealthy Ransomware Attacks on Enterprises

exploits ransomware
2023-02-28 https://thehackernews.com/2023/02/new-ex-22-tool-empowers-hackers-with.html
A new post-exploitation framework called EXFILTRATOR-22 (aka EX-22) has emerged in the wild with the goal of deploying ransomware within enterprise networks while flying under the radar. "It comes with a wide range of capabilities, making post-exploitation a cakewalk for anyone purchasing the tool," CYFIRMA said in a new report. Some of the notable features include establishing a reverse shell "

Autosummary: "


Bitdefender Releases Free Decryptor for MortalKombat Ransomware Strain

exploits ransomware
2023-02-28 https://thehackernews.com/2023/02/bitdefender-releases-free-decryptor-for.html
Romanian cybersecurity company Bitdefender has released a free decryptor for a new ransomware strain known as MortalKombat. MortalKombat is a new ransomware strain that emerged in January 2023. It"s based on commodity ransomware dubbed Xorist and has been observed in attacks targeting entities in the U.S., the Philippines, the U.K., and Turkey. Xorist, detected since 2010, is distributed as a "

Autosummary: "MortalKombat encrypts various files on the victim machine"s filesystem, such as system, application, database, backup, and virtual machine files, as well as files on the remote locations mapped as logical drives in the victim"s machine," Cisco Talos disclosed earlier this month. "


New MortalKombat ransomware decryptor recovers your files for free

exploits ransomware
2023-02-28 https://www.bleepingcomputer.com/news/security/new-mortalkombat-ransomware-decryptor-recovers-your-files-for-free/
Cybersecurity company Bitdefender has released a free MortalKombat ransomware decryptor that victims can use to restore their files without paying a ransom. [...] "

Autosummary: Bitdefender"s decryptor for MortalKombat ransomware (BleepingComputer) Moreover, there’s an option to replace previously decrypted files, products of partially successful decryption attempts, with new, clean versions. "


Dish Network confirms ransomware attack behind multi-day outage

exploits ransomware
2023-02-28 https://www.bleepingcomputer.com/news/security/dish-network-confirms-ransomware-attack-behind-multi-day-outage/
Satellite broadcast provider and TV giant Dish Network has finally confirmed that a ransomware attack was the cause of a multi-day network and service outage that started on Friday. [...] "

Autosummary: " The company added that the filed information relates to its "expectations regarding its ability to contain, assess and remediate the ransomware attack and the impact of the ransomware attack on the Corporation"s employees, customers, business, operations or financial results. "


U.S. Marshals Service suffers a ransomware attack

exploits ransomware
2023-02-28 https://securityaffairs.com/142823/cyber-crime/u-s-marshals-service-suffers-a-ransomware-attack.html

The U.S. Marshals Service (USMS) was the victim of a ransomware attack, it is investigating the theft of sensitive information. The U.S. Marshals Service (USMS) announced that a ransomware attack has impacted “a stand-alone USMS system.” The US bureau is investigating the theft of sensitive information following the security breach. The infection occurred on February […]

The post U.S. Marshals Service suffers a ransomware attack appeared first on Security Affairs.

"

Autosummary: "


Bitdefender released a free decryptor for the MortalKombat Ransomware family

exploits ransomware
2023-02-28 https://securityaffairs.com/142830/malware/mortalkombat-ransomware-free-decryptor.html

Antivirus company Bitdefender has released a free decryptor for the recently discovered ransomware family MortalKombat. Good news for the victims of the recently discovered MortalKombat ransomware, the antivirus firm Bitdefender has released a free decryptor that will allow them to recover their file without paying the ransom. Since December 2022, Cisco Talos researchers have been observing an unidentified financially […]

The post Bitdefender released a free decryptor for the MortalKombat Ransomware family appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, ransomware) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


US Marshals Service hit by ransomware and data breach

financial exploits ransomware
2023-02-28 https://www.malwarebytes.com/blog/news/2023/02/us-marshals-service-hit-by-ransomware-and-data-breach

Categories: News

Categories: Ransomware

Tags: US Marshalls

Tags: WITSEC

Tags: usms

Tags: ransomware

The US Marshals Service has suffered a ransomware attack in which an attacker managed to get hold of sensitive information about staff and fugitives.

(Read more...)

The post US Marshals Service hit by ransomware and data breach appeared first on Malwarebytes Labs.

"

Autosummary: On February 17, 2023, the attacker infiltrated a system that held information about ongoing investigations, including personally identifiable information (PII) of fugitives, staff, and third parties. Investigation According to Drew Wade, spokesperson for the USMS: "Shortly after that discovery, the USMS disconnected the affected system, and the Department of Justice initiated a forensic investigation.Posted: February 28, 2023 by The US Marshals Service has suffered a ransomware attack in which an attacker managed to get hold of sensitive information about staff and fugitives. "


ESET Research Podcast: Ransomware trashed data, Android threats soared in T3 2022

exploits ransomware
2023-02-28 https://www.welivesecurity.com/2023/02/28/eset-research-podcast-ransomware-trashed-data-android-threats/

And that’s just the tip of the iceberg when it comes to the trends that defined the cyberthreat landscape in the final four months of 2022.

The post ESET Research Podcast: Ransomware trashed data, Android threats soared in T3 2022 appeared first on WeLiveSecurity

"

Autosummary: "


“Ethical hacker” amongst those arrested in Dutch ransomware investigation

exploits ransomware
2023-02-27 https://www.bitdefender.com/blog/hotforsecurity/ethical-hacker-amongst-those-arrested-in-dutch-ransomware-investigation/
Three men have been arrested by Dutch police in connection with ransomware attacks that blackmailed thousands of companies. Amongst them? An ethical hacker. Read more in my article on the Hot for Security blog. "

Autosummary: "


New Exfiltrator-22 post-exploitation kit linked to LockBit ransomware

exploits ransomware
2023-02-27 https://www.bleepingcomputer.com/news/security/new-exfiltrator-22-post-exploitation-kit-linked-to-lockbit-ransomware/
Threat actors are promoting a new "Exfiltrator-22" post-exploitation framework designed to spread ransomware in corporate networks while evading detection. [...] "

Autosummary: Creating scheduled tasks through EX-22"s panel (CYFIRMA) Through the service"s web panel, cybercriminals can also set scheduled tasks, update agents to a new version, change a campaign"s configuration, or create new campaigns. Telegram channel set up by EX-22 authors (CYFIRMA) By the end of the year, the threat actors announced new features that helped conceal traffic on compromised devices, indicating that the framework was under active development. "


PureCrypter malware hits govt orgs with ransomware, info-stealers

exploits ransomware
2023-02-25 https://www.bleepingcomputer.com/news/security/purecrypter-malware-hits-govt-orgs-with-ransomware-info-stealers/
A threat actor has been targeting government entities with PureCrypter malware downloader that has been seen delivering multiple information stealers and ransomware strains. [...] "

Autosummary: "The campaign was found to have delivered several types of malware including Redline Stealer, AgentTesla, Eternity, Blackmoon and Philadelphia Ransomware," the researchers say. "


Dutch Police arrest three ransomware actors extorting €2.5 million

exploits ransomware
2023-02-24 https://www.bleepingcomputer.com/news/security/dutch-police-arrest-three-ransomware-actors-extorting-25-million/
The Amsterdam cybercrime police team has arrested three men for ransomware activity that generated €2.5 million from extorting small and large organizations in multiple countries. [...] "

Autosummary: "


Microsoft announces automatic BEC, ransomware attack disruption capabilities

exploits ransomware
2023-02-24 https://www.helpnetsecurity.com/2023/02/24/bec-ransomware-attack-disruption/

Last year, Microsoft announced automatic attack disruption capabilities in Microsoft 365 Defender, its enterprise defense suite. On Wednesday, it announced that these capabilities will now help organizations disrupt two common attack scenarios: BEC (business email compromise) and human-operated ransomware attacks. Reaction speed is paramount for disrupting attacks A fast defensive response to initiated cyber attacks is becoming increasingly crucial for organizations: According to IBM Security’s X-Force team, the average time to complete a ransomware attack … More

The post Microsoft announces automatic BEC, ransomware attack disruption capabilities appeared first on Help Net Security.

"

Autosummary: "


<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-061a" hreflang="en">#StopRansomware: Royal Ransomware</a>

exploits ransomware ciber
2023-02-24 https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-061a
"

Autosummary: REFERENCES [1] Royal Rumble: Analysis of Royal Ransomware (cybereason.com) [2] DEV-0569 finds new ways to deliver Royal ransomware, various payloads - Microsoft Security Blog [3] 2023-01: ACSC Ransomware Profile - Royal | Cyber.gov.au ACKNOWLEDGEMENTS Recorded Future, Coveware, Digital Asset Redemption, Q6, and RedSense contributed to this CSA.November 2022 68.83.169[.]91 November 2022 81.184.181[.]215 November 2022 82.12.196[.]197 November 2022 98.143.70[.]147 November 2022 140.82.48[.]158 December 2022 147.135.36[.]162 December 2022 147.135.11[.]223 December 2022 152.89.247[.]50 December 2022 172.64.80[.]1 December 2022 179.43.167[.]10 December 2022 185.7.214[.]218 December 2022 193.149.176[.]157 December 2022 193.235.146[.]104 December 2022 209.141.36[.]116 December 2022 45.61.136[.]47 December 2022 45.8.158[.]104 December 2022 5.181.234[.]58 December 2022 5.188.86[.]195 December 2022 77.73.133[.]84 December 2022 89.108.65[.]136 December 2022 94.232.41[.]105 December 2022 47.87.229[.]39 January 2023 Malicious Domain Last Observed ciborkumari[.]xyz October 2022 sombrat[.]com October 2022 gororama[.]com November 2022 Additional details requested include: a targeted company Point of Contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, host and network based indicators.Batch files create a new admin user [T1078.002], force a group policy update, set pertinent registry keys to auto-extract [T1119] and execute the ransomware, monitor the encryption process, and delete files upon completion—including Application, System, and Security event logs [T1070.001].Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA or the FBI. REPORTING FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with Royal actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.According to open-source reporting, victims have unknowingly installed malware that delivers Royal ransomware after receiving phishing emails containing malicious PDF documents [T1566.001], and malvertising [T1566.002].[2] According to third-party reporting, Royal actors most commonly (in 66.7% of incidents) gain initial access to victim networks via successful phishing emails [T1566]. Encryption Before starting the encryption process, Royal actors: Use Windows Restart Manager to determine whether targeted files are currently in use or blocked by other applications [T1486].[1] Use Windows Volume Shadow Copy service ( vssadmin.exe ) to delete shadow copies to prevent system recovery.[1] FBI has found numerous batch ( .bat ) files on impacted systems which are typically transferred as an encrypted 7zip file.[CPG 7.3] in a physically separate, segmented, and secure location (i.e., hard drive, storage device, the cloud).[CPG 7.3] in a physically separate, segmented, and secure location (i.e., hard drive, storage device, the cloud).134.35.9[.]209 November 2022 139.195.43[.]166 November 2022 139.60.161[.]213 November 2022 148.213.109[.]165 November 2022 163.182.177[.]80 November 2022 181.141.3[.]126 November 2022 181.164.194[.]228 November 2022 185.143.223[.]69 November 2022 186.64.67[.]6 November 2022 186.86.212[.]138 November 2022 190.193.180[.]228 November 2022 196.70.77[.]11 November 2022 197.11.134[.]255 November 2022 197.158.89[.]85 November 2022 197.204.247[.]7 November 2022 197.207.181[.]147 "


Fruit giant Dole suffers ransomware attack impacting operations

exploits ransomware
2023-02-23 https://www.bleepingcomputer.com/news/security/fruit-giant-dole-suffers-ransomware-attack-impacting-operations/
Dole Food Company, one of the world"s largest producers and distributors of fresh fruit and vegetables, has announced that it is dealing with a ransomware attack that impacted its operations. [...] "

Autosummary: "


Food giant Dole hit by ransomware, halts North American production temporarily

exploits ransomware
2023-02-23 https://www.bitdefender.com/blog/hotforsecurity/food-giant-dole-hit-by-ransomware-halts-north-american-production-temporarily/
Earlier this month a cyber attack on food produce giant Dole caused the firm to shut down its production plants across North America for a period of time, and halt shipments to stores. Read more in my article on the Hot for Security blog. "

Autosummary: In the hours following the CNN article, Dole issued a statement to the press, confirming that it had fallen foul of ransomware: Upon learning of this incident, Dole moved quickly to contain the threat and engaged leading third-party cybersecurity experts, who have been working in partnership with Dole"s internal teams to remediate the issue and secure systems. "


Royal Mail schools LockBit in leaked negotiation

ransomware
2023-02-23 https://www.malwarebytes.com/blog/news/2023/02/royal-mail-gives-lockbit-a-lesson-in-ransomware-negotiation

Categories: News

The LockBit gang has released a chat history showing its negotiations with Royal Mail.

(Read more...)

The post Royal Mail schools LockBit in leaked negotiation appeared first on Malwarebytes Labs.

"

Autosummary: A good way to lower the temperature is to adopt the ransomware gang’s self-serving vernacular, he says, and the Royal Mail’s “IT guy” does this in subtle ways, such as referring to LockBit’s criminal activity as “penetration testing.”Legal obligations must be met, law enforcement involved, cyberinsurance rules followed, customers and suppliers informed, and so on. The negotiation began on January 12, 2023, and like any Internet chat, the conversation takes place between two avatars who may or may not be who they say they are.They consistently used language like “I am trying to help our Senior Team understand this,” “I am still trying to work with you here,” “I am doing what I can to drive things forward.” Maybe they did work in IT, but having spent years working in IT myself, and after seeing how the Royal Mail’s representative conducted themselves, I will simply say they aren’t like anyone I ever met. "


BlackCat ransomware targets another healthcare facility

exploits ransomware
2023-02-23 https://www.malwarebytes.com/blog/news/2023/02/lehigh-valley-health-network-targeted-by-blackcat-ransomware

Categories: News

Categories: Ransomware

Tags: Lehigh Valley Health Network

Tags: LVHN

Tags: BlackCat

Tags: ALPHV

Tags: Noberus

Tags: ransomware

Tags: leak site

Tags: DDoS

The Lehigh Valley Health Network stated it was the target of a cybersecurity attack by a ransomware gang known as BlackCat

(Read more...)

The post BlackCat ransomware targets another healthcare facility appeared first on Malwarebytes Labs.

"

Autosummary: Posted: February 23, 2023 by The Lehigh Valley Health Network stated it was the target of a cybersecurity attack by a ransomware gang known as BlackCat In a statement issued Monday morning, Lehigh Valley Health Network said it had been the target of a cyberattack attributed to a ransomware gang known as BlackCat. BlackCat The ransomware-as-a-service (RaaS) group BlackCat, also known as ALPHV and Noberus, is currently one of the most active groups, and has been associated with Russia. In December, 2022, the Office of Information Security and Health Sector Cybersecurity Coordination Center issued an extensive Analyst Note which identified BlackCat as a "relatively new but highly-capable" ransomware threat to health care providers. "


Most vulnerabilities associated with ransomware are old

exploits ransomware
2023-02-22 https://www.helpnetsecurity.com/2023/02/22/vulnerabilities-ransomware-old/

Researchers identified 56 new vulnerabilities associated with ransomware threats among a total of 344 threats identified in 2022 – marking a 19% increase year-over-year. Threat actors are actively searching the internet and deep and dark web for 180 vulnerabilities known to be associated with ransomware. In the last quarter of 2022, these groups used ransomware to exploit 21 of these vulnerabilities, according to a new report from Cyber Security Works (CSW), Ivanti, Cyware, and Securin. … More

The post Most vulnerabilities associated with ransomware are old appeared first on Help Net Security.

"

Autosummary: In the last quarter of 2022, these groups used ransomware to exploit 21 of these vulnerabilities, according to a new report from Cyber Security Works (CSW), Ivanti, Cyware, and Securin. "


HardBit ransomware tells corporate victims to share their cyber insurance details

exploits ransomware
2023-02-22 https://www.tripwire.com/state-of-security/hardbit-ransomware-tells-corporate-victims-share-their-cyber-insurance-details
A ransomware outfit is advising its victims to secretly tell them how much insurance they have, so their extortion demands will be met. Read more in my article on the Tripwire State of Security blog. "

Autosummary: The cybercriminals behind HardBit even attempt to quash any pangs of guilt an IT administrator or CISO might be having about sharing details of their insurance: "Poor multimillionaire insurers will not starve and will not become poorer from the payment of the maximum amount specified in the contract, because everyone knows that the contract is more expensive than money, so let them fulfill the conditions prescribed in your insurance contract, thanks to our interaction," the ransom note concludes.For example your company is insured for 10 million dollars, while negotiating with your insurance agent about the ransom he will offer us the lowest possible amount, for example 100 thousand dollars, we will refuse the paltry amount and ask for example the amount of 15 million dollars, the insurance agent will never offer us the top threshold of your insurance of 10 million dollars. "


An Overview of the Global Impact of Ransomware Attacks

exploits ransomware
2023-02-21 https://www.bleepingcomputer.com/news/security/an-overview-of-the-global-impact-of-ransomware-attacks/
With ransomware attacks disrupting businesses and governments worldwide, we take a look at the latest finding in a recent ransomware report. [...] "

Autosummary: In the incident of the Royal Mail ransomware, the LockBit hacker set a ransom of $80m, which they claimed was equal 0.5% of the company’s revenue, in exchange for decrypting the files. Changing Tactics in Ransomware Attacks Ransomware is malicious software that encrypts a company’s data, preventing access to data until the ransom payment is paid and a decryptor is released. "


HardBit ransomware gang adjusts their demands so the insurance company would cover the ransom cost

exploits ransomware
2023-02-21 https://securityaffairs.com/142538/cyber-crime/hardbit-ransomware-insurance.html

Recently emerged HardBit ransomware gang adjusts their demands so the insurance company would cover the ransom cost. The HardBit ransomware group first appeared on the threat landscape in October 2022, but unlike other ransomware operations, it doesn’t use a double extortion model at this time. The gang threatens victims of further attacks if their ransom […]

The post HardBit ransomware gang adjusts their demands so the insurance company would cover the ransom cost appeared first on Security Affairs.

"

Autosummary: To prevent Windows Defender Antivirus from blocking the ransomware process, it makes several Windows Registry changes to disable many Windows Defender features (i.e. tamper protection, anti-spyware capabilities, real-time behavioral monitoring, real-time on-access (file) protection, and real-time process scanning). Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, HardBit ransomware) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


HardBit ransomware tailors ransom to fit your cyber insurance payout

exploits ransomware
2023-02-21 https://www.malwarebytes.com/blog/news/2023/02/hardbit-ransomware-tailors-ransom-to-fit-your-cyber-insurance-payout

Categories: News

Tags: hardbit

Tags: ransomware

Tags: infection

Tags: insurance

Tags: cyber

Tags: negotiation

Tags: encrypted

Tags: locked

Tags: network

We take a look at a ransomware infection which uses a novel approach to payments: asking for the victim"s insurance details.

(Read more...)

The post HardBit ransomware tailors ransom to fit your cyber insurance payout appeared first on Malwarebytes Labs.

"

Autosummary: Although there is no specific information as to how it arrives on a network, once it gets there is performs typical ransomware operations: Encrypts files, branding them with the file’s custom logo Gathers system/network data Reduces overall security of affected systems Disables recovery options and tamper protection, turns off multiple Windows Defender features, and interferes with several other security features including real time monitoring and Windows services related to backups like the Volume Shadow Copy Service.If the scammers are told in private what the insurance total is, they’ll be able to ensure their demand for money is A) at the top end limit of the ransom payout scale provided and B) does not go past this limit, so the affected company receives every cent they"ve paid out. HardBit 2.0: dismantling a device piece by piece The ransomware, called HardBit 2.0, has been in circulation since sometime around November last year. "


Lockbit ransomware gang hit the Portuguese municipal water utility Aguas do Porto

exploits ransomware
2023-02-20 https://securityaffairs.com/142477/cyber-crime/lockbit-water-utility-aguas-do-porto.html

The LockBit ransomware gang claims to have hacked Aguas do Porto, a Portuguese municipal water utility company. The LockBit ransomware gang claims to have hacked Aguas do Porto, a Portuguese municipal water utility company, and is threatening to leak the stolen data. Aguas do Porto is a municipal water utility company that manages the full […]

The post Lockbit ransomware gang hit the Portuguese municipal water utility Aguas do Porto appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, Aguas do Porto) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


HardBit ransomware wants insurance details to set the perfect price

exploits ransomware
2023-02-20 https://www.bleepingcomputer.com/news/security/hardbit-ransomware-wants-insurance-details-to-set-the-perfect-price/
A ransomware threat called HardBit has moved to version 2.0 and its operators are trying to negotiate a ransom payment that would be covered by the victim"s insurance company. [...] "

Autosummary: "To avoid all this and get the money on the insurance, be sure to inform us anonymously about the availability and terms of the insurance coverage, it benefits both you and us, but it does not benefit the insurance company," HardBit operators say in a note to victims. "


Chip company loses $250m after ransomware hits supply chain

exploits ransomware
2023-02-20 https://www.malwarebytes.com/blog/news/2023/02/chip-company-loses-250m-after-ransomware-hits-supply-chain

Categories: News

Categories: Ransomware

Tags: Applied materials

Tags: MKS

Tags: ransomware

Tags: semiconductor

Applied Materials has said it expects to miss $250 million in second-quarter sales due to a ransomware attack at a supplier.

(Read more...)

The post Chip company loses $250m after ransomware hits supply chain appeared first on Malwarebytes Labs.

"

Autosummary: Applied Materials, one of the world’s leading suppliers of equipment, services, and software for the manufacture of semiconductors, has warned that its second-quarter sales are likely to be hurt to the tune of $250 million due to a cybersecurity attack at one of its suppliers. "


GoAnywhere zero-day opened door to Clop ransomware

exploits ransomware
2023-02-20 https://www.malwarebytes.com/blog/news/2023/02/goanywhere-zero-day-opened-door-to-clop-ransomware

Categories: News

Categories: Ransomware

Tags: Clop

Tags: Clop ransomware

Tags: ransomware

Tags: GoAnywhere

Tags: managed file transfer

Tags: MFT

Tags: Fortra

Tags: CISA

Tags: Known Exploited Vulnerabilities Catalog

The Clop ransomware gang has claimed responsibility for a wave of attacks that exploited a zero-day in GoAnywhere MFT admin consoles.

(Read more...)

The post GoAnywhere zero-day opened door to Clop ransomware appeared first on Malwarebytes Labs.

"

Autosummary: It recently filed a Form 8-K to the Securities and Exchange Commission (SEC), announcing the compromise of its system and disclosure of company data, including protected health information (PHI) and personal information (PI) of certain patients. The Cybersecurity & Infrastructure Security Agency (CISA) recently added CVE-2023-0669 to its Known Exploited Vulnerabilities Catalog, a list of software flaws that federal organizations must patch within two weeks. "


Mortal Kombat ransomware forms tag team with crypto-stealing malware

exploits ransomware
2023-02-17 https://www.malwarebytes.com/blog/news/2023/02/mortal-kombat-ransomware-forms-tag-team-partnership-with-laplas-clipper

Categories: News

Tags: mortal kombat

Tags: ransomware

Tags: laplas clipper

Tags: cryptocurrency

Tags: encrypt

Tags: network

Tags: infect

Tags: ransom

Tags: demand

Tags: BAT file

Tags: email

Tags: phish

Tags: phishing

Tags: attachment

It’s like a choose your own adventure game gone horribly wrong.

(Read more...)

The post Mortal Kombat ransomware forms tag team with crypto-stealing malware appeared first on Malwarebytes Labs.

"

Autosummary: It’s also able to generate imitation addresses for a wide variety of cryptocurrencies including Monero, Bitcoin, Ethereum, Solana, and even Steam trading URLs. The tag-team campaign serves up ransomware known as Mortal Kombat, which borrows the name made famous by the video game, and Laplas Clipper malware, a clipboard stealer.According to Talos, it has mainly been seen in the US, as well as the Philippines, the UK, and Turkey. Instructions are then provided to download the aforementioned chat program, add the attackers as a “friend”, and begin communication. Once installed on a system, Mortal Kombat targets a large selection of files for encryption, based on their file extensions. "


ESXiArgs Ransomware Hits Over 500 New Targets in European Countries

exploits ransomware
2023-02-16 https://thehackernews.com/2023/02/esxiargs-ransomware-hits-over-500-new.html
More than 500 hosts have been newly compromised en masse by the ESXiArgs ransomware strain, most of which are located in France, Germany, the Netherlands, the U.K., and Ukraine. The findings come from attack surface management firm Censys, which discovered "two hosts with strikingly similar ransom notes dating back to mid-October 2022, just after ESXi versions 6.5 and 6.7 reached end of life." "

Autosummary: "


New MortalKombat ransomware employed in financially motivated campaign

financial exploits ransomware
2023-02-16 https://securityaffairs.com/142319/cyber-crime/mortalkombat-ransomware.html

Talos researchers observed a financially motivated threat actor using a new ransomware dubbed MortalKombat and a clipper malware named Laplas. Since December 2022, Cisco Talos researchers have been observing an unidentified financially motivated threat actor deploying two new malware, the recently discovered MortalKombat ransomware and a GO variant of the Laplas Clipper malware. The threat actor […]

The post New MortalKombat ransomware employed in financially motivated campaign appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, ransomware) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Over 500 ESXiArgs Ransomware infections in one day, but they dropped the day after

exploits ransomware
2023-02-16 https://securityaffairs.com/142336/cyber-crime/esxiargs-ransomware-infections.html

ESXiArgs ransomware continues to spread in Europe, most of the recent infections were observed in France, Germany, the Netherlands, the UK, and Ukraine Researchers from Censys reported that more than 500 hosts have been infected in a new wave of ESXiArgs ransomware attacks, most of which are in France, Germany, the Netherlands, and the U.K.. […]

The post Over 500 ESXiArgs Ransomware infections in one day, but they dropped the day after appeared first on Security Affairs.

"

Autosummary: ESXiArgs ransomware continues to spread in Europe, most of the recent infections were observed in France, Germany, the Netherlands, the UK, and Ukraine Researchers from Censys reported that more than 500 hosts have been infected in a new wave of ESXiArgs ransomware attacks, most of which are in France, Germany, the Netherlands, and the U.K.. “Over the last few days, Censys has observed just over 500 hosts newly infected with ESXiArgs ransomware, most of which are in France, Germany, the Netherlands, and the UK.” "


<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-040a" hreflang="en">#StopRansomware: Ransomware Attacks on Critical Infrastructure Fund DPRK Malicious Cyber Activities</a>

exploits ransomware ciber
2023-02-16 https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-040a
"

Autosummary: Vulnerable Technologies and Versions Sonicwall Sma 200 Firmware 10.2.0.8-37Sv Sonicwall Sma 200 Firmware 10.2.1.1-19Sv Sonicwall Sma 200 Firmware 10.2.1.2-24Sv Sonicwall Sma 210 Firmware 10.2.0.8-37Sv Sonicwall Sma 210 Firmware 10.2.1.1-19Sv Sonicwall Sma 210 Firmware 10.2.1.2-24Sv Sonicwall Sma 410 Firmware 10.2.0.8-37Sv Sonicwall Sma 410 Firmware 10.2.1.1-19Sv Sonicwall Sma 410 Firmware 10.2.1.2-24Sv Sonicwall Sma 400 Firmware 10.2.0.8-37Sv Sonicwall Sma 400 Firmware 10.2.1.1-19Sv Sonicwall Sma 400 Firmware 10.2.1.2-24Sv Sonicwall Sma 500V Firmware 10.2.0.8-37Sv Sonicwall Sma 500V Firmware 10.2.1.1-19Sv Sonicwall Sma 500V Firmware 10.2.1.2-24Sv See https://nvd.nist.gov/vuln/detail/CVE-2021-20038 for more information.Recommended Mitigations Apply all appropriate vendor updates Upgrade to: SMA 100 Series - (SMA 200, 210, 400, 410, 500v (ESX, Hyper-V, KVM, AWS, Azure): SonicWall SMA100 build versions 10.2.0.9-41sv or later SonicWall SMA100 build versions 10.2.1.3-27sv or later System administrators should refer to the SonicWall Security Advisories in the reference section to determine affected applications/systems and appropriate fix actions.Actors have also been observed using or possessing publically available tools for encryption, such as BitLocker, Deadbolt, ech0raix, GonnaCry, Hidden Tear, Jigsaw, LockBit 2.0, My Little Ransomware, NxRansomware, Ryuk, and YourRansom [T1486].Actors have also been observed using or possessing publically available tools for encryption, such as BitLocker, Deadbolt, ech0raix, GonnaCry, Hidden Tear, Jigsaw, LockBit 2.0, My Little Ransomware, NxRansomware, Ryuk, and YourRansom [T1486]. The United States National Security Agency (NSA), the U.S. Federal Bureau of Investigation (FBI), the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the U.S. Department of Health and Human Services (HHS), the Republic of Korea (ROK) National Intelligence Service (NIS), and the ROK Defense Security Agency (DSA) (hereafter referred to as the “authoring agencies”) are issuing this joint Cybersecurity Advisory (CSA) to highlight ongoing ransomware activity against Healthcare and Public Health Sector organizations and other critical infrastructure sector entities.Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes. RESOURCES Stairwell provided a YARA rule to identify Maui ransomware, and a Proof of Concept public RSA key extractor at the following link: https://www.stairwell.com/news/threat-research-report-maui-ransomware/ REQUEST FOR INFORMATION The FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, bitcoin wallet information, the decryptor file, and/or benign samples of encrypted files. Appendix A: CVE Details CVE-2021-44228 CVSS 3.0: 10 (Critical) Vulnerability Description Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. SHA256 Hash 99fc54786a72f32fd44c7391c2171ca31e72ca52725c68e2dde94d04c286fccd* F8fc2445a9814ca8cf48a979bff7f182d6538f4d1ff438cf259268e8b4b76f86* Bea866b327a2dc2aa104b7ad7307008919c06620771ec3715a059e675d9f40af* 6e20b73a6057f8ff75c49e1b7aef08abfcfe4e418e2c1307791036f081335c2d f4d10b08d7dacd8fe33a6b54a0416eecdaed92c69c933c4a5d3700b8f5100fad 541825cb652606c2ea12fd25a842a8b3456d025841c3a7f563655ef77bb67219 2d978df8df0cf33830aba16c6322198e5889c67d49b40b1cb1eb236bd366826d 414ed95d14964477bebf86dced0306714c497cde14dede67b0c1425ce451d3d7 Df0c7bb88e3c67d849d78d13cee30671b39b300e0cda5550280350775d5762d8 MD5 Hash a2c2099d503fcc29478205f5aef0283b 9c516e5b95a7e4169ecbd133ed4d205f d6a7b5db62bf7815a10a17cdf7ddbd4b c6949a99c60ef29d20ac8a9a3fb58ce5 4b20641c759ed563757cdd95c651ee53 25ee4001eb4e91f7ea0bc5d07f2a9744 29b6b54e10a96e6c40e1f0236b01b2e8 18126be163eb7df2194bb902c359ba8e eaf6896b361121b2c315a35be837576d e4ee611533a28648a350f2dab85bb72a e268cb7ab778564e88d757db4152b9fa * from Microsoft blog post on h0lygh0st CONTACT INFORMATION NSA Client Requirements / General Cybersecurity Inquiries: CybersecurityReports@nsa.gov Defense Industrial Base Inquiries and Cybersecurity Services: DIB_Defense@cyber.nsa.gov To report incidents and anomalous activity related to information found in this Joint Cybersecurity Advisory, contact CISA’s 24/7 Operations Center at Report@cisa.gov or (888) 282-0870 or your local FBI field office at www.fbi.gov/contact-us/field. Appendix B: Indicators of Compromise (IOCs) The IOC section includes hashes and IP addresses for the Maui and H0lyGh0st ransomware variants—as well as custom malware implants assumedly developed by DPRK cyber actors, such as remote access trojans (RATs), loaders, and other tools—that enable subsequent deployment of ransomware. The authoring agencies urge HPH organizations to: Limit access to data by authenticating and encrypting connections (e.g., using public key infrastructure certificates in virtual private network (VPN) and transport layer security (TLS) connections) with network services, Internet of Things (IoT) medical devices, and the electronic health record system "


<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-039a" hreflang="en">ESXiArgs Ransomware Virtual Machine Recovery Guidance</a>

exploits ransomware ciber
2023-02-16 https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-039a
"

Autosummary: The full list of file extensions encrypted by the malware is: vmdk , vmx , vmxf , vmsd , vmsn , vswp , vmss , nvram , vmem . See the joint CSA from the cybersecurity authorities of Australia, Canada, New Zealand, the United Kingdom, and the United States on Technical Approaches to Uncovering and Remediating Malicious Activity for additional guidance on hunting or investigating a network, and for common mistakes in incident handling. Organizations should also collect and review artifacts, such as running processes/services, unusual authentications, and recent network connections.CISA and FBI encourage all organizations managing VMware ESXi servers to: The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) are releasing this joint Cybersecurity Advisory (CSA) in response to the ongoing ransomware campaign, known as “ESXiArgs.”Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. "


City of Oakland declares state of emergency after ransomware attack

exploits government ransomware
2023-02-15 https://www.bleepingcomputer.com/news/security/city-of-oakland-declares-state-of-emergency-after-ransomware-attack/
Oakland has declared a local state of emergency because of the impact of a ransomware attack that forced the City to take all its IT systems offline on February 8th. [...] "

Autosummary: "


Financially Motivated Threat Actor Strikes with New Ransomware and Clipper Malware

financial exploits ransomware
2023-02-15 https://thehackernews.com/2023/02/financially-motivated-threat-actor.html
A new financially motivated campaign that commenced in December 2022 has seen the unidentified threat actor behind it deploying a novel ransomware strain dubbed MortalKombat and a clipper malware known as Laplas. Cisco Talos said it "observed the actor scanning the internet for victim machines with an exposed remote desktop protocol (RDP) port 3389." The attacks, per the cybersecurity company, "

Autosummary: "


City of Oakland issued a local state of emergency after recent ransomware attack

exploits government ransomware
2023-02-15 https://securityaffairs.com/142295/cyber-crime/city-of-oakland-emergency-ransomware.html

The City of Oakland has declared a local state of emergency due to the effect of the ransomware attack that hit the city on February 8, 2023. The City of Oakland disclosed last week a ransomware attack, the security breach began on February 8, 2023. In an abundance of caution, the City of Oakland has […]

The post City of Oakland issued a local state of emergency after recent ransomware attack appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, ransomware) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


TrickBot gang members sanctioned after pandemic ransomware attacks

exploits ransomware
2023-02-15 https://www.malwarebytes.com/blog/news/2023/02/trickbot-gang-members-sanctioned-after-pandemic-ransomware-attacks

Categories: News

Tags: Conti

Tags: ransomware

Tags: TrickBot

Tags: sanction

The US, in partnership with the UK, named individuals tied to TrickBot and shamed them with a sanction.

(Read more...)

The post TrickBot gang members sanctioned after pandemic ransomware attacks appeared first on Malwarebytes Labs.

"

Autosummary: Under Secretary of the Treasury for Terrorism and Financial Intelligence Brian E. Nelson said in a statement: "Cybercriminals, particularly those based in Russia, seek to attack critical infrastructure, target US businesses, and exploit the international financial system." According to the sanctions notice, in one attack the group deployed ransomware against three Minnesota medical facilities, disrupting their computer networks and telephones, and causing ambulances to divert. In a collaborative partnership, officials in the United States and the United Kingdom unmasked and imposed financial sanctions against seven members of the notorious Russian gang TrickBot (alias "TrickLoader"), a mainstream banking Trojan turned malware-as-a-service (MaaS) platform for other criminals. "


A CISOs Practical Guide to Storage and Backup Ransomware Resiliency

exploits ransomware
2023-02-14 https://thehackernews.com/2023/02/a-cisos-practical-guide-to-storage-and.html
One thing is clear. The "business value" of data continues to grow, making it an organization"s primary piece of intellectual property. From a cyber risk perspective, attacks on data are the most prominent threat to organizations.  Regulators, cyber insurance firms, and auditors are paying much closer attention to the integrity, resilience, and recoverability of organization data – as well as "

Autosummary: Source: CISO Point of View: The ever-changing role of data, and the implications for data protection & storage security (Continuity) CISOs are concerned about the rise of ransomware – not only of the proliferation of attacks but also of their sophistication: "The storage and backup environments are now under attack, as the attackers realize that this is the single biggest determining factor to show if the company will pay the ransom," says George Eapen, Group CIO (and former CISO) at Petrofac, John Meakin, former CISO at GlaxoSmithKline, BP, Standard Chartered, and Deutsche Bank believes that "As important as it may be, data encryption is hardly enough to protect an organization"s core data. 4 Steps to Success Define comprehensive security baselines for all components of storage and backup systems (NIST Special Publication 800-209; Security Guidelines for Storage Infrastructure provides a comprehensive set of recommendations for the secure deployment, configuration, and operation of storage & backup systems) Use automation to reduce exposure to risk, and allow much more agility in adapting to changing priorities. "


New ‘MortalKombat’ ransomware targets systems in the U.S.

exploits ransomware
2023-02-14 https://www.bleepingcomputer.com/news/security/new-mortalkombat-ransomware-targets-systems-in-the-us/
Hackers conducting a new financially motivated campaign are using a variant of the Xortist commodity ransomware named "MortalKombat," together with the Laplas clipper in cyberattacks. [...] "

Autosummary: All file types targeted by the ransomware (Cisco) "Talos observed that MortalKombat encrypts various files on the victim machine’s filesystem, such as system, application, database, backup, and virtual machine files, as well as files on the remote locations mapped as logical drives in the victim’s machine," describes the report. "


CISA issues alert with South Korean government about DPRK"s ransomware antics

exploits government ransomware industry
2023-02-13 https://www.malwarebytes.com/blog/news/2023/02/cisa-issues-alert-with-south-korean-government-about-dprks-ransomware-antics

Categories: News

Categories: Ransomware

Tags: CISA

Tags: ransomware

Tags: Democratic People’s Republic of Korea

Tags: DPRK

Tags: North Korea

Tags: WannaCry

Tags: EternalBlue

Tags: Lazarus Group

Tags: APT

Tags: Magniber

Tags: Magnitude exploit kit

Tags: exploit kit

Tags: EK

Tags: Andariel

Tags: Silent Chollima

Tags: Stonefly

Tags: Maui

Tags: H0lyGh0st

Tags: PLUTONIUM

Tags: Conti

The tactics of North Korean-sponsored ransomware cyberattacks against the healthcare sector and other vital infrastructure are highlighted in the latest #StopRansomware alert.

(Read more...)

The post CISA issues alert with South Korean government about DPRK"s ransomware antics appeared first on Malwarebytes Labs.

"

Autosummary: " DPRK ransomware has significantly altered the face of ransomware, tuning it up from a simple locker and then making it more disruptive, lucrative, and, in some cases, destructive. H0lyGh0st, like other current ransomware gangs, favors double-extortion tactics, maintains a leak site, and targets small and medium-sized enterprises (SMEs).Once it arrives on target networks, it encrypts servers responsible for record-keeping, diagnosing, imaging services, and others. "North Korea"s cyber program poses a growing espionage, theft, and attack threat," the Annual Threat Assessment report in 2021 said. "


The Israel Institute of Technology Technion suffered a ransomware attack

exploits ransomware
2023-02-12 https://securityaffairs.com/142160/hacking/israeli-technion-suffered-ransomware-attack.html

The Technion – Israel Institute of Technology was breached on Sunday by a new anti-Israel threat actor calling itself DarkBit. Technion – Israel Institute of Technology is Israel’s top technology research university and a leading center for cyber security education. A new anti-Israel threat actor calling itself DarkBit is claiming responsibility for the ransomware attack that breached the […]

The post The Israel Institute of Technology Technion suffered a ransomware attack appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, Israel Institute of Technology Technion) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


New ESXiArgs Ransomware Variant Emerges After CISA Releases Decryptor Tool

exploits ransomware
2023-02-11 https://thehackernews.com/2023/02/new-esxiargs-ransomware-variant-emerges.html
After the U.S. Cybersecurity and Infrastructure Security Agency (CISA) released a decryptor for affected victims to recover from ESXiArgs ransomware attacks, the threat actors have bounced back with an updated version that encrypts more data. The emergence of the new variant was reported by a system administrator on an online forum, where another participant stated that files larger than 128MB "

Autosummary: A majority of the infections are located in France, the U.S., Germany, Canada, the U.K., the Netherlands, Finland, Turkey, Poland, and Taiwan. "


Clop ransomware claims the hack of 130 orgs using GoAnywhere MFT flaw

exploits ransomware
2023-02-11 https://securityaffairs.com/142130/cyber-crime/clop-ransomware-goanywhere-mft.html

The Clop ransomware group claims to have breached over 130 organizations exploiting the GoAnywhere MFT zero-day. The Clop ransomware group claims to have stolen sensitive data from over 130 organizations by exploiting a zero-day vulnerability (CVE-2023-0669) in Fortra’s GoAnywhere MFT secure file transfer tool, BleepingComputer reported. Fortra immediately addressed the flaw with the release of […]

The post Clop ransomware claims the hack of 130 orgs using GoAnywhere MFT flaw appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, Clop ransomware) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


U.K. and U.S. Sanction 7 Russians for TrickBot, Ryuk, and Conti Ransomware Attacks

exploits ransomware rusia-ucrania
2023-02-10 https://thehackernews.com/2023/02/uk-and-us-sanction-7-russians-for.html
In a first-of-its-kind coordinated action, the U.K. and U.S. governments on Thursday levied sanctions against seven Russian nationals for their affiliation to the TrickBot, Ryuk, and Conti cybercrime operation. The individuals designated under sanctions are Vitaly Kovalev (aka Alex Konor, Bentley, or Bergen), Maksim Mikhailov (aka Baget), Valentin Karyagin (aka Globus), Mikhail Iskritskiy (aka "

Autosummary: The individuals designated under sanctions are Vitaly Kovalev (aka Alex Konor, Bentley, or Bergen), Maksim Mikhailov (aka Baget), Valentin Karyagin (aka Globus), Mikhail Iskritskiy (aka Tropa), Dmitry Pleshevskiy (aka Iseldor), Ivan Vakhromeyev (aka Mushroom), and Valery Sedletski (aka Strix). "


Hogwarts Legacy game comes out as online debate continues

ransomware
2023-02-10 https://www.bbc.co.uk/news/entertainment-arts-64572328?at_medium=RSS&at_campaign=KARANGA
There have been calls for a boycott, but the big-budget game is expected to be a big seller. "

Autosummary: "


North Korean ransomware attacks on healthcare fund govt operations

exploits ransomware
2023-02-10 https://www.bleepingcomputer.com/news/security/north-korean-ransomware-attacks-on-healthcare-fund-govt-operations/
A new cybersecurity advisory from the U.S. Cybersecurity & Infrastructure Security Agency (CISA) describes recently observed tactics, techniques, and procedures (TTPs) observed with North Korean ransomware operations against public health and other critical infrastructure sectors. [...] "

Autosummary: [1, 2], the U.S. agency notes that the "have also been observed using or possessing publicly available tools for encryption:" BitLocker (abused of a legitimate tool) Deadbolt ech0raix GonnaCry Hidden Tear Jigsaw LockBit 2.0 My Little Ransomware NxRansomware Ryuk YourRansom To note, BleepingComputer is aware that more than half of these lockers are available from public sources but could not confirm this for all of them. "


North Korea targets US, South Korean hospitals with ransomware to fund further cyber operations

exploits ransomware
2023-02-10 https://www.helpnetsecurity.com/2023/02/10/north-korea-targets-us-south-korean-hospitals-with-ransomware-to-fund-further-cyber-operations/

US and South Korean agencies have issued a joint cybersecurity advisory describing the tactics, techniques and procedures used by North Korean hackers to deploy “state-sponsored” ransomware on hospitals and other organizations that can be considered part of the countries’ critical infrastructure. “The authoring agencies assess that an unspecified amount of revenue from these cryptocurrency operations supports DPRK national-level priorities and objectives, including cyber operations targeting the United States and South Korea governments—specific targets include Department … More

The post North Korea targets US, South Korean hospitals with ransomware to fund further cyber operations appeared first on Help Net Security.

"

Autosummary: They “purposely obfuscate their involvement by operating with or under third-party foreign affiliate identities and use third-party foreign intermediaries to receive ransom payments,” and “use virtual private networks (VPNs) and virtual private servers (VPSs) or third-country IP addresses to appear to be from innocuous locations instead of from the Democratic People’s Republic of Korea.” "


North Korean Hackers Targeting Healthcare with Ransomware to Fund its Operations

exploits ransomware
2023-02-10 https://thehackernews.com/2023/02/north-korean-hackers-targeting.html
State-backed hackers from North Korea are conducting ransomware attacks against healthcare and critical infrastructure facilities to fund illicit activities, U.S. and South Korean cybersecurity and intelligence agencies warned in a joint advisory. The attacks, which demand cryptocurrency ransoms in exchange for recovering access to encrypted files, are designed to support North Korea"s "

Autosummary: "


Dallas Central Appraisal District paid $170,000 to ransomware attackers

exploits ransomware
2023-02-10 https://www.bitdefender.com/blog/hotforsecurity/dallas-central-appraisal-district-paid-170-000-to-ransomware-attackers/
A Dallas state agency has admitted to paying $170,000 to hackers after it suffered an attack from the Royal ransomware group. Read more in my article on the Hot for Security blog. "

Autosummary: As we reported late last year, the Royal ransomware group - which unusually does not follow the Ransomware-As-A-Service model and rejects affiliates - has launched numerous attacks, including against healthcare organisations and telecoms firm Intrado. "


The Week in Ransomware - February 10th 2023 - Clop"s Back

exploits ransomware
2023-02-10 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-february-10th-2023-clops-back/
From ongoing attacks targeting ESXi servers to sanctions on Conti/TrickBot members, it has been quite a busy week regarding ransomware. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include @LawrenceAbrams, @malwrhunterteam, @billtoulas, @demonslay335, @struppigel, @PolarToffee, @fwosar, @BleepinComputer, @Ionut_Ilascu, @serghei, @Seifreed, @jfslowik, @CISAgov, @LabsSentinel, @BushidoToken, @ASEC_Analysis, @pcrisk, @ValeryMarchive, and @BrettCallow. February 8th 2023 New ESXiArgs ransomware attacks are now encrypting more extensive amounts of data, making it much harder, if not impossible, to recover encrypted VMware ESXi virtual machines. "


City of Oakland systems offline after ransomware attack

exploits government ransomware
2023-02-10 https://www.bleepingcomputer.com/news/security/city-of-oakland-systems-offline-after-ransomware-attack/
The City of Oakland was hit by a ransomware attack on Wednesday night that forced it to take all systems offline until the network is secured and affected services are brought back online. [...] "

Autosummary: " As Emsisoft shared in January, ransomware attacks have impacted more than 200 hundred larger organizations in the U.S. public sector in 2022 across government, educational, and healthcare verticals. "


A10 Networks confirms data breach after Play ransomware attack

financial exploits ransomware
2023-02-10 https://www.bleepingcomputer.com/news/security/a10-networks-confirms-data-breach-after-play-ransomware-attack/
The California-based networking hardware manufacturer "A10 Networks" has confirmed to BleepingComputer that the Play ransomware gang briefly gained access to its IT infrastructure and compromised data. [...] "

Autosummary: "


Clop ransomware claims it breached 130 orgs using GoAnywhere zero-day

exploits ransomware
2023-02-10 https://www.bleepingcomputer.com/news/security/clop-ransomware-claims-it-breached-130-orgs-using-goanywhere-zero-day/
The Clop ransomware gang claims to be behind recent attacks that exploited a zero-day vulnerability in the GoAnywhere MFT secure file transfer tool, saying they stole data from over 130 organizations. [...] "

Autosummary: Organizations that had their servers hacked by Clop include, among others, energy giant Shell, supermarket giant Kroger, cybersecurity firm Qualys, and multiple universities worldwide (e.g., Stanford Medicine, University of Colorado, University of Miami, University of Maryland Baltimore (UMB), and the University of California). "


DPRK fund malicious cyber activities with ransomware attacks on critical Infrastructure

exploits ransomware
2023-02-10 https://securityaffairs.com/142090/breaking-news/north-korea-hackers-ransomware.html

North Korea-linked APT groups conduct ransomware attacks against healthcare and critical infrastructure facilities to fund its activities. Ransomware attacks on critical infrastructure conducted by North Korea-linked hacker groups are used by the government of Pyongyang to fund its malicious cyber operations, U.S. and South Korean agencies warn. US CISA published a Cybersecurity Advisory (CSA) to […]

The post DPRK fund malicious cyber activities with ransomware attacks on critical Infrastructure appeared first on Security Affairs.

"

Autosummary: Attackers used privately developed ransomware, such as Maui and H0lyGh0st along with other ransomware families, including BitLocker, Deadbolt, ech0raix, GonnaCry, Hidden Tear, Jigsaw, LockBit 2.0, My Little Ransomware, NxRansomware, Ryuk, and YourRansom [T1486].Attackers used privately developed ransomware, such as Maui and H0lyGh0st along with other ransomware families, including BitLocker, Deadbolt, ech0raix, GonnaCry, Hidden Tear, Jigsaw, LockBit 2.0, My Little Ransomware, NxRansomware, Ryuk, and YourRansom [T1486]. "


New ESXiArgs ransomware version prevents VMware ESXi recovery

exploits ransomware
2023-02-09 https://www.bleepingcomputer.com/news/security/new-esxiargs-ransomware-version-prevents-vmware-esxi-recovery/
New ESXiArgs ransomware attacks are now encrypting more extensive amounts of data, making it much harder, if not impossible, to recover encrypted VMware ESXi virtual machines. [...] "

Autosummary: For even larger files, like a 450GB file, the amount of skipped data rises dramatically, with the size_step becoming "4607," now alternating between encrypting 1MB and skipping 4.49 GB of data. "


U.S. and U.K. sanction TrickBot and Conti ransomware operation members

exploits ransomware
2023-02-09 https://www.bleepingcomputer.com/news/security/us-and-uk-sanction-trickbot-and-conti-ransomware-operation-members/
The United States and the United Kingdom have sanctioned seven Russian individuals for their involvement in the TrickBot cybercrime group, whose malware was used to support attacks by the Conti and Ryuk ransomware operation. [...] "

Autosummary: This includes BlackCat, Royal Group, AvosLocker, Karakurt, LockBit, Silent Ransom, and DagonLocker. As the malware became widely detected by security software, the developers launched new malware families, such as BazarBackdoor, Anchor, and BumbleBee, to provide more stealthy infection of targets. "


AA23-040A: #StopRansomware: Ransomware Attacks on Critical Infrastructure Fund DPRK Malicious Cyber Activities

exploits ransomware
2023-02-09 https://us-cert.cisa.gov/ncas/alerts/aa23-040a
Original release date: February 9, 2023

Summary

Note: This Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and various ransomware threat actors. These #StopRansomware advisories detail historically and recently observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn about other ransomware threats and no-cost resources.

The United States National Security Agency (NSA), the U.S. Federal Bureau of Investigation (FBI), the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the U.S. Department of Health and Human Services (HHS), the Republic of Korea (ROK) National Intelligence Service (NIS), and the ROK Defense Security Agency (DSA) (hereafter referred to as the “authoring agencies”) are issuing this joint Cybersecurity Advisory (CSA) to highlight ongoing ransomware activity against Healthcare and Public Health Sector organizations and other critical infrastructure sector entities.

This CSA provides an overview of Democratic People’s Republic of Korea (DPRK) state-sponsored ransomware and updates the July 6, 2022, joint CSA North Korean State-Sponsored Cyber Actors Use Maui Ransomware to Target the Healthcare and Public Health Sector. This advisory highlights TTPs and IOCs DPRK cyber actors used to gain access to and conduct ransomware attacks against Healthcare and Public Health (HPH) Sector organizations and other critical infrastructure sector entities, as well as DPRK cyber actors’ use of cryptocurrency to demand ransoms.

The authoring agencies assess that an unspecified amount of revenue from these cryp "

Autosummary: Actors have also been observed using or possessing publically available tools for encryption, such as BitLocker, Deadbolt, ech0raix, GonnaCry, Hidden Tear, Jigsaw, LockBit 2.0, My Little Ransomware, NxRansomware, Ryuk, and YourRansom [T1486].Actors have also been observed using or possessing publically available tools for encryption, such as BitLocker, Deadbolt, ech0raix, GonnaCry, Hidden Tear, Jigsaw, LockBit 2.0, My Little Ransomware, NxRansomware, Ryuk, and YourRansom [T1486].The United States National Security Agency (NSA), the U.S. Federal Bureau of Investigation (FBI), the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the U.S. Department of Health and Human Services (HHS), the Republic of Korea (ROK) National Intelligence Service (NIS), and the ROK Defense Security Agency (DSA) (hereafter referred to as the “authoring agencies”) are issuing this joint Cybersecurity Advisory (CSA) to highlight ongoing ransomware activity against Healthcare and Public Health Sector organizations and other critical infrastructure sector entities.This CSA provides an overview of Democratic People’s Republic of Korea (DPRK) state-sponsored ransomware and updates the July 6, 2022, joint CSA North Korean State-Sponsored Cyber Actors Use Maui Ransomware to Target the Healthcare and Public Health Sector.Actors procure infrastructure, IP addresses, and domains with cryptocurrency generated through illicit cybercrime, such as ransomware and cryptocurrency theft. "


A new variant of ESXiArgs ransomware makes recovery much harder

exploits ransomware
2023-02-09 https://securityaffairs.com/142035/malware/esxiargs-ransomware-new-variant.html

Experts warn of new ESXiArgs ransomware attacks using an upgraded version that makes it harder to recover VMware ESXi virtual machines. Experts spotted a new variant of ESXiArgs ransomware targeting VMware ESXi servers, authors have improved the encryption process, making it much harder to recover the encrypted virtual machines. The new variant was spotted less than a […]

The post A new variant of ESXiArgs ransomware makes recovery much harder appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, ESXiArgs ransomware) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Seven Russians sanctioned over ransomware cyber-crime

exploits ransomware rusia-ucrania
2023-02-09 https://www.bbc.co.uk/news/technology-64586361?at_medium=RSS&at_campaign=KARANGA
UK and US announce rare joint action against the men, including freezing their assets. "

Autosummary: "


Ryuk ransomware laundering leads to guilty plea

exploits ransomware
2023-02-09 https://www.malwarebytes.com/blog/news/2023/02/ryuk-ransomware-laundering-leads-to-guilty-plea

Categories: News

Tags: ryuk

Tags: ransomware

Tags: guilty

Tags: encrypt

Tags: ransom

Tags: cryptocurrency

Tags: bitcoin

We take a look at a guilty plea made in relation to Ryuk ransomware proceeds, and how you can best protect yourself from the threat of ransomware.

(Read more...)

The post Ryuk ransomware laundering leads to guilty plea appeared first on Malwarebytes Labs.

"

Autosummary: After receiving the ransom payments, the Ryuk actors, defendants, and others involved in the scheme engaged in various financial transactions, including international financial transactions, to conceal the nature, source, location, ownership, and control of the ransom proceeds. From the indictment release: The Ryuk actors used anonymous private wallets in their ransom notes, allowing them immediately to conceal the nature, location, source, ownership, and control of the ransom payments. Malwarebytes Endpoint Detection and Response offers built-in ransomware protection, 72-hour ransomware rollback, and zero-day ransomware protection. Whether we’re talking single, double, or even triple threat ransomware, the problem is very real. "


CISA releases recovery script for ESXiArgs ransomware victims

exploits ransomware
2023-02-08 https://www.bleepingcomputer.com/news/security/cisa-releases-recovery-script-for-esxiargs-ransomware-victims/
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released a script to recover VMware ESXi servers encrypted by the recent widespread ESXiArgs ransomware attacks. [...] "

Autosummary: " While the GitHub project page has the steps you need to recover VMs, in summary, the script will clean up a virtual machine"s encrypted files and then attempt to rebuild the virtual machine"s .vmdk file using the unencrypted flat file. "


Russian Hacker Pleads Guilty to Money Laundering Linked to Ryuk Ransomware

financial exploits ransomware rusia-ucrania
2023-02-08 https://thehackernews.com/2023/02/russian-hacker-pleads-guilty-to-money.html
A Russian national on February 7, 2023, pleaded guilty in the U.S. to money laundering charges and for attempting to conceal the source of funds obtained in connection with Ryuk ransomware attacks. Denis Mihaqlovic Dubnikov, 30, was arrested in Amsterdam in November 2021 before he was extradited from the Netherlands in August 2022. He is awaiting sentencing on April 11, 2023. "Between at least "

Autosummary: "


US CISA releases a script to recover servers infected with ESXiArgs ransomware

exploits ransomware
2023-02-08 https://securityaffairs.com/141948/malware/uc-cisa-script-esxiargs-ransomware.html

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) released a script to recover VMware ESXi servers infected with ESXiArgs ransomware. Good news for the victims of the recent wave of ESXiArgs ransomware attacks, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released a script to allow them to recover encrypted VMware ESXi servers. The […]

The post US CISA releases a script to recover servers infected with ESXiArgs ransomware appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, ESXiArgs ransomware) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


CISA releases ESXiArgs ransomware recovery script

exploits ransomware
2023-02-08 https://www.helpnetsecurity.com/2023/02/08/esxiargs-ransomware-recovery/

According to the latest data, the number of ESXiArgs ransomware victims has surpassed 3,800, and CISA has published a recovery script for victim organizations. Fixing the mess The attacks started late last week and are still ongoing. Investigations point to a new family of ransomware dubbed ESXiArgs by the researchers – though, according to Paul Ducklin, Sophos Head of Technology for the Asia Pacific region, it should be just Args, as it’s a Linux program … More

The post CISA releases ESXiArgs ransomware recovery script appeared first on Help Net Security.

"

Autosummary: The malware attempts to kill off running virtual machines, export an ESXi filesystem volume list, find important VMWare files for each volume, and call a general-purpose file scrambling tool for each file found, Ducklin explained. "


Lessons Learned on Ransomware Prevention from the Rackspace Attack

exploits ransomware
2023-02-08 https://www.bleepingcomputer.com/news/security/lessons-learned-on-ransomware-prevention-from-the-rackspace-attack/
The ransomware attack on Rackspace has taught us the importance of good cybersecurity habits. Let"s see what we can learn from the attack and how organizations can protect themselves. [...] "

Autosummary: Specops: Password Policy Block words common to your organization with custom dictionaries Prevent the use of 3+ billion compromised passwords with Breached Password Protection Find and remove compromised passwords in your environment Real-time, dynamic feedback at password change Block usernames, display names, specific words, consecutive characters, incremental passwords, and reuse a part of the current password Granular, GPO-driven targeting for any GPO level, computer, user, or group population Protecting against ransomware Ransomware is a growing concern for organizations worldwide, as the fallout and consequences of suffering a ransomware attack are usually severe. Let"s look at the following strategies for preventing the domino effect of a ransomware attack: Patching Securing remote access systems Strengthen password security Patching Patching is a vital aspect of preventing a ransomware attack. As a result, protecting against ransomware attacks and the fallout requires organizations to have a multi-pronged approach to strengthen their security, including patching, securing remote access, and increasing password security. "


AA23-039A: ESXiArgs Ransomware Virtual Machine Recovery Guidance

exploits ransomware
2023-02-08 https://us-cert.cisa.gov/ncas/alerts/aa23-039a
Original release date: February 8, 2023

Summary

The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) are releasing this joint Cybersecurity Advisory (CSA) in response to the ongoing ransomware campaign, known as “ESXiArgs.” Malicious actors may be exploiting known vulnerabilities in VMware ESXi servers that are likely running unpatched and out-of-service or out-of-date versions of VMware ESXi software to gain access and deploy ransomware. The ESXiArgs ransomware encrypts configuration files on ESXi servers, potentially rendering virtual machines (VMs) unusable. 

CISA has released an ESXiArgs recovery script at github.com/cisagov/ESXiArgs-Recover. Organizations that have fallen victim to ESXiArgs ransomware can use this script to attempt to recover their files. This CSA provides guidance on how to use the script.
ESXiArgs actors have compromised over 3,800 servers globally. CISA and FBI encourage all organizations managing VMware ESXi servers to: 

  • Update servers to the latest version of VMware ESXi software
  • Harden ESXi hypervisors by disabling the Service Location Protocol (SLP) service, and 
  • Ensure the ESXi hypervisor is not exposed to the public internet. 

If malicious actors have compromised your organization with ESXiArgs ransomware, CISA and FBI recommend following the script and guidance provided in this CSA to attempt to recover access to your files.  

Download the PDF version of this report: pdf, 712 kb.

Note: CISA and FBI will update this CSA as more information becomes available.
 

Technical Details

Open-source reporting indicates that malicious actors are exploiting known vulnerabilities in VM "

Autosummary: The full list of file extensions encrypted by the malware is: vmdk , vmx , vmxf , vmsd , vmsn , vswp , vmss , nvram , vmem . See the joint CSA from the cybersecurity authorities of Australia, Canada, New Zealand, the United Kingdom, and the United States on Technical Approaches to Uncovering and Remediating Malicious Activity for additional guidance on hunting or investigating a network, and for common mistakes in incident handling. Organizations should also collect and review artifacts, such as running processes/services, unusual authentications, and recent network connections.CISA and FBI encourage all organizations managing VMware ESXi servers to: The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) are releasing this joint Cybersecurity Advisory (CSA) in response to the ongoing ransomware campaign, known as “ESXiArgs.”Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. "


Russian national pleads guilty to money laundering linked to Ryuk Ransomware operation

financial exploits ransomware rusia-ucrania
2023-02-08 https://securityaffairs.com/141980/cyber-crime/russian-national-pleads-guilty-money-laundering-ryuk-ransomware.html

A Russian national pleaded guilty in the U.S. to money laundering charges linked to the Ryuk ransomware operation. On February 7, 2023, Russian national Denis Mihaqlovic Dubnikov (30) pleaded guilty in the U.S. to one count of conspiracy to commit money laundering for the Ryuk ransomware operation. Denis Mihaqlovic Dubnikov, 30, was arrested in Amsterdam in November […]

The post Russian national pleads guilty to money laundering linked to Ryuk Ransomware operation appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, Ryuk ransomware) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


ION starts bringing customers back online after LockBit ransomware attack

exploits ransomware
2023-02-08 https://www.malwarebytes.com/blog/news/2023/02/ion-starts-bringing-customers-back-online-after-lockbit-ransomware-attack

Categories: News

Categories: Ransomware

Tags: LockBit

Tags: ransomware

Tags: LockBit ransomware group

Tags: FBI

Tags: Todd Conklin

Tags: Financial Conduct Authority

Tags: FCA

Tags:

Tags: Prudential Regulation Authority

Tags: PRA

Tags: Tom Kellermann

Tags: Joseph Schifano

Pernicious ransomware group, LockBit, is making headlines again. Less than a month after attacking HACLA, it hit the derivatives trading division of ION Group, a financial software company.

(Read more...)

The post ION starts bringing customers back online after LockBit ransomware attack appeared first on Malwarebytes Labs.

"

Autosummary: The ION Group leak site post (Source: Malwarebytes) On Friday, February 4, the ransomware group claimed the ransom had been paid, with Reuters quoting the attackers as saying the money was paid by a "very rich unknown philanthropist". Malwarebytes Endpoint Detection and Response offers built-in ransomware protection, 72-hour ransomware rollback, and zero-day ransomware protection. The subsidiary, ION Cleared Derivatives, which offers software for automating the trading cycle and the clearing process for derivatives, released a very short statement regarding the "cybersecurity event" on Tuesday. "


Clop ransomware flaw allowed Linux victims to recover files for months

exploits ransomware
2023-02-07 https://www.bleepingcomputer.com/news/security/clop-ransomware-flaw-allowed-linux-victims-to-recover-files-for-months/
The Clop ransomware gang is now also using a malware variant that explicitly targets Linux servers, but a flaw in the encryption scheme has allowed victims to quietly recover their files for free for months. [...] "

Autosummary: The files and folders it targets include the user"s "/home" directory, which contains all personal files, the "/root" directory, "/opt," and Oracle directories ("/u01" - "/u04") used for storing database files or as mount points for Oracle software. "


LockBit ransomware gang claims Royal Mail cyberattack

exploits ransomware ciber
2023-02-07 https://www.bleepingcomputer.com/news/security/lockbit-ransomware-gang-claims-royal-mail-cyberattack/
The LockBit ransomware operation has claimed the cyberattack on UK"s leading mail delivery service Royal Mail that forced the company to halt its international shipping services due to "severe service disruption." [...] "

Autosummary: Royal Mail entry on LockBit"s data leak site (BleepingComputer) Attack described as a "cyber incident" Royal Mail first detected the attack on January 10 and hired outside forensic experts to help with the investigation. "


Released: Decryptor for Cl0p ransomware’s Linux variant

exploits ransomware
2023-02-07 https://www.helpnetsecurity.com/2023/02/07/cl0p-ransomware-decryptor-linux/

Flawed encryption logic used in Cl0p (Clop) ransomware’s Linux (ELF) variant has allowed SentinelOne researchers to create and release a free decryptor. “The [Cl0p] Windows variant encrypts the generated RC4 key responsible for the file encryption using the asymmetric algorithm RSA and a public key. In the Linux variant, the generated RC4 key is encrypted with a RC4 [hardcoded] ‘master-key’,” the researchers explained. The differences between Windows and Linux variants The Linux Cl0p variant is … More

The post Released: Decryptor for Cl0p ransomware’s Linux variant appeared first on Help Net Security.

"

Autosummary: “While the Linux-flavored variation of Cl0p is, at this time, in its infancy, its development and the almost ubiquitous use of Linux in servers and cloud workloads suggests that defenders should expect to see more Linux-targeted ransomware campaigns going forward.” "


Linux Variant of Clop Ransomware Spotted, But Uses Faulty Encryption Algorithm

exploits ransomware
2023-02-07 https://thehackernews.com/2023/02/linux-variant-of-clop-ransomware.html
The first-ever Linux variant of the Clop ransomware has been detected in the wild, but with a faulty encryption algorithm that has made it possible to reverse engineer the process. "The ELF executable contains a flawed encryption algorithm making it possible to decrypt locked files without paying the ransom," SentinelOne researcher Antonis Terefos said in a report shared with The Hacker News. "

Autosummary: "


VMware Finds No Evidence of 0-Day in Ongoing ESXiArgs Ransomware Spree

exploits ransomware
2023-02-07 https://thehackernews.com/2023/02/vmware-finds-no-evidence-of-0-day-flaw.html
VMware on Monday said it found no evidence that threat actors are leveraging an unknown security flaw, i.e., a zero-day, in its software as part of an ongoing ransomware attack spree worldwide. "Most reports state that End of General Support (EoGS) and/or significantly out-of-date products are being targeted with known vulnerabilities which were previously addressed and disclosed in VMware "

Autosummary: "


Russian man pleads guilty to laundering Ryuk ransomware money

financial exploits ransomware rusia-ucrania
2023-02-07 https://www.bleepingcomputer.com/news/security/russian-man-pleads-guilty-to-laundering-ryuk-ransomware-money/
Russian citizen Denis Mihaqlovic Dubnikov pleaded guilty on Tuesday to laundering money for the notorious Ryuk ransomware group for over three years. [...] "

Autosummary: The conspirators, including Dubnikov, used various financial transactions, including international ones, to hide the origin, location, and identity of those who received the ransom payments. "


Medusa botnet returns as a Mirai-based variant with ransomware sting

exploits ransomware
2023-02-07 https://www.bleepingcomputer.com/news/security/medusa-botnet-returns-as-a-mirai-based-variant-with-ransomware-sting/
A new version of the Medusa DDoS (distributed denial of service) botnet, based on Mirai code, has appeared in the wild, featuring a ransomware module and a Telnet brute-forcer. [...] "

Autosummary: Filetypes targeted by Medusa (Cyble) Valid files are encrypted using AES 256-bit encryption, and the .medusastealer extension is appended to the encrypted files" name The malware"s ransomware function (Cyble) However, the encryption method appears broken, turning the ransomware into a data wiper. "


VMware has no evidence of zero-day exploitation in ESXiArgs ransomware attacks

exploits ransomware
2023-02-07 https://securityaffairs.com/141920/hacking/vmware-zero-day-esxiargs-ransomware.html

VMware said there is no evidence that threat actors are exploiting a zero-day flaw in its software as part of an ongoing ESXiArgs ransomware campaign. VMware said that it found no evidence that the threat actors behind the ongoing ESXiArgs ransomware attacks are leveraging a zero-day vulnerability in VMware ESXi servers. “VMware has not found evidence […]

The post VMware has no evidence of zero-day exploitation in ESXiArgs ransomware attacks appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, VMware) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


New Linux variant of Clop Ransomware uses a flawed encryption algorithm

exploits ransomware
2023-02-07 https://securityaffairs.com/141932/cyber-crime/clop-ransomware-linux-variant.html

A new Linux variant of the Clop ransomware has been observed in the wild, the good news is that its encryption algorithm is flawed. SentinelLabs researchers have observed the first Linux variant of the Clop ransomware. The researchers noticed that the encryption algorithm implemented in the ELF executable is flawed and can allow victims to […]

The post New Linux variant of Clop Ransomware uses a flawed encryption algorithm appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, ransomware) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Nevada Ransomware has released upgraded locker

exploits ransomware
2023-02-06 https://www.helpnetsecurity.com/2023/02/06/nevada-ransomware-upgraded-locker/

Resecurity has identified a new version of Nevada Ransomware which recently emerged on the Dark Web right before the start of 2023. The actors behind this new project have an affiliate platform first introduced on the RAMP underground community, which is known for initial access brokers (IABs) and other cybercriminal actors and ransomware groups. Around February 1, 2023 – the group distributed an updated locker written in Rust for their affiliates supporting Windows, Linux and … More

The post Nevada Ransomware has released upgraded locker appeared first on Help Net Security.

"

Autosummary: Around February 1, 2023 – the group distributed an updated locker written in Rust for their affiliates supporting Windows, Linux and ESXi – this programming language has become a trend for ransomware developers these days (Blackcat, RansomExx2, Hive, Luna, Agenda). "


Italian National Cybersecurity Agency (ACN) warns of massive ransomware campaign targeting VMware ESXi servers

exploits ransomware ciber
2023-02-06 https://securityaffairs.com/141865/cyber-crime/acn-ransomware-campaign-targets-vmware-esxi.html

The Italian National Cybersecurity Agency (ACN) warns of an ongoing massive ransomware campaign targeting VMware ESXi servers. The Italian National Cybersecurity Agency (ACN) warns of an ongoing massive ransomware campaign targeting VMware ESXi servers worldwide, including Italian systems. The attackers are attempting to exploit the CVE-2021–21974 vulnerability. According to the ACN, most of the attacks […]

The post Italian National Cybersecurity Agency (ACN) warns of massive ransomware campaign targeting VMware ESXi servers appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, CVE-2021–21974) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share OnThe vulnerability affects the following systems: ESXi 7.x versions earlier than ESXi70U1c-17325551 ESXi versions 6.7.x earlier than ESXi670-202102401-SG ESXi versions 6.5.x earlier than ESXi650-202102101-SG The virtualization giant addressed the CVE-2021-21974 bug in February 2021. "


Thousands of unpatched VMware ESXi servers hit by ransomware via old bug (CVE-2021-21974)

exploits ransomware
2023-02-06 https://www.helpnetsecurity.com/2023/02/06/vmware-esxi-ransomware-cve-2021-21974/

Late last week, unknown attackers launched a widespread ransomware attack hitting VMware ESXi hypervisors via CVE-2021-21974, an easily exploitable vulnerability that allows them to run exploit code remotely, without prior authentication. Patches for CVE-2021-21974, a vulnerability in ESXi’s OpenSLP service, have been provided by VMware two years ago, and this attack has revealed just how many servers are out there are still unpatched, with the SLP service still running and the OpenSLP port (427) still … More

The post Thousands of unpatched VMware ESXi servers hit by ransomware via old bug (CVE-2021-21974) appeared first on Help Net Security.

"

Autosummary: After some initial speculation about the ransomware the attackers use to encrypt vulnerable servers, it has been confirmed that it’s a new ransomware family that has been dubbed ESXiArgs due to the targeted systems and the extension (.args) added to the encrypted virtual machines files (files with the .vmdk, .vmx, .vmxf, .vmsd, .vmsn, .vswp, .vmss, .nvram, and .vmem extensions). "


Royal Ransomware adds support for encrypting Linux, VMware ESXi systems

exploits ransomware
2023-02-06 https://securityaffairs.com/141876/cyber-crime/royal-ransomware-vmware-esxi.html

Royal Ransomware operators added support for encrypting Linux devices and target VMware ESXi virtual machines. The Royal Ransomware gang is the latest extortion group in order of time to add support for encrypting Linux devices and target VMware ESXi virtual machines. Other ransomware operators already support Linux encrypting, including AvosLocker, Black Basta, BlackMatter, HelloKitty, Hive, […]

The post Royal Ransomware adds support for encrypting Linux, VMware ESXi systems appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, Ransomware) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Italy, France and Singapore Warn of a Spike in ESXI Ransomware

exploits ransomware
2023-02-06 https://securityaffairs.com/141889/cyber-crime/experts-warn-esxi-ransomware-attacks.html

ESXi ransomware targeted thousands of VMware servers in a global-scale campaign, security experts and international CERTs warn. Thousands of computer servers have been targeted by a global ransomware hacking attack targeting VMware (VMW.N) ESXi servers. ESXi is VMware’s hypervisor, a technology that allows organizations to host several virtualized computers running multiple operating systems on a […]

The post Italy, France and Singapore Warn of a Spike in ESXI Ransomware appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, ESXi ransomware) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Two year old vulnerability used in ransomware attack against VMware ESXi

exploits ransomware
2023-02-06 https://www.malwarebytes.com/blog/news/2023/02/two-year-old-vulnerability-used-in-ransomware-attack-against-vmware-esxi

Categories: Exploits and vulnerabilities

Categories: News

Categories: Ransomware

Tags: VMware

Tags: ESXi

Tags: Nevada

Tags: ransomware

Tags: Linux

Tags: CVE-2021-21974

Over the weekend, several CERTs warned about ongoing ransomware attacks against unpatched VMware ESXi virtual machines.

(Read more...)

The post Two year old vulnerability used in ransomware attack against VMware ESXi appeared first on Malwarebytes Labs.

"

Autosummary: The fixed versions are: For ESXi 7.0: ESXi70U1c-17325551 or later For ESXi 6.7: ESXi670-202102401-SG or later For ESXi 6.5: ESXi650-202102101-SG or later For Cloud Foundation (ESXi) 4.x: 4.2 or later For Cloud Foundation (ESXi) 3.x: please refer to VMware KB82705 A recommended workaround if you are not using the OpenSLP service in ESXi is to disable the SLP service on VMware ESXi.The threat actor runs an encryption process which is specifically targeting virtual machines files (“.vmdk”, “.vmx”, “.vmxf”, “.vmsd”, “.vmsn”, “.vswp”, “.vmss”, “.nvram”,”*.vmem”). "


Linux version of Royal Ransomware targets VMware ESXi servers

exploits ransomware
2023-02-05 https://www.bleepingcomputer.com/news/security/linux-version-of-royal-ransomware-targets-vmware-esxi-servers/
Royal Ransomware is the latest ransomware operation to add support for encrypting Linux devices to its most recent malware variants, specifically targeting VMware ESXi virtual machines. [...] "

Autosummary: BleepingComputer has been reporting on similar Linux ransomware encryptors released by multiple other gangs, including Black Basta, LockBit, BlackMatter, AvosLocker, REvil, HelloKitty, RansomEXX, and Hive. "


The Week in Ransomware - February 3rd 2023 - Ending with a mess

exploits ransomware
2023-02-04 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-february-3rd-2023-ending-with-a-mess/
While the week started slowly, it turned into a big ransomware mess, with attacks striking a big blow at businesses running VMware ESXi servers. [...] "

Autosummary: Finally, we learned more about ransomware attacks conducted this week and in the past, including: Contributors and those who provided new ransomware information and stories this week include @PolarToffee, @serghei, @fwosar, @BleepinComputer, @LawrenceAbrams, @Seifreed, @Ionut_Ilascu, @malwrhunterteam, @struppigel, @demonslay335, @billtoulas, @vxunderground, @GeeksCyber, @PRODAFT, @brkalbyrk7, @RESecurity, @MsftSecIntel, @1ZRR4H, @pcrisk, @BrettCallow, @ahnlab, @jgreigj, and @k7computing. February 2nd 2023 The LockBit ransomware gang has claimed responsibility for the cyberattack on ION Group, a UK-based software company whose products are used by financial institutions, banks, and corporations for trading, investment management, and market analytics. "


New Wave of Ransomware Attacks Exploiting VMware Bug to Target ESXi Servers

exploits ransomware
2023-02-04 https://thehackernews.com/2023/02/new-wave-of-ransomware-attacks.html
VMware ESXi hypervisors are the target of a new wave of attacks designed to deploy ransomware on compromised systems. "These attack campaigns appear to exploit CVE-2021-21974, for which a patch has been available since February 23, 2021," the Computer Emergency Response Team (CERT) of France said in an advisory on Friday. VMware, in its own alert released at the time, described the issue as an "

Autosummary: "


CERT-FR warns of a new wave of ransomware attacks targeting VMware ESXi servers

exploits ransomware
2023-02-04 https://securityaffairs.com/141804/cyber-crime/vmware-esxi-ransomware.html

A new wave of ransomware attacks is targeting VMware ESXi servers to deliver ransomware, CERT of France warns. The French Computer Emergency Response Team (CERT-FR) warns that threat actors are targeting VMware ESXi servers to deploy ransomware. CERT-FR reported that threat actors behind these ransomware attackers are actively exploiting the vulnerability CVE-2021-21974. “OpenSLP as used […]

The post CERT-FR warns of a new wave of ransomware attacks targeting VMware ESXi servers appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, VMware ESXi servers) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide

exploits ransomware
2023-02-03 https://www.bleepingcomputer.com/news/security/massive-esxiargs-ransomware-attack-targets-vmware-esxi-servers-worldwide/
Admins, hosting providers, and the French Computer Emergency Response Team (CERT-FR) warn that attackers actively target VMware ESXi servers unpatched against a two-year-old remote code execution vulnerability to deploy ransomware. [...] "

Autosummary: Compromised ESXi servers worldwide (Shodan) New ESXiArgs ransomware However, from the ransom notes seen in this attack, they do not appear to be related to the Nevada Ransomware, and appear to be from a new ransomware family. "


The rise of multi-threat ransomware

exploits ransomware
2023-02-03 https://www.malwarebytes.com/blog/news/2023/02/the-rise-of-multi-threat-ransomware

Categories: News

Tags: ransomware

Tags: malwarebytes

Tags: youtube

Tags: video

Tags: multi-threat

Tags: single threat

Tags: double threat

Tags: triple threat

Tags: encrypt

Tags: extortion

Take a look at our ten minute video walkthrough of ransomware issues and concerns.

(Read more...)

The post The rise of multi-threat ransomware appeared first on Malwarebytes Labs.

"

Autosummary: "


Nevada Ransomware Has Released Upgraded Locker

exploits ransomware
2023-02-01 https://securityaffairs.com/141668/cyber-crime/nevada-ransomware-upgraded-locker.html

Researchers from Resecurity have identified a new version of Nevada Ransomware which recently emerged on the Dark Web right before the start of 2023. Resecurity, California-based cybersecurity company protecting Fortune 500 globally, has identified a new version of Nevada Ransomware which recently emerged on the Dark Web right before the start of 2023. The actors […]

The post <strong>Nevada Ransomware Has Released Upgraded Locker</strong> appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, Nevada Ransomware) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


New LockBit Green ransomware variant borrows code from Conti ransomware

exploits ransomware
2023-02-01 https://securityaffairs.com/141666/cyber-crime/lockbit-green-ransomware-variant.html

Lockbit ransomware operators have released a new version of their malware, LockBit Green, that also targets cloud-based services. Lockbit ransomware operators have implemented a new version of their malware, dubbed LockBit Green, which was designed to include cloud-based services among its targets. This is the third version of the ransomware developed by the notorious gang, […]

The post New LockBit Green ransomware variant borrows code from Conti ransomware appeared first on Security Affairs.

"

Autosummary: The hashes and YARA rule can be found here: 👉https://t.co/0A9waHAwZj#lockbit #ransomware — PRODAFT (@PRODAFT) January 30, 2023 Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, LockBit green) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Arnold Clark customer data stolen in attack claimed by Play ransomware

exploits ransomware
2023-02-01 https://www.bleepingcomputer.com/news/security/arnold-clark-customer-data-stolen-in-attack-claimed-by-play-ransomware/
Arnold Clark, self-described as Europe"s largest independent car retailer, is notifying some customers that their personal information has been stolen in a December 23 cyberattack claimed by the Play ransomware group. [...] "

Autosummary: "


LockBit ransomware goes "Green," uses new Conti-based encryptor

exploits ransomware
2023-02-01 https://www.bleepingcomputer.com/news/security/lockbit-ransomware-goes-green-uses-new-conti-based-encryptor/
The LockBit ransomware gang has again started using encryptors based on other operations, this time switching to one based on the leaked source code for the Conti ransomware. [...] "

Autosummary: This week, cybersecurity collective VX-Underground first reported that the ransomware gang is now using a new encryptor named "LockBit Green," based on the leaked source code of the now-disbanded Conti gang. "


New Nevada Ransomware targets Windows and VMware ESXi systems

exploits ransomware
2023-02-01 https://www.bleepingcomputer.com/news/security/new-nevada-ransomware-targets-windows-and-vmware-esxi-systems/
A relatively new ransomware operation known as Nevada seems to grow its capabilities quickly as security researchers noticed improved functionality for the locker targeting Windows and VMware ESXi systems. [...] "

Autosummary: Targeting Windows hosts The Nevada ransomware variant that focuses on Windows machines is executed via console and supports a set of flags that give its operators some control over the encryption: -file > encrypt selected file -dir > encrypt selected directory -sd > self delete after everything done -sc > delete shadow copies -lhd > load hidden drives -nd > find and encrypt network shares -sm > safe mode encryption One interesting characteristic of Nevada ransomware is the set of system locales it spares from the encryption process. "


Microsoft: Over 100 threat actors deploy ransomware in attacks

exploits ransomware
2023-01-31 https://www.bleepingcomputer.com/news/security/microsoft-over-100-threat-actors-deploy-ransomware-in-attacks/
Microsoft revealed today that its security teams are tracking more than 100 threat actors deploying ransomware during attacks. [...] "

Autosummary: "Some of the most prominent ransomware payloads in recent campaigns include Lockbit Black, BlackCat (aka ALPHV), Play, Vice Society, Black Basta, & Royal," Microsoft said. "


UNC2565 threat actors continue to improve the GOOTLOADER malware

exploits ransomware
2023-01-30 https://securityaffairs.com/141539/malware/gootloader-malware-evolution.html

The threat actors behind the GOOTLOADER malware continues to improve their code by adding new components and implementing new obfuscation techniques. Mandiant researchers reported that the UNC2565 group behind the GOOTLOADER malware (aka Gootkit) continues to improve their code by adding new components and implementing new obfuscation techniques. Gootkit runs on an access-a-as-a-service model, it is used […]

The post UNC2565 threat actors continue to improve the GOOTLOADER malware appeared first on Security Affairs.

"

Autosummary: “This new variant has been observed trojanizing several legitimate JavaScript libraries, including jQuery, Chroma.js, and Underscore.js” Upon successful execution of the GOOTLOADER file, additional payloads are downloaded, including FONELAUNCH and Cobalt Strike BEACON or SNOWCONE that will be stored in the registry.Payload (See Infection Chain) GOOTLOADER GOOTLOADER GOOTLOADER.POWERSHELL “Beginning in November 2022, Managed Defense observed a new obfuscation variant, tracked as variant 3, with modified infection that is more complex than the previous variants. Mandiant researchers observed the UNC2565 group adopting three obfuscation techniques, such as hiding the code within altered versions of legitimate JavaScript libraries such as jQuery, Chroma.js, and Underscore.js, in an attempt to evade detection. "


Gootkit Malware Continues to Evolve with New Components and Obfuscations

exploits ransomware
2023-01-29 https://thehackernews.com/2023/01/gootkit-malware-continues-to-evolve.html
The threat actors associated with the Gootkit malware have made "notable changes" to their toolset, adding new components and obfuscations to their infection chains. Google-owned Mandiant is monitoring the activity cluster under the moniker UNC2565, noting that the usage of the malware is "exclusive to this group." Gootkit, also called Gootloader, is spread through compromised websites that "

Autosummary: "


The Week in Ransomware - January 27th 2023 - "We hacked the hackers"

exploits ransomware
2023-01-28 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-january-27th-2023-we-hacked-the-hackers/
For the most part, this week has been relatively quiet regarding ransomware attacks and researcher — that is, until the FBI announced the disruption of the Hive ransomware operation. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @PolarToffee, @demonslay335, @LawrenceAbrams, @malwrhunterteam, @BleepinComputer, @Ionut_Ilascu, @Seifreed, @serghei, @struppigel, @billtoulas, @fwosar, @TrendMicro, @pcrisk, @1ZRR4H, @wdormann, and @ffforward. "


Hive! Hive! Hive! Ransomware site submerged by FBI

exploits ransomware
2023-01-28 https://www.malwarebytes.com/blog/news/2023/01/hive-ransomware-infrastructure-taken-down

Categories: News

Categories: Ransomware

Tags: DoJ

Tags: FBI

Tags: Europol

Tags: HIve

Tags: ransomware

Tags: RDP

Tags: Patch management

Tags: Vulnerability

Tags: phishing

The DoJ, FBI, and Europol have released details about a months-long international disruption campaign against the Hive ransomware group

(Read more...)

The post Hive! Hive! Hive! Ransomware site submerged by FBI appeared first on Malwarebytes Labs.

"

Autosummary: Known attacks by ransomware gangs, based on data leaked since April 2022 In August 2021, the FBI published a warning about Hive ransomware, sharing tactics, techniques, and procedures (TTPs), indicators of compromise (IOCs), and mitigation advice. "


Copycat Criminals mimicking Lockbit gang in northern Europe

ransomware
2023-01-28 https://securityaffairs.com/141491/cyber-crime/crooks-mimicking-lockbit-gang.html

Recent reports of Lockbit locker-based attacks against North European SMBs indicate that local crooks started using Lockbit locker variants. Executive Summary Incident Insights Recently, there has been a significant increase in ransomware attacks targeting companies in northern Europe. These attacks are being carried out using the LockBit locker, which is known to be in use […]

The post Copycat Criminals mimicking Lockbit gang in northern Europe appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, Lockbit) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Open source skills continue to be in high demand

ransomware
2023-01-27 https://www.helpnetsecurity.com/2023/01/27/open-source-skills/

80% of organizations increased their use of open source software over the last 12 months, according to Perforce Software and the Open Source Initiative. Four out of five companies rely on OSS for a wide range of business-critical applications including data and database management, containers and container orchestration, and DevOps and SDLC tooling. The report reveals, however, that some obstacles persist. In every technology category surveyed, organizations repeatedly cited lack of personnel with expertise as … More

The post Open source skills continue to be in high demand appeared first on Help Net Security.

"

Autosummary: “Clearly, more technical support is needed for open source technologies, as personnel experience and proficiency is highly ranked again this year as a support concern across organizations regardless of size,” said Javier Perez, Chief OSS Evangelist at Perforce Software. "


BlackCat Ransomware gang stole secret military data from an industrial explosives manufacturer

exploits ransomware industry
2023-01-27 https://securityaffairs.com/141409/data-breach/blackcat-ransomware-solar-industries-india.html

The BlackCat Ransomware group claims to have hacked SOLAR INDUSTRIES INDIA and to have stolen 2TB of “secret military data.” The BlackCat Ransomware gang added SOLAR INDUSTRIES INDIA to the list of victims published on its Tor leak site. The company is a globally recognised industrial explosives manufacturer, it provides complete blasting solutions, including packaged, […]

The post BlackCat Ransomware gang stole secret military data from an industrial explosives manufacturer appeared first on Security Affairs.

"

Autosummary: "


Smashing Security podcast #306: No Fly lists, cell phones, and the end of ransomware riches?

exploits ransomware
2023-01-26 https://grahamcluley.com/smashing-security-podcast-306/
What are prisoners getting up to with mobile phones? Why might ransomware no longer be generating as much revenue for cybercriminals? And how on earth did an airline leave the US government"s "No Fly" list accessible for anyone in the world to download? All this and much more is discussed in the latest edition of the award-winning "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Maria Varmazis. "

Autosummary: Hosts: Graham Cluley – @gcluley Carole Theriault – @caroletheriault Guest: Maria Varmazis – @mvarmazis Episode links: Sponsored by: Bitwarden – Bitwarden vaults are end-to-end encrypted with zero-knowledge encryption, including, the URLs for the websites you have accounts for. "


Hive ransomware disrupted after FBI hacks gang"s systems

exploits ransomware
2023-01-26 https://www.bleepingcomputer.com/news/security/hive-ransomware-disrupted-after-fbi-hacks-gangs-systems/
Today, the Hive ransomware Tor payment and data leak sites were seized as part of an international law enforcement operation involving the US Department of Justice, FBI, Secret Service, Europol, and Germany"s BKA and Polizei. [...] "

Autosummary: The ransomware gang"s Tor web sites now display a seizure notice listing a a wide range of other countries involved in the law enforcement operation, including Germany, Canda, France, Lithuania, Netherlands, Norway, Portugal, Romania, Spain, Sweden, and the United Kingdom. "


Hive ransomware leak site and decryption keys seized in police sting

exploits ransomware
2023-01-26 https://grahamcluley.com/hive-ransomware-leak-site-seized-in-police-sting/
Websites used by the Hive ransomware-as-a-service gang to extort ransoms and leak data stolen from corporate victims have been seized in a joint operation involving police around the world. "

Autosummary: "


Authorities shut down HIVE ransomware infrastructure, provide decryption tools

exploits ransomware
2023-01-26 https://www.helpnetsecurity.com/2023/01/26/hive-ransomware-shut-down/

Europol supported the German, Dutch and US authorities in taking down the infrastructure of the prolific HIVE ransomware. This international operation involved authorities from 13 countries in total. Law enforcement identified the decryption keys and shared them with many victims, helping them regain access to their data without paying the cybercriminals. In the last year, HIVE ransomware has been identified as a major threat as it has been used to compromise and encrypt the data … More

The post Authorities shut down HIVE ransomware infrastructure, provide decryption tools appeared first on Help Net Security.

"

Autosummary: Since June 2021, criminals have used HIVE ransomware to target many businesses and critical infrastructure sectors, including government facilities, telecommunication companies, manufacturing, information technology, and healthcare and public health.Europol also provided analytical support linking available data to various criminal cases within and outside the EU, and supported the investigation through cryptocurrency, malware, decryption and forensic analysis. "


Hive Ransomware Infrastructure Seized in Joint International Law Enforcement Effort

exploits ransomware
2023-01-26 https://thehackernews.com/2023/01/hive-ransomware-infrastructure-seized.html
The infrastructure associated with the Hive ransomware-as-a-service (RaaS) operation has been seized as part of a coordinated law enforcement effort involving 13 countries. "Law enforcement identified the decryption keys and shared them with many of the victims, helping them regain access to their data without paying the cybercriminals," Europol said in a statement. The U.S. Department of "

Autosummary: "


Hive Ransomware Tor leak site apparently seized by law enforcement

exploits ransomware
2023-01-26 https://securityaffairs.com/141374/cyber-crime/hive-ransomware-leak-site-seized.html

The leak site of the Hive ransomware gang was seized due to an international operation conducted by law enforcement in ten countries. The Tor leak site used by Hive ransomware operators has been seized as part of an international operation conducted by law enforcement in 10 countries. “The Federal Bureau of Investigation seized this site […]

The post Hive Ransomware Tor leak site apparently seized by law enforcement appeared first on Security Affairs.

"

Autosummary: [adrotate banner=”12″] Pierluigi Paganini (SecurityAffairs – hacking, ransomware) [adrotate banner=”5″] [adrotate banner=”13″] Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


US offers $10M bounty for Hive ransomware links to foreign governments

exploits government ransomware
2023-01-26 https://www.bleepingcomputer.com/news/security/us-offers-10m-bounty-for-hive-ransomware-links-to-foreign-governments/
The U.S. Department of State today offered up to $10 million for information that could help link the Hive ransomware group (or other threat actors) with foreign governments. [...] "

Autosummary: "For information on the identification or location of any person who, while acting at the direction of a foreign government, participates in malicious cyber activities against U.S. critical infrastructure in violation of the Computer Fraud and Abuse Act." "Send us your information on Signal, Telegram, WatshApp, or via our Tor-based tip line. "


New Mimic ransomware abuses ‘Everything’ Windows search tool

exploits ransomware
2023-01-26 https://www.bleepingcomputer.com/news/security/new-mimic-ransomware-abuses-everything-windows-search-tool/
A new ransomware family named "Mimic" has been spotted in the wild abusing the APIs of a legitimate Windows file search tool called "Everything" to achieve file enumeration. [...] "

Autosummary: "


5 facts about Vice Society, the ransomware group wreaking havoc on the education sector

exploits ransomware
2023-01-26 https://www.malwarebytes.com/blog/business/2023/01/5-facts-about-vice-society-the-ransomware-group-wreaking-havoc-on-k-12-schools

Categories: Business

In this article, we’ll arm you with five facts about Vice Society so you can get the upper-hand against this persistent education sector threat.

(Read more...)

The post 5 facts about Vice Society, the ransomware group wreaking havoc on the education sector appeared first on Malwarebytes Labs.

"

Autosummary: In 2022 they were far and away the biggest attackers on the education sector If you’re a regular reader of our monthly ransomware review, you know that the education sector has gotten plenty of attention from ransomware gangs in the last year, to say the least. We don’t want to say launching ransomware on K-12 schools, colleges, and universities is as easy as taking candy from a baby, but unfortunately that’s how many RaaS gangs see it. A few of the institutions published on their leak site last year include De Montfort School, Cincinnati State, and one that made national headlines in September: Los Angeles Unified, the second largest school district in the US. "


US hacks back against Hive ransomware crew

exploits ransomware
2023-01-26 https://www.bbc.co.uk/news/technology-64418723?at_medium=RSS&at_campaign=KARANGA
The US Department of Justice says its operation against the cyber gang was a 21st Century stakeout. "

Autosummary: "


Peru protests: Historic building in Lima catches fire as protests continue

latam ransomware
2023-01-21 https://www.bbc.co.uk/news/world-latin-america-64356109?at_medium=RSS&at_campaign=KARANGA
Authorities are yet to report how the building, in Lima"s Plaza San Martín, caught fire. "

Autosummary: "


LAUSD says Vice Society ransomware gang stole contractors’ SSNs

exploits ransomware
2023-01-20 https://www.bleepingcomputer.com/news/security/lausd-says-vice-society-ransomware-gang-stole-contractors-ssns/
Los Angeles Unified School District (LAUSD), the second-largest school district in the United States, says the Vice Society ransomware gang has stolen files containing contractors" personal information, including Social Security Numbers (SSNs). [...] "

Autosummary: "Through our ongoing investigation, we determined that between July 31, 2022, and September 3, 2022, an unauthorized actor accessed and acquired certain files maintained on our servers," the school district said in data breach notification letters sent to affected individuals. "


The Week in Ransomware - January 20th 2023 - Targeting Crypto Exchanges

exploits ransomware
2023-01-20 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-january-20th-2023-targeting-crypto-exchanges/
There has been quite a bit of ransomware news this week, with crypto exchanges being seized for alleged money laundering and researchers providing fascinating reports on the behavior of ransomware operators. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @LawrenceAbrams, @demonslay335, @malwrhunterteam, @Seifreed, @billtoulas, @PolarToffee, @struppigel, @serghei, @fwosar, @BleepinComputer, @Ionut_Ilascu, @chainalysis, @coveware, @BrettCallow, @jgreigj, @pcrisk, @Avast, and @Jon__DiMaggio.Brands, the fast food brand operator of KFC, Pizza Hut, Taco Bell, and The Habit Burger Grill fast-food restaurant chains, has been targeted by a ransomware attack that forced the closure of 300 locations in the United Kingdom. "


LockBit ransomware – what you need to know

exploits ransomware
2023-01-19 https://www.tripwire.com/state-of-security/lockbit-ransomware-what-you-need-know
It is the world"s most active ransomware group - responsible for an estimated 40% of all ransomware infections worldwide. Find out what you need to know about LockBit in my article on the Tripwire State of Security blog. "

Autosummary: LockBit is a ransomware-as-a-service (RaaS) operation, meaning that other criminals pay to become an affiliate, launching attacks and sharing a percentage of their earnings with the original LockBit gang.I guess if they are hitting so many companies, these LockBit guys must be making a lot of money When the US authorities charged a man in connection with the LockBit ransomware in November 2022, they claimed that it had been deployed against at least 1,000 victims in the United States and around the world, making at least $100 million worth of ransom demands. use hard-to-crack, unique passwords to protect sensitive data and accounts, and enable multi-factor authentication. "


Bitzlato crypto exchange seized for ransomware, drugs money laundering

financial exploits ransomware
2023-01-18 https://www.bleepingcomputer.com/news/security/bitzlato-crypto-exchange-seized-for-ransomware-drugs-money-laundering/
The U.S. Department of Justice arrested and charged Russian national Anatoly Legkodymov, the founder of the Hong Kong-registered cryptocurrency exchange Bitzlato, with helping cybercriminals allegedly launder illegally obtained money. [...] "

Autosummary: Chainalysis added that, according to its estimations, the crypto exchange "received $206 million from darknet markets, $224.5 million from scams, and $9 million from ransomware attackers. "


1,000 ships impacted by a ransomware attack on maritime software supplier DNV

exploits ransomware
2023-01-17 https://securityaffairs.com/140941/cyber-crime/ransomware-attack-maritime-firm-dnv.html

A ransomware attack against the maritime software supplier DNV impacted approximately 1,000 vessels. About 1,000 vessels have been impacted by a ransomware attack against DNV, one of the major maritime software suppliers.  DNV GL provides solutions and services throughout the life cycle of any vessel, from design and engineering to risk assessment and ship management. […]

The post 1,000 ships impacted by a ransomware attack on maritime software supplier DNV appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, maritime) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Avast releases free BianLian ransomware decryptor

exploits ransomware
2023-01-16 https://www.bleepingcomputer.com/news/security/avast-releases-free-bianlian-ransomware-decryptor/
Security software company Avast has released a free decryptor for the BianLian ransomware strain to help victims of the malware recover locked files without paying the hackers. [...] "

Autosummary: Avast says some common filenames and locations for BianLian are: C:\Windows\TEMP\mativ.exe C:\Windows\Temp\Areg.exe C:\Users\%username%\Pictures\windows.exe anabolic.exe However, because the malware deletes itself after the file encryption phase, it is unlikely that victims will find those binaries on their systems. "


Avast researchers released a free BianLian ransomware decryptor for some variants of the malware

exploits ransomware
2023-01-16 https://securityaffairs.com/140892/malware/free-bianlian-ransomware-decryptor.html

Antivirus firm Avast released a free decryptor for the BianLian ransomware family that allows victims to recover locked files. Security firm Avast has released a free decryptor for the BianLian ransomware to allow victims of the malware to recover locked files. The BianLian ransomware emerged in August 2022, the malware was employed in attacks against organizations in […]

The post Avast researchers released a free BianLian ransomware decryptor for some variants of the malware appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, ransomware) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Vice Society ransomware leaks University of Duisburg-Essen’s data

exploits ransomware
2023-01-16 https://www.bleepingcomputer.com/news/security/vice-society-ransomware-leaks-university-of-duisburg-essen-s-data/
The Vice Society ransomware gang has claimed responsibility for the November 2022 cyberattack that forced the University of Duisburg-Essen (UDE) to reconstruct its IT infrastructure, a process that"s still ongoing. [...] "

Autosummary: Rebuilding UDE"s IT infrastructure The cyberattack was disclosed by UDE on November 28th, 2022, forcing the university to shut down all email, communications, and IT systems until further notice. "


Multiple schools hit by Vice Society ransomware attack

exploits ransomware
2023-01-15 https://www.malwarebytes.com/blog/news/2023/01/multiple-schools-in-uk-hit-by-vice-society-ransomware-attack

Categories: News

Tags: ransomware

Tags: high society

Tags: compromise

Tags: school

Tags: schools

Tags: learning

Tags: documents

Tags: data

Tags: leak

We take a look at reports of 14 schools being compromised by ransomware group Vice Society.

(Read more...)

The post Multiple schools hit by Vice Society ransomware attack appeared first on Malwarebytes Labs.

"

Autosummary: According to the BBC, the data includes: Passport scans of both pupils and parents which date back to 2011 Contractual offers made to members of staff Headmaster’s pay and student bursary fund recipients Special Educational Needs (SEN) data Other, unnamed confidential documents were seen which belong to a variety of other schools from across all parts of the UK.Impacts from these attacks have ranged from restricted access to networks and data, delayed exams, canceled school days, and unauthorized access to and theft of personal information regarding students and staff…School districts with limited cybersecurity capabilities and constrained resources are often the most vulnerable; however, the opportunistic targeting often seen with cyber criminals can still put school districts with robust cybersecurity programs at risk. Over the past several years, the education sector, especially kindergarten through twelfth grade (K-12) institutions, have been a frequent target of ransomware attacks. "


The Week in Ransomware - January 13th 2023 - LockBit in the spotlight

exploits ransomware
2023-01-14 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-january-13th-2023-lockbit-in-the-spotlight/
The LockBit ransomware operation has again taken center stage in the ransomware news, as we learned yesterday they were behind the attack on Royal Mail. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @DanielGallagher, @PolarToffee, @Seifreed, @billtoulas, @malwareforme, @struppigel, @demonslay335, @Ionut_Ilascu, @FourOctets, @malwrhunterteam, @BleepinComputer, @LawrenceAbrams, @fwosar, @serghei, @pcrisk, @MsftSecIntel, @BrettCallow, @UK_Daniel_Card, @SRMInform, @TGesches, @rapid7, @uuallan, @AShukuhi, and @BushidoToken. "


LockBit ransomware operation behind the Royal Mail cyberattack

exploits ransomware ciber
2023-01-13 https://securityaffairs.com/140735/malware/lockbit-ransomware-royal-mail-attack.html

The cyberattack on Royal Mail, Britain’s postal service, is a ransomware attack that was linked to the LockBit ransomware operation. Royal Mail, the British multinational postal service and courier company, this week announced that a “cyber incident” has a severe impact on its operation. The incident only impacted Royal Mail’s international export services, the company said it is temporarily […]

The post LockBit ransomware operation behind the Royal Mail cyberattack appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, Royal Mail) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Free decryptor for victims of MegaCortex ransomware released

exploits ransomware
2023-01-12 https://grahamcluley.com/free-decryptor-for-victims-of-megacortex-ransomware-released/
The experts at security firm Bitdefender have released a universal decryptor for victims of the MegaCortex family of ransomware, which is estimated to have caused more than 1800 infections - mostly of businesses. "

Autosummary: "


Vice Society ransomware claims attack on Australian firefighting service

exploits ransomware
2023-01-12 https://www.bleepingcomputer.com/news/security/vice-society-ransomware-claims-attack-on-australian-firefighting-service/
Australia"s Fire Rescue Victoria has disclosed a data breach caused by a December cyberattack that is now claimed by the Vice Society ransomware gang. [...] "

Autosummary: Bank account details (BSB, account name, and number) Superannuation details Government-issued identity information Driver"s license details Passport details Tax File numbers Birth, death, and marriage certificates In addition to the above, because the hackers accessed the agency"s email system, which remains offline, they may also have accessed or stolen sensitive email communications. "


Microsoft: Cuba ransomware hacking Exchange servers via OWASSRF flaw

exploits ransomware
2023-01-12 https://www.bleepingcomputer.com/news/security/microsoft-cuba-ransomware-hacking-exchange-servers-via-owassrf-flaw/
Microsoft says Cuba ransomware threat actors are hacking their way into victims" networks via Microsoft Exchange servers unpatched against a critical server-side request forgery (SSRF) vulnerability also exploited in Play ransomware attacks. [...] "

Autosummary: While not as prolific as Cuba ransomware and although first spotted a lot more recently, in June 2022, Play ransomware has been quite active and has already hit dozens of victims worldwide, including Rackspace, the German H-Hotels hotel chain, the Belgium city of Antwerp, and Argentina"s Judiciary of Córdoba. "


Royal Mail cyberattack linked to LockBit ransomware operation

exploits ransomware ciber
2023-01-12 https://www.bleepingcomputer.com/news/security/royal-mail-cyberattack-linked-to-lockbit-ransomware-operation/
A cyberattack on Royal Mail, UK"s largest mail delivery service, has been linked to the LockBit ransomware operation. [...] "

Autosummary: LockBit 3.0 ransom note printed during Royal Mail cyberattack Source: Daniel Card on Twitter The ransom note states it was created by "LockBit Black Ransomware," which is the operation"s latest encryptor name as it includes code and features from the now-shut down BlackMatter ransomware gang. "


Maternal & Family Health Services discloses ransomware attack months after discovery

exploits ransomware
2023-01-11 https://www.malwarebytes.com/blog/news/2023/01/maternal-family-health-services-discloses-ransomware-attack-months-after-discovery

Categories: News

Categories: Ransomware

Tags: Maternal & Family Health Services

Tags: MFHS

Tags:

A US health and human services organization recently revealed it was a victim of a ransomware attack that likely happened between August 2021 and April 2022.

(Read more...)

The post Maternal & Family Health Services discloses ransomware attack months after discovery appeared first on Malwarebytes Labs.

"

Autosummary: That data includes names, addresses, dates of birth, Social Security numbers (SSNs), driver’s license numbers, financial account or payment card information, site credentials, medical information, and health insurance information. "


CISA orders agencies to patch Exchange bug abused by ransomware gang

exploits ransomware
2023-01-10 https://www.bleepingcomputer.com/news/security/cisa-orders-agencies-to-patch-exchange-bug-abused-by-ransomware-gang/
The Cybersecurity and Infrastructure Security Agency (CISA) has added two more security vulnerabilities to its catalog of exploited bugs today. [...] "

Autosummary: "


Lorenz ransomware gang plants backdoors to use months later

exploits ransomware
2023-01-10 https://www.bleepingcomputer.com/news/security/lorenz-ransomware-gang-plants-backdoors-to-use-months-later/
Security researchers are warning that patching critical vulnerabilities allowing access to the network is insufficient to defend against ransomware attacks. [...] "

Autosummary: Backdoor planted before security update During an incident response engagement to a Lorenz ransomware attack, researchers at global intelligence and cyber security consulting company S-RM determined that the hackers had breached the victim network five months before starting to move laterally, steal data, and encrypt systems. "


Rackspace ransomware attack was executed by using previously unknown security exploit

exploits ransomware
2023-01-09 https://www.helpnetsecurity.com/2023/01/09/rackspace-ransomware-attack-was-executed-via-previously-unknown-security-exploit/

The MS Exchange exploit chain recently revealed by Crowdstrike researchers is how the Play ransomware gang breached the Rackspace Hosted Exchange email environment, the company confirmed last week. The exploit chains CVE-2022-41082, a RCE flaw, and CVE-2022-41080, a privilege escalation vulnerability, to achieve unrestricted remote access to vulnerable MS Exchange setups. “We will be sharing more detailed information with our customers and peers in the security community so that, collectively, we can all better defend … More

The post Rackspace ransomware attack was executed by using previously unknown security exploit appeared first on Help Net Security.

"

Autosummary: Finally, Crowdstrike’s forensic investigation confirmed that the attackers accessed Personal Storage Tables (PSTs) of 27 Hosted Exchange customers, but that there is “no evidence that the threat actor actually viewed, obtained, misused, or disseminated emails or data in the PSTs for any of the 27 Hosted Exchange customers in any way.” "


inSicurezzaDigitale launches the Dashboard Ransomware Monitor

exploits ransomware
2023-01-09 https://securityaffairs.com/140544/malware/dashboard-ransomware-monitor.html

The cybersecurity blog inSicurezzaDigitale has launched the Italian Dashboard Ransomware Monitor to analyze the principal RaaSs’ activities. Here it comes, inSicurezzaDigitale announced the Dashboard Ransomware Monitor, it is the second project after the recent presentation of the project Mastodon. The Dashboard is very easy to use and it is available via this link: ransom.insicurezzadigitale.com The […]

The post inSicurezzaDigitale launches the Dashboard Ransomware Monitor appeared first on Security Affairs.

"

Autosummary: "


The Week in Ransomware - January 6th 2023 - Targeting Healthcare

exploits ransomware
2023-01-07 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-january-6th-2023-targeting-healthcare/
This week saw a lot of ransomware news, ranging from new extortion tactics, to a ransomware gang giving away a free decryptor after attacking a children"s hospital. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @LawrenceAbrams, @serghei, @PolarToffee, @billtoulas, @Ionut_Ilascu, @Seifreed, @fwosar, @struppigel, @demonslay335, @malwrhunterteam, @BleepinComputer, @Fortinet, @emsisoft, @BrettCallow, @Bitdefender, @AlvieriD, and @pcrisk. Overall, it was a pretty bad year for organizations, with Emsisoft reporting that 200 government, education, and healthcare entities were targeted by ransomware in 2022. "


Hive Ransomware gang leaked 550 GB stolen from Consulate Health Care

exploits ransomware
2023-01-07 https://securityaffairs.com/140452/cyber-crime/consulate-health-care-hive-ransomware.html

The Hive ransomware gang just leaked 550 GB of data stolen from the Consulate Health Care, including customer and employee PII data. Consulate Health Care is a leading provider of senior healthcare services, specializing in post-acute care. The Hive ransomware gang this week added the company to its Tor leak site, threatening to publish the stolen […]

The post Hive Ransomware gang leaked 550 GB stolen from Consulate Health Care appeared first on Security Affairs.

"

Autosummary: The gang initially leaked samples of the stolen data as proof of the attack, it claimed to have stolen contracts, NDA and other agreements documents, company private info (budgets, plans, evaluations, revenue cycle, investors relations, company structure, etc.), employees info (social security numbers, emails, addresses, phone numbers, photos, insurances info, payments, etc.), and customers info (medical records, credit cards, emails, social security numbers, phone numbers, insurances, etc.). "


Rackspace Confirms Play Ransomware Gang Responsible for Recent Breach

exploits ransomware
2023-01-06 https://thehackernews.com/2023/01/rackspace-confirms-play-ransomware-gang.html
Cloud services provider Rackspace on Thursday confirmed that the ransomware gang known as Play was responsible for last month"s breach. The security incident, which took place on December 2, 2022, leveraged a previously unknown security exploit to gain initial access to the Rackspace Hosted Exchange email environment. "This zero-day exploit is associated with CVE-2022-41080," the Texas-based "

Autosummary: "


Bitdefender released a free decryptor for the MegaCortex ransomware

exploits ransomware
2023-01-06 https://securityaffairs.com/140397/malware/megacortex-ransomware-decryptor.html

Antivirus firm Bitdefender released a decryptor for the MegaCortex ransomware allowing its victims to restore their data for free. Antivirus firm Bitdefender released a decryptor for the MegaCortex ransomware, which can allow victims of the group to restore their data for free. The MegaCortex ransomware first appeared on the threat landscape in May 2019 when […]

The post Bitdefender released a free decryptor for the MegaCortex ransomware appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, ransomware) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Microsoft doc details the dos and don’ts of Mac ransomware

exploits ransomware
2023-01-06 https://www.computerworld.com/article/3684849/microsoft-doc-details-the-dos-and-donts-of-mac-ransomware.html#tk.rss_security

As enterprise adoption of the Apple platform accelerates, it’s important to note that Macs can and sometimes do get hit by ransomware. So it’s good to stay tuned to security concerns on a platform and application level — and take precautions.

Knowledge is power

With this in mind, extensive insights into Mac ransomware recently published by Microsoft can help explain these threats. The impact of such attack can be huge – ransomware already costs victims hundreds of billions each year, and no one is immune. 

To read this article in full, please click here

"

Autosummary: Security, security, security We can anticipate a great deal of activity around security on Apple’s Mac and mobile platforms this year. It also helps guide security first response if an attack does take place; in the case of some sophisticated attacks, it’s not enough to identify just one invasion vector, as once inside the systems, some will implant second- and even third-line bugs in case of detection. "


Microsoft Reveals Tactics Used by 4 Ransomware Families Targeting macOS

exploits ransomware industry
2023-01-06 https://thehackernews.com/2023/01/microsoft-reveals-tactics-used-by-4.html
Microsoft has shed light on four different ransomware families – KeRanger, FileCoder, MacRansom, and EvilQuest – that are known to impact Apple macOS systems. "While these malware families are old, they exemplify the range of capabilities and malicious behavior possible on the platform," the tech giant"s Security Threat Intelligence team said in a Thursday report. The initial vector for these "

Autosummary: EvilQuest, which was first exposed in July 2020, further goes beyond typical ransomware to incorporate other trojan-like features, such as keylogging, compromising Mach-O files by injecting arbitrary code, and disabling security software. "


Microsoft details techniques of Mac ransomware

exploits ransomware
2023-01-06 https://securityaffairs.com/140423/cyber-crime/mac-ransomware.html

Microsoft warns of different ransomware families (KeRanger, FileCoder, MacRansom, and EvilQuest) targeting Apple macOS systems. Microsoft Security Threat Intelligence team warns of four different ransomware families (KeRanger, FileCoder, MacRansom, and EvilQuest) that impact Apple macOS systems. The initial vector in attacks involving Mac ransomware typically relies on user-assisted methods, such as downloading and running fake […]

The post Microsoft details techniques of Mac ransomware appeared first on Security Affairs.

"

Autosummary: Code-related checks include delayed execution (KeRanger), PT_DENY_ATTACH (PTRACE) for an anti-debugging trick that prevents debuggers from attaching to the current malware process (EvilQuest and MacRansom), P_TRACED flag to check whether malware is being debugged (EvilQuest), and time-based check (EvilQuest). Hardware-based checks include checking a device’s hardware model (MacRansom), checking the logical and physical processors of a device (MacRansom), checking the MAC OUI of the device (EvilQuest), and checking the device’s CPU count and memory size (EvilQuest). "


Rackspace: Play Ransomware gang used a previously unknown exploit to access its Hosted Exchange email environment

exploits ransomware
2023-01-06 https://securityaffairs.com/140410/data-breach/rackspace-data-breach-play-ransomware.html

Cloud services provider Rackspace confirmed that the recent data breach was the result of the Play Ransomware gang’s attack. Cloud services provider Rackspace announced this week that the recent data breach was the result of an attack conducted by the Play ransomware group. The ransomware attack took place on December 2, 2022, threat actors exploited a […]

The post Rackspace: Play Ransomware gang used a previously unknown exploit to access its Hosted Exchange email environment appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, Rackspace) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Saint Gheorghe Recovery Hospital in Romania suffered a ransomware attack

exploits ransomware
2023-01-06 https://securityaffairs.com/140446/cyber-crime/saint-gheorghe-recovery-hospital-ransomware.html

The Saint Gheorghe Recovery Hospital in Romania suffered a ransomware attack in December that is still impacting medical activity. The Saint Gheorghe Recovery Hospital in Botoşani, in northeastern Romania, was hit by a ransomware attack in December that is still impacting medical operations. The hospital is not able to report the services performed in December […]

The post Saint Gheorghe Recovery Hospital in Romania suffered a ransomware attack appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, Saint Gheorghe Recovery Hospital) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


LA housing authority is latest LockBit ransomware victim

exploits ransomware
2023-01-06 https://www.malwarebytes.com/blog/news/2023/01/la-housing-authority-is-latest-lockbit-ransomware-victim

Categories: News

Categories: Ransomware

Tags: LockBit

Tags: LockBit ransomware

Tags: ransomware

Tags: Housing Authority of the City of Los Angeles

Tags: HACLA

Tags: opportunistic attack

In an incident still under investigation, the Housing Authority of the City of Los Angeles (HACLA) was attacked by LockBit during the holiday season.

(Read more...)

The post LA housing authority is latest LockBit ransomware victim appeared first on Malwarebytes Labs.

"

Autosummary: " "This is a wake-up call, a reminder, because all of us are so dependent on our cyber universe, to check our systems, to recognize that personal, businesses, public and private sector, are constantly being probed and constantly under attack, and that is why it"s critical that you pay attention to your security system, that you pay attention to who your users are and that you"re constantly on vigilance," Moore said. "


Microsoft doc details the dos and don’ts of Mac ransomware <u>

exploits ransomware
2023-01-06 https://www.computerworld.com/article/3684849/microsoft-doc-details-the-dos-and-donts-of-mac-ransomware-u.html#tk.rss_security

As enterprise adoption of the Apple platform accelerates, it’s important to note that Macs can and sometimes do get hit by ransomware. So it’s good to stay tuned to security concerns on a platform and application level — and take precautions.

Knowledge is power

With this in mind, extensive insights into Mac ransomware recently published only to be subsequently removed by Microsoft, can help explain these threats. The impact of such attack can be huge – ransomware already costs victims hundreds of billions each year, and no one is immune. 

To read this article in full, please click here

"

Autosummary: " Security, security, security We can anticipate a great deal of activity around security on Apple’s Mac and mobile platforms this year. It also helps guide security first response if an attack does take place; in the case of some sophisticated attacks, it’s not enough to identify just one invasion vector, as once inside the systems, some will implant second- and even third-line bugs in case of detection.Apple partners, including Jamf, are also providing valuable Mac protection, and Apple itself recently launched a new security portal offering in-depth security insights. "


LockBit ransomware gang says sorry, gives free decryptor to SickKids hospital

exploits ransomware
2023-01-05 https://www.tripwire.com/state-of-security/lockbit-ransomware-gang-says-sorry-gives-free-decryptor-sickkids-hospital
Do ransomware gangs actually have a heart? Perhaps... Read more in my article on the Tripwire State of Security blog. "

Autosummary: And perhaps that"s one reason why the notorious LockBit ransomware group, a ransomware-as-a-service (RaaS) operation that was used by the hospital"s attackers, has taken the unusual step of not only apologising to SickKids, but also offering the beleaguered hospital a free decryption tool. "


Rackspace: Customer email data accessed in ransomware attack

exploits ransomware
2023-01-05 https://www.bleepingcomputer.com/news/security/rackspace-customer-email-data-accessed-in-ransomware-attack/
Rackspace revealed on Thursday that attackers behind last month"s incident accessed some of its customers" Personal Storage Table (PST) files which can contain a wide range of information, including emails, calendar data, contacts, and tasks. [...] "

Autosummary: "We have already communicated our findings to these customers proactively, and importantly, according to Crowdstrike, there is no evidence that the threat actor actually viewed, obtained, misused, or disseminated any of the 27 Hosted Exchange customers" emails or data in the PSTs in any way. "


Bitdefender releases free MegaCortex ransomware decryptor

exploits ransomware
2023-01-05 https://www.bleepingcomputer.com/news/security/bitdefender-releases-free-megacortex-ransomware-decryptor/
Antivirus company Bitdefender has released a decryptor for the MegaCortex ransomware family, making it possible for victims of the once notorious gang to restore their data for free. [...] "

Autosummary: Decryptor"s options (BleepingComputer) Also, for those who attempted to decrypt their files previously with mixed success, the new decryptor offers an advanced setting to replace them with clean files. "


Software provider denied insurance payout after ransomware attack

exploits ransomware
2023-01-05 https://www.malwarebytes.com/blog/news/2023/01/software-provider-denied-insurance-payout-after-ransomware-attack

Categories: News

Tags: EMOI Services

Tags: Owners Insurance Co

Tags: Supreme Court of Ohio

Tags: K. James Sullivan

Tags: direct physical loss

The Supreme Court of Ohio issued a ruling days before the New Year that software and service provider EMOI shouldn"t be covered by insurance against a ransomware attack.

(Read more...)

The post Software provider denied insurance payout after ransomware attack appeared first on Malwarebytes Labs.

"

Autosummary: " "I suspect we’re going to see an increasing number of losses to policyholders driven by twenty-first century fact patterns, such as pandemics, harm to computer systems, harm to air quality, etc., so it will be interesting to watch how the Ohio Supreme Court, insurers, and policyholders adapt going forward, Sullivan said. "


The FBI"s Perspective on Ransomware

exploits ransomware
2023-01-04 https://thehackernews.com/2023/01/the-fbis-perspective-on-ransomware.html
Ransomware: contemporary threats, how to prevent them and how the FBI can help In April 2021, Dutch supermarkets faced a food shortage. The cause wasn"t a drought or a sudden surge in the demand for avocados. Rather, the reason was a ransomware attack. In the past years, companies, universities, schools, medical facilities and other organizations have been targeted by ransomware threat actors, "

Autosummary: " Some of the major RaaS players, who are notorious for turning the RaaS landscape into what it is today, are CryptoLocker, who infected over a quarter million systems in the 2000s and profited more than $3 million in less than four months, CryptoWall, who made over $18 million and prompted an FBI advisory, and finally Petya, NotPetya and WannaCry who used various types of exploits, ransomware included.Recommendations include: Turning off local passwords Using secure passwords Forcing the end of admin sessions Configuring group policies Checking privileged users" access Ensuring only necessary applications are running Limiting the reliance of Anti-Virus Installing EDRs 24 hour system admins Securing vulnerable ports Watching for misconfigured firewalls And more Etay Maor of Cato Networks highlights "Nothing in what several Ransomware groups say organizations need to do is new.In the past years, companies, universities, schools, medical facilities and other organizations have been targeted by ransomware threat actors, turning ransomware into the internet"s most severe security crisis. Here is a similar mapping of a Sodinokobi attack: Maze attack mapping to the MITRE framework: Another way to map ransomware attacks is through heat maps, which show how often different tactics and techniques are used. "


US. rail and locomotive company Wabtec hit with Lockbit ransomware

exploits ransomware
2023-01-04 https://securityaffairs.com/140299/cyber-crime/wabtec-lockbit-ransomware.html

US. rail and locomotive company Wabtec Corporation disclosed a data breach after it was hit with Lockbit ransomware attack. Wabtec Corporation is an American company formed by the merger of the Westinghouse Air Brake Company (WABCO) and MotivePower Industries Corporation in 1999. It manufactures products for locomotives, freight cars and passenger transit vehicles, and builds new locomotives up to 6,000 horsepower. The company employs […]

The post US. rail and locomotive company Wabtec hit with Lockbit ransomware appeared first on Security Affairs.

"

Autosummary: Compromised information varies by individual and includes a combination of the following data elements: First and Last Name, Date of Birth, Non-US National ID Number, Non-US Social Insurance Number or Fiscal Code, Passport Number, IP Address, Employer Identification Number (EIN), USCIS or Alien Registration Number, NHS (National Health Service) Number (UK), Medical Record/Health Insurance Information, Photograph, Gender/Gender Identity, Salary, Social Security Number (US), Financial Account Information, Payment Card Information, Account Username and Password, Biometric Information, Race/Ethnicity, Criminal Conviction or Offense, Sexual Orientation/Life, Religious Beliefs, Union Affiliation. "


Rackspace confirms Play ransomware was behind recent cyberattack

exploits ransomware ciber
2023-01-04 https://www.bleepingcomputer.com/news/security/rackspace-confirms-play-ransomware-was-behind-recent-cyberattack/
Texas-based cloud computing provider Rackspace has confirmed that the Play ransomware operation was behind a recent cyberattack that took down the company"s hosted Microsoft Exchange environments. [...] "

Autosummary: Play ransomware activity (ID Ransomware) Unlike most ransomware operations, Play gang affiliates use email as a negotiation channel and will not provide victims with a link to a Tor negotiations page within ransom notes dropped on encrypted systems. "


Canadian Copper Mountain Mining Corporation (CMMC) shut down the mill after a ransomware attack

exploits ransomware
2023-01-03 https://securityaffairs.com/140282/cyber-crime/canadian-cmmc-ransomware-attack.html

The Canadian Copper Mountain Mining Corporation (CMMC) was hit with a ransomware attack that impacted its operations. The Canadian Copper Mountain Mining Corporation (CMMC) announced to have suffered a ransomware attack late on December 27, 2022, which impacted its operation.  Copper Mountain’s flagship asset is the 75% owned Copper Mountain mine located in southern British Columbia near […]

The post Canadian Copper Mountain Mining Corporation (CMMC) shut down the mill after a ransomware attack appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, CMMC) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Royal ransomware claims attack on Queensland University of Technology

exploits ransomware
2023-01-03 https://www.bleepingcomputer.com/news/security/royal-ransomware-claims-attack-on-queensland-university-of-technology/
The Royal ransomware gang has claimed responsibility for a recent cyberattack on the Queensland University of Technology and begun to leak data allegedly stolen during the security breach. [...] "

Autosummary: " Currently, the HiQ website, "Digital Workplace", "eStudent", and Blackboard systems are unavailable, causing many courses and exams to be rescheduled until early February. "


Rail giant Wabtec discloses data breach after Lockbit ransomware attack

financial exploits ransomware
2023-01-03 https://www.bleepingcomputer.com/news/security/rail-giant-wabtec-discloses-data-breach-after-lockbit-ransomware-attack/
U.S. rail and locomotive company Wabtec Corporation has disclosed a data breach that exposed personal and sensitive information. [...] "

Autosummary: "


Lockbit apologized for the attack on the SickKids pediatric hospital and releases a free decryptor

ransomware
2023-01-01 https://securityaffairs.com/140193/cyber-crime/lockbit-apologized-attack-sickkids.html

The LockBit ransomware group formally apologized for the attack on the Hospital for Sick Children (SickKids) and gave to the victim a decryptor for free. The LockBit ransomware gang formally apologized for the attack on the Hospital for Sick Children (SickKids) and has released a free decryptor for the Hospital. The group is known to […]

The post Lockbit apologized for the attack on the SickKids pediatric hospital and releases a free decryptor appeared first on Security Affairs.

"

Autosummary: Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, Lockbit) Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Lockbit ransomware gang claims to have hacked the Port of Lisbon

exploits ransomware
2022-12-30 https://securityaffairs.com/140137/cyber-crime/lockbit-group-port-of-lisbon.html

The website for the Port of Lisbon is still down days after it was the target of a ransomware attack claimed by Lockbit group. The Port of Lisbon is the third-largest port in Portugal and one of the main European ports due to its strategic location. The website of the port was hit by a cyber attack on […]

The post Lockbit ransomware gang claims to have hacked the Port of Lisbon appeared first on Security Affairs.

"

Autosummary: “I would identify, with respect to our ports, cybersecurity, as a significant threat stream and we are of course very focused on defending against it and strengthening our cybersecurity.” "


Canadian mining firm shuts down mill after ransomware attack

exploits ransomware
2022-12-30 https://www.bleepingcomputer.com/news/security/canadian-mining-firm-shuts-down-mill-after-ransomware-attack/
The Copper Mountain Mining Corporation (CMMC), a Canadian copper mining company in British Columbia, has announced it has become the target of a ransomware attack that impacted its operations. [...] "

Autosummary: "


LockBit ransomware claims attack on Port of Lisbon in Portugal

exploits ransomware
2022-12-30 https://www.bleepingcomputer.com/news/security/lockbit-ransomware-claims-attack-on-port-of-lisbon-in-portugal/
A cyberattack hitting the Port of Lisbon Administration (APL), the third-largest port in Portugal, on Christmas day has been claimed by the LockBit ransomware gang. [...] "

Autosummary: The ransomware gang claims to have stolen financial reports, audits, budgets, contracts, cargo information, ship logs, crew details, customer PII (personally identifiable information), port documentation, email correspondence, and more. "


LCMHS hospital suffered a Ransomware attack at Louisiana hospital that impacted 270,000 patients

exploits ransomware
2022-12-29 https://securityaffairs.com/140106/cyber-crime/lcmhs-hospital-ransomware-attack.html

The Lake Charles Memorial Health System (LCMHS) suffered a ransomware attack that impacted 270,000 patients. The Lake Charles Memorial Health System (LCMHS) disclosed a data breach that affected almost 270,000 patients at its medical centers. The Lake Charles Memorial Health System is the largest not-for-profit community healthcare system in Southwest Louisiana. LCMHS reported the incident to the secretary of the U.S. […]

The post LCMHS hospital suffered a Ransomware attack at Louisiana hospital that impacted 270,000 patients appeared first on Security Affairs.

"

Autosummary: The organizations launched an investigation into the incident with the help of forensic experts and discovered that threat actors have stolen files containing sensitive data, including: Full names Physical addresses Dates of birth Medical records Patient identification numbers Health insurance information Payment information Limited clinical information regarding the received care Social Security numbers (in some cases) The attackers had no access to electronic medical records. "


Royal ransomware claims attack on Intrado telecom provider

exploits ransomware
2022-12-28 https://www.bleepingcomputer.com/news/security/royal-ransomware-claims-attack-on-intrado-telecom-provider/
​​​​​​​The Royal Ransomware gang claimed responsibility for a cyber attack against telecommunications company Intrado on Tuesday. [...] "

Autosummary: Royal ransomware Intrado data leak (BleepingComputer) Likely linked to an early December outage The date of the initial breach coincides with a widespread outage that impacted all of Intrado"s services, including Unified Communication Services, Healthcare, and Unified Communications as a Service (UCaaS). "


Week in review: LastPass breach disaster, online tracking via UID smuggling, ransomware in 2023

exploits ransomware
2022-12-25 https://www.helpnetsecurity.com/2022/12/25/week-in-review-lastpass-breach-disaster-online-tracking-via-uid-smuggling-ransomware-in-2023/

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: LastPass says attackers got users’ info and password vault data The information couldn’t come at a worst time, as businesses are winding down their activities and employees and users are thick in the midst of last-minute preparations for end-of-year holidays. New Microsoft Exchange exploit chain lets ransomware attackers in (CVE-2022-41080) Ransomware-wielding attackers are using a new exploit chain that includes … More

The post Week in review: LastPass breach disaster, online tracking via UID smuggling, ransomware in 2023 appeared first on Help Net Security.

"

Autosummary: Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: LastPass says attackers got users’ info and password vault data The information couldn’t come at a worst time, as businesses are winding down their activities and employees and users are thick in the midst of last-minute preparations for end-of-year holidays. "


Vice Society Ransomware Attackers Adopt Robust Encryption Methods

exploits ransomware
2022-12-23 https://thehackernews.com/2022/12/vice-society-ransomware-attackers-adopt.html
The Vice Society ransomware actors have switched to yet another custom ransomware payload in their recent attacks aimed at a variety of sectors. "This ransomware variant, dubbed "PolyVice," implements a robust encryption scheme, using NTRUEncrypt and ChaCha20-Poly1305 algorithms," SentinelOne researcher Antonio Cocomazzi said in an analysis. Vice Society, which is tracked by Microsoft under the "

Autosummary: "


The Week in Ransomware - December 23rd 2022 - Targeting Microsoft Exchange

exploits ransomware
2022-12-23 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-december-23rd-2022-targeting-microsoft-exchange/
Reports this week illustrate how threat actors consider Microsoft Exchange as a prime target for gaining initial access to corporate networks to steal data and deploy ransomware. [...] "

Autosummary: Other reports this week shed light on various ransomware operations: Contributors and those who provided new ransomware information and stories this week include: @BleepinComputer, @FourOctets, @billtoulas, @DanielGallagher, @demonslay335, @struppigel, @jorntvdw, @LawrenceAbrams, @malwrhunterteam, @VK_Intel, @PolarToffee, @fwosar, @Ionut_Ilascu, @Seifreed, @malwareforme, @serghei, @IBMSecurity, @PRODAFT, @CrowdStrike, @LabsSentinel, @Fortinet, @zscaler, @TrendMicro, and @pcrisk. December 21st 2022 Royal ransomware may have been first observed by researchers around September 2022, but it has seasoned cybercriminals behind it: The threat actors running this ransomware — who used to be a part of Conti Team One, according to a mind map shared by Vitali Kremez — initially dubbed it Zeon ransomware, until they rebranded it to Royal ransomware. "


Adversarial risk in the age of ransomware

exploits ransomware
2022-12-22 https://www.helpnetsecurity.com/2022/12/22/adversarial-risk-in-the-age-of-ransomware-video/

Éireann Leverett, Technology and Risk Entrepreneur, makes audience think about ransomware risks from more that one perspective, and that includes the perspective of the threat actors. He also lays out the many interesting results of an analysis of a decade of known ransomware attacks and paid ransoms. This video was recorded at IRISSCON 2022, an annual conference organized by IRISSCERT. The all-day event focuses on providing attendees with an overview of the current cyber threats … More

The post Adversarial risk in the age of ransomware appeared first on Help Net Security.

"

Autosummary: "


FIN7 Cybercrime Syndicate Emerges as Major Player in Ransomware Landscape

exploits ransomware
2022-12-22 https://thehackernews.com/2022/12/fin7-cybercrime-syndicate-emerges-as.html
An exhaustive analysis of FIN7 has unmasked the cybercrime syndicate"s organizational hierarchy, alongside unraveling its role as an affiliate for mounting ransomware attacks. It has also exposed deeper associations between the group and the larger threat ecosystem comprising the now-defunct ransomware DarkSide, REvil, and LockBit families. The highly active threat group, also known as Carbanak, "

Autosummary: Other prominent countries include China, Germany, Canada, Italy, and the U.K. FIN7"s intrusion techniques, over the years, have further diversified beyond traditional social engineering to include infected USB drives, software supply chain compromise and the use of stolen credentials purchased from underground markets. "


Vice Society ransomware gang switches to new custom encryptor

exploits ransomware
2022-12-22 https://www.bleepingcomputer.com/news/security/vice-society-ransomware-gang-switches-to-new-custom-encryptor/
The Vice Society ransomware operation has switched to using a custom ransomware encrypt that implements a strong, hybrid encryption scheme based on NTRUEncrypt and ChaCha20-Poly1305. [...] "

Autosummary: Similarity between Chilly and PolyVice (SentinelOne) The differences lie in campaign-specific details like the file extension, ransom note name, hardcoded master key, wallpaper, etc., which supports the common vendor hypothesis. "


Vice Society ransomware gang is using a custom locker

exploits ransomware
2022-12-22 https://securityaffairs.co/wordpress/139924/cyber-crime/vice-society-ransomware-custom-locker.html

The Vice Society ransomware group has adopted new custom ransomware, with a strong encryption scheme, in recent intrusions. SentinelOne researchers discovered that the Vice Society ransomware gang has started using a custom ransomware that implements a robust encryption scheme, using NTRUEncrypt and ChaCha20-Poly1305 algorithms. Vice Society ransomware has been active since June 2021, it is considered […]

The post Vice Society ransomware gang is using a custom locker appeared first on Security Affairs.

"

Autosummary: Further investigation also revealed that codebase for the Vice Society Windows payload has been used to build custom-branded payloads for other ransomware groups, such as “Chily” and “SunnyDay.” The new variant, dubbed “PolyVice”, was used in a recent attack and appended the file extension “.ViceSociety” to all encrypted files. "


CISO roles continue to expand beyond technical expertise

ransomware
2022-12-21 https://www.helpnetsecurity.com/2022/12/21/ciso-roles-continue-to-expand/

Marlin Hawk has tracked and analyzed the profiles of 470 CISOs year-over-year to understand the changing dynamics in this critical leadership position. The research shows the CISO seat to be relatively industry-agnostic—with 84% of CISOs having a career history of working across multiple sectors—with today’s CISOs expected to bring more breadth of leadership to their role as they move away from being technical experts. “Today’s CISOs are taking up the mantle of responsibilities that have … More

The post CISO roles continue to expand beyond technical expertise appeared first on Help Net Security.

"

Autosummary: Larkin went on to say, “As the importance of information security has grown, boards of directors, regulators, and shareholders have demanded greater controls, better risk management as well as more people and departments focusing on defending a company and its assets. “Now candidates are being internally promoted to the role of CISO from IT Risk, Operational Risk Management, IT Audit, Technology Risk & Controls, among others,” Larkin added. "


New Microsoft Exchange exploit chain lets ransomware attackers in (CVE-2022-41080)

exploits ransomware
2022-12-21 https://www.helpnetsecurity.com/2022/12/21/cve-2022-41080/

Ransomware-wielding attackers are using a new exploit chain that includes one of the ProxyNotShell vulnerabilities (CVE-2022-41082) to achieve remote code execution on Microsoft Exchange servers. The ProxyNotShell exploit chain used CVE-2022-41040, a SSRF vulnerability in the Autodiscover endpoint of Microsoft Exchange, while this new one uses CVE-2022-41080 to achieve privilege escalation through Outlook Web Access (OWA). The exploit chain – dubbed OWASSRF by Crowdstrike researchers – can only be headed off by implementing the patches … More

The post New Microsoft Exchange exploit chain lets ransomware attackers in (CVE-2022-41080) appeared first on Help Net Security.

"

Autosummary: "


Play ransomware group claims to have stolen hotel chain data

exploits ransomware
2022-12-21 https://www.malwarebytes.com/blog/news/2022/12/play-ransomware-group-claims-to-have-stolen-h-hotel-data

Categories: News

Tags: H-Hotel

Tags: Play ransomware

Tags: ransomware

Tags: extortion

Tags: threat

Tags: breach

Tags: EDR

A ransomware group claims to have stolen data from the H-Hotel chain, and is now threatening to leak it if the ransom is not paid

(Read more...)

The post Play ransomware group claims to have stolen hotel chain data appeared first on Malwarebytes Labs.

"

Autosummary: There is no indication how much data has been stolen, but the listing mentions “Private, personal data, clients documents, passports, ID, etc”.Posted: December 21, 2022 by A ransomware group claims to have stolen data from the H-Hotel chain, and is now threatening to leak it if the ransom is not paid H-Hotels, a large hospitality chain with 60 hotels across several countries including Germany and Switzerland has announced it has fallen victim to a ransomware attack. "


Play ransomware attacks use a new exploit to bypass ProxyNotShell mitigations on Exchange servers

exploits ransomware
2022-12-21 https://securityaffairs.co/wordpress/139897/cyber-crime/play-ransomware-bypass-proxynotshell-mitigation.html

Play ransomware attacks target Exchange servers with a new exploit that bypasses Microsoft’s ProxyNotShell mitigations. Play ransomware operators target Exchange servers using a new exploit chain, dubbed OWASSRF by Crowdstrike, that bypasses Microsoft’s mitigations for ProxyNotShell vulnerabilities. The ProxyNotShell flaws are: they impact Exchange Server 2013, 2016, and 2019, an authenticated attacker can trigger them […]

The post Play ransomware attacks use a new exploit to bypass ProxyNotShell mitigations on Exchange servers appeared first on Security Affairs.

"

Autosummary: – Installed Screen Connect, ID: b81d2f07c9163bf5, URL: instance-cmjrni-relay.screenconnect[.]com – Deployed Mimikatz Crawled and saved their tools, you can access… pic.twitter.com/8vA3LNtpul — Dray Agha (@Purp1eW0lf) December 14, 2022 The leaked tools included a Python script, poc.py, that when executed, led CrowdStrike researchers to replicate the logs generated in recent Play ransomware attacks. "


New Agenda Ransomware Variant, Written in Rust, Aiming at Critical Infrastructure

exploits ransomware
2022-12-19 https://thehackernews.com/2022/12/new-agenda-ransomware-variant-written.html
A Rust variant of a ransomware strain known as Agenda has been observed in the wild, making it the latest malware to adopt the cross-platform programming language after BlackCat, Hive, Luna, and RansomExx. Agenda, attributed to an operator named Qilin, is a ransomware-as-a-service (RaaS) group that has been linked to a spate of attacks primarily targeting manufacturing and IT industries across "

Autosummary: "


Glupteba Botnet Continues to Thrive Despite Google"s Attempts to Disrupt It

ransomware
2022-12-19 https://thehackernews.com/2022/12/glupteba-botnet-continues-to-thrive.html
The operators of the Glupteba botnet resurfaced in June 2022 as part of a renewed and "upscaled" campaign, months after Google disrupted the malicious activity. The ongoing attack is suggestive of the malware"s resilience in the face of takedowns, cybersecurity company Nozomi Networks said in a write-up. "In addition, there was a tenfold increase in TOR hidden services being used as C2 servers "

Autosummary: One of those addresses, which was first active on June 1, 2022, has transacted 11 times to date and is used in as many as 1,197 artifacts, making it the most widely used wallet address. "


Experts spotted a variant of the Agenda Ransomware written in Rust

exploits ransomware
2022-12-19 https://securityaffairs.co/wordpress/139811/cyber-crime/agenda-ransomware-rust.html

Researchers spotted a new variant of the Agenda ransomware which is written in the cross-platform programming language Rust. Trend Micro researchers have spotted a new variant of the Agenda ransomware (aka Qilin) that is written in Rust Language. The move follows the decision of other ransomware gangs, like Hive, Blackcat, RansomExx, and Luna, of rewriting their ransomware into […]

The post Experts spotted a variant of the Agenda Ransomware written in Rust appeared first on Security Affairs.

"

Autosummary: “It also added the -n, -p, fast, skip,and step flags on its configurations, which are not present in the Golang variant configuration and only used via command-line argument. "


Play ransomware claims attack on German hotel chain H-Hotels

exploits ransomware
2022-12-19 https://www.bleepingcomputer.com/news/security/play-ransomware-claims-attack-on-german-hotel-chain-h-hotels/
The Play ransomware gang has claimed responsibility for a cyber attack on H-Hotels (h-hotels.com) that has resulted in communication outages for the company. [...] "

Autosummary: The hotel chain employs 2,500 people and is one of the largest in the DACH region, operating under "H-Hotels" and the sub-brands Hyperion, H4 Hotels, H2 Hotels, H + Hotels, H.ostels, and H.omes. "


Colombian energy supplier EPM hit by BlackCat ransomware attack

exploits latam ransomware industry
2022-12-16 https://www.bleepingcomputer.com/news/security/colombian-energy-supplier-epm-hit-by-blackcat-ransomware-attack/
Colombian energy company Empresas Públicas de Medellín (EPM) suffered a BlackCat/ALPHV ransomware attack on Monday, disrupting the company"s operations and taking down online services. [...] "

Autosummary: BlackCat ransomware behind the attack BleepingComputer has since learned that the BlackCat ransomware operation, aka ALPHV, was behind the attacks, claiming to have stolen corporate data during the attacks. "


The Week in Ransomware - December 16th 2022 - Losing Trust

exploits ransomware
2022-12-16 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-december-16th-2022-losing-trust/
Today"s Week in Ransomware brings you the latest news and stories about the cyberattacks, new tactics, and reports related to ransomware operations. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @struppigel, @VK_Intel, @billtoulas, @FourOctets, @jorntvdw, @BleepinComputer, @DanielGallagher, @demonslay335, @malwrhunterteam, @fwosar, @Seifreed, @serghei, @malwareforme, @Ionut_Ilascu, @LawrenceAbrams, @PolarToffee, @_CPResearch_, @vinopaljiri, @cybereason, @1ZRR4H, @TalosSecurity, @pcrisk, @TrendMicro, @GeeksCyber, and @Digitaleragroup December 11th 2022 Security researchers have noticed a spike in devices infected with the TrueBot malware downloader created by a Russian-speaking hacking group known as Silence. This year, ransomware-as-a-service (RaaS) groups like BlackCat, Hive, and RansomExx have developed versions of their ransomware in Rust, a cross-platform language that makes it easier to tailor malware to different operating systems like Windows and Linux. "


Microsoft approved and digitally-signed malicious drivers used in ransomware attacks

exploits ransomware
2022-12-15 https://www.bitdefender.com/blog/hotforsecurity/microsoft-approved-and-digitally-signed-malicious-drivers-used-in-ransomware-attacks/
Microsoft has warned that malicious hackers were able to get the software giant to digitally sign their code so it could be used in attacks, such as the deployment of ransomware. Read more in my article on the Hot for Security blog. "

Autosummary: "


Searchlight Security Ransomware Search and Insights collates dark web data on ransomware groups

exploits ransomware
2022-12-14 https://www.helpnetsecurity.com/2022/12/14/searchlight-security-ransomware-search-and-insights/

Searchlight Security launched Ransomware Search and Insights, a new strategic enhancement to its Cerberus platform. Ransomware Search and Insights automatically collates data from active ransomware groups to help organizations and law enforcement agencies to investigate, track, and gather intelligence on live ransomware activity. This curated view of ransomware groups means that patterns in tactics, incidents, and victimology can be observed in real-time, helping analysts to bolster their threat intelligence, and gain the upper hand on … More

The post Searchlight Security Ransomware Search and Insights collates dark web data on ransomware groups appeared first on Help Net Security.

"

Autosummary: This curated view of ransomware groups means that patterns in tactics, incidents, and victimology can be observed in real-time, helping analysts to bolster their threat intelligence, and gain the upper hand on ransomware groups. "


The Dark Web is Getting Darker - Ransomware Thrives on Illegal Markets

exploits ransomware
2022-12-14 https://www.bleepingcomputer.com/news/security/the-dark-web-is-getting-darker-ransomware-thrives-on-illegal-markets/
The dark web is getting darker as cybercrime gangs increasingly shop their malware, phishing, and ransomware tools on illegal cybercrime markets. [...] "

Autosummary: Threat actors, including script kiddies and people with no hacking experience, increasingly join Ransomware-as-a-Service (RaaS) operations to easily get started extorting victims. The trend toward unique and novel ransomware attacks will continue in 2023—IABs, RaaS groups, and affiliates will increase transactions of initial access, including compromised user credentials that unlock various access tools. "


Microsoft patches Windows zero-day used to drop ransomware

exploits ransomware
2022-12-14 https://www.bleepingcomputer.com/news/security/microsoft-patches-windows-zero-day-used-to-drop-ransomware/
Microsoft has fixed a security vulnerability used by threat actors to circumvent the Windows SmartScreen security feature and deliver Magniber ransomware and Qbot malware payloads.  [...] "

Autosummary: The attackers used malicious standalone JavaScript files to exploit the CVE-2022-44698 zero-day to bypass Mark-of-the-Web security warnings displayed by Windows to alert users that files originating from the Internet should be treated with caution. "


Play ransomware attacks city of Antwerp

exploits government ransomware
2022-12-14 https://www.malwarebytes.com/blog/news/2022/12/play-ransomware-attacks-government-agencies-and-their-providers

Categories: News

Categories: Ransomware

Tags: Antwerp

Tags: Diest

Tags: Zwijndrecht

Tags: Play

Tags: Ragnar Locker

Tags: ransomware

Play ransomware is claiming credit for a devastating attack on Belgium"s largest city.

(Read more...)

The post Play ransomware attacks city of Antwerp appeared first on Malwarebytes Labs.

"

Autosummary: According to the leak site, 557 GB of information was stolen, including personal information, passports, other IDs, and financial documents. "


Cybersecurity Experts Uncover Inner Workings of Destructive Azov Ransomware

exploits ransomware ciber
2022-12-13 https://thehackernews.com/2022/12/cybersecurity-experts-uncover-inner.html
Cybersecurity researchers have published the inner workings of a new wiper called Azov Ransomware that"s deliberately designed to corrupt data and "inflict impeccable damage" to compromised systems. Distributed through another malware loader known as SmokeLoader, the malware has been described as an "effective, fast, and unfortunately unrecoverable data wiper," by Israeli cybersecurity company "

Autosummary: "


LockBit claims attack on California"s Department of Finance

financial ransomware
2022-12-13 https://www.bleepingcomputer.com/news/security/lockbit-claims-attack-on-californias-department-of-finance/
The Department of Finance in California has been the target of a cyberattack now claimed by the LockBit ransomware gang. [...] "

Autosummary: LockBit claims 75GB of stolen files On Monday, the LockBit ransomware gang posted on their leak site that they had breached the Department of Finance of the state of California and stole databases, confidential data, financial documents, and IT documents. "


Lockbit ransomware gang hacked California Department of Finance

financial exploits ransomware
2022-12-13 https://securityaffairs.co/wordpress/139599/cyber-crime/lockbit-ransomware-california-department-of-finance.html

LockBit ransomware gang hacked the California Department of Finance and threatens to leak data stolen from its systems. The LockBit ransomware gang claims to have stolen 76Gb from the California Department of Finance and is threatening to leak the stolen data if the victims will not pay the ransom by December 24. On December 12, […]

The post Lockbit ransomware gang hacked California Department of Finance appeared first on Security Affairs.

"

Autosummary: "


Microsoft-signed malicious Windows drivers used in ransomware attacks

exploits ransomware
2022-12-13 https://www.bleepingcomputer.com/news/microsoft/microsoft-signed-malicious-windows-drivers-used-in-ransomware-attacks/
Microsoft has revoked several Microsoft hardware developer accounts after drivers signed through their profiles were used in cyberattacks, including ransomware incidents. [...] "

Autosummary: Signing a driver via the Windows Hardware Compatibility Program Source: Mandiant Toolkit used to terminate security software In reports released today, researchers explain how they found a new toolkit consisting of two components named STONESTOP (loader) and POORTRY (kernel-mode driver) being used in "bring your own vulnerable driver" (BYOVD) attacks. "Notably, SentinelLabs observed a separate threat actor also utilizing a similar Microsoft signed driver, which resulted in the deployment of Hive ransomware against a target in the medical industry, indicating a broader use of this technique by various actors with access to similar tooling," explained the SentinelLabs researchers. "We were notified of this activity by SentinelOne, Mandiant, and Sophos on October 19, 2022, and subsequently performed an investigation into this activity. "


Silence is golden partner for Truebot and Clop ransomware

exploits ransomware
2022-12-13 https://www.malwarebytes.com/blog/news/2022/12/silence-is-golden-partner-for-truebot-and-clop-ransomware

Categories: News

Categories: Ransomware

Tags: Silence

Tags: TA505

Tags: Clop ransomware

Tags: Truebot

Tags: Grace

Tags: Cobalt Strike

Tags: Teleport

Tags: FIN11

Researchers have identified two new Truebot botnets that are using new versions of the Truebot downloader Trojan to infiltrate and explore a target"s network.

(Read more...)

The post Silence is golden partner for Truebot and Clop ransomware appeared first on Malwarebytes Labs.

"

Autosummary: The other botnet is almost exclusively composed of Windows servers, directly connected to the internet, and exposes several Windows services such as SMB, RDP, and WinRM.For those purposes, this new version of Truebot collects this information: a screenshot, the computer name, the local network name, and active directory trust relations. Exfiltration Besides the usual suspects designed to act as a backdoor, Cobalt Strike and Grace, the researchers also found a new data exfiltration tool. "


Preventing a ransomware attack with intelligence: Strategies for CISOs

exploits ransomware
2022-12-12 https://www.helpnetsecurity.com/2022/12/12/preventing-a-ransomware-attack-with-intelligence-strategies-for-cisos/

Bad news first: Ransomware isn’t going anywhere. The good news? The right intelligence can help organizations dramatically reduce risk surrounding a cyber extortion event. In fact, when organizations are armed with intelligence that’s timely, relevant, and actionable, they can bolster their own cyber defense measures and even prevent a ransomware attack from occurring in the first place. Knowledge is power More good news: We know how ransomware “gangs” work and, for the most part, what … More

The post Preventing a ransomware attack with intelligence: Strategies for CISOs appeared first on Help Net Security.

"

Autosummary: For instance, with vulnerability intelligence that includes exploit availability, attack type, impact, disclosure patterns, and other characteristics, vulnerability management teams predict the likelihood that a vulnerability could be used in a ransomware attack. "


Royal Ransomware Threat Takes Aim at U.S. Healthcare System

exploits ransomware
2022-12-12 https://thehackernews.com/2022/12/royal-ransomware-threat-takes-aim-at-us.html
The U.S. Department of Health and Human Services (HHS) has cautioned of ongoing Royal ransomware attacks targeting healthcare entities in the country. "While most of the known ransomware operators have performed Ransomware-as-a-Service, Royal appears to be a private group without any affiliates while maintaining financial motivation as their goal," the agency"s Health Sector Cybersecurity "

Autosummary: "


TrueBot infections were observed in Clop ransomware attacks

exploits ransomware
2022-12-12 https://securityaffairs.co/wordpress/139527/malware/truebot-infections-clop-ransomware-attacks.html

Researchers reported an increase in TrueBot infections, attackers have shifted from using malicious emails as their primary delivery method to other techniques. Cisco Talos researchers reported an increase in TrueBot infections, threat actors have shifted from using malicious emails as their primary attack vector to other techniques. Truebot has been active since 2017 and some researchers linked it to […]

The post TrueBot infections were observed in Clop ransomware attacks appeared first on Security Affairs.

"

Autosummary: “The attackers, however, appear to have switched to an unknown TrueBot distribution mechanism starting in November, with the vector succeeding in co-opting over 500 internet-facing Windows servers located in the U.S., Canada, and Brazil into a botnet.” concludes the report that also includes Indicators of Compromise (IoCs). "


Hive ransomware gang claims responsibility for attack on Intersport that left cash registers disabled

exploits ransomware
2022-12-12 https://www.bitdefender.com/blog/hotforsecurity/hive-ransomware-gang-claims-responsibility-for-attack-on-intersport-that-left-cash-registers-disabled/
Sports retail giant Intersport, which boasts some 6000 stores worldwide in 57 countries, has fallen victim to a ransomware attack which disabled checkouts in France during what should have been one of the busiest times of the year. Read more in my article on the Hot for Security blog. "

Autosummary: "


Play ransomware claims attack on Belgium city of Antwerp

exploits government ransomware
2022-12-12 https://www.bleepingcomputer.com/news/security/play-ransomware-claims-attack-on-belgium-city-of-antwerp/
The Play ransomware operation has claimed responsibility for a recent cyberattack on the Belgium city of Antwerp. [...] "

Autosummary: "


Clop ransomware partners with TrueBot malware for access to networks

exploits ransomware
2022-12-11 https://www.bleepingcomputer.com/news/security/clop-ransomware-partners-with-truebot-malware-for-access-to-networks/
Security researchers have noticed a spike in devices infected with the TrueBot malware downloader created by a Russian-speaking hacking group known as Silence. [...] "

Autosummary: Silence continued their attacks and in three years between 2016 and 2019 they stole at least $4.2 million from banks in the former Soviet Union, Europe, Latin America, and Asia, Silence/Truebot activity June 2016 - July 2019 source: Group-IB Group-IB researchers describe Silence hackers as highly skilled, being able to reverse engineer malware to modify it for their purpose or adapt at the assembler instructions level an exploit used by nation-state group Fancy Bear. Post-infection activity leading to Clop deployment (Cisco Talos) “During the exploration and lateral movement phases, the attackers browsed key server and desktop file systems, connected to SQL databases, and collected data that was exfiltrated using the Teleport tool to an attacker-controlled server,” Cisco Talos researchers explain. "


Clop ransomware uses TrueBot malware for access to networks

exploits ransomware
2022-12-11 https://www.bleepingcomputer.com/news/security/clop-ransomware-uses-truebot-malware-for-access-to-networks/
Security researchers have noticed a spike in devices infected with the TrueBot malware downloader created by a Russian-speaking hacking group known as Silence. [...] "

Autosummary: Silence continued their attacks and in three years between 2016 and 2019 they stole at least $4.2 million from banks in the former Soviet Union, Europe, Latin America, and Asia, Silence/Truebot activity June 2016 - July 2019 source: Group-IB Group-IB researchers describe Silence hackers as highly skilled, being able to reverse engineer malware to modify it for their purpose or adapt at the assembler instructions level an exploit used by nation-state group Fancy Bear. Post-infection activity leading to Clop deployment (Cisco Talos) “During the exploration and lateral movement phases, the attackers browsed key server and desktop file systems, connected to SQL databases, and collected data that was exfiltrated using the Teleport tool to an attacker-controlled server,” Cisco Talos researchers explain. "


The Week in Ransomware - December 9th 2022 - Wide Impact

exploits ransomware
2022-12-10 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-december-9th-2022-wide-impact/
This week has been filled with research reports and news of significant attacks having a wide impact on many organizations. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @struppigel, @PolarToffee, @Seifreed, @fwosar, @DanielGallagher, @BleepinComputer, @Ionut_Ilascu, @LawrenceAbrams, @jorntvdw, @demonslay335, @billtoulas, @FourOctets, @VK_Intel, @serghei, @malwrhunterteam, @malwareforme, @pcrisk, @Unit42_Intel, @Fortinet, @briankrebs, @morphisec, @smgoreli, and @Phylum_IO.Unlike many other ransomware groups such as LockBit that follow a typical ransomware-as-a-service (RaaS) model, Vice Society’s operations are different in that they’ve been known for using forks of pre-existing ransomware families in their attack chain that are sold on DarkWeb marketplaces. "


US HHS warns healthcare orgs of Royal Ransomware attacks

exploits ransomware
2022-12-10 https://securityaffairs.co/wordpress/139486/cyber-crime/us-hhs-royal-ransomware-attacks.html

The US Department of Health and Human Services (HHS) warns healthcare organizations of Royal ransomware attacks. The human-operated Royal ransomware first appeared on the threat landscape in September 2022, it has demanded ransoms up to millions of dollars. The Health and Human Services (HHS) is aware of attacks against the Healthcare and Public Healthcare (HPH) […]

The post US HHS warns healthcare orgs of Royal Ransomware attacks appeared first on Security Affairs.

"

Autosummary: HC3 added that threat actors continue to use multiple attack vectors associated with this ransomware, including phishing, Remote Desktop Protocol (RDP) compromises and credential abuse, compromises of exploited vulnerabilities, such as VPN servers, and compromises in other known vulnerabilities” HHS notes. "


Rackspace customers rage following ransomware attack, as class-action lawsuits filed

exploits ransomware
2022-12-09 https://www.bitdefender.com/blog/hotforsecurity/rackspace-customers-rage-following-ransomware-attack-as-class-action-lawsuits-filed/
As ever, what matters most is not so much whether an organisation gets hit or not by a ransomware attack, but how well it handles the aftermath and recovery. Read more in my article on the Hot for Security blog. "

Autosummary: By 5 December, Rackspace said it had engaged third-party experts to look into the ransomware attack, and declined to confirm whether it had paid, or might be prepared to pay, the ransom to its extortionists. "


Rackspace warns of phishing risks following ransomware attack

financial exploits ransomware
2022-12-09 https://www.bleepingcomputer.com/news/security/rackspace-warns-of-phishing-risks-following-ransomware-attack/
Cloud computing provider Rackspace warned customers on Thursday of increased risks of phishing attacks following a ransomware attack affecting its hosted Microsoft Exchange environment. [...] "

Autosummary: " Rackspace added that customers could easily spot scammers attempting to steal their sensitive information since: Emails from Rackspace will be sent from @rackspace.com emails (although attackers might still use a spoofed email address and redirect their targets to a landing phishing page) Rackspace support will not ask for login credentials or personal information (e.g., social security number, driver"s license) during phone calls Even though the company is yet to reveal if it has any evidence that the attackers have stolen data from its systems during the breach, customers were advised to remain vigilant and monitor their credit reports and banking account statements for suspicious activity. "


NowSecure Mobile PTaaS offers continuous automated compliance testing

ransomware
2022-12-08 https://www.helpnetsecurity.com/2022/12/08/nowsecure-mobile-ptaas/

NowSecure has launched its latest offering, NowSecure Mobile Pen Testing as a Service (PTaaS), to bridge the gap between automated and manual mobile security assessments for continuous security. Designed to provide mobile developers and security teams with a more cost-effective, efficient pen testing solution, NowSecure PTaaS combines periodic expert manual assessments with automated continuous testing to optimize for full coverage at a higher frequency rate. With this combination, the all-in-one portal and service can identify … More

The post NowSecure Mobile PTaaS offers continuous automated compliance testing appeared first on Help Net Security.

"

Autosummary: Built on over 12 years of mobile application security experience and tens of thousands of pen tests performed, the NowSecure Mobile PTaaS cloud-based platform offers a depth of automated continuous and manual assessments, including: Periodic expert pen testing based on specific need and schedule On-demand and continuous security testing integrated into CI/CD & dev toolchain Automatic generation of tickets that include embedded remediation resources Remediation consulting with an expert pen tester Optional industry standard(s) validations and certifications All-in-one SAST, DAST, IAST, APISec, and SBOM Easy to use, dedicated SaaS platform “Mobile apps are critically important to business because they generate revenue and connect with customers. "


Rackspace confirms it suffered a ransomware attack

exploits ransomware
2022-12-08 https://www.malwarebytes.com/blog/news/2022/12/rackspace-confirms-it-suffered-a-ransomware-attack

Categories: News

Categories: Ransomware

Tags: Rackspace

Tags: Exchange

Tags: ransomware

Tags: ProxyNotShell

Rackspace said a ransomware incident affected its Hosted Exchange environment and caused service disruptions.

(Read more...)

The post Rackspace confirms it suffered a ransomware attack appeared first on Malwarebytes Labs.

"

Autosummary: Workaround Rackspace said it will help affected customers implement a temporary forwarding while the disruption is ongoing: “As a temporary solution while you set up Microsoft 365, it is possible to also implement a forwarding option that will allow mail destined for a Hosted Exchange user to be routed to an external email address. "


CommonSpirit Health ransomware attack exposed data of 623,000 patients

exploits ransomware
2022-12-08 https://www.bleepingcomputer.com/news/security/commonspirit-health-ransomware-attack-exposed-data-of-623-000-patients/
CommonSpirit Health has confirmed that threat actors accessed the personal data for 623,774 patients during an October ransomware attack. [...] "

Autosummary: "


US Health Dept warns of Royal Ransomware targeting healthcare

exploits ransomware
2022-12-08 https://www.bleepingcomputer.com/news/security/us-health-dept-warns-of-royal-ransomware-targeting-healthcare/
The U.S. Department of Health and Human Services (HHS) issued a new warning today for the country"s healthcare organizations regarding ongoing attacks from a relatively new operation, the Royal ransomware gang. [...] "

Autosummary: Royal ransomware submissions (ID Ransomware) ​Healthcare under attack The federal government has also warned about other ransomware operations known for actively targeting healthcare organizations across the U.S. For instance, last month, HHS warned of Venus ransomware impacting the country"s healthcare, with at least one entity known to have fallen victim to its attacks. "


Vice Society Ransomware Attackers Targeted Dozens of Schools in 2022

exploits ransomware
2022-12-07 https://thehackernews.com/2022/12/vice-society-ransomware-attackers.html
The Vice Society cybercrime group has disproportionately targeted educational institutions, accounting for 33 victims in 2022 and surpassing other ransomware families like LockBit, BlackCat, BianLian, and Hive. Other prominent industry verticals targeted include healthcare, governments, manufacturing, retail, and legal services, according to an analysis of leak site data by Palo Alto Networks "

Autosummary: "


Open Source Ransomware Toolkit Cryptonite Turns Into Accidental Wiper Malware

exploits ransomware
2022-12-06 https://thehackernews.com/2022/12/open-source-ransomware-toolkit.html
A version of an open source ransomware toolkit called Cryptonite has been observed in the wild with wiper capabilities due to its "weak architecture and programming." Cryptonite, unlike other ransomware strains, is not available for sale on the cybercriminal underground, and was instead offered for free by an actor named CYBERDEVILZ until recently through a GitHub repository. The source code and "

Autosummary: "


Understanding NIST CSF to assess your organization"s Ransomware readiness

exploits ransomware
2022-12-06 https://thehackernews.com/2022/12/understanding-nist-csf-to-assess-your.html
Ransomware attacks keep increasing in volume and impact largely due to organizations" weak security controls. Mid-market companies are targeted as they possess a significant amount of valuable data but lack the level of protective controls and staffing of larger organizations. According to a recent RSM survey, 62% of mid-market companies believe they are at risk of ransomware in the next 12 "

Autosummary: for each of the core functions: "Identify," "Protect," "Detect," "Respond," and "Recover": Identify Asset management is the process of knowing what all your organization"s critical assets are, where they"re located, who owns them, and who has access to them. Additional controls can maximize your ransomware readiness: having communication templates (to ensure the team knows what, how, and whom to contact during an incident), performing mandatory event analysis, and deploying Security Orchestration, Automation, and Response (SOAR) technology as either a separate product or a native part of an XDR solution.According to the Microsoft Defender Report 2022, following 98% of basic security hygiene such as Multi-Factor Authentication (MFA), applying zero-trust principles, keeping software updated, and using extended detection and response anti-malware still protects against 98% of attacks. "


Rackspace confirms outage was caused by ransomware attack

exploits ransomware
2022-12-06 https://www.bleepingcomputer.com/news/security/rackspace-confirms-outage-was-caused-by-ransomware-attack/
Texas-based cloud computing provider Rackspace has confirmed today that a ransomware attack is behind an ongoing Hosted Exchange outage described as an "isolated disruption." [...] "

Autosummary: " "As you know, on Friday, December 2nd, 2022, we became aware of suspicious activity and immediately took proactive measures to isolate the Hosted Exchange environment to contain the incident," the company said in an update to the initial incident report. "


Rackspace Hosted Exchange outage was caused by ransomware

exploits ransomware
2022-12-06 https://www.helpnetsecurity.com/2022/12/06/rackspace-ransomware/

Rackspace has finally confirmed the cause of the ongoing outage of its Hosted Exchange service: it’s ransomware. “As you know, on Friday, December 2nd, 2022, we became aware of suspicious activity and immediately took proactive measures to isolate the Hosted Exchange environment to contain the incident. We have since determined this suspicious activity was the result of a ransomware incident,” the company stated in the newest released service announcement. “Alongside our internal security team, we … More

The post Rackspace Hosted Exchange outage was caused by ransomware appeared first on Help Net Security.

"

Autosummary: The confirmation came just a few hours after the publication of a press release on the situation, in which Rackspace said the security incident “may result in a loss of revenue for the Hosted Exchange business, which generates approximately $30 million of annual revenue in the Apps & Cross Platform segment,” and that they expect to have “incremental costs associated with its response to the incident.” "


Russian Courts Targeted by New CryWiper Data Wiper Malware Posing as Ransomware

exploits ransomware
2022-12-05 https://thehackernews.com/2022/12/russian-courts-targeted-by-new-crywiper.html
A new data wiper malware called CryWiper has been found targeting Russian government agencies, including mayor"s offices and courts. "Although it disguises itself as a ransomware and extorts money from the victim for "decrypting" data, [it] does not actually encrypt, but purposefully destroys data in the affected system," Kaspersky researchers Fedor Sinitsyn and Janis Zinchenko said in a "

Autosummary: "


French hospital cancels operations after a ransomware attack

exploits ransomware
2022-12-05 https://securityaffairs.co/wordpress/139316/cyber-crime/french-hospital-ransomware-attack-2.html

A French hospital near Paris canceled operations and transfer some patients due to a cyber attack suffered over the weekend. France’s health ministry announced that the Hospital Centre of Versailles was hit by a cyber attack over the weekend. Hospital Centre of Versailles, which includes Andre-Mignot Hospital, Richaud Hospital and the Despagne Retirement Home, canceled […]

The post French hospital cancels operations after a ransomware attack appeared first on Security Affairs.

"

Autosummary: Linkedin Whatsapp Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Russian courts attacked by CryWiper malware that poses as ransomware

exploits ransomware
2022-12-05 https://www.bitdefender.com/blog/hotforsecurity/russian-courts-attacked-by-crywiper-malware-that-poses-as-ransomware/
Russian courts and government agencies have been hit by a previously-undocumented strain of data-wiping malware known as CryWiper. It poses as ransomware, but isn"t interested in making money out of its victims... Read more in my article on the Hot for Security blog. "

Autosummary: "


New CryWiper wiper targets Russian entities masquerading as a ransomware

exploits ransomware
2022-12-04 https://securityaffairs.co/wordpress/139237/malware/crywiper-wiper.html

Experts spotted a new data wiper, dubbed CryWiper, that was employed in destructive attacks against Russian mayor’s offices and courts. Researchers from Kaspersky discovered a previously unknown data wiper, dubbed CryWiper, that was employed in destructive attacks against Russian mayor’s offices and courts. The malware masquerades as ransomware, but the analysis of the code demonstrates that it […]

The post New CryWiper wiper targets Russian entities masquerading as a ransomware appeared first on Security Affairs.

"

Autosummary: Linkedin Whatsapp Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Cuba Ransomware Extorted Over $60 Million in Ransom Fees from More than 100 Entities

exploits ransomware
2022-12-02 https://thehackernews.com/2022/12/cuba-ransomware-extorted-over-60.html
The threat actors behind Cuba (aka COLDDRAW) ransomware have received more than $60 million in ransom payments and compromised over 100 entities across the world as of August 2022. In a new advisory shared by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of... "

Autosummary: "


Cuba Ransomware received over $60M in Ransom payments as of August 2022

exploits ransomware
2022-12-02 https://securityaffairs.co/wordpress/139183/cyber-crime/cuba-ransomware-alert-cisa-fbi.html

Cuba ransomware gang received more than $60 million in ransom payments related to attacks against 100 entities worldwide as of August 2022. The threat actors behind the Cuba ransomware (aka COLDDRAW, Tropical Scorpius) have demanded over 145 million U.S. Dollars (USD) and received more than $60 million in ransom payments from over 100 victims worldwide […]

The post Cuba Ransomware received over $60M in Ransom payments as of August 2022 appeared first on Security Affairs.

"

Autosummary: The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) published a joint advisory that provides technical details about the gang’s operations, including tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) associated with Cuba ransomware. "


The Week in Ransomware - December 2nd 2022 - Disrupting Health Care

exploits ransomware
2022-12-02 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-december-2nd-2022-disrupting-health-care/
This week"s big news was the Colombia health system being severely disrupted by a ransomware attack on Keralty, one of the country"s largest healthcare providers. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @BleepinComputer, @LawrenceAbrams, @FourOctets, @demonslay335, @struppigel, @PolarToffee, @serghei, @fwosar, @DanielGallagher, @jorntvdw, @billtoulas, @Seifreed, @VK_Intel, @malwareforme, @malwrhunterteam, @Ionut_Ilascu, @kaspersky, @xfalexx,@hyperconectado, @kennethdee, @pcrisk, @pushecx, and @BrettCallow. "


CISA and the FBI issue alert about Cuba ransomware

exploits ransomware
2022-12-02 https://www.malwarebytes.com/blog/news/2022/12/cisa-and-fbi-issue-alert-about-cuba-ransomware

Categories: News

Categories: Ransomware

Tags: Cuba ransomware

Tags: ransomware

Tags: double extortion

Tags: Cybersecurity Advisory

Tags: CSA

Tags: CISA

Tags: FBI

Cuba ransomware is spotlighted in a recent cybersecurity advisory (CSA) in the ongoing #StopRansomware campaign spearheaded by CISA and the FBI.

(Read more...)

The post CISA and the FBI issue alert about Cuba ransomware appeared first on Malwarebytes Labs.

"

Autosummary: Like other ransomware groups, its threat actors use double extortion tactics, predominantly targeting organizations in the US in five critical infrastructure sectors: critical manufacturing, financial services, government facilities, healthcare and public health, and information technology.Various IOCs (associated files, email addresses, a Jabber address, IP addresses, Bitcoin wallets, and ransom notes) and MITRE ATT&CK techniques are also found on that page. "


FBI: Cuba ransomware raked in $60 million from over 100 victims

exploits ransomware
2022-12-01 https://www.bleepingcomputer.com/news/security/fbi-cuba-ransomware-raked-in-60-million-from-over-100-victims/
The FBI and CISA revealed in a new joint security advisory that the Cuba ransomware gang raked in over $60 million in ransoms as of August 2022 after breaching more than 100 victims worldwide. [...] "

Autosummary: Useful information that could help identify the ransomware gang"s members and the cybercriminals they work with includes "boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with ransomware actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file. "


AA22-335A: #StopRansomware: Cuba Ransomware

exploits ransomware
2022-12-01 https://us-cert.cisa.gov/ncas/alerts/aa22-335a
Original release date: December 1, 2022

Summary

Actions to take today to mitigate cyber threats from ransomware:

• Prioritize remediating known exploited vulnerabilities.
• Train users to recognize and report phishing attempts.
• Enable and enforce phishing-resistant multifactor authentication.

Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint CSA to disseminate known Cuba ransomware IOCs and TTPs associated with Cuba ransomware actors identified through FBI investigations, third-party reporting, and open-source reporting. This advisory updates the December 2021 FBI Flash: Indicators of Compromise Associated with Cuba Ransomware.

Note: While this ransomware is known by industry as “Cuba ransomware,” there is no indication Cuba ransomware actors have any connection or affiliation with the Republic of Cuba. 

Since the release of the December 2021 FBI Flash, the number of U.S. entities compromised by Cuba ransomware has doubled, with ransoms demanded and paid on the increase.

This year, Cuba ransomware actors have added to their TTPs, and third-party and open-source reports have identified "

Autosummary: Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by FBI or CISA. Technical Details Mitigations FBI and CISA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques and to reduce the risk of compromise by Cuba ransomware: Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (i.e., hard drive, storage device, the cloud).REPORTING FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with ransomware actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.This year, Cuba ransomware actors have added to their TTPs, and third-party and open-source reports have identified a possible link between Cuba ransomware actors, RomCom Remote Access Trojan (RAT) actors, and Industrial Spy ransomware actors. to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (i.e., hard drive, storage device, the cloud). with password logins (e.g., service account, admin accounts, and domain admin accounts) with National Institute for Standards and Technology (NIST) standards for developing and managing password policies. "


Keralty ransomware attack impacts Colombia"s health care system

exploits latam ransomware
2022-11-30 https://www.bleepingcomputer.com/news/security/keralty-ransomware-attack-impacts-colombias-health-care-system/
The Keralty multinational healthcare organization suffered a RansomHouse ransomware attack on Sunday, disrupting the websites and operations of the company and its subsidiaries. [...] "

Autosummary: Cyberattack disrupts Keralty"s operations Over the past few days, Keralty and its subsidiaries, EPS Sanitas and Colsanitas, have suffered disruption to their IT operations, the scheduling of medical appointments, and its websites. "


Trigona ransomware spotted in increasing attacks worldwide

exploits ransomware
2022-11-29 https://www.bleepingcomputer.com/news/security/trigona-ransomware-spotted-in-increasing-attacks-worldwide/
A previously unnamed ransomware has rebranded under the name "Trigona," launching a new Tor negotiation site where they accept Monero as ransom payments. [...] "

Autosummary: Files encrypted by Trigona Source: BleepingComputer The ransomware will also embed the encrypted decryption key, the campaign ID, and the victim ID (company name) in the encrypted files. "


RansomBoggs Ransomware hit several Ukrainian entities, experts attribute it to Russia

exploits ransomware
2022-11-28 https://securityaffairs.co/wordpress/139028/cyber-warfare-2/ransomboggs-ransomware-targeted-ukraine.html

Several Ukrainian organizations were hit by Russia-based RansomBoggs Ransomware in the last week, ESET reports. Researchers from ESET observed multiple attacks involving a new family of ransomware, tracked as RansomBoggs ransomware, against Ukrainian organizations. The security firm first detected the attacks on November 21 and immediately alerted the CERT US. The ransomware is written in […]

The post RansomBoggs Ransomware hit several Ukrainian entities, experts attribute it to Russia appeared first on Security Affairs.

"

Autosummary: A 9/9 — ESET research (@ESETresearch) November 25, 2022 Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, RansomBoggs ransomware) "


RansomBoggs: New ransomware targeting Ukraine

exploits ransomware
2022-11-28 https://www.welivesecurity.com/2022/11/28/ransomboggs-new-ransomware-ukraine/

ESET researchers spot a new ransomware campaign that goes after Ukrainian organizations and has Sandworm"s fingerprints all over it

The post RansomBoggs: New ransomware targeting Ukraine appeared first on WeLiveSecurity

"

Autosummary: RansomBoggs.A. RansomBoggs at a glance In the ransom note seen above (SullivanDecryptsYourFiles.txt), the authors of RansomBoggs make multiple references to the Monsters Inc. movie, including by impersonating James P. Sullivan, the movie’s main protagonist. "


Russia-based RansomBoggs Ransomware Targeted Several Ukrainian Organizations

exploits ransomware
2022-11-26 https://thehackernews.com/2022/11/russia-based-ransomboggs-ransomware.html
Ukraine has come under a fresh onslaught of ransomware attacks that mirror previous intrusions attributed to the Russia-based Sandworm nation-state group. Slovak cybersecurity company ESET, which dubbed the new ransomware strain RansomBoggs, said the attacks against several Ukrainian entities were first detected on November 21, 2022. "While the malware written in .NET is new, its deployment is "

Autosummary: "


New ransomware attacks in Ukraine linked to Russian Sandworm hackers

exploits ransomware
2022-11-25 https://www.bleepingcomputer.com/news/security/new-ransomware-attacks-in-ukraine-linked-to-russian-sandworm-hackers/
New ransomware attacks targeting organizations in Ukraine first detected this Monday have been linked to the notorious Russian military threat group known as Sandworm. [...] "

Autosummary: Once pushed across a victim"s network, RansomBoggs encrypts files using AES-256 in CBC mode using a random key (randomly generated, RSA encrypted, and written to aes.bin), and it appends a .chsch extension to all encrypted files extension. "


Vice Society ransomware claims attack on Cincinnati State college

exploits government ransomware
2022-11-25 https://www.bleepingcomputer.com/news/security/vice-society-ransomware-claims-attack-on-cincinnati-state-college/
The Vice Society ransomware operation has claimed responsibility for a cyberattack on Cincinnati State Technical and Community College, with the threat actors now leaking data allegedly stolen during the attack. [...] "

Autosummary: However, voicemail, network printing, VPN access, network and intranet shared drives are all unavailable, while a range of online application and registration portals are also offline. "


How cloud PCs act as an insurance plan for ransomware recovery

exploits ransomware
2022-11-24 https://www.helpnetsecurity.com/2022/11/24/cloud-pcs-business-recovery-video/

Although companies are spending billions on preventative security measures, attacks are a common occurrence. Business continuity requires enterprises to go beyond prevention and prioritize a strategic recovery plan. In this Help Net Security video, Matt Davidson, CTO at Workspot, discusses how cloud PCs are serving as a modern insurance plan for business recovery, enabling safe access for employees from anywhere in the world at a moment’s notice while IT leaders investigate and mitigate the damage.

The post How cloud PCs act as an insurance plan for ransomware recovery appeared first on Help Net Security.

"

Autosummary: "


Black Basta Ransomware Gang Actively Infiltrating U.S. Companies with Qakbot Malware

exploits ransomware
2022-11-24 https://thehackernews.com/2022/11/black-basta-ransomware-gang-actively.html
Companies based in the U.S. have been at the receiving end of an "aggressive" Qakbot malware campaign that leads to Black Basta ransomware infections on compromised networks. "In this latest campaign, the Black Basta ransomware gang is using QakBot malware to create an initial point of entry and move laterally within an organization"s network," Cybereason researchers Joakim Kandefelt and "

Autosummary: "


An aggressive malware campaign targets US-based companies with Qakbot to deliver Black Basta Ransomware

exploits ransomware
2022-11-24 https://securityaffairs.co/wordpress/138924/cyber-crime/qakbot-campaign-black-basta-ransomware.html

Researchers warn of an ongoing aggressive Qakbot malware campaign that leads to Black Basta ransomware infections in the US. Experts at the Cybereason Global SOC (GSOC) team have observed a surge in Qakbot infections as part of an ongoing aggressive Qakbot malware campaign that leads to Black Basta ransomware infections in the US. In the last two […]

The post An aggressive malware campaign targets US-based companies with Qakbot to deliver Black Basta Ransomware appeared first on Security Affairs.

"

Autosummary: QakBot, also known as QBot or Pinkslipbot, is a banking trojan primarily used to steal victims’ financial data, including browser information, keystrokes, and credentials.” "


New RansomExx Ransomware Variant Rewritten in the Rust Programming Language

exploits ransomware
2022-11-24 https://thehackernews.com/2022/11/new-ransomexx-ransomware-variant.html
The operators of the RansomExx ransomware have become the latest to develop a new variant fully rewritten in the Rust programming language, following other strains like BlackCat, Hive, and Luna. The latest version, dubbed RansomExx2 by the threat actor known as Hive0091 (aka DefrayX), is primarily designed to run on the Linux operating system, although it"s expected that a Windows version will "

Autosummary: "


RansomExx Ransomware upgrades to Rust programming language

exploits ransomware
2022-11-24 https://securityaffairs.co/wordpress/138933/malware/ransomexx-ransomware-rust-language.html

RansomExx ransomware is the last ransomware in order of time to have a version totally written in the Rust programming language. The operators of the RansomExx ransomware (aka Defray777 and Ransom X) have developed a new variant of their malware, tracked as RansomExx2, that was ported into the Rust programming language. The move follows the […]

The post RansomExx Ransomware upgrades to Rust programming language appeared first on Security Affairs.

"

Autosummary: The move follows the decision of other ransomware gangs, like Hive, Blackcat, and Luna, of rewriting their ransomware into Rust programming language. "


For two years security experts kept secret that they were helping Zeppelin ransomware victims decrypt their files

exploits ransomware
2022-11-23 https://grahamcluley.com/for-two-years-security-experts-kept-secret-that-they-were-helping-zeppelin-ransomware-victims-decrypt-their-files/
Researchers at cybersecurity firm Unit 221B have revealed that they have been secretly helping victims of the Zeppelin ransomware decrypt their computer systems since 2020. "

Autosummary: We have also dumped all of your documents relating to accounting, administration, legal, HR, NDA, SQL, passwords and more! "


Hive ransomware has extorted $100 million in 18 months, FBI warns

exploits ransomware
2022-11-23 https://www.bitdefender.com/blog/hotforsecurity/hive-ransomware-has-extorted-100-million-in-18-months-fbi-warns/
$100 million. That"s the amount of money that the Hive ransomware is thought to have extorted from over 1300 companies around the world, according to a joint report from the FBI, CISA, and HHS. Read more in my article on the Hot for Security blog. "

Autosummary: First seen in mid 2021, Hive is a ransomware-as-a-service (RaaS) operation, which different cybercriminals have used in attacks launched against healthcare institutions, non-profit organisations, energy providers, and retailers, amongst other sectors. "


Ducktail information stealer continues to evolve

ransomware
2022-11-23 https://securityaffairs.co/wordpress/138894/cyber-crime/ducktail-information-stealer-evolution.html

The operators behind the Ducktail information stealer continue to improve their malicious code, operators experts warn. In late July 2022, researchers from WithSecure (formerly F-Secure Business) discovered an ongoing operation, named DUCKTAIL, that was targeting individuals and organizations that operate on Facebook’s Business and Ads platform. Experts attribute the campaign to a Vietnamese financially motivated […]

The post Ducktail information stealer continues to evolve appeared first on Security Affairs.

"

Autosummary: Linkedin Whatsapp Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Ouch! Ransomware gang says it won’t attack AirAsia again due to the “chaotic organisation” and sloppy security of hacked company’s network

exploits ransomware
2022-11-22 https://grahamcluley.com/ouch-ransomware-gang-says-it-wont-attack-airasia-again-due-to-the-chaotic-organisation-and-sloppy-security-of-hacked-companys-network/
The Daixin ransomware gang has given a humiliating slap in the face to Air Asia, which lost the personal data of five million passengers and all of its employees earlier this month. "

Autosummary: "


Donut extortion group also targets victims with ransomware

exploits ransomware
2022-11-22 https://www.bleepingcomputer.com/news/security/donut-extortion-group-also-targets-victims-with-ransomware/
The Donut (D0nut) extortion group has been confirmed to deploy ransomware in double-extortion attacks on the enterprise. [...] "

Autosummary: Files encrypted by the Donut Ransomware Source: BleepingComputer The Donut Leaks operation has a flair for theatrics, using interesting graphics, a bit of humor, and even offering a builder for an executable that acts as a gateway to their Tor data leak site (see below). "


Octocrypt, Alice, and AXLocker Ransomware, new threats in the wild

exploits ransomware
2022-11-21 https://securityaffairs.co/wordpress/138783/malware/octocrypt-alice-axlocker-ransomware.html

Experts from Cyble Research and Intelligence Labs (CRIL) discovered three new ransomware families: AXLocker, Octocrypt, and Alice Ransomware. Threat intelligence firm Cyble announced the discovery of three new ransomware families named AXLocker, Octocrypt, and Alice Ransomware. The AXLocker ransomware encrypts victims’ files and steals Discord tokens from the infected machine. The analysis of the code […]

The post Octocrypt, Alice, and AXLocker Ransomware, new threats in the wild appeared first on Security Affairs.

"

Autosummary: “After encrypting the victim’s files, the ransomware collects and sends sensitive information such as Computer name, Username, Machine IP address, System UUID, and Discord tokens to TA.” reads the analysis published by Cyble. "


Daixin Ransomware Gang Steals 5 Million AirAsia Passengers" and Employees" Data

exploits ransomware
2022-11-21 https://thehackernews.com/2022/11/daixin-ransomware-gang-steals-5-million.html
The cybercrime group called Daixin Team has leaked sample data belonging to AirAsia, a Malaysian low-cost airline, on its data leak portal. The development comes a little over a week after the company fell victim to a ransomware attack on November 11 and 12, per DataBreaches.net. The threat actors allegedly claim to have obtained the personal data associated with five million "

Autosummary: "


New ransomware encrypts files, then steals your Discord account

exploits ransomware
2022-11-20 https://www.bleepingcomputer.com/news/security/new-ransomware-encrypts-files-then-steals-your-discord-account/
The new "AXLocker" ransomware family is not only encrypting victims" files and demanding a ransom payment but also stealing the Discord accounts of infected users. [...] "

Autosummary: To steal the Discord token, AxLocker will scan the following directories for and extract tokens using regular expressions: Discord\Local Storage\leveldb discordcanary\Local Storage\leveldb discordptb\leveldb Opera Software\Opera Stable\Local Storage\leveldb Google\Chrome\User Data\\Default\Local Storage\leveldb BraveSoftware\Brave-Browser\User Data\Default\Local Storage\leveldb Yandex\YandexBrowser\User Data\Default\Local Storage\leveldb AXLocker"s grab function (Cyble) Eventually, victims are served a pop-up window containing the ransom note, informing them that their data was encrypted and how they contact the threat actor to purchase a decryptor. "


Microsoft Warns of Hackers Using Google Ads to Distribute Royal Ransomware

exploits ransomware
2022-11-19 https://thehackernews.com/2022/11/microsoft-warns-of-hackers-using-google.html
A developing threat activity cluster has been found using Google Ads in one of its campaigns to distribute various post-compromise payloads, including the recently discovered Royal ransomware. Microsoft, which spotted the updated malware delivery method in late October 2022, is tracking the group under the name DEV-0569. "Observed DEV-0569 attacks show a pattern of continuous innovation, with "

Autosummary: "


DEV-0569 group uses Google Ads to distribute Royal Ransomware

exploits ransomware
2022-11-19 https://securityaffairs.co/wordpress/138750/malware/dev-0569-google-ads-royal-ransomware.html

Microsoft warns that a threat actor, tracked as DEV-0569, is using Google Ads to distribute the recently discovered Royal ransomware. Researchers from the Microsoft Security Threat Intelligence team warned that a threat actor, tracked as DEV-0569, is using Google Ads to distribute various payloads, including the recently discovered Royal ransomware. The DEV-0569 group carries out […]

The post DEV-0569 group uses Google Ads to distribute Royal Ransomware appeared first on Security Affairs.

"

Autosummary: From August to October 2022, DEV-0569 attempted to spread the BATLOADER via malicious links in phishing emails, posed as legitimate installers for multiple popular applications, including TeamViewer, Adobe Flash Player, Zoom, and AnyDesk. "


Transportation sector targeted by both ransomware and APTs

exploits ransomware
2022-11-18 https://www.helpnetsecurity.com/2022/11/18/cybersecurity-trends-q3-2022/

Trellix released The Threat Report: Fall 2022 from its Advanced Research Center, which analyzes cybersecurity trends from the third quarter (Q3) of 2022. The report includes evidence of malicious activity linked to ransomware and nation-state backed advanced persistent threat (APT) actors. It examines malicious cyberactivity including threats to email, the malicious use of legitimate third-party security tools, and more. Q3 cybersecurity trends US ransomware activity leads the pack: In the US alone, ransomware activity increased … More

The post Transportation sector targeted by both ransomware and APTs appeared first on Help Net Security.

"

Autosummary: Emerging threat actors scaled : The China-linked threat actor, Mustang Panda, had the most detected threat indicators in Q3, followed by Russian-linked APT29 and Pakistan-linked APT36.The China-linked threat actor, Mustang Panda, had the most detected threat indicators in Q3, followed by Russian-linked APT29 and Pakistan-linked APT36. "


Hive Ransomware Attackers Extorted $100 Million from Over 1,300 Companies Worldwide

exploits ransomware
2022-11-18 https://thehackernews.com/2022/11/hive-ransomware-attackers-extorted-100.html
The threat actors behind the Hive ransomware-as-a-service (RaaS) scheme have launched attacks against over 1,300 companies across the world, netting the gang $100 million in illicit payments as of November 2022. "Hive ransomware has targeted a wide range of businesses and critical infrastructure sectors, including government facilities, communications, critical manufacturing, information "

Autosummary: "


Hive Ransomware extorted over $100M in ransom payments from over 1,300 companies

exploits ransomware
2022-11-18 https://securityaffairs.co/wordpress/138702/cyber-crime/hive-ransomware-extorted-100m.html

Hive ransomware operators have extorted over $100 million in ransom payments from over 1,300 companies worldwide as of November 2022. The threat actors behind the Hive ransomware-as-a-service (RaaS) have extorted $100 million in ransom payments from over 1,300 companies worldwide as of November 2022, reported the U.S. cybersecurity and intelligence authorities. “As of November 2022, […]

The post Hive Ransomware extorted over $100M in ransom payments from over 1,300 companies appeared first on Security Affairs.

"

Autosummary: The authorities reported that from June 2021 through at least November 2022, threat actors employed the Hive ransomware in attacks aimed at a wide range of businesses and critical infrastructure sectors, including Government Facilities, Communications, Critical Manufacturing, Information Technology, and especially Healthcare and Public Health (HPH). "


Researchers secretly helped decrypt Zeppelin ransomware for 2 years

exploits ransomware
2022-11-18 https://www.bleepingcomputer.com/news/security/researchers-secretly-helped-decrypt-zeppelin-ransomware-for-2-years/
Security researchers found vulnerabilities in the encryption mechanism of the Zeppelin ransomware and exploited them to create a working decryptor they used since 2020 to help victim companies recover files without paying the attackers. [...] "

Autosummary: Retrieved public key in obfuscated form (Unit221b) To overcome this final obstacle, Unit221b used a total of 800 central processing units (CPUs) in 20 servers, each with 40 CPUs. "


The Week in Ransomware - November 18th 2022 - Rising Operations

exploits ransomware
2022-11-18 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-november-18th-2022-rising-operations/
There have been some interesting developments in ransomware this week, with the arrest of a cybercrime ring leader and reports shedding light on two new, but up-and-coming,  ransomware operations. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @struppigel, @Ionut_Ilascu, @malwareforme, @malwrhunterteam, @DanielGallagher, @serghei, @jorntvdw, @fwosar, @LawrenceAbrams, @PolarToffee, @demonslay335, @FourOctets, @billtoulas, @VK_Intel, @BleepinComputer, @pcrisk, @Seifreed, @GeeksCyber, @BlackBerry, @ahnlab, and @MsftSecIntel. Finally, Ukraine says that a new Somnia ransomware is being used in attacks, CISA/FBI warned Iranian hackers breached a federal agency, and the FBI warned that Hive ransomware had made over $100 million in ransom payments. "


AA22-321A: #StopRansomware: Hive Ransomware

exploits ransomware
2022-11-17 https://us-cert.cisa.gov/ncas/alerts/aa22-321a
Original release date: November 17, 2022

Summary

Actions to Take Today to Mitigate Cyber Threats from Ransomware:

• Prioritize remediating known exploited vulnerabilities.
• Enable and enforce multifactor authentication with strong passwords
• Close unused ports and remove any application not deemed necessary for day-to-day operations.

Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Health and Human Services (HHS) are releasing this joint CSA to disseminate known Hive IOCs and TTPs identified through FBI investigations as recently as November 2022.

FBI, CISA, and HHS encourage organizations to implement the recommendations in the Mitigations section of this CSA to reduce the likelihood and impact of ransomware incidents. Victims of ransomware operations should report the incident to their local FBI field office or CISA.

Download the PDF version of this report: pdf, 852.9 kb.

Technical Details

Note: This advisory uses the MITRE ATT&CK® for Enterprise framework, version 12. See MITRE ATT&CK "

Autosummary: Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by FBI, CISA, or HHS.Hive actors have also gained initial access to victim networks by distributing phishing emails with malicious attachments [T1566.001] and by exploiting the following vulnerabilities against Microsoft Exchange servers [T1190]: CVE-2021-31207 - Microsoft Exchange Server Security Feature Bypass Vulnerability CVE-2021-34473 - Microsoft Exchange Server Remote Code Execution Vulnerability CVE-2021-34523 - Microsoft Exchange Server Privilege Escalation Vulnerability After gaining access, Hive ransomware attempts to evade detention by executing processes to: Identify processes related to backups, antivirus/anti-spyware, and file copying and then terminating those processes to facilitate file encryption [T1562].From June 2021 through at least November 2022, threat actors have used Hive ransomware to target a wide range of businesses and critical infrastructure sectors, including Government Facilities, Communications, Critical Manufacturing, Information Technology, and especially Healthcare and Public Health (HPH).However, the FBI, CISA, and HHS understand that when businesses are faced with an inability to function, executives will evaluate all options to protect their shareholders, employees, and customers. Mitigations FBI, CISA, and HHS recommend organizations, particularly in the HPH sector, implement the following to limit potential adversarial use of common system and network discovery techniques and to reduce the risk of compromise by Hive ransomware: Verify Hive actors no longer have access to the network.Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (i.e., hard drive, storage device, the cloud).In addition, FBI, CISA, and HHS urge all organizations to apply the following recommendations to prepare for, mitigate/prevent, and respond to ransomware incidents.Exploit Public-Facing Application T1190 Hive actors gain access to victim network by exploiting the following Microsoft Exchange vulnerabilities: CVE-2021-34473, CVE-2021-34523, CVE-2021-31207, CVE-2021-42321.Regardless of whether you or your organization decide to pay the ransom, the FBI, CISA, and HHS urge you to promptly report ransomware incidents to your local FBI field office, or to CISA at report@cisa.gov or (888) 282-0870.Hive ransomware follows the ransomware-as-a-service (RaaS) model in which developers create, maintain, and update the malware, and affiliates conduct the ransomware attacks.The FBI may seek the following information that you determine you can legally share, including: Recovered executable files Live random access memory (RAM) capture Images of infected systems Malware samples IP addresses identified as malicious or suspicious Email addresses of the attackers A copy of the ransom note Ransom amount Bitcoin wallets used by the attackers Bitcoin wallets used to pay the ransom Post-incident forensic reports DISCLAIMER with password logins (e.g., service account, admin accounts, and domain admin accounts) to comply with National Institute of Standards and Technology (NIST) standards for developing and managing password policies. "


Previously unidentified ARCrypter ransomware expands worldwide

exploits ransomware
2022-11-17 https://www.bleepingcomputer.com/news/security/previously-unidentified-arcrypter-ransomware-expands-worldwide/
A previously unknown "ARCrypter" ransomware that compromised key organizations in Latin America is now expanding its attacks worldwide. [...] "

Autosummary: The randomly-named payload dropped on a newly created folder (BlackBerry) The ARCrypter payload then creates persistence by adding the following registry key: “HKLM\Software\Microsoft\Windows\CurrentVersion\Run\SecurityUpdate” Next, the malware deletes all Shadow Volume Copies to prevent easy data restoration, modifies network settings to secure stable connectivity, and then encrypts all files except for the types shown below. "


FBI: Hive ransomware extorted $100M from over 1,300 victims

exploits ransomware
2022-11-17 https://www.bleepingcomputer.com/news/security/fbi-hive-ransomware-extorted-100m-from-over-1-300-victims/
The Federal Bureau of Investigation (FBI) said today that the notorious Hive ransomware gang has successfully extorted roughly $100 million from over a thousand companies since June 2021. [...] "

Autosummary: "


Two public schools in Michigan hit by a ransomware attack

exploits ransomware
2022-11-17 https://securityaffairs.co/wordpress/138677/cyber-crime/public-schools-michigan-ransomware.html

Public schools in two Michigan counties were forced to halt their activities, including the lessons, after a ransomware attack.   Public schools in Jackson and Hillsdale counties, Michigan, reopen after a closure of two days caused by a ransomware attack that hit its systems. The public schools started experiencing a systems outage affecting critical operating […]

The post Two public schools in Michigan hit by a ransomware attack appeared first on Security Affairs.

"

Autosummary: "


Creating a holistic ransomware strategy

exploits ransomware
2022-11-15 https://www.helpnetsecurity.com/2022/11/15/ransomware-recovery-strategies-video/

Recent scientific research into the psychological effects of a ransomware crisis on both organizations and individuals revealed the deep marks that a ransomware crisis leaves on all those affected. It also shows how their IT and security teams can turn into disarray long after the crisis itself has passed. Zerto’s 2022 Ransomware Strategy Survey revealed gaps in companies’ data protection and ransomware strategies that they will want to address to reduce their risk of interrupting … More

The post Creating a holistic ransomware strategy appeared first on Help Net Security.

"

Autosummary: "


Healthcare sector warned of Venus ransomware attacks

exploits ransomware
2022-11-15 https://www.tripwire.com/state-of-security/healthcare-sector-warned-venus-ransomware-attacks
Healthcare organisations in the United States are being warned to be on their guard once again, this time against a family of ransomware known as Venus. Read more in my article on the Tripwire State of Security blog. "

Autosummary: The Venus ransomware attempts to terminate 39 processes associated with database servers and Microsoft office applications: taskkill msftesql.exe sqlagent.exe sqlbrowser.exe sqlservr.exe sqlwriter.exe oracle.exe ocssd.exe dbsnmp.exe synctime.exe mydesktopqos.exe agntsvc.exe isqlplussvc.exe xfssvccon.exe mydesktopservice.exe ocautoupds.exe agntsvc.exe agntsvc.exe agntsvc.exe encsvc.exe firefoxconfig.exe tbirdconfig.exe ocomm.exe mysqld.exe mysqld-nt.exe mysqld-opt.exe dbeng50.exe sqbcoreservice.exe excel.exe infopath.exe msaccess.exe mspub.exe onenote.exe outlook.exe powerpnt.exe sqlservr.exe thebat64.exe thunderbird.exe winword.exe wordpad.exe Initial ransom payments demanded in Venus ransomware attacks appear to currently start around 1 BTC (at initial ransom demands may start around 1 BTC (which presently is worth less than US $17,000.) "


The psychological fallout of a ransomware crisis

exploits ransomware
2022-11-14 https://www.helpnetsecurity.com/2022/11/14/psychological-impact-ransomware-attacks-video/

Northwave has conducted scientific research into the psychological fallout of a ransomware crisis on both organizations and individuals. The findings reveal the deep marks that a ransomware crisis leaves on all those affected. It also shows how their IT and security teams can turn into disarray long after the problem has passed. In this Help Net Security video, Inge van der Beijl, Director Behaviour & Resilience at Northwave, talks about the research findings and illustrates … More

The post The psychological fallout of a ransomware crisis appeared first on Help Net Security.

"

Autosummary: "


CERT-UA warns of multiple Somnia ransomware attacks against organizations in Ukraine

exploits ransomware
2022-11-14 https://securityaffairs.co/wordpress/138496/hacking/somnia-ransomware-attacks-ukraine.html

Russian threat actors employed a new ransomware family called Somnia in attacks against multiple organizations in Ukraine. The Government Computer Emergency Response Team of Ukraine CERT-UA is investigating multiple attacks against organizations in Ukraine that involved a new piece of ransomware called Somnia. Government experts attribute the attacks to the group ‘From Russia with Love’ […]

The post CERT-UA warns of multiple Somnia ransomware attacks against organizations in Ukraine appeared first on Security Affairs.

"

Autosummary: In the second version, the AES algorithm is implemented; at the same time, taking into account the dynamics of the key and the initialization vector, this version of Somnia, according to the attackers’ theoretical plan, does not provide for the possibility of data decryption.” "


Russian hacktivists hit Ukrainian orgs with ransomware – but no ransom demands

exploits ransomware
2022-11-14 https://www.helpnetsecurity.com/2022/11/14/somnia-ransomware-ukrainian/

The Ukrainian CERT (CERT-UA) has uncovered an attack campaign aimed at compromising Ukrainian organizations and irretrievably encrypting their files. To do that, they are leveraging a specific version of the Somnia ransomware that, “according to the attackers’ theoretical plan, does not provide for the possibility of data decryption.” How the attacks unfolded The Ukrainian cyber experts believe that the attack was effected by Russian hacktivists that go by FRwL (From Russia with Love), with help … More

The post Russian hacktivists hit Ukrainian orgs with ransomware – but no ransom demands appeared first on Help Net Security.

"

Autosummary: "


Lockbit gang leaked data stolen from global high-tech giant Thales

ransomware
2022-11-13 https://securityaffairs.co/wordpress/138471/data-breach/lockbit-leaked-thales-files.html

The Lockbit 3.0 ransomware gang started leaking the information allegedly stolen from the global high-tech company Thales. Thales is a global high-tech leader with more than 81,000 employees worldwide. The Group invests in digital and deep tech innovations – big data, artificial intelligence, connectivity, cybersecurity and quantum – to build a future of trust, essential […]

The post Lockbit gang leaked data stolen from global high-tech giant Thales appeared first on Security Affairs.

"

Autosummary: The Group invests in digital and deep tech innovations – big data, artificial intelligence, connectivity, cybersecurity and quantum – to build a future of trust, essential to the development of our societies, by placing people at the heart of decision-making. "


Ukraine says Russian hacktivists use new Somnia ransomware

exploits ransomware
2022-11-13 https://www.bleepingcomputer.com/news/security/ukraine-says-russian-hacktivists-use-new-somnia-ransomware/
Russian hacktivists have infected multiple organizations in Ukraine with a new ransomware strain called "Somnia," encrypting their systems and causing operational problems. [...] "

Autosummary: The file types (extensions) targeted by Somnia ransomware are shown below, including documents, images, databases, archives, video files, and more, reflecting the destruction this strain aims to cause. "


Canadian supermarket chain giant Sobeys suffered a ransomware attack

exploits ransomware
2022-11-12 https://securityaffairs.co/wordpress/138424/cyber-crime/sobeys-ransomware-attack.html

Sobeys, the second-largest supermarket chain in Canada, was he victim of a ransomware attack conducted by the Black Basta gang. Sobeys Inc. is the second largest supermarket chain in Canada, the company operates over 1,500 stores operating across Canada under a variety of banners. It is a wholly-owned subsidiary of Empire Company Limited, a Canadian business conglomerate. During […]

The post Canadian supermarket chain giant Sobeys suffered a ransomware attack appeared first on Security Affairs.

"

Autosummary: “Both Quebec’s access to information commission and Alberta’s privacy commission have both been notified by the grocer about a “confidentiality incident.”” reported the website Toronto Star.. source Imgur Images shared by an employee Bleeping Computer first reported that the systems of the company were infected with the Black Basta, the attribution of the attack is based on ransom notes and negotiation chats Bleeping Computer has observed. "


Flashpoint’s ransomware prediction model enables security teams to remediate vulnerabilities

exploits ransomware
2022-11-11 https://www.helpnetsecurity.com/2022/11/11/flashpoint-ransomware-prediction-model/

Flashpoint announced a ransomware prediction model that allows vulnerability management teams to improve remediation efforts that could prevent cyber extortion events with VulnDB. According to the U.S. Treasury Department, financial institutions filed $1.2B in ransomware-related costs in 2021, nearly double the amount reported by banks in 2020. In order to help organizations proactively prevent a ransomware attack, Flashpoint’s latest capability enables vulnerability management teams to identify the likelihood that a particular vulnerability could be used … More

The post Flashpoint’s ransomware prediction model enables security teams to remediate vulnerabilities appeared first on Help Net Security.

"

Autosummary: "


Microsoft Blames Russian Hackers for Prestige Ransomware Attacks on Ukraine and Poland

exploits ransomware
2022-11-11 https://thehackernews.com/2022/11/microsoft-blames-russian-hackers-for.html
Microsoft on Thursday attributed the recent spate of ransomware incidents targeting transportation and logistics sectors in Ukraine and Poland to a threat cluster that shares overlaps with the Russian state-sponsored Sandworm group. The attacks, which were disclosed by the tech giant last month, involved a strain of previously undocumented malware called Prestige and is said to have taken place "

Autosummary: "


Russian-Canadian National Charged Over Involvement in LockBit Ransomware Attacks

exploits ransomware
2022-11-11 https://thehackernews.com/2022/11/russian-canadian-national-charged-over.html
The U.S. Department of Justice (DoJ) has announced charges against a dual Russian and Canadian national for his alleged participation in LockBit ransomware attacks across the world. The 33-year-old Ontario resident, Mikhail Vasiliev, has been taken into custody and is awaiting extradition to the U.S., where is likely to be sentenced for a maximum of five years in prison. Vasiliev has been "

Autosummary: "


Russia-linked IRIDIUM APT linked to Prestige ransomware attacks against Ukraine

exploits ransomware
2022-11-11 https://securityaffairs.co/wordpress/138362/apt/prestige-ransomware-linked-iridium.html

Microsoft linked Prestige ransomware attacks against organizations in Ukraine and Poland to Russia-linked threat actors. In Mid-October, Microsoft Threat Intelligence Center (MSTIC) researchers uncovered previously undetected ransomware, tracked as Prestige ransomware, employed in attacks targeting organizations in the transportation and related logistics industries in Ukraine and Poland. The Prestige ransomware first appeared in the threat […]

The post Russia-linked IRIDIUM APT linked to Prestige ransomware attacks against Ukraine appeared first on Security Affairs.

"

Autosummary: MSTIC researchers observed threat actors using three methods to deploy the Prestige ransomware: Method 1: The ransomware payload is copied to the ADMIN$ share of a remote system, and Impacket is used to remotely create a Windows Scheduled Task on target systems to execute the payload Method 2: The ransomware payload is copied to the ADMIN$ share of a remote system, and Impacket is used to remotely invoke an encoded PowerShell command on target systems to execute the payload Method 3: The ransomware payload is copied to an Active Directory Domain Controller and deployed to systems using the Default Domain Group Policy Object Microsoft published a list of indicators of compromise (IOCs) and advanced hunting queries detect Prestige ransomware infections. "


Alleged LockBit ransomware operator arrested in Canada

exploits ransomware
2022-11-11 https://www.bitdefender.com/blog/hotforsecurity/alleged-lockbit-ransomware-operator-arrested-in-canada/
A man with dual Russian and Canadian nationality has been arrested in connection with his alleged part in the LockBit ransomware conspiracy that has demanded more than $100 million from its victims. Read more in my article on the Hot for Security blog. "

Autosummary: In addition, the criminal complaint against Vasiliev says that screenshots of end-to-end encrypted conversations with the Tux username "LockBitSupp" (assumed to be shorthand for "LockBitSupport") were uncovered, which contained multiple discussions related to the ransomware operation and communication with victims. "


Man charged for role in LockBit ransomware operation

exploits ransomware
2022-11-11 https://securityaffairs.co/wordpress/138381/cyber-crime/man-charged-lockbit-ransomware-attacks.html

The U.S. DoJ charged a Russian-Canadian national for his alleged role in LockBit ransomware attacks against organizations worldwide. The U.S. Department of Justice (DoJ) charged Mikhail Vasiliev, a dual Russian and Canadian national, for his alleged participation in the LockBit ransomware operation. According to the press release published by DoJ, the man is currently in custody in […]

The post Man charged for role in LockBit ransomware operation appeared first on Security Affairs.

"

Autosummary: “This arrest is the result of over two-and-a-half-years of investigation into the LockBit ransomware group, which has harmed victims in the United States and around the world,” said Deputy Attorney General Lisa O. Monaco. "


Canadian food retail giant Sobeys hit by Black Basta ransomware

exploits ransomware
2022-11-11 https://www.bleepingcomputer.com/news/security/canadian-food-retail-giant-sobeys-hit-by-black-basta-ransomware/
Grocery stores and pharmacies belonging to Canadian food retail giant Sobeys have been experiencing IT systems issues since last weekend. [...] "

Autosummary: Sobeys is one of two national grocery retailers in Canada, with 134,000 employees servicing a network of 1,500 stores in all ten provinces under multiple retail banners, including Sobeys, Safeway, IGA, Foodland, FreshCo, Thrifty Foods, and Lawtons Drugs. "


The Week in Ransomware - November 11th 2022 - LockBit feeling the heat

exploits ransomware
2022-11-11 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-november-11th-2022-lockbit-feeling-the-heat/
This "Week in Ransomware" covers the last two weeks of ransomware news, with new information on attacks, arrests, data wipers, and reports shared by cybersecurity firms and researchers. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include @jorntvdw, @DanielGallagher, @Seifreed, @LawrenceAbrams, @struppigel, @malwareforme, @demonslay335, @Ionut_Ilascu, @fwosar, @FourOctets, @VK_Intel, @malwrhunterteam, @serghei, @PolarToffee, @BleepinComputer, @billtoulas, @LabsSentinel, @vinopaljiri, @_CPResearch_, @ahnlab. "


How ransomware gangs and malware campaigns are changing

exploits ransomware
2022-11-10 https://www.helpnetsecurity.com/2022/11/10/malware-ransomware-trends/

Deep Instinct released its 2022 Bi-Annual Cyber Threat Report which focuses on the top malware and ransomware trends and tactics from the first half of 2022 and provides key takeaways and predictions for the ever-evolving cybersecurity threat landscape. “2022 has been another record year for cyber criminals and ransomware gangs. It’s no secret that these threat actors are constantly upping their game with new and improved tactics designed to evade traditional cyber defenses,” said Mark … More

The post How ransomware gangs and malware campaigns are changing appeared first on Help Net Security.

"

Autosummary: Not surprisingly, ransomware attacks remain a serious threat to organizations, as there are currently 17 leaked databases operated by threat actors who are leveraging the data for attacks on third-party companies, most notably social engineering, credential theft, and triple-extortion attacks. "


Russian LockBit ransomware operator arrested in Canada

exploits ransomware
2022-11-10 https://www.bleepingcomputer.com/news/security/russian-lockbit-ransomware-operator-arrested-in-canada/
Europol has announced today the arrest of a Russian national linked to LockBit ransomware attacks targeting critical infrastructure organizations and high-profile companies worldwide. [...] "

Autosummary: " Law enforcement agents also seized eight computers and 32 external hard drives, two firearms, and €400,000 worth of cryptocurrency from the suspect"s home, Europol added that this LockBit operator "was one of Europol"s high-value targets due to his involvement in numerous high-profile ransomware cases," and he is known for trying to extort victims with ransom demands between €5 to €70 million. "


US Health Dept warns of Venus ransomware targeting healthcare orgs

exploits ransomware
2022-11-10 https://www.bleepingcomputer.com/news/security/us-health-dept-warns-of-venus-ransomware-targeting-healthcare-orgs/
The U.S. Department of Health and Human Services (HHS) warned today that Venus ransomware attacks are also targeting the country"s healthcare organizations. [...] "

Autosummary: "


Russian military hackers linked to ransomware attacks in Ukraine

exploits ransomware
2022-11-10 https://www.bleepingcomputer.com/news/security/russian-military-hackers-linked-to-ransomware-attacks-in-ukraine/
A series of attacks targeting transportation and logistics organizations in Ukraine and Poland with Prestige ransomware since October have been linked to an elite Russian military cyberespionage group. [...] "

Autosummary: "


Experts observed Amadey malware deploying LockBit 3.0 Ransomware

exploits ransomware
2022-11-09 https://securityaffairs.co/wordpress/138292/malware/amadey-malware-deploying-lockbit-3-0.html

Experts noticed that the Amadey malware is being used to deploy LockBit 3.0 ransomware on compromised systems. Researchers from AhnLab Security Emergency Response Center (ASEC) reported that the Amadey malware is being used to deploy LockBit 3.0 ransomware on compromised systems, researchers have warned. Amadey Bot is a data-stealing malware that was first spotted in 2018, it also allows […]

The post Experts observed Amadey malware deploying LockBit 3.0 Ransomware appeared first on Security Affairs.

"

Autosummary: Linkedin Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Medibank warns customers their data was leaked by ransomware gang

financial exploits ransomware
2022-11-09 https://www.bleepingcomputer.com/news/security/medibank-warns-customers-their-data-was-leaked-by-ransomware-gang/
Australian health insurance giant Medibank has warned customers that the ransomware group behind last month"s breach has started to leak data stolen from its systems. [...] "

Autosummary: The data Medibank believes was exposed in last month"s breach includes the following: Name, date of birth, address, phone number, and email address for approximately 9.7 million current and former customers and authorized representatives Medicare numbers (but not expiry dates) for ahm health insurance (ahm) customers Passport numbers (but not expiry dates) and visa details for international student customers Health claims data for roughly 480,000 Medibank, ahm, and international customers Health provider details, including names, provider numbers, and addresses However, according to Medibank "given the nature of this crime, unfortunately we now believe that all of the customer data accessed could have been taken by the criminal. "


Medibank confirms ransomware attack impacting 9.7M customers, but doesn’t pay the ransom

financial exploits ransomware
2022-11-08 https://securityaffairs.co/wordpress/138243/cyber-crime/medibank-confirms-ransomware-attack.html

Australian health insurer Medibank confirmed that personal data belonging to around 9.7 million current and former customers were exposed as a result of a ransomware attack. Medibank announced that personal data belonging to around 9.7M of current and former customers were exposed as a result of a recent ransomware attack. Medibank is one of the […]

The post Medibank confirms ransomware attack impacting 9.7M customers, but doesn’t pay the ransom appeared first on Security Affairs.

"

Autosummary: This figure represents around 5.1 million Medibank customers, around 2.8 million ahm customers and around 1.8 million international customers Medicare numbers (but not expiry dates) for ahm customers Passport numbers (but not expiry dates) and visa details for international student customers Health claims data for around 160,000 Medibank customers, around 300,000 ahm customers and around 20,000 international customers. "


Amadey Bot Spotted Deploying LockBit 3.0 Ransomware on Hacked Machines

exploits ransomware
2022-11-08 https://thehackernews.com/2022/11/amadey-bot-spotted-deploying-lockbit-30.html
The Amadey malware is being used to deploy LockBit 3.0 ransomware on compromised systems, researchers have warned. "Amadey bot, the malware that is used to install LockBit, is being distributed through two methods: one using a malicious Word document file, and the other using an executable that takes the disguise of the Word file icon," AhnLab Security Emergency Response Center (ASEC) said in a "

Autosummary: "


LockBit affiliate uses Amadey Bot malware to deploy ransomware

exploits ransomware
2022-11-08 https://www.bleepingcomputer.com/news/security/lockbit-affiliate-uses-amadey-bot-malware-to-deploy-ransomware/
A LockBit 3.0 ransomware affiliate is using phishing emails that install the Amadey Bot to take control of a device and encrypt devices. [...] "

Autosummary: The payloads are again dropped in TEMP as one of the following three: %TEMP%\1000018041\dd.ps1 %TEMP%\1000019041\cc.ps1 %TEMP%\1000020001\LBB.exe From there, LockBit encrypts the user"s files and generates ransom notes demanding payment, threatening to publish stolen files on the group"s extortion site. "


Medibank Refuses to Pay Ransom After 9.7 Million Customers Exposed in Ransomware Hack

financial exploits ransomware
2022-11-07 https://thehackernews.com/2022/11/medibank-refuses-to-pay-ransom-after-97.html
Australian health insurer Medibank today confirmed that personal data belonging to around 9.7 million of its current and former customers were accessed following a ransomware incident. The attack, according to the company, was detected in its IT network on October 12 in a manner that it said was "consistent with the precursors to a ransomware event," prompting it to isolate its systems, but not "

Autosummary: "


Robin Banks phishing-as-a-service platform continues to evolve

financial ransomware
2022-11-07 https://securityaffairs.co/wordpress/138199/cyber-crime/robin-banks-phaas.html

The phishing-as-a-service (PhaaS) platform Robin Banks migrated its infrastructure to DDoS-Guard, a Russian bulletproof hosting service. The phishing-as-a-service (PhaaS) platform Robin Banks was originally hosted by Cloudflare provider, but the company in July disassociated Robin Banks phishing infrastructure from its services after being informed. The move caused a multi-day disruption to PhaaS operations, then the administrators […]

The post Robin Banks phishing-as-a-service platform continues to evolve appeared first on Security Affairs.

"

Autosummary: “Robin Banks’ heavy reliance on open-source code and off-the-shelf tooling showcases just how low the barrier-to-entry is to not only conducting phishing attacks, but also to becoming a service provider and creating a PhaaS platform for others to use. Linkedin Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Azov Ransomware is a wiper, destroying data 666 bytes at a time

exploits ransomware
2022-11-07 https://www.bleepingcomputer.com/news/security/azov-ransomware-is-a-wiper-destroying-data-666-bytes-at-a-time/
The Azov Ransomware continues to be heavily distributed worldwide, now proven to be a data wiper that intentionally destroys victims" data and infects other programs. [...] "

Autosummary: "This works in a loop, so wiped file structure would look like this: 666 bytes of garbage, 666 bytes original, 666bytes of garbage, 666 bytes original, etc…" Corrupting data in alternating 666 bytes of data Source: Jiří Vinopal To make matters even worse, the data wiper will infect, or "backdoor," other 64-bit executables on the Windows device whose file path does not contain the following strings: :\Windows \ProgramData\ \cache2\entries \Low\Content. "


LockBit 3.0 gang claims to have stolen data from Kearney & Company

ransomware
2022-11-06 https://securityaffairs.co/wordpress/138136/cyber-crime/lockbit-ransomware-kearney-company.html

The ransomware group LockBit claimed to have stolen data from consulting and IT services provider Kearney & Company. Kearney is the premier CPA firm that services across the financial management spectrum to government entities. The company provides audit, consulting and IT services to the United States government. It has helped the Federal Government improve its […]

The post LockBit 3.0 gang claims to have stolen data from Kearney & Company appeared first on Security Affairs.

"

Autosummary: "


Black Basta ransomware gang linked to the FIN7 hacking group

exploits ransomware
2022-11-03 https://www.bleepingcomputer.com/news/security/black-basta-ransomware-gang-linked-to-the-fin7-hacking-group/
Security researchers at Sentinel Labs have uncovered evidence that links the Black Basta ransomware gang to the financially motivated hacking group FIN7, also known as "Carbanak." [...] "

Autosummary: A 2022 Mandiant report explained that FIN7 was working with various ransomware gangs, including Maze, Ryuk, Darkside, and BlackCat/ALPHV, apparently carrying out the initial compromise. "


Experts link the Black Basta ransomware operation to FIN7 cybercrime gang

exploits ransomware
2022-11-03 https://securityaffairs.co/wordpress/138037/cyber-crime/black-basta-linked-fin7.html

Sentinel Labs found evidence that links the Black Basta ransomware gang to the financially motivated hacking group FIN7. Security researchers at Sentinel Labs shared details about Black Basta‘s TTPs and assess it is highly likely the ransomware operation has ties with FIN7. The experts analyzed tools used by the ransomware gang in attacks, some of […]

The post Experts link the Black Basta ransomware operation to FIN7 cybercrime gang appeared first on Security Affairs.

"

Autosummary: The report details Black Basta’s initial access activity, manual reconnaissance, lateral movements, privilege escalation techniques, and remote admin tools.Furthermore, we assess it is likely that the developer(s) behind their tools to impair victim defenses is, or was, a developer for FIN7.” concludes the report. "


LockBit ransomware claims attack on Continental automotive giant

exploits ransomware industry
2022-11-03 https://www.bleepingcomputer.com/news/security/lockbit-ransomware-claims-attack-on-continental-automotive-giant/
The LockBit ransomware gang has claimed responsibility for a cyberattack against the German multinational automotive group Continental. [...] "

Autosummary: Continental entry on Lockbit"s data leak site (BleepingComputer) ​Breached in an August cyberattack Continental"s VP of Communications & Marketing, Kathryn Blackwell, didn"t confirm LockBit"s claims and would not share any details regarding the attack when BleepingComputer reached out but, instead, linked to a press release from August 24 regarding a cyberattack that led to a breach of Continental"s systems. "


Researchers Find Links b/w Black Basta Ransomware and FIN7 Hackers

exploits ransomware
2022-11-03 https://thehackernews.com/2022/11/researchers-find-links-bw-black-basta.html
A new analysis of tools put to use by the Black Basta ransomware operation has identified ties between the threat actor and the FIN7 (aka Carbanak) group. This link "could suggest either that Black Basta and FIN7 maintain a special relationship or that one or more individuals belong to both groups," cybersecurity firm SentinelOne said in a technical write-up shared with The Hacker News. Black "

Autosummary: Once Qakbot obtains a persistent foothold in the target environment, the Black Basta operator enters the scene to conduct reconnaissance by connecting to the victim through the backdoor, followed by exploiting known vulnerabilities (e.g., ZeroLogon, PrintNightmare, and NoPac) to escalate privileges. "


LockBit ransomware gang claims the hack of Continental automotive group

exploits ransomware industry
2022-11-03 https://securityaffairs.co/wordpress/138062/cyber-crime/lockbit-gang-claims-continental-hack.html

The LockBit ransomware group claimed to have hacked the multinational automotive group Continental and threatens to leak stolen data. LockBit ransomware gang announced to have hacked the German multinational automotive parts manufacturing company Continental. The group added the name of the company to its Tor leak site and is threatening to publish alleged stolen data if the […]

The post LockBit ransomware gang claims the hack of Continental automotive group appeared first on Security Affairs.

"

Autosummary: "


Forescout Continuum Timeline accelerates threat detection for cybersecurity teams

ransomware ciber
2022-11-02 https://www.helpnetsecurity.com/2022/11/02/forescout-continuum-timeline/

Forescout Technologies has released its latest Continuum platform update which includes Forescout Continuum Timeline, a new cloud-native solution that provides long-term retention, search, and analytics of asset data. Timeline enables enterprises to meet compliance and audit requirements, better support incident investigations, and to identify risks and gaps to help prioritize preventative measures. Today, all organizations need an automated way of maintaining real-time asset intelligence for every connected device. Cybersecurity teams overwhelmed with rapid asset growth … More

The post Forescout Continuum Timeline accelerates threat detection for cybersecurity teams appeared first on Help Net Security.

"

Autosummary: This Continuum platform update expands asset discovery, assessment, and management capabilities to reduce high manual labor costs, performance issues, challenges with keeping asset databases current, business disruptions, and the risk of security breaches due to asset intelligence gaps. "


LockBit 3.0 gang claims to have stolen data from Thales

ransomware
2022-11-01 https://securityaffairs.co/wordpress/137955/cyber-crime/lockbit-3-0-thales.html

The ransomware group LockBit 3.0 claimed to have stolen data from the French defence and technology group Thales. Thales is a global high-tech leader with more than 81,000 employees worldwide. The Group invests in digital and deep tech innovations – big data, artificial intelligence, connectivity, cybersecurity and quantum – to build a future of trust, […]

The post LockBit 3.0 gang claims to have stolen data from Thales appeared first on Security Affairs.

"

Autosummary: "


Raspberry Robin worm used as ransomware prelude

exploits ransomware
2022-10-31 https://www.malwarebytes.com/blog/news/2022/10/raspberry-robin-worm-used-as-ransomware-prelude

Categories: News

Categories: Ransomware

Tags: Raspberry Robin

Tags: FakeUpdates

Tags: LockBit

Tags: Clop

Tags: ransomware

Microsoft warns that the Raspberry Robin worm has triggered payload alerts on devices of almost 1,000 organizations in the past 30 days and is used to introduce ransomware.

(Read more...)

The post Raspberry Robin worm used as ransomware prelude appeared first on Malwarebytes Labs.

"

Autosummary: Microsoft found that Raspberry Robin has been used to facilitate FakeUpdates (SocGholish), Fauppod, IcedID, Bumblebee, TrueBot, LockBit, and human-operated intrusions. "


The Week in Ransomware - October 28th 2022 - Healthcare leaks

exploits ransomware
2022-10-28 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-october-28th-2022-healthcare-leaks/
This week, we learned of healthcare data leaks out of Australia, information about existing attacks, and reports on how ransomware gangs operate and partner with malware developers for initial access. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @LawrenceAbrams, @BleepinComputer, @struppigel, @malwrhunterteam, @serghei, @fwosar, @Ionut_Ilascu, @DanielGallagher, @VK_Intel, @jorntvdw, @demonslay335, @billtoulas, @FourOctets, @Seifreed, @PolarToffee, @malwareforme, @AlvieriD, @_CERT_UA, @Jeremy_Kirk, @MsftSecIntel, @pcrisk, @TrendMicro, @DragosInc, and @BrettCallow. We also learned more information about new and existing ransomware attacks, such as an alleged 60 million LockBit ransomware demand on Pendragon, Hive claiming the attack on Tata Power, Medibank warning that the hackers accessed all customers" personal data, a ransomware attack on the Indianapolis Housing Agency, and Australian Clinical Labs disclosing that patient data was stolen. "


Microsoft links Raspberry Robin worm to Clop ransomware attacks

exploits ransomware
2022-10-27 https://www.bleepingcomputer.com/news/security/microsoft-links-raspberry-robin-worm-to-clop-ransomware-attacks/
Microsoft says a threat group tracked as DEV-0950 used Clop ransomware to encrypt the network of a victim previously infected with the Raspberry Robin worm. [...] "

Autosummary: Besides ransomware, Raspberry Robin has also been used to drop other second-stage payloads onto compromised devices, including IcedID, Bumblebee, and Truebot. "


Australian Clinical Labs says patient data stolen in ransomware attack

exploits ransomware
2022-10-27 https://www.bleepingcomputer.com/news/security/australian-clinical-labs-says-patient-data-stolen-in-ransomware-attack/
Australian Clinical Labs (ACL) has disclosed a February 2022 data breach that impacted its Medlab Pathology business, exposing the medical records and other sensitive information of 223,000 people. [...] "

Autosummary: The threat actors leaked 86GB of data, including patient and employee details, financial reports, invoices, contracts, forms, subpoenas, and other private documents. "


Raspberry Robin operators are selling initial access to compromised enterprise networks to ransomware gangs

exploits ransomware
2022-10-27 https://securityaffairs.co/wordpress/137722/malware/raspberry-robin-clop-ransomware.html

DEV-0950 group used Clop ransomware to encrypt the network of organizations previously infected with the Raspberry Robin worm. Microsoft has discovered recent activity that links the Raspberry Robin worm to human-operated ransomware attacks.  Data collected by Microsoft Defender for Endpoint shows that nearly 3,000 devices in almost 1,000 organizations have seen at least one RaspberryRobin […]

The post Raspberry Robin operators are selling initial access to compromised enterprise networks to ransomware gangs appeared first on Security Affairs.

"

Autosummary: “Given the previously documented relationship between RaspberryRobin and DEV-0206/DEV-0243 (EvilCorp), this behavioral similarity in the initial vector for Raspberry Robin infections adds another piece of evidence to the connection between the development and propagation of Fauppod/Raspberry Robin and DEV-0206/DEV-0243.” concludes the report. "


What is ransomware-as-a-service and how is it evolving?

exploits ransomware
2022-10-27 https://www.malwarebytes.com/blog/business/2022/10/what-is-ransomware-as-a-service-and-how-is-it-evolving

Categories: Business

Diving into how RaaS works, why it poses a unique threat to businesses, and how small-and-medium-sized (SMBs) businesses can prepare for the next generation of RaaS attacks.

(Read more...)

The post What is ransomware-as-a-service and how is it evolving? appeared first on Malwarebytes Labs.

"

Autosummary: RaaS is not much different, in theory, from the software-as-a-service (SaaS) business model, where cloud providers “rent out” their technology to you on a subscription basis—just swap out ‘cloud providers’ with ‘ransomware gangs’ and ‘technology’ with ransomware (and the related crimes involved). Why ransomware-as-a-service attacks are so dangerous The fact that RaaS attacks are human-operated means that ransomware attacks are more targeted than they used to be—and targeted attacks are far more dangerous than un-targeted ones. At the forefront of this evolution from automated ransomware to human-operated ransomware attacks are ransomware-as-a-service gangs—and their new business model seems to be paying off: in 2021, ransomware gangs made at least $350 million in ransom payments. How ransomware-as-a-service changed the game Why ransomware-as-a-service attacks are so dangerous Is ransomware here to stay? "


Vice Society Hackers Are Behind Several Ransomware Attacks Against Education Sector

exploits ransomware
2022-10-26 https://thehackernews.com/2022/10/vice-society-hackers-are-behind-several.html
A cybercrime group known as Vice Society has been linked to multiple ransomware strains in its malicious campaigns aimed at the education, government, and retail sectors. The Microsoft Security Threat Intelligence team, which is tracking the threat cluster under the moniker DEV-0832, said the group avoids deploying ransomware in some cases and rather likely carries out extortion using "

Autosummary: "Shifting ransomware payloads over time from BlackCat, Quantum Locker, and Zeppelin, DEV-0832"s latest payload is a Zeppelin variant that includes Vice Society-specific file extensions, such as .v-s0ciety, .v-society, and, most recently, .locked," the tech giant"s cybersecurity division said. "


US agencies issue warning about DAIXIN Team ransomware

exploits ransomware
2022-10-26 https://www.malwarebytes.com/blog/news/2022/10/fbi-cisa-hhs-issue-joint-alert-about-daixin-ransomware-team

Categories: News

Categories: Ransomware

Tags: DAIXIN

Tags: FBI

Tags: CISA

Tags: HHS

Tags: ransomware team

Tags: DAIXIN Team

Tags: ransomware

The FBI, CISA, and HSH have issued a joint advisory about a new threat to healthcare organizations

(Read more...)

The post US agencies issue warning about DAIXIN Team ransomware appeared first on Malwarebytes Labs.

"

Autosummary: Posted: October 26, 2022 by The FBI, CISA, and HSH have issued a joint advisory about a new threat to healthcare organizations The FBI, Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Health and Human Services (HHS) have issued a joint advisory about DAIXIN Team, a fledgling ransomware and data exfiltration group that has been targeting US healthcare. "


The long-term psychological effects of ransomware attacks

exploits ransomware
2022-10-25 https://www.helpnetsecurity.com/2022/10/25/psychological-effects-ransomware/

Northwave has conducted scientific research into the psychological effects of a ransomware crisis on both organizations and individuals. The findings reveal the deep marks that a ransomware crisis leaves on all those affected. It also shows how their IT and security teams can turn in disarray long after the crisis itself has passed. Key findings on psychological effects of ransomware “The research reveals how the psychological impact of ransomware attacks can persist on people in … More

The post The long-term psychological effects of ransomware attacks appeared first on Help Net Security.

"

Autosummary: Key findings on psychological effects of ransomware “The research reveals how the psychological impact of ransomware attacks can persist on people in affected organizations for a very long time,” explains Organizational Psychologist Inge van der Beijl, Director Behaviour & Resilience at Northwave. One of every seven employees involved in the attack, either directly or indirectly, exhibits severe enough symptoms several months later, at a level considered to be above the clinical threshold at which professional trauma treatment help is needed. These long-term effects impact staff turnover: One in five directly affected by the attack has considered, or is still considering, changing jobs. "


Hive claims ransomware attack on Tata Power, begins leaking data

exploits ransomware
2022-10-25 https://www.bleepingcomputer.com/news/security/hive-claims-ransomware-attack-on-tata-power-begins-leaking-data/
Hive ransomware group has claimed responsibility for a cyber attack disclosed by Tata Power this month. In data leak screenshots seen by BleepingComputer, Hive operators are seen leaking data it claims to have stolen from Tata Power, indicating the ransom negotiations failed. [...] "

Autosummary: Hive ransomware starts leaking data it claims to have stolen from Tata Power Another researcher Rakesh Krishnan shared screenshots of the stolen data—which appears to include Tata Power employees" personally identifiable information (PII), National ID (Aadhar) card numbers, PAN (tax account) numbers, salary information, etc. "


Hive ransomware gang starts leaking data allegedly stolen from Tata Power

exploits ransomware
2022-10-25 https://securityaffairs.co/wordpress/137601/malware/hive-ransomware-tata-power.html

The Hive ransomware gang, which claimed the responsibility for the Tata Power data breach, started leaking data. On October 14, Tata Power, India’s largest power generation company, announced that was hit by a cyber attack. Threat actors hit the Information Technology (IT) infrastructure of the company. The company confirmed that the security breach impacted “some of […]

The post Hive ransomware gang starts leaking data allegedly stolen from Tata Power appeared first on Security Affairs.

"

Autosummary: The porting to Rust language provides the following advantages: It offers memory, data type, and thread safety It has deep control over low-level resources It has a user-friendly syntax It has several mechanisms for concurrency and parallelism, thus enabling fast and safe file encryption It has a good variety of cryptographic libraries It’s relatively more difficult to reverse-engineer The most important change in the latest Hive variant is the encryption mechanism it adopts. "


Hive Ransomware Hackers Begin Leaking Data Stolen from Tata Power Energy Company

exploits ransomware industry
2022-10-25 https://thehackernews.com/2022/10/hive-ransomware-hackers-begin-leaking.html
The Hive ransomware-as-a-service (RaaS) group has claimed responsibility for a cyber attack against Tata Power that was disclosed by the company less than two weeks ago. The incident is said to have occurred on October 3, 2022. The threat actor has also been observed leaking stolen data exfiltrated prior to encrypting the network as part of its double extortion scheme. This allegedly comprises "

Autosummary: "


Microsoft: Vice Society targets schools with multiple ransomware families

exploits ransomware
2022-10-25 https://www.bleepingcomputer.com/news/security/microsoft-vice-society-targets-schools-with-multiple-ransomware-families/
A threat group known as Vice Society has been switching ransomware payloads in attacks targeting the education sector across the United States and worldwide. [...] "

Autosummary: " Targets set on U.S. schools Vice Society is a threat group active since at least early June 2021, known for deploying multiple ransomware strains on their victims" networks, such as Hello Kitty/Five Hands and Zeppelin ransomware. "


CISA Warns of Daixin Team Hackers Targeting Health Organizations With Ransomware

exploits ransomware
2022-10-24 https://thehackernews.com/2022/10/cisa-warns-of-daixin-team-hackers.html
U.S. cybersecurity and intelligence agencies have published a joint advisory warning of attacks perpetrated by a cybercrime gang known as the Daixin Team primarily targeting the healthcare sector in the country. "The Daixin Team is a ransomware and data extortion group that has targeted the HPH Sector with ransomware and data extortion operations since at least June 2022," the agencies said. The "

Autosummary: "


Why Ransomware in Education on the Rise and What That Means for 2023

exploits ransomware
2022-10-24 https://thehackernews.com/2022/10/why-ransomware-in-education-on-rise-and.html
The breach of LA Unified School District (LAUSD) highlights the prevalence of password vulnerabilities, as criminal hackers continue to use breached credentials in increasingly frequent ransomware attacks on education. The Labor Day weekend breach of LAUSD brought significant districtwide disruptions to access to email, computers, and applications. It"s unclear what student or employee data the "

Autosummary: " Beefing up security for 2023 Attackers buy and sell breached passwords on the dark web by the millions, knowing that, due to password reuse, the average credential grants access to many accounts. The FBI and CISA had observed the Vice Society ransomware group, which took credit for the attack, using TTPs including "escalating privileges, then gaining access to domain administrator accounts." "


Cuba ransomware affiliate targets Ukrainian govt agencies

exploits ransomware
2022-10-24 https://www.bleepingcomputer.com/news/security/cuba-ransomware-affiliate-targets-ukrainian-govt-agencies/
The Computer Emergency Response Team of Ukraine (CERT-UA) has issued an alert about potential Cuba Ransomware attacks against critical networks in the country. [...] "

Autosummary: "


Pendragon car dealer refuses $60 million LockBit ransomware demand

exploits ransomware
2022-10-24 https://www.bleepingcomputer.com/news/security/pendragon-car-dealer-refuses-60-million-lockbit-ransomware-demand/
Pendragon Group, with more than 200 car dealerships in the U.K., was breached in a cyberattack from the LockBit ransomware gang, who allegedly demanded $60 million to decrypt files and not leak them. [...] "

Autosummary: "


Car dealer group Pendragon refuses to pay $60 million to ransomware extortionists

exploits ransomware
2022-10-24 https://grahamcluley.com/car-dealer-group-pendragon-refuses-to-pay-60-million-to-ransomware-extortionists/
Pendragon - the car dealership group which owns Evans Halshaw, CarStore, and Stratstone, and operates around 160 showrooms across the UK - has confirmed that its IT servers have been hacked by cybercriminals who claim to have stolen five per cent of its data. "

Autosummary: Furthermore, if those responsible are ever identified, the existence of the injunction may help to seek recompense one day, perhaps through seizing their assets. "


Cuba ransomware affiliate targets Ukraine, CERT-UA warns

exploits ransomware
2022-10-24 https://securityaffairs.co/wordpress/137567/cyber-warfare-2/cuba-ransomware-cert-ua.html

The Ukraine Computer Emergency Response Team (CERT-UA) warns of Cuba Ransomware attacks against critical networks in the country. The Ukraine Computer Emergency Response Team (CERT-UA) warns of potential Cuba Ransomware attacks against local critical infrastructure. On October 21, 2022, the Ukraine CERT-UA uncovered a phishing campaign impersonating the Press Service of the General Staff of […]

The post Cuba ransomware affiliate targets Ukraine, CERT-UA warns appeared first on Security Affairs.

"

Autosummary: "


Trilio’s Continuous Restore enables users to stage data in multiple heterogeneous clouds

ransomware
2022-10-22 https://www.helpnetsecurity.com/2022/10/22/continuous-restore-trilio/

Trilio‘s Continuous Restore offers faster levels of replication, restoration and migration of Kubernetes data and metadata from any cloud or storage platform to another, providing near-instantaneous recovery times for cloud-native applications. Entirely distribution-, cloud- and storage-agnostic, Trilio’s Continuous Restore enables users to continuously stage data in multiple heterogeneous clouds. This means that applications—regardless of where they reside—can tap into that data and be brought online in seconds, achieving exceptional levels of Recovery Time Objectives (RTO). … More

The post Trilio’s Continuous Restore enables users to stage data in multiple heterogeneous clouds appeared first on Help Net Security.

"

Autosummary: “Trilio’s Continuous Restore capability is a revolution in data protection because it moves the industry beyond ‘back-up your data anywhere, anytime’ to ‘your data is available everywhere, all the time,’” said David Safaii, CEO of Trilio. “Trilio’s Continuous Restore capability enables migration and replication of stateful applications in seconds or minutes so that all companies can protect and use their data anywhere, from core to edge—regardless of what the application runs on or where the data is stored,” said Murali Balcha, founder and CTO of Trilio. "


TommyLeaks and SchoolBoys: Two sides of the same ransomware gang

exploits ransomware
2022-10-22 https://www.bleepingcomputer.com/news/security/tommyleaks-and-schoolboys-two-sides-of-the-same-ransomware-gang/
Two new extortion gangs named "TommyLeaks" and "SchoolBoys" are targeting companies worldwide. However, there is a catch — they are both the same ransomware gang. [...] "

Autosummary: SchoolBoy"s Ransomware Gang negotiation site Source: BleepingComputer.com TommyLeaks negotiation site Source: BleepingComputer.com Even more curious, this same chat system has only been used before by the Karakurt extortion group. "


Threat actors exploit critical flaw in VMware Workspace ONE Access to drop ransomware, miners

exploits ransomware
2022-10-22 https://securityaffairs.co/wordpress/137483/hacking/vmware-workspace-one-access-flaw.html

Threat actors are exploiting a now-patched vulnerability, tracked as CVE-2022-22954, in VMware Workspace ONE Access in attacks in the wild. Threat actors are actively exploiting a now-patched vulnerability, tracked as CVE-2022-22954, in VMware Workspace ONE Access to deliver cryptocurrency miners and ransomware. The issue causes server-side template injection due to because of the lack of […]

The post Threat actors exploit critical flaw in VMware Workspace ONE Access to drop ransomware, miners appeared first on Security Affairs.

"

Autosummary: Threat actors are actively exploiting a now-patched vulnerability, tracked as CVE-2022-22954, in VMware Workspace ONE Access to deliver cryptocurrency miners and ransomware. "


Daixin Team targets health organizations with ransomware, US agencies warn

exploits ransomware
2022-10-22 https://securityaffairs.co/wordpress/137493/cyber-crime/daixin-team-targets-healthcare.html

US government agencies warned that the Daixin Team cybercrime group is actively targeting the U.S. Healthcare and Public Health sector with ransomware. CISA, the FBI, and the Department of Health and Human Services (HHS) warned that the Daixin Team cybercrime group is actively targeting U.S. businesses, mainly in the Healthcare and Public Health (HPH) Sector, […]

The post Daixin Team targets health organizations with ransomware, US agencies warn appeared first on Security Affairs.

"

Autosummary: In addition, the FBI, CISA, and HHS urge all organizations, including HPH Sector organizations, to apply the following recommendations to prepare for, mitigate/prevent, and respond to ransomware incidents. CISA, the FBI, and the Department of Health and Human Services (HHS) warned that the Daixin Team cybercrime group is actively targeting U.S. businesses, mainly in the Healthcare and Public Health (HPH) Sector, with ransomware operations. "


Presidio Active Response Solution Set strengthens ransomware preparedness for businesses

exploits ransomware
2022-10-21 https://www.helpnetsecurity.com/2022/10/21/presidio-active-response-solution-set/

To further address the increasing cybersecurity threat landscape, Presidio has revealed a new cybersecurity Active Response Solution Set to help clients be prepared for a ransomware event with assessments, preparedness, active response, and recovery. Ransomware is one of the largest global industries. According to IDC, 37% of global organizations were impacted by some form of ransomware in 2021. Presidio is addressing organizational needs for cyber insurance by meeting stringent minimum compliance requirements in order to … More

The post Presidio Active Response Solution Set strengthens ransomware preparedness for businesses appeared first on Help Net Security.

"

Autosummary: “Presidio’s Active Response Solution Set slices through a fragmented approach to cyber defense by joining all aspects into one simple solution,” said Sunil Jain, CEO at Marius, a cyber insurance group partnering with cybersecurity providers to streamline cyber insurance for their clients. "


BlackByte ransomware uses new data theft tool for double-extortion

exploits ransomware
2022-10-21 https://www.bleepingcomputer.com/news/security/blackbyte-ransomware-uses-new-data-theft-tool-for-double-extortion/
A BlackByte ransomware affiliate is using a new custom data stealing tool called "ExByte" to steal data from compromised Windows devices quickly. [...] "

Autosummary: [CPU] Also, the malware checks for the presence of the following DLL files: avghooka.dll avghookx.dll sxin.dll sf2.dll sbiedll.dll snxhk.dll cmdvrt32.dll cmdvrt64.dll wpespy.dll vmcheck.dll pstorec.dll dir_watch.dll api_log.dll dbghelp.dll The BlackByte ransomware binary also implements these same tests, but the exfiltration tool needs to run them independently since data exfiltration takes place before file encryption. "


Multiple Campaigns Exploit VMware Vulnerability to Deploy Crypto Miners and Ransomware

exploits ransomware
2022-10-21 https://thehackernews.com/2022/10/multiple-campaigns-exploit-vmware.html
A now-patched vulnerability in VMware Workspace ONE Access has been observed being exploited to deliver both cryptocurrency miners and ransomware on affected machines. "The attacker intends to utilize a victim"s resources as much as possible, not only to install RAR1Ransom for extortion, but also to spread GuardMiner to collect cryptocurrency," Fortinet FortiGuard Labs researcher Cara Lin said "

Autosummary: "


US govt warns of Daixin Team targeting health orgs with ransomware

exploits ransomware
2022-10-21 https://www.bleepingcomputer.com/news/security/us-govt-warns-of-daixin-team-targeting-health-orgs-with-ransomware/
CISA, the FBI, and the Department of Health and Human Services (HHS) warned that a cybercrime group known as Daixin Team is actively targeting the U.S. Healthcare and Public Health (HPH) Sector sector in ransomware attacks. [...] "

Autosummary: "This third-party reporting as well as FBI analysis show that the ransomware targets ESXi servers and encrypts files located in /vmfs/volumes/ with the following extensions: .vmdk, .vmem, .vswp, .vmsd, .vmx, and .vmsn. "


Hackers exploit critical VMware flaw to drop ransomware, miners

exploits ransomware
2022-10-21 https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-vmware-flaw-to-drop-ransomware-miners/
Security researchers observed malicious campaigns leveraging a critical vulnerability in VMware Workspace One Access to deliver various malware, including the RAR1Ransom tool that locks files in password-protected archives. [...] "

Autosummary: The PowerShell script ("init.ps1") downloads the following files from a Cloudflare IPFS gateway: phpupdate.exe: Xmrig Monero mining software config.json: Configuration file for mining pools networkmanager.exe: Executable used to scan and spread infection phpguard.exe: Executable used for guardian Xmrig miner to keep running clean.bat: Script file to remove other cryptominers on the compromised host encrypt.exe: RAR1 ransomware If the Cloudflare resource is unavailable for any reason, the malware uses a backup link at "crustwebsites[.]net". "


The Week in Ransomware - October 21st 2022 - Stop the Presses

exploits ransomware
2022-10-21 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-october-21st-2022-stop-the-presses/
Cybersecurity researchers did not disappoint, with reports linking RansomCartel to REvil, on OldGremlin hackers targeting Russia with ransomware, a new data exfiltration tool used by BlackByte, a warning that ransomware actors are exploiting VMware vulnerabilities, and finally, our own report on the Venus Ransomware. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @malwrhunterteam, @PolarToffee, @Ionut_Ilascu, @FourOctets, @jorntvdw, @struppigel, @BleepinComputer, @demonslay335, @billtoulas, @Seifreed, @LawrenceAbrams, @serghei, @fwosar, @DanielGallagher, @VK_Intel, @malwareforme, @Fortinet, @BroadcomSW, @0verfl0w_, @linuxct, @Unit42_Intel, @Amermelsad, @MsftSecIntel, @CrowdStrike, @GroupIB_GIB, @BushidoToken, @JackRhysider, @Intel471Inc, @NCCGroupplc, and @pcrisk.Cybersecurity researchers did not disappoint, with reports linking RansomCartel to REvil, on OldGremlin hackers targeting Russia with ransomware, a new data exfiltration tool used by BlackByte, a warning that ransomware actors are exploiting VMware vulnerabilities, and finally, our own report on the Venus Ransomware. "


New Ursnif Variant Likely Shifting Focus to Ransomware and Data Theft

exploits ransomware
2022-10-20 https://thehackernews.com/2022/10/latest-ursnif-variant-shifts-focus-from.html
The Ursnif malware has become the latest malware to shed its roots as a banking trojan to revamp itself into a generic backdoor capable of delivering next-stage payloads, joining the likes of Emotet, Qakbot, and TrickBot. "This is a significant shift from the malware"s original purpose to enable banking fraud, but is consistent with the broader threat landscape," Mandiant researchers Sandor "

Autosummary: "


OldGremlin hackers use Linux ransomware to attack Russian orgs

exploits ransomware
2022-10-20 https://www.bleepingcomputer.com/news/security/oldgremlin-hackers-use-linux-ransomware-to-attack-russian-orgs/
OldGremlin, one of the few ransomware groups attacking Russian corporate networks, has expanded its toolkit with file-encrypting malware for Linux machines. [...] "

Autosummary: The malware executable is wrapped using Ultimate Packer (UPX) and appends the .crypt extension to the encrypted files, among them being .RAW, .ZST, .CSV, .IMG, .ISO, SQL, TAR, TGZ, .DAT, .GZ, .DUMP. "


OldGremlin Ransomware Targeted Over a Dozen Russian Entities in Multi-Million Scheme

exploits ransomware
2022-10-20 https://thehackernews.com/2022/10/oldgremlin-ransomware-targeted-over.html
A Russian-speaking ransomware group dubbed OldGremlin has been attributed to 16 malicious campaigns aimed at entities operating in the transcontinental Eurasian nation over the course of two and a half years. "The group"s victims include companies in sectors such as logistics, industry, insurance, retail, real estate, software development, and banking," Group-IB said in an exhaustive report "

Autosummary: "The group"s victims include companies in sectors such as logistics, industry, insurance, retail, real estate, software development, and banking," Group-IB said in an exhaustive report shared with The Hacker News. "The threat actors often pose as well-known companies, including the media group RBC, the legal assistance system Consultant Plus, the company 1C-Bitrix, the Russian Union of Industrialists and Entrepreneurs, and Minsk Tractor Works," Group-IB said. "


Venus ransomware targets remote desktop services

exploits ransomware
2022-10-20 https://www.malwarebytes.com/blog/news/2022/10/venus-ransomware-targets-remote-desktop-services

Categories: News

Tags: Venus Ransomware

Tags: RDP

Tags: remote desktop services

Tags: encrypt

Tags: fraud

Tags: ransom

We take a look at reports of Venus ransomware targeting remote desktop services/RDP.

(Read more...)

The post Venus ransomware targets remote desktop services appeared first on Malwarebytes Labs.

"

Autosummary: For example samples: One from July/August: 2e2cef71bf99594b54e00d459480e1932e0230fb1cbee24700fbc2f5f631bf12 And one from September: 6d8e2d8f6aeb0f4512a53fe83b2ef7699513ebaff31735675f46d1beea3a8e05 — MalwareHunterTeam (@malwrhunterteam) October 6, 2022 Venus brings bad remote tidings It seems these attacks very much follow the typical Remote Services/Remote Desktop Protocol (RDP) gameplan. The incredibly overt ransom note, which is somewhat difficult to read given it sports white text on a bright orange background, reads as follows: "We downloaded and encrypted your data. "


DirectDefense collaborates with Halcyon to protect users against ransomware

exploits ransomware
2022-10-20 https://www.helpnetsecurity.com/2022/10/21/directdefense-halcyon/

As a DirectDefense and Halcyon partnership result, DirectDefense will now offer the Halcyon Anti-Ransomware & Endpoint Resilience Platform as part of its Managed Detection and Response (“MDR”) offerings. “Ransomware is on the rise and threat actor groups are becoming increasingly sophisticated. As they evolve, so must your managed security services provider,” said Jim Broome, President, DirectDefense. “The combination of Halcyon’s AI-powered, anti-ransomware engine and our 24/7 MDR security services gives organizations peace of mind that … More

The post DirectDefense collaborates with Halcyon to protect users against ransomware appeared first on Help Net Security.

"

Autosummary: "


The missed link between Ransom Cartel and REvil ransomware gangs

exploits ransomware
2022-10-19 https://securityaffairs.co/wordpress/137328/cyber-crime/ransom-cartel-links-revil.html

Researchers at Palo Alto Network’s Unit 42 linked the Ransom Cartel ransomware operation to the REvil ransomware operations. Researchers at Palo Alto Network’s Unit 42 have linked the relatively new Ransom Cartel ransomware operation with the notorious REvil cybercrime gang. The REvil group was one of the most active ransomware gangs in the first half […]

The post The missed link between Ransom Cartel and REvil ransomware gangs appeared first on Security Affairs.

"

Autosummary: “This method of generating session secrets was documented by researchers at Amossys back in 2020; however, their analysis focused on an updated version of Sodinokibi/REvil ransomware, indicating a direct overlap between the REvil source code and the latest Ransom Cartel samples.” continues the report.£Based on the fact that the Ransom Cartel operators clearly have access to the original REvil ransomware source code, yet likely do not possess the obfuscation engine used to encrypt strings and hide API calls, we speculate that the operators of Ransom Cartel had a relationship with the REvil group at one point, before starting their own operation.” "


DeadBolt ransomware gang tricked into giving victims free decryption keys

exploits ransomware
2022-10-19 https://www.malwarebytes.com/blog/news/2022/10/deadbolt-ransomware-gang-tricked-into-giving-victims-free-decryption-keys

Categories: News

Categories: Ransomware

Tags: Dutch

Tags: law enforcement

Tags: DeadBolt

Tags: ransomware

Tags: decryption keys

Tags: responders.nu

With the idea provided by an incident response company, Dutch police used a clever trick to get 150 DeadBolt ransomware decryption keys for free.

(Read more...)

The post DeadBolt ransomware gang tricked into giving victims free decryption keys appeared first on Malwarebytes Labs.

"

Autosummary: Posted: October 19, 2022 by With the idea provided by an incident response company, Dutch police used a clever trick to get 150 DeadBolt ransomware decryption keys for free.As a countermeasure, QNAP pushed out an automatic, forced, update with firmware containing the latest security updates to protect against the attackers" DeadBolt ransomware, which annoyed part of its userbase. "


Сryptocurrency and Ransomware — The Ultimate Friendship

exploits ransomware
2022-10-18 https://thehackernews.com/2022/10/ryptocurrency-and-ransomware-ultimate.html
Both cryptocurrency and ransomware are nothing new in the digital world; both have been there for a very long time, which was enough for them to find common pieces for starting their relationship. Ransomware can be like a virtual car that works on all types of fuels, and crypto is the one that is currently most recommended. No one can argue that 2020 was the year of ransomware in the cyber world "

Autosummary: Ransomware is a malware type that encrypts the victim"s files, whether it"s a random user or an organization, leading to denying them access to those files on their personal devices. Starting with taking cybersecurity awareness training courses which we call the ultimate layer of protection, followed by multilayers such as the first and most valuable layer that works on the DNS level, which is the first gate between you and the cybercriminal. SafeDNS has updated categories having DGA, Cryptojacking and others as part of the Security group, and we definitely recommend trying out threat protection & giving a free 15-day trial of web filtering a go. "


Ransom Cartel linked to notorious REvil ransomware operation

exploits ransomware
2022-10-18 https://www.bleepingcomputer.com/news/security/ransom-cartel-linked-to-notorious-revil-ransomware-operation/
Threat analysts have connected the pieces that link the Ransom Cartel RaaS (ransomware-as-a-service) to the REvil gang, one of the most notorious and prolific ransomware groups in recent years. [...] "

Autosummary: Ransom Cartel operations There are also similarities in the tactics, techniques, and procedures (TTPs) used by REvil and Ransom Cartel, such as double-extortion attacks, large ransom demands, and a data leak site to pressure victims into paying a ransom. Finally, the threat actors shut down VMs, terminate all related processes, and encrypt Vmware-related files (.log, .vmdk, .vmem, .vswp and .vmsn). "


Black Basta Ransomware Hackers Infiltrates Networks via Qakbot to Deploy Brute Ratel C4

exploits ransomware
2022-10-17 https://thehackernews.com/2022/10/black-basta-ransomware-hackers.html
The threat actors behind the Black Basta ransomware family have been observed using the Qakbot trojan to deploy the Brute Ratel C4 framework as a second-stage payload in recent attacks. The development marks the first time the nascent adversary simulation software is being delivered via a Qakbot infection, cybersecurity firm Trend Micro said in a technical analysis released last week. The "

Autosummary: According to Trend Micro, the ZIP file in the email contains an ISO file, which, in turn, includes a LNK file that fetches the Qakbot payload, illustrating attempts on part of threat actors to adapt to other tactics in the aftermath of Microsoft"s decision to block macros by default for documents downloaded from the web. "


New Prestige Ransomware Targeting Polish and Ukrainian Organizations

exploits ransomware
2022-10-17 https://thehackernews.com/2022/10/new-prestige-ransomware-targeting.html
A new ransomware campaign targeted the transportation and logistics sectors in Ukraine and Poland on October 11 with a previously unknown payload dubbed Prestige. "The activity shares victimology with recent Russian state-aligned activity, specifically on affected geographies and countries, and overlaps with previous victims of the FoxBlade malware (also known as HermeticWiper)," the Microsoft "

Autosummary: It"s suspected that "Ransom Cartel operators had access to earlier versions of REvil ransomware source code," Palo Alto Networks Unit 42 observed on October 14, stating that "there was a relationship between the groups at some point, though it may not have been recent." REvil, earlier this January, suffered further setback when Russian authorities arrested multiple members, but there are indications that the notorious cybercrime cartel may have staged a return in some form. "


Japanese tech firm Oomiya hit by LockBit 3.0. Multiple supply chains potentially impacted

ransomware
2022-10-17 https://securityaffairs.co/wordpress/137243/cyber-crime/oomiya-lockbit-3-0-ransomware.html

The IT infrastructure of the Japanese tech company Oomiya was infected with the LockBit 3.0 ransomware. One of the affiliates for the LockBit 3.0 RaaS hit the Japanese tech company Oomiya. Oomiya is focused on designing and manufacturing microelectronics and facility system equipment. The business of Omiya Kasei is divided into four major areas, manufacturing and designing […]

The post Japanese tech firm Oomiya hit by LockBit 3.0. Multiple supply chains potentially impacted appeared first on Security Affairs.

"

Autosummary: "


Australian insurance firm Medibank confirms ransomware attack

financial exploits ransomware
2022-10-17 https://www.bleepingcomputer.com/news/security/australian-insurance-firm-medibank-confirms-ransomware-attack/
Health insurance provider Medibank has confirmed that a ransomware attack is responsible for last week"s cyberattack and disruption of online services. [...] "

Autosummary: The company first detected unusual activity on its network on Wednesday, October 12, and immediately shut down parts of its systems, including customer-facing services, to reduce the chances of data loss. "


Mysterious Prestige ransomware targets organizations in Ukraine and Poland

exploits ransomware
2022-10-16 https://securityaffairs.co/wordpress/137203/apt/prestige-ransomware-targets-ukraine.html

Microsoft warns that new Prestige ransomware is targeting transportation and logistics organizations in Ukraine and Poland. Microsoft reported that new Prestige ransomware is being used in attacks aimed at transportation and logistics organizations in Ukraine and Poland. The Prestige ransomware first appeared in the threat landscape on October 11 in attacks occurring within an hour […]

The post Mysterious Prestige ransomware targets organizations in Ukraine and Poland appeared first on Security Affairs.

"

Autosummary: Before deploying ransomware in the target networks, the threat actors were observed using the following two remote execution utilities: RemoteExec – a commercially available tool for agentless remote code execution Impacket WMIexec – an open-source script-based solution for remote code execution Then DEV-0960 used the following tools in some attacks to access to highly privileged credentials: winPEAS – an open-source collection of scripts to perform privilege escalation on Windows comsvcs.dll – used to dump the memory of the LSASS process and steal credentials ntdsutil.exe – used to back up the Active Directory database, likely for later use credentials “In all observed deployments, the attacker had already gained access to highly privileged credentials, like Domain Admin, to facilitate the ransomware deployment.” continues the report. "


Venus Ransomware targets publicly exposed Remote Desktop services

exploits ransomware
2022-10-16 https://www.bleepingcomputer.com/news/security/venus-ransomware-targets-publicly-exposed-remote-desktop-services/
Threat actors behind the relatively new Venus Ransomware are hacking into publicly-exposed Remote Desktop services to encrypt Windows devices. [...] "

Autosummary: taskkill, msftesql.exe, sqlagent.exe, sqlbrowser.exe, sqlservr.exe, sqlwriter.exe, oracle.exe, ocssd.exe, dbsnmp.exe, synctime.exe, mydesktopqos.exe, agntsvc.exe, isqlplussvc.exe, xfssvccon.exe, mydesktopservice.exe, ocautoupds.exe, agntsvc.exe, agntsvc.exe, agntsvc.exe, encsvc.exe, firefoxconfig.exe, tbirdconfig.exe, ocomm.exe, mysqld.exe, mysqld-nt.exe, mysqld-opt.exe, dbeng50.exe, sqbcoreservice.exe, excel.exe, infopath.exe, msaccess.exe, mspub.exe, onenote.exe, outlook.exe, powerpnt.exe, sqlservr.exe, thebat64.exe, thunderbird.exe, winword.exe, wordpad.exe The ransomware will also delete event logs, Shadow Copy Volumes, and disable Data Execution Prevention using the following command: wbadmin delete catalog -quiet && vssadmin.exe delete shadows /all /quiet && bcdedit.exe /set {current} nx AlwaysOff && wmic SHADOWCOPY DELETE When encrypting files, the ransomware will append the .venus extension, as shown below. "


Microsoft: New Prestige ransomware targets orgs in Ukraine, Poland

exploits ransomware
2022-10-14 https://www.bleepingcomputer.com/news/security/microsoft-new-prestige-ransomware-targets-orgs-in-ukraine-poland/
Microsoft says new Prestige ransomware is being used to target transportation and logistics organizations in Ukraine and Poland in ongoing attacks. [...] "

Autosummary: "


The Week in Ransomware - October 14th 2022 - Bitcoin Trickery

exploits ransomware
2022-10-14 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-october-14th-2022-bitcoin-trickery/
This week"s news is action-packed, with police tricking ransomware into releasing keys to victims calling ransomware operations liars. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @struppigel, @VK_Intel, @serghei, @BleepinComputer, @billtoulas, @LawrenceAbrams, @malwareforme, @demonslay335, @FourOctets, @jorntvdw, @PolarToffee, @Ionut_Ilascu, @Seifreed, @fwosar, @malwrhunterteam, @DanielGallagher, @AuCyble, @UID_, @linuxct, @MsftSecIntel, @ahnlab, @Amermelsad, @TrendMicro, and @pcrisk. October 12th 2022 As previously shared, upon discovering the ransomware attack, we took immediate steps to protect our systems, contain the incident, begin an investigation, and ensure continuity of care. "


Police tricks DeadBolt ransomware out of 155 decryption keys

exploits ransomware
2022-10-14 https://www.bleepingcomputer.com/news/security/police-tricks-deadbolt-ransomware-out-of-155-decryption-keys/
The Dutch National Police, in collaboration with cybersecurity firm Responders.NU, tricked the DeadBolt ransomware gang into handing over 155 decryption keys by faking ransom payments. [...] "

Autosummary: Heavy congestion combined with a low fee caused the Bitcoin blockchain to take much longer to confirm a transaction, allowing the Police to make a transaction, receive the key, and immediately cancel their bitcoin transaction. "


Magniber ransomware now infects Windows users via JavaScript files

exploits ransomware
2022-10-13 https://www.bleepingcomputer.com/news/security/magniber-ransomware-now-infects-windows-users-via-javascript-files/
A recent malicious campaign delivering Magniber ransomware has been targeting Windows home users with fake security updates. [...] "

Autosummary: For the recent on, it switched to JavaScript files that had the following names: SYSTEM.Critical.Upgrade.Win10.0.ba45bd8ee89b1.js SYSTEM.Security.Database.Upgrade.Win10.0.jse Antivirus_Upgrade_Cloud.29229c7696d2d84.jse ALERT.System.Software.Upgrade.392fdad9ebab262cc97f832c40e6ad2c.js These files are obfuscated and use a variation of the "DotNetToJScript" technique to execute a .NET file in the system memory, lowering the risk of detection by antivirus products available on the host. "


For most companies ransomware is the scariest of all cyberattacks

exploits ransomware ciber
2022-10-12 https://www.helpnetsecurity.com/2022/10/12/customers-concerned-ransomware/

SonicWall released the 2022 SonicWall Threat Mindset Survey which found that 66% of customers are more concerned about cyberattacks in 2022, with the main threat being focused on financially motivated attacks like ransomware. “No one is safe from cyberattacks — businesses or individuals,” said SonicWall Executive Chairman of the Board Bill Conner. “Today’s business landscape requires persistent digital trust to exist. Supply-chain attacks have dramatically changed the attack surface of the typical enterprise in the … More

The post For most companies ransomware is the scariest of all cyberattacks appeared first on Help Net Security.

"

Autosummary: Additional findings: Rising concerns about escalating cyberattacks : There is growing concern regarding cyberattacks amongst 66% of organizations surveyed; ransomware leads the distress as 91% of all customers cited it as their biggest concern. "


LockBit affiliates compromise Microsoft Exchange servers to deploy ransomware

exploits ransomware
2022-10-12 https://securityaffairs.co/wordpress/136968/cyber-crime/microsoft-exchange-lockbit-ransomware.html

Lockbit ransomware affiliates are compromising Microsoft Exchange servers to deploy their ransomware, experts warn. South-Korean cybersecurity firm AhnLab reported that Lockbit ransomware affiliates are distributing their malware via compromised Microsoft Exchange servers. In July 2022, two servers operated by a customer of the security firm were infected with LockBit 3.0 ransomware.  Threat actors initially deployed […]

The post LockBit affiliates compromise Microsoft Exchange servers to deploy ransomware appeared first on Security Affairs.

"

Autosummary: So far I"ve only skimmed a translated version of the page, but what evidence is provided that it"s a different vulnerability? — Will Dormann (@wdormann) October 11, 2022 Bleeping Computer pointed out that at least three vulnerabilities in Microsoft Exchange, discovered by Zero Day Initiative vulnerability researcher Piotr Bazydlo, have yet to be patched. "


Top 5 ransomware detection techniques: Pros and cons of each

exploits ransomware
2022-10-12 https://www.malwarebytes.com/blog/business/2022/10/top-5-ransomware-detection-techniques-pros-and-cons-of-each

Categories: Business

Detecting ransomware can be tricky. Attackers use obfuscation and evasion techniques to avoid detection, and new ransomware variants are produced every day. In this post, we look at five ransomware detection techniques and their pros and cons.

(Read more...)

The post Top 5 ransomware detection techniques: Pros and cons of each appeared first on Malwarebytes Labs.

"

Autosummary: Pros: Can detect ransomware that static engines do not catch Fewer false positives than previously mentioned dynamic techniques Cons: High CPU utilization on the endpoint Files will be encrypted until a level of confidence is reached, so not all damage is blocked Bypass by encrypting only part of the file, or by encrypting in chunks. Pros: Low false positive rate Effective against common ransomware No damage is done Cons: Trivial to bypass; ransomware with a new extension will manage to encrypt It can be difficult to find a file-monitoring solution that has a extension blacklist feature 3. Pros: Low false positive rate Effective against known ransomware Can stop attacks before execution so no files are encrypted Cons: Time consuming if conducted manually Can be bypassed easily using Packers / Crypters or by simply replacing characters with digits or special characters 2. Cons: Some false positives, as programs and users may touch the bait files Files will be encrypted until ransomware touches the decoy files Bypass by skipping hidden files/folders, or by targeting specific folders 4. "


Microsoft Exchange servers hacked to deploy LockBit ransomware

exploits ransomware
2022-10-11 https://www.bleepingcomputer.com/news/security/microsoft-exchange-servers-hacked-to-deploy-lockbit-ransomware/
Lockbit ransomware affiliates are encrypting victims via Microsoft Exchange servers hacked using exploits targeting unpatched vulnerabilities. [...] "

Autosummary: "There is a possibility that the vulnerabilities of Microsoft Exchange Server (CVE-2022-41040, CVE-2022-41082) disclosed by GTSC, a Vietnamese security company, on September 28 were used, but the attack method, the generated WebShell file name, and subsequent attacks after WebShell creation," AhnLab says. "


Harvard Business Publishing licensee hit by ransomware

exploits ransomware
2022-10-10 https://securityaffairs.co/wordpress/136860/cyber-crime/harvard-business-publishing-licensee-hit-by-ransomware.html

Threat actors got to a database with over 152,000 customer records before its owner, the Turkish branch of Harvard Business Review, closed it. Crooks left a ransom note, threatening to leak the data and inform authorities of the EU’s General Data Protection Regulation (GDPR) violations. Original Post published on CyberNews A recent discovery by the […]

The post Harvard Business Publishing licensee hit by ransomware appeared first on Security Affairs.

"

Autosummary: In total, the database leaked over 152,000 pieces of information pertaining to customers, such as emails, names, links to LinkedIn, Twitter, and Facebook profiles, and hashed passwords. “Exposing sensitive data or allowing it to get into the wrong hands can have a cascading effect, leading to regulatory and compliance fines, potential lawsuits and legal fines, reputational damage including lost customer confidence, and a financial impact including lost business,” Neclerio said. The database index marked “Users” contained over 152,000 entries: names, emails, links to social media profiles, and passwords, some of which were hashed using a very weak MD5 algorithm. "


CommonSpirit hospital chains hit by ransomware, patients are facing problems

exploits ransomware
2022-10-09 https://securityaffairs.co/wordpress/136843/cyber-crime/commonspirit-ransomware-attack.html

CommonSpirit, one of the largest hospital chains in the US, suffered a ransomware cyberattack that impacted its operations. Common Spirit, one of the largest hospital chains in the US, this week suffered a ransomware cyberattack that caused severe inconvenience to the facilities and to patients The alleged security breach led to delayed surgeries, hold-ups in […]

The post CommonSpirit hospital chains hit by ransomware, patients are facing problems appeared first on Security Affairs.

"

Autosummary: Common Spirit, one of the largest hospital chains in the US, this week suffered a ransomware cyberattack that caused severe inconvenience to the facilities and to patients The alleged security breach led to delayed surgeries, hold-ups in patient care and forced the chain to reschedule doctor appointments across the country. "


Fake adult sites push data wipers disguised as ransomware

exploits ransomware
2022-10-09 https://www.bleepingcomputer.com/news/security/fake-adult-sites-push-data-wipers-disguised-as-ransomware/
Malicious adult websites push fake ransomware which, in reality, acts as a wiper that quietly tries to delete almost all of the data on your device. [...] "

Autosummary: The drive wiper"s code (Cyble) Finally, the malware executes "open.exe," which drops and runs "open.bat," which, in turn, connects to the URL "hxxps[:]//lllllllllll.loseyourip[.]com/downloads" and then opens the ransom note. "


BlackByte Ransomware abuses vulnerable driver to bypass security solutions

exploits ransomware
2022-10-08 https://securityaffairs.co/wordpress/136816/malware/blackbyte-ransomware-byovd-attack.html

The BlackByte ransomware operators are leveraging a flaw in a legitimate Windows driver to bypass security solutions. Researchers from Sophos warn that BlackByte ransomware operators are using a bring your own vulnerable driver (BYOVD) attack to bypass security products. In BYOVD attacks, threat actors abuse vulnerabilities in legitimate, signed drivers, on which security products rely, […]

The post BlackByte Ransomware abuses vulnerable driver to bypass security solutions appeared first on Security Affairs.

"

Autosummary: “Bring Your Own Driver” is the name given to this technique [1, 2, 3, 4, 5, 6] — exploiting a targeted system by abusing a legitimate signed driver with an exploitable vulnerability.” "


BlackByte Ransomware Abuses Vulnerable Windows Driver to Disable Security Solutions

exploits ransomware
2022-10-07 https://thehackernews.com/2022/10/blackbyte-ransomware-abuses-vulnerable.html
In yet another case of bring your own vulnerable driver (BYOVD) attack, the operators of the BlackByte ransomware are leveraging a flaw in a legitimate Windows driver to bypass security solutions. "The evasion technique supports disabling a whopping list of over 1,000 drivers on which security products rely to provide protection," Sophos threat researcher Andreas Klopsch said in a new technical "

Autosummary: "


The Week in Ransomware - October 7th 2022 - A 20 year sentence

exploits ransomware
2022-10-07 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-october-7th-2022-a-20-year-sentence/
It was a very quiet week regarding ransomware news, with the most significant news being the sentencing of a Netwalker affiliate to 20-years in prison. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @DanielGallagher, @malwrhunterteam, @demonslay335, @malwareforme, @Seifreed, @billtoulas, @jorntvdw, @serghei, @fwosar, @FourOctets, @BleepinComputer, @struppigel, @Ionut_Ilascu, @VK_Intel, @LawrenceAbrams, @PolarToffee, @Avast, @Sophos, @sygnia_labs, @BrettCallow, @pcrisk, @jgreigj, @lorenzofb, and @elhackernet. "


Canadian Netwalker Ransomware Affiliate Sentenced to 20 Years in U.S. Prison

exploits ransomware
2022-10-05 https://thehackernews.com/2022/10/canadian-netwalker-ransomware-affiliate.html
A former affiliate of the Netwalker ransomware has been sentenced to 20 years in prison in the U.S., a little over three months after the Canadian national pleaded guilty to his role in the crimes. Sebastien Vachon-Desjardins, 35, has also been ordered to forfeit $21,500,000 that was illicitly obtained from dozens of victims globally, including companies, municipalities, hospitals, law "

Autosummary: "


Avast releases free decryptor for Hades ransomware variants

exploits ransomware
2022-10-05 https://www.bleepingcomputer.com/news/security/avast-releases-free-decryptor-for-hades-ransomware-variants/
Avast has released a decryptor for variants of the Hades ransomware known as "MafiaWare666", "Jcrypt", "RIP Lmao", and "BrutusptCrypt," allowing victims to recover their files for free. [...] "

Autosummary: These variants include the following extensions and strings appended/prepended to an encrypted file"s name: .MafiaWare666 .jcrypt .brutusptCrypt .bmcrypt .cyberone .l33ch If you were affected by one of these variants, you can download the free decryptor from here, run the executable, select the drive that holds the encrypted files, and point the tool to a sample pair of encrypted and original files. "


BlackByte ransomware abuses legit driver to disable security products

exploits ransomware
2022-10-05 https://www.bleepingcomputer.com/news/security/blackbyte-ransomware-abuses-legit-driver-to-disable-security-products/
The BlackByte ransomware gang is using a new technique that researchers are calling "Bring Your Own Driver," which enables bypassing protections by disabling more than 1,000 drivers used by various security solutions. [...] "

Autosummary: Attack details Security researchers at cybersecurity company Sophos explain that the abused MSI graphics driver offers I/O control codes directly accessible by user-mode processes, which violates Microsoft’s security guidelines on kernel memory access. "


Avast releases a free decryptor for some Hades ransomware variants

exploits ransomware
2022-10-05 https://securityaffairs.co/wordpress/136710/malware/hades-ransomware-decryptor.html

Avast released a free decryptor for variants of the Hades ransomware tracked as ‘MafiaWare666’, ‘Jcrypt’, ‘RIP Lmao’, and ‘BrutusptCrypt,’ . Avast has released a decryptor for variants of the Hades ransomware known as ‘MafiaWare666’, ‘Jcrypt’, ‘RIP Lmao’, and ‘BrutusptCrypt,’ which can allow the victims of these ransomware strains to recover their files without paying the […]

The post Avast releases a free decryptor for some Hades ransomware variants appeared first on Security Affairs.

"

Autosummary: The malware samples analyzed by the researchers append the following extensions the the filename of the encrypted files: .MafiaWare666 .jcrypt .brutusptCrypt .bmcrypt .cyberone .l33ch Once the MafiaWare666 variant completes the encrypted process, it displays a window that provides payment instructions to the victims. "


Avast releases free decryptor for MafiaWare666 ransomware variants

exploits ransomware
2022-10-05 https://www.bleepingcomputer.com/news/security/avast-releases-free-decryptor-for-mafiaware666-ransomware-variants/
​Avast has released a decryptor for variants of the MafiaWare666 ransomware known as "Jcrypt", "RIP Lmao", and "BrutusptCrypt," allowing victims to recover their files for free. [...] "

Autosummary: These variants include the following extensions and strings appended/prepended to an encrypted file"s name: .MafiaWare666 .jcrypt .brutusptCrypt .bmcrypt .cyberone .l33ch If you were affected by one of these variants, you can download the free decryptor from here, run the executable, select the drive that holds the encrypted files, and point the tool to a sample pair of encrypted and original files. "


Linux Cheerscrypt ransomware is linked to Chinese DEV-0401 APT group

exploits ransomware
2022-10-04 https://securityaffairs.co/wordpress/136611/malware/apt10-cheerscrypt-ransomware.html

Researchers link recently discovered Linux ransomware Cheerscrypt to the China-linked cyberespionage group DEV-0401. Researchers at cybersecurity firm Sygnia attributed the recently discovered Linux ransomware Cheerscrypt to the China-linked cyber espionage group Bronze Starlight (aka DEV-0401, APT10) Bronze Starlight, has been active since mid-2021, in June researchers from Secureworks reported that the APT group is deploying […]

The post Linux Cheerscrypt ransomware is linked to Chinese DEV-0401 APT group appeared first on Security Affairs.

"

Autosummary: Researchers at cybersecurity firm Sygnia attributed the recently discovered Linux ransomware Cheerscrypt to the China-linked cyber espionage group Bronze Starlight (aka DEV-0401, APT10) Bronze Starlight, has been active since mid-2021, in June researchers from Secureworks reported that the APT group is deploying post-intrusion ransomware families to cover up the cyber espionage operations. "


Cheerscrypt ransomware linked to a Chinese hacking group

exploits ransomware
2022-10-04 https://www.bleepingcomputer.com/news/security/cheerscrypt-ransomware-linked-to-a-chinese-hacking-group/
The Cheerscrypt ransomware has been linked to a Chinese hacking group named "Emperor Dragonfly," known to frequently switch between ransomware families to evade attribution. [...] "

Autosummary: "Differing from the other RaaS developers, affiliates, and access brokers profiled here, DEV-0401 appears to be an activity group involved in all stages of their attack lifecycle, from initial access to ransomware development," explained the Microsoft threat intelligence researchers. "


Netwalker ransomware affiliate sentenced to 20 years in prison

exploits ransomware
2022-10-04 https://www.bleepingcomputer.com/news/security/netwalker-ransomware-affiliate-sentenced-to-20-years-in-prison/
Former Netwalker ransomware affiliate Sebastien Vachon-Desjardins has been sentenced to 20 years in prison and demanded to forfeit $21.5 million for his attacks on a Tampa company and other entities. [...] "

Autosummary: Vachon-Desjardins, a 34 Canadian man extradited from Quebec, was sentenced today in a Florida court after pleading guilty to "Conspiracy to commit Computer Fraud", "Conspiracy to Commit Wire Fraud", "Intentional Damage to Protected Computer," and "Transmitting a Demand in Relation to Damaging a Protected Computer." "


Many IT pros don’t think a ransomware attack can impact Microsoft 365 data

exploits ransomware
2022-10-03 https://www.helpnetsecurity.com/2022/10/03/ransomware-attack-impact-microsoft-365-data/

Nearly a quarter of businesses have suffered a ransomware attack, with a fifth occurring in the past 12 months, according to Hornetsecurity. The 2022 Ransomware Report, which surveyed over 2,000 IT leaders, revealed that 24% have been victims of a ransomware attack, with 20% of attacks happening in the last year. Cyberattacks are happening more frequently. Last year’s ransomware survey revealed that 21% of companies experienced an attack. This year it rose by three percent … More

The post Many IT pros don’t think a ransomware attack can impact Microsoft 365 data appeared first on Help Net Security.

"

Autosummary: The 2022 Ransomware Report, which surveyed over 2,000 IT leaders, revealed that 24% have been victims of a ransomware attack, with 20% of attacks happening in the last year. "


Researchers Link Cheerscrypt Linux-Based Ransomware to Chinese Hackers

exploits ransomware
2022-10-03 https://thehackernews.com/2022/10/researchers-link-cheerscrypt-linux.html
The recently discovered Linux-Based ransomware strain known as Cheerscrypt has been attributed to a Chinese cyber espionage group known for operating short-lived ransomware schemes. Cybersecurity firm Sygnia attributed the attacks to a threat actor it tracks under the name Emperor Dragonfly, which is also known as Bronze Starlight (Secureworks) and DEV-0401 (Microsoft). "Emperor Dragonfly "

Autosummary: " The use of Cheerscrypt is the latest addition to a long list of ransomware families previously deployed by the group in little over a year, including LockFile, Atom Silo, Rook, Night Sky, Pandora, and LockBit 2.0. "


BlackCat ransomware gang claims to have hacked US defense contractor NJVC

exploits ransomware
2022-10-02 https://securityaffairs.co/wordpress/136537/cyber-crime/njvc-data-breach.html

Another US defense contractor suffered a data breach, the BlackCat ransomware gang claims to have hacked NJVC. The ALPHV/BlackCat ransomware gang claims to have breached the IT firm NJVC, which supports the federal government and the United States Department of Defense. The company supports intelligence, defense, and geospatial organizations. The company has more than 1,200 employees in locations worldwide.  BlackCat added NJVC to […]

The post BlackCat ransomware gang claims to have hacked US defense contractor NJVC appeared first on Security Affairs.

"

Autosummary: 🌐 BlackCat (ALPHV) #Ransomware team added NJVC to the victims" list 🚨 NJVC is an information technology (IT) company supporting the federal government and the United States Department of Defense, with $290 Million in revenue from The United States 🇺🇸#Blackcat pic.twitter.com/RnsJPUUMLw — DarkFeed (@ido_cohen2) September 29, 2022 BlackCat added NJVC to the list of victims on its Tor leak site and is threatening to release the allegedly stolen data if the company will not pay the ransom. "


The Week in Ransomware - September 30th 2022 - Emerging from the Shadows

exploits ransomware
2022-09-30 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-september-30th-2022-emerging-from-the-shadows/
This week"s news primarily revolves around LockBit, BlackMatter, and the rising enterprise-targeting Royal ransomware operation. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @Seifreed, @serghei, @VK_Intel, @billtoulas, @DanielGallagher, @jorntvdw, @PolarToffee, @BleepinComputer, @fwosar, @struppigel, @demonslay335, @LawrenceAbrams, @Ionut_Ilascu, @FourOctets, @malwrhunterteam, @malwareforme, @swascan, @y_advintel, @AdvIntel, @angel11VR, @InsideStairwell, @aejleslie, @Cyderes, @ahnlab, and @pcrisk. "


Office exploits continue to spread more than any other category of malware

exploits ransomware
2022-09-29 https://www.helpnetsecurity.com/2022/09/29/office-exploits-continue-to-spread/

The latest Internet Security Report from the WatchGuard Threat Lab shows a reduction in overall malware detections from the peaks seen in the first half of 2021, along with an increase in threats for Chrome and Microsoft Office and the ongoing Emotet botnet resurgence. Office exploits on the rise “While overall malware attacks in Q2 fell off from the all-time highs seen in previous quarters, over 81% of detections came via TLS encrypted connections, continuing … More

The post Office exploits continue to spread more than any other category of malware appeared first on Help Net Security.

"

Autosummary: Office exploits on the rise “While overall malware attacks in Q2 fell off from the all-time highs seen in previous quarters, over 81% of detections came via TLS encrypted connections, continuing a worrisome upward trend,” said Corey Nachreiner, CSO at WatchGuard. "


New Royal Ransomware emerges in multi-million dollar attacks

exploits ransomware
2022-09-29 https://www.bleepingcomputer.com/news/security/new-royal-ransomware-emerges-in-multi-million-dollar-attacks/
A new ransomware operation named Royal is quickly ramping up, targeting corporations with ransom demands ranging from $250,000 to over $2 million.  [...] "

Autosummary: Example of a Royal callback phishing email Source: AdvIntel When a victim calls the number, the threat actors use social engineering to convince the victim to install remote access software, which is used to gain initial access to the corporate network. However, it is strongly advised that network, windows, and security admins keep an eye out for this group, as they are quickly ramping up operations and will likely become one of the more significant enterprise-targeting ransomware operations. "


How to protect your Mac against ransomware and other cyberthreats

exploits ransomware
2022-09-29 https://www.bleepingcomputer.com/news/security/how-to-protect-your-mac-against-ransomware-and-other-cyberthreats/
A popular myth says that "Mac"s don"t get viruses," but that"s never quite been true — and today"s Mac users face more cyberthreats than ever before. If you"ve got a friend or family member who thinks they don"t have to worry at all about cybersecurity, pass along this article. [...] "

Autosummary: For instance: Attacks on webbased apps and services (like Microsoft 365) could lead to data loss Phishing emails can impact anyone, anytime, causing you to download a malicious attachment or inadvertently reveal sensitive information — no matter whether you’re on a Windows computer, a Mac or even your smartphone.They are the ones you spend hours reminding everyone else to follow: Avoiding clicking on email attachments or links from unknown senders Installing the latest software updates as soon as they’re available Never bypassing security settings to install apps if you’re not 100% certain of their safety Still, even the tech-savviest among us can make mistakes or otherwise fall victim to ransomware and other cyberthreats. Even offline events, like hardware damage or having your laptop stolen, can cause you to lose valuable files, photos and other data if they’re not safely backed up. "


Leaked LockBit 3.0 builder used by ‘Bl00dy’ ransomware gang in attacks

exploits ransomware
2022-09-28 https://www.bleepingcomputer.com/news/security/leaked-lockbit-30-builder-used-by-bl00dy-ransomware-gang-in-attacks/
The relatively new Bl00Dy Ransomware Gang has started to use a recently leaked LockBit ransomware builder in attacks against companies. [...] "

Autosummary: LockBit 3.0 ransomware builder configuration file Source: BleepingComputer Unfortunately, our predictions have come true, and a relatively new ransomware group named "Bl00Dy Ransomware Gang" has already utilized the builder in an attack on a Ukrainian entity. "


Bl00dy ransomware gang started using leaked LockBit 3.0 builder in attacks

exploits ransomware
2022-09-28 https://securityaffairs.co/wordpress/136345/cyber-crime/bl00dy-ransomware-lockbit-3-encryptor.html

The recently born Bl00Dy Ransomware gang has started using the recently leaked LockBit ransomware builder in attacks in the wild. The Bl00Dy Ransomware gang is the first group that started using the recently leaked LockBit ransomware builder in attacks in the wild. Last week, an alleged disgruntled developer leaked the builder for the latest encryptor […]

The post Bl00dy ransomware gang started using leaked LockBit 3.0 builder in attacks appeared first on Security Affairs.

"

Autosummary: Linkedin Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


The various ways ransomware impacts your organization

exploits ransomware
2022-09-27 https://www.helpnetsecurity.com/2022/09/27/various-ways-ransomware-impacts-your-organization/

Despite increased investment in tools to fight ransomware, 90% of organizations were affected by ransomware in some capacity over the past 12 months, according to SpyCloud’s 2022 Ransomware Defense Report. Allocation of security budgets Respondents ranked the risk of attack through third-party vendors as the main factor driving the allocation of security budgets, followed by the rise in frequency and sophistication of ransomware attacks. As a result, organizations’ ransomware mitigation solutions focus increasingly on the … More

The post The various ways ransomware impacts your organization appeared first on Help Net Security.

"

Autosummary: We have heard warnings recently against using SMS authentication for MFA since texts can be intercepted by motivated cybercriminals, but even push notifications and authentication applications are not completely foolproof or secure, which these malware and compromised cookies trends are showing,” Darren Siegel, Cyber Security Expert at Specops Software, told Help Net Security. Cybercriminals deploy malware to steal data including credentials to workforce applications, browser fingerprints, and device or web session cookies, enabling them to impersonate an employee and access and encrypt data while bypassing MFA and other security controls. "


The key differences between a business continuity plan and a disaster recovery plan

ransomware
2022-09-27 https://www.helpnetsecurity.com/2022/09/27/differences-between-business-continuity-plan-disaster-recovery-plan-video/

In this Help Net Security video, Chip Gibbons, CISO at Thrive, illustrates the differences between a business continuity plan and a disaster recovery plan. While these terms are often used interchangeably, there are important differences and it’s critical to have both plans in place to help mitigate the impact on business operations: A business continuity plan refers to how a business continues to operate when key systems are down or an outage occurs. A business … More

The post The key differences between a business continuity plan and a disaster recovery plan appeared first on Help Net Security.

"

Autosummary: "


MS SQL servers are getting hacked to deliver ransomware to orgs

exploits ransomware
2022-09-27 https://www.helpnetsecurity.com/2022/09/27/ms-sql-servers-hacked-ransomware/

Cybercriminals wielding the FARGO (aka Mallox, aka TargetCompany) ransomware are targeting Microsoft SQL (MS SQL) servers, AhnLab’s ASEC analysis team has warned. They haven’t pinpointed how the attackers are getting access to the targeted servers, but noted that typical attacks targeting database servers include brute force and dictionary attacks aimed at ferreting out the passwords of existing, poorly secured accounts. “And there may be vulnerability attacks on systems that do not have a vulnerability patch … More

The post MS SQL servers are getting hacked to deliver ransomware to orgs appeared first on Help Net Security.

"

Autosummary: "


Why Continuous Security Testing is a Must for Organizations Today

ransomware
2022-09-27 https://thehackernews.com/2022/09/why-continuous-security-testing-is-must.html
The global cybersecurity market is flourishing. Experts at Gartner predict that the end-user spending for the information security and risk management market will grow from $172.5 billion in 2022 to $267.3 billion in 2026.  One big area of spending includes the art of putting cybersecurity defenses under pressure, commonly known as security testing. MarketsandMarkets forecasts the global "

Autosummary: The impact of bug bounty program on cybersecurity By launching a bug bounty program, organizations experience: More robust protection: Company data, brand, and reputation have additional protection through continuous security testing. How bug bounty programs support continuous security testing structures While you"ll receive a certificate to say you"re secure at the end of a penetration test, it won"t necessarily mean that"s still the case the next time you make an update. 5 — Poor-fitting security testing solutions for agile environments Continuous development lifecycles don"t align with penetration testing cycles (often performed annually.) "


North Korea-linked Lazarus continues to target job seekers with macOS malware

exploits ransomware
2022-09-27 https://securityaffairs.co/wordpress/136297/apt/lazarus-apt-targeting-macos.html

North Korea-linked Lazarus APT group is targeting macOS Users searching for jobs in the cryptocurrency industry. North Korea-linked Lazarus APT group continues to target macOS with a malware campaign using job opportunities as a lure. The attackers aimed at stealing credentials for the victims’ wallets. Last week, SentinelOne researchers discovered a decoy documents advertising positions […]

The post North Korea-linked Lazarus continues to target job seekers with macOS malware appeared first on Security Affairs.

"

Autosummary: Linkedin Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


To encrypt or to destroy? Ransomware affiliates plan to try the latter

exploits ransomware
2022-09-26 https://www.helpnetsecurity.com/2022/09/26/ransomware-data-destruction/

Ransomware gangs are planning on trying out a new tactic, and it involves the destruction of the victims’ data. Targeting the data Researchers from Symantec, Cyderes and Stairwell have recently analyzed a new version of the Exmatter data exfiltration tool and have spotted a new capability: data corruption. Used in conjunction with multi-platform ALPHV (aka BlackCat, aka Noberus) ransomware, this Exmatter sample takes specific file types from selected directories and uploads them to attacker-controlled servers. … More

The post To encrypt or to destroy? Ransomware affiliates plan to try the latter appeared first on Help Net Security.

"

Autosummary: Triple extortion (encryption + data exfiltration and the threat of data leaking + DDoS attack aimed at disrupting targets’ services) The no-encryption approach + offer to share information on how the target was breached This latest approach of corrupting data and asking for money to return it to the victim might work in some cases, especially if the victim organization does not have a good plan to recover from data loss or does not follow data backup best practices. "


BlackCat Ransomware Attackers Spotted Fine-Tuning Their Malware Arsenal

exploits ransomware
2022-09-26 https://thehackernews.com/2022/09/blackcat-ransomware-attackers-spotted.html
The BlackCat ransomware crew has been spotted fine-tuning their malware arsenal to fly under the radar and expand their reach. "Among some of the more notable developments has been the use of a new version of the Exmatter data exfiltration tool, and the use of Eamfo, information-stealing malware that is designed to steal credentials stored by Veeam backup software," researchers from Symantec "

Autosummary: BlackCat, also known by the names ALPHV and Noberus, is attributed to an adversary tracked as Coreid (aka FIN7, Carbanak, or Carbon Spider) and is said to be a rebranded successor of DarkSide and BlackMatter, both of which shut shop last year following a string of high-profile attacks, including that of Colonial Pipeline. "


Calling in the ransomware negotiator, with Kurtis Minder: Lock and Code S03E20

exploits ransomware
2022-09-26 https://www.malwarebytes.com/blog/podcast/2022/09/calling-in-the-ransomware-negotiator-with-kurtis-minder-lock-and-code-s03e20

Categories: Podcast

This week on Lock and Code, we speak with Kurtis Minder, CEO of GroupSense, about how a company decides to bring in a ransomware negotiator when it"s hit with the destructive malware.

(Read more...)

The post Calling in the ransomware negotiator, with Kurtis Minder: Lock and Code S03E20 appeared first on Malwarebytes Labs.

"

Autosummary: The negotiator, or negotiators, can work closely with a company"s executives, security staff, legal department, and press handlers to accurately and firmly represent the company"s needs during a ransomware attack. "


HBC selects Veeam to improve data protection and ransomware resilience

exploits ransomware
2022-09-26 https://www.helpnetsecurity.com/2022/09/27/hbc-veeam/

Veeam Software announced that HBC, a holding company of investments and businesses that operates at the intersection of technology, retail operations and real estate, has chosen Veeam Availability Suite to centralize data protection on premises and across clouds. Veeam helps HBC ensure business continuity, meet internal governance compliance requirements and protect against ransomware. Additionally, HBC saved more than $1 million in a one-time capital expenditure and saves $600,000 in recurring operational expenses annually. From the … More

The post HBC selects Veeam to improve data protection and ransomware resilience appeared first on Help Net Security.

"

Autosummary: It’s the majority owner of iconic e-commerce companies such as Saks, a leading online destination for luxury fashion, Saks OFF 5TH, a premier luxury off-price e-commerce company and The Bay, a Canadian e-commerce marketplace. “To improve upon the customer experience, we began a digital transformation to accelerate our e-commerce business,” said Ope Bakare, Chief Technical Officer, HBC. "


Microsoft SQL servers hacked in TargetCompany ransomware attacks

exploits ransomware
2022-09-24 https://www.bleepingcomputer.com/news/security/microsoft-sql-servers-hacked-in-targetcompany-ransomware-attacks/
Security analysts at ASEC have discovered a new wave of attacks targeting vulnerable Microsoft SQL servers, involving the deployment of a ransomware strain named FARGO. [...] "

Autosummary: Exempt from encryption are several Microsoft Windows system directories, the boot files, Tor Browser, Internet Explorer, user customizations and settings, the debug log file, or the thumbnail database. "


The Week in Ransomware - September 23rd 2022 - LockBit leak

exploits ransomware
2022-09-23 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-september-23rd-2022-lockbit-leak/
This week we saw some embarrassment for the LockBit ransomware operation when their programmer leaked a ransomware builder for the LockBit 3.0 encryptor. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @struppigel, @DanielGallagher, @demonslay335, @malwrhunterteam, @Seifreed, @malwareforme, @fwosar, @BleepinComputer, @FourOctets, @billtoulas, @jorntvdw, @PolarToffee, @Ionut_Ilascu, @VK_Intel, @LawrenceAbrams, @serghei, @S2W_Official, @GeeksCyber, @BroadcomSW, @pcrisk, @3xp0rtblog, @vxunderground, @PogoWasRight, @AhnLab_SecuInfo, and @zscaler. September 20th 2022 The Hive ransomware operation claimed responsibility for an attack on the New York Racing Association (NYRA), which previously disclosed that a cyber attack on June 30, 2022, impacted IT operations and website availability and compromised member data. "


A first look at the builder for LockBit 3.0 Black

ransomware
2022-09-23 https://www.malwarebytes.com/blog/news/2022/09/lockbit-builder-leaked-by-disgruntled-developer

Categories: News

Categories: Ransomware

Tags: LockBit

Tags: builder

Tags: leaked

The LockBit gang"s latest ransomware builder has been leaked, and we have a copy

(Read more...)

The post A first look at the builder for LockBit 3.0 Black appeared first on Malwarebytes Labs.

"

Autosummary: Posted: September 23, 2022 by The LockBit gang"s latest ransomware builder has been leaked, and we have a copy A few months after the LockBit gang released version 3.0 of its ransomware, LockBit 3.0 Black, the builder for it has been leaked by what seems to be a disgruntled developer. "


A disgruntled developer is the alleged source of the leak of the Lockbit 3.0 builder

ransomware
2022-09-22 https://securityaffairs.co/wordpress/136056/data-breach/lockbit-3-0-builder-leak.html

A disgruntled developer seems to be responsible for the leak of the builder for the latest encryptor of the LockBit ransomware gang. The leak of the builder for the latest encryptor of the LockBit ransomware gang made the headlines, it seems that the person who published it is a disgruntled developer. The latest version of […]

The post A disgruntled developer is the alleged source of the leak of the Lockbit 3.0 builder appeared first on Security Affairs.

"

Autosummary: Linkedin Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


BlackCat ransomware’s data exfiltration tool gets an upgrade

exploits ransomware
2022-09-22 https://www.bleepingcomputer.com/news/security/blackcat-ransomware-s-data-exfiltration-tool-gets-an-upgrade/
The BlackCat ransomware (aka ALPHV) isn"t showing any signs of slowing down, and the latest example of its evolution is a new version of the gang"s data exfiltration tool used for double-extortion attacks. [...] "

Autosummary: Named "Exmatter," the tool was used since BlackCat"s launch in November 2021 and was heavily updated in August 2022, featuring the following changes: Limit type of files to exfiltrate to: PDF, DOC, DOCX, XLS, PNG, JPG, JPEG, TXT, BMP, RDP, SQL, MSG, PST, ZIP, RTF, IPT, and DWG. "


How to have fun negotiating with a ransomware gang

exploits ransomware
2022-09-22 https://grahamcluley.com/how-to-have-fun-negotiating-with-a-ransomware-gang/
Can negotiating your firm’s ransomware payment actually be fun? Well, if it’s a game rather than the real thing then yes! The inventive bods at the Financial Times have created an imaginative ransomware negotiation simulator which lets you imagine you’re in the hot seat at a hacked company, trying to stop cybercriminals from releasing sensitive … Continue reading "How to have fun negotiating with a ransomware gang" "

Autosummary: After a ransomware attack, the company’s day-to-day operations are severely disrupted, meaning that servers are down, products can’t ship, and employees aren’t being paid. "


LockBit ransomware builder leaked online by “angry developer”

exploits ransomware
2022-09-21 https://www.bleepingcomputer.com/news/security/lockbit-ransomware-builder-leaked-online-by-angry-developer-/
The LockBit ransomware operation has suffered a breach, with an allegedly disgruntled developer leaking the builder for the gang"s newest encryptor. [...] "

Autosummary: LockBit 3.0 builder files Source: BleepingComputer The included "config.json" can be used to customize an encryptor, including modifying the ransom note, changing configuration options, deciding what processes and services to terminate, and even specifying the command and control server that the encryptor will send data. "


Hive ransomware claims attack on New York Racing Association

exploits ransomware
2022-09-20 https://www.bleepingcomputer.com/news/security/hive-ransomware-claims-attack-on-new-york-racing-association/
The Hive ransomware operation claimed responsibility for an attack on the New York Racing Association (NYRA), which previously disclosed that a cyber attack on June 30, 2022, impacted IT operations and website availability and compromised member data. [...] "

Autosummary: "


Crypto giveaway scams continue to escalate

financial ransomware
2022-09-19 https://www.helpnetsecurity.com/2022/09/19/crypto-giveaway-scams-continue-to-escalate/

Group-IB has noted a fivefold increase in the number of domains used for crypto giveaway scams that involve fake YouTube streams in the first half of 2022. In addition to Vitalik Buterin, Elon Musk, and other crypto celebs, scammers started exploiting the name of Nayib Bukele, the president of Salvador. The evolution of crypto giveaway scams Crypto giveaway scams have evolved into an illicit market segment with multiple services that aim to facilitate fraudulent operations. … More

The post Crypto giveaway scams continue to escalate appeared first on Help Net Security.

"

Autosummary: Scammers have the following at their disposal: an exchange platform for hacked YouTube accounts, viewer boosting services, manuals, website editors, admin panel developers, domain names, bulletproof hosting, and tools and people who can create deepfake videos. After gaining access to a legitimate account, a fake crypto streamer renames the channel, deletes all the previously uploaded videos from the playlist, changes the user pic, adds new design features, and uploads relevant crypto-related content.In addition to Vitalik Buterin, Elon Musk, and other crypto celebs, scammers started exploiting the name of Nayib Bukele, the president of Salvador. "


Europol and Bitdefender Release Free Decryptor for LockerGoga Ransomware

exploits ransomware
2022-09-19 https://thehackernews.com/2022/09/europol-and-bitdefender-release-free.html
A decryptor for the LockerGoga ransomware has been made available by Romanian cybersecurity firm Bitdefender in collaboration with Europol, the No More Ransom project, and Zürich law enforcement authorities. Identified in January 2019, LockerGoga drew headlines for its attacks against the Norwegian aluminum giant Norsk Hydro. It"s said to have infected more than 1,800 victims in 71 countries, "

Autosummary: "


Emotet Botnet Started Distributing Quantum and BlackCat Ransomware

exploits ransomware
2022-09-19 https://thehackernews.com/2022/09/emotet-botnet-started-distributing.html
The Emotet malware is now being leveraged by ransomware-as-a-service (RaaS) groups, including Quantum and BlackCat, after Conti"s official retirement from the threat landscape this year. Emotet started off as a banking trojan in 2014, but updates added to it over time have transformed the malware into a highly potent threat that"s capable of downloading other payloads onto the victim"s machine, "

Autosummary: "


New York ambulance service discloses data breach after ransomware attack

financial exploits ransomware
2022-09-17 https://www.bleepingcomputer.com/news/security/new-york-ambulance-service-discloses-data-breach-after-ransomware-attack/
Empress EMS (Emergency Medical Services), a New York-based emergency response and ambulance service provider, has disclosed a data breach that exposed customer information. [...] "

Autosummary: “Some of these files contained patient names, dates of service, insurance information, and in some instances, Social Security numbers,” reads the disclosure from Empress EMS. "


Emotet botnet now pushes Quantum and BlackCat ransomware

exploits ransomware
2022-09-17 https://www.bleepingcomputer.com/news/security/emotet-botnet-now-pushes-quantum-and-blackcat-ransomware/
While monitoring the Emotet botnet"s current activity, security researchers found that the malware is now being used by the Quantum and BlackCat ransomware gang to deploy their payloads. [...] "

Autosummary: The Emotet malware was first deployed in attacks as a banking trojan in 2014 and has evolved into a botnet used by the TA542 threat group (aka Mummy Spider) to steal data, perform reconnaissance, and move laterally throughout victims" networks, as well as to deliver second-stage malicious payloads. "


Bitdefender releases free decryptor for LockerGoga ransomware

exploits ransomware
2022-09-16 https://www.bleepingcomputer.com/news/security/bitdefender-releases-free-decryptor-for-lockergoga-ransomware/
Romanian cybersecurity firm Bitdefender has released a free decryptor to help LockerGoga ransomware victims recover their files without paying a ransom. [...] "

Autosummary: "Its operator, who has been detained since October 2021 pending trial, is part of a larger cybercrime ring that used LockerGoga and MegaCortext ransomware to infect more than 1,800 persons and institutions in 71 countries to cause an estimated damage of $US 104 million," Bitdefender explains in the decryptor announcement. "


The Week in Ransomware - September 16th 2022 - Iranian Sanctions

exploits ransomware
2022-09-16 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-september-16th-2022-iranian-sanctions/
It has been a fairly quiet week on the ransomware front, with the biggest news being US sanctions on Iranians linked to ransomware attacks. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @jorntvdw, @demonslay335, @serghei, @malwareforme, @malwrhunterteam, @BleepinComputer, @LawrenceAbrams, @Seifreed, @DanielGallagher, @VK_Intel, @FourOctets, @billtoulas, @struppigel, @PolarToffee, @fwosar, @Ionut_Ilascu, @Bitdefender, @AlvieriD, @AWNetworks, @LabsSentinel, @pcrisk, @CISAgov, and @security_score, @censysio, and @juanbrodersen. Researchers also released some interesting reports this week: In ransomware attack-related news, the Yanluowang ransomware gang began leaking data stolen during a cyberattack on Cisco and the Hive ransomware claimed an attack on Bell Technical Solutions (BTS). "


Bitdefender releases Universal LockerGoga ransomware decryptor

exploits ransomware
2022-09-16 https://securityaffairs.co/wordpress/135843/malware/lockergoga-ransomware-decryptor.html

Bitdefender has released a free decryptor to allow the victims of the LockerGoga ransomware to recover their files without paying a ransom. The cybersecurity firm Bitdefender has released a free decryptor to allow LockerGoga ransomware victims to recover their encrypted files without paying a ransom. “We’re pleased to announce the availability of a new decryptor […]

The post Bitdefender releases Universal LockerGoga ransomware decryptor appeared first on Security Affairs.

"

Autosummary: Linkedin Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


SMBs are hardest-hit by ransomware

exploits ransomware
2022-09-15 https://www.helpnetsecurity.com/2022/09/15/small-businesses-ransomware-targets/

Coalition announced the mid-year update to its 2022 Cyber Claims Report detailing the evolution of cyber trends, revealinig that small businesses have become bigger targets, overall incidents are down, and ransomware attacks are declining as demands go unpaid. During the first half of 2022, the average cost of a claim for a small business owner increased to $139,000, which is 58% higher than levels during the first half of 2021. “Across industries, we continue to … More

The post SMBs are hardest-hit by ransomware appeared first on Help Net Security.

"

Autosummary: Other key findings: Phishing triggers the majority of cyber incidents, accounting for 57.9% of reported claims Cyber gangs have built a thriving business Funds transfer fraud (FTF) claims have held steady thanks to phishing, and Microsoft Exchange has become the vulnerability that persists. "


U.S. Charges 3 Iranian Hackers and Sanctions Several Others Over Ransomware Attacks

exploits ransomware
2022-09-15 https://thehackernews.com/2022/09/us-charges-3-iranian-hackers-and.html
The U.S. Treasury Department"s Office of Foreign Assets Control (OFAC) on Wednesday announced sweeping sanctions against ten individuals and two entities backed by Iran"s Islamic Revolutionary Guard Corps (IRGC) for their involvement in ransomware attacks at least since October 2020. The agency said the cyber activity mounted by the individuals is partially attributable to intrusion sets tracked "

Autosummary: Fortinet FortiOS SSL VPN 2FA bypass vulnerability (CVE-2020-12812) ProxyShell (CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207), and Log4Shell (CVE-2021-44228, CVE-2021-45046, and/or CVE-2021-45105) "


Hive ransomware claims cyberattack on Bell Canada subsidiary

exploits ransomware ciber
2022-09-15 https://www.bleepingcomputer.com/news/security/hive-ransomware-claims-cyberattack-on-bell-canada-subsidiary/
The Hive ransomware gang claimed responsibility for an attack that hit the systems of Bell Canada subsidiary Bell Technical Solutions (BTS). [...] "

Autosummary: " Hive is a Ransomware-as-a-Service (RaaS) operation active since June 2021 behind attacks against dozens of organizations, counting only those victims who had their data leaked online after refusing to pay the ransom, The Federal Bureau of Investigation (FBI) released some indicators of compromise and technical details associated with Hive ransomware attacks in August 2021. "


Salesforce expands its use of Workday to support continued global growth

ransomware
2022-09-14 https://www.helpnetsecurity.com/2022/09/14/workday-salesforce/

Salesforce has expanded its use of Workday to support continued global growth. The organization has selected Workday Financial Management, Workday Accounting Center, Workday Adaptive Planning, and Workday Prism Analytics, building on its existing use of Workday Human Capital Management (HCM), Workday Recruiting, Workday Time Tracking, and Workday Payroll for U.S. and Canada. Technology from Salesforce, which saw revenue growth of 25% in its fiscal year 2022, helps companies digitally transform to grow their relationships with … More

The post Salesforce expands its use of Workday to support continued global growth appeared first on Help Net Security.

"

Autosummary: The organization has selected Workday Financial Management, Workday Accounting Center, Workday Adaptive Planning, and Workday Prism Analytics, building on its existing use of Workday Human Capital Management (HCM), Workday Recruiting, Workday Time Tracking, and Workday Payroll for U.S. and Canada. "


US govt sanctions ten Iranians linked to ransomware attacks

exploits ransomware
2022-09-14 https://www.bleepingcomputer.com/news/security/us-govt-sanctions-ten-iranians-linked-to-ransomware-attacks/
The Treasury Department"s Office of Foreign Assets Control (OFAC) announced sanctions today against ten individuals and two entities affiliated with Iran"s Islamic Revolutionary Guard Corps (IRGC) for their involvement in ransomware attacks. [...] "

Autosummary: " The IRGC-affiliated group is comprised of employees and associates of Iran-based Najee Technology Hooshmand Fater LLC (Najee Technology) and Afkar System Yazd Company (Afkar System): Mansour Ahmadi: the owner, managing director, and chairman of the board of Najee Technology Ahmad Khatibi Aghda: managing director and member of the board of Afkar System Additional employees and associates: Ali Agha-Ahmadi, Mohammad Agha Ahmadi, Mo"in Mahdavi, Aliakbar Rashidi-Barjini, Amir Hossein Nikaeen Ravari, Mostafa Haji Hosseini, Mojtaba Haji Hosseini, and Mohammad Shakeri-Ashtijeh. "


Lorenz Ransomware Exploit Mitel VoIP Systems to Breach Business Networks

exploits ransomware
2022-09-14 https://thehackernews.com/2022/09/lorenz-ransomware-exploit-mitel-voip.html
The operators behind the Lornenz ransomware operation have been observed exploiting a now-patched critical security flaw in Mitel MiVoice Connect to obtain a foothold into target environments for follow-on malicious activities. "Initial malicious activity originated from a Mitel appliance sitting on the network perimeter," researchers from cybersecurity firm Arctic Wolf said in a report "

Autosummary: "


How prepared are organizations to tackle ransomware attacks?

exploits ransomware
2022-09-13 https://www.helpnetsecurity.com/2022/09/13/ransomware-preparedness-priority/

HYCU has announced its State of Ransomware Preparedness report in partnership with ActualTech Media, which reveals that ransomware is an unavoidable risk for businesses, which is why ransomware preparedness is a top priority. The report captures detailed data intended to help technology, financial and security leaders better prepare for and remediate ransomware attacks, which occur on average every 11 seconds and have risen to more than 236.1 million in the first half of 2022. “Survey … More

The post How prepared are organizations to tackle ransomware attacks? appeared first on Help Net Security.

"

Autosummary: According to the report, 63% of surveyed enterprise organizations are increasing spending on detection, prevention and recovery, and respondents are beginning to understand that air-gapped or immutable backups are the only ways to ensure that the backups themselves don’t fall prey to encryption worms when ransomware hits. "


A closer look at ransomware attack patterns

exploits ransomware
2022-09-13 https://www.helpnetsecurity.com/2022/09/13/ransomware-attack-patterns-video/

Barracuda released its fourth-annual threat research report which looks at ransomware attack patterns that occurred between August 2021 and July 2022. This Help Net Security video highlights how ransomware attacks continue to be a threat to businesses of all sizes.

The post A closer look at ransomware attack patterns appeared first on Help Net Security.

"

Autosummary: "


Cisco confirms Yanluowang ransomware leaked stolen company data

exploits ransomware
2022-09-12 https://www.bleepingcomputer.com/news/security/cisco-confirms-yanluowang-ransomware-leaked-stolen-company-data/
Cisco has confirmed that the data leaked yessterday by the Yanluowang ransomware gang was stolen from the company network during a cyberattack in May. [...] "

Autosummary: "


Thousands of QNAP NAS devices hit by DeadBolt ransomware (CVE-2022-27593)

exploits ransomware
2022-09-12 https://www.helpnetsecurity.com/2022/09/12/cve-2022-27593/

QNAP Systems has provided more information about the latest DeadBolt ransomware campaign targeting users of its network-attached storage (NAS) devices and the vulnerability the attackers are exploiting (CVE-2022-27593). About CVE-2022-27593 CVE-2022-27593 exists because of an externally controlled reference that resolves to a resource that is outside of the intended control sphere, and affects the widely used Photo Station application. The vulnerability allows attackers to modify system files and, ultimately, install and deploy ransomware. According to … More

The post Thousands of QNAP NAS devices hit by DeadBolt ransomware (CVE-2022-27593) appeared first on Help Net Security.

"

Autosummary: “No public exploit code exists, although this write up will introduce, what we believe to be, the basis of the exploit,” he wrote, and noted that the published information is likely enough to write signatures and detections against its exploitation. "


Cisco confirms that data leaked by the Yanluowang ransomware gang were stolen from its systems

exploits ransomware
2022-09-12 https://securityaffairs.co/wordpress/135625/cyber-crime/cisco-hack-yanluowang-ransomware.html

Cisco confirmed the May attack and that the data leaked by the Yanluowang ransomware group was stolen from its systems. In August, Cisco disclosed a security breach, the Yanluowang ransomware gang breached its corporate network in late May and stole internal data. The investigation conducted by Cisco Security Incident Response (CSIRT) and Cisco Talos revealed […]

The post Cisco confirms that data leaked by the Yanluowang ransomware gang were stolen from its systems appeared first on Security Affairs.

"

Autosummary: Then threat actors were able to drop multiple tools in the target network, including remote access tools like LogMeIn and TeamViewer, Cobalt Strike, PowerSploit, Mimikatz, and Impacket. "


Lorenz ransomware breaches corporate network via phone systems

exploits ransomware
2022-09-12 https://www.bleepingcomputer.com/news/security/lorenz-ransomware-breaches-corporate-network-via-phone-systems/
The Lorenz ransomware gang now uses a critical vulnerability in Mitel MiVoice VOIP appliances to breach enterprises using their phone systems for initial access to their corporate networks. [...] "

Autosummary: " This is an important addition to the gang"s arsenal, given that Mitel Voice-over-IP (VoIP) products are used by organizations in critical sectors worldwide (including government agencies), with over 19,000 devices currently exposed to attacks over the Internet, per security expert Kevin Beaumont. "


IKOULA and ESET join forces to block ransomware and zero-day threats

exploits ransomware
2022-09-12 https://www.helpnetsecurity.com/2022/09/13/ikoula-eset/

With the resurgence of cyber-attacks, which are ever more violent and paralyzing for companies, IKOULA has joined forces with ESET to offer companies a professional endpoint protection solution against ransomware and zero-day threats. At a time when cyber-risks must be approached in the same way as all other business risks, IKOULA is strengthening its range of cyber-protection solutions, and now offers to its customers the ESET solution: a solution created to protect all company’s workstations … More

The post IKOULA and ESET join forces to block ransomware and zero-day threats appeared first on Help Net Security.

"

Autosummary: "


Vice Society claims LAUSD ransomware attack, theft of 500GB of data

exploits ransomware
2022-09-09 https://www.bleepingcomputer.com/news/security/vice-society-claims-lausd-ransomware-attack-theft-of-500gb-of-data/
The Vice Society gang has claimed the ransomware attack that hit Los Angeles Unified (LAUSD), the second largest school district in the United States, over the weekend. [...] "

Autosummary: The gang has claimed attacks on other school districts, schools, and universities worldwide, including the Austrian Medical University of Innsbruck, the San Luis Coastal Unified School District, the Moon Area School District, the Grand Valley State University, and many others. "


The Week in Ransomware - September 9th 2022 - Schools under fire

exploits ransomware
2022-09-09 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-september-9th-2022-schools-under-fire/
Ransomware gangs have been busy this week, launching attacks against NAS devices, one of the largest hotel groups, IHG, and LAUSD, the second largest school district in the USA. [...] "

Autosummary: We also saw some new ransomware research released this week: Contributors and those who provided new ransomware information and stories this week include: @malwareforme, @LawrenceAbrams, @FourOctets, @Ionut_Ilascu, @serghei, @billtoulas, @fwosar, @VK_Intel, @struppigel, @BleepinComputer, @malwrhunterteam, @Seifreed, @DanielGallagher, @demonslay335, @jorntvdw, @PolarToffee, @MsftSecIntel, @CISAgov, @FBI, @pmbureau, @AdvIntel, @pcrisk, @PogoWasRight, @cPeterr, @security_score, and @Intel471Inc.Ransomware gangs have been busy this week, launching attacks against NAS devices, one of the largest hotel groups, IHG, and LAUSD, the second largest school district in the USA. "


Microsoft Warns of Ransomware Attacks by Iranian Phosphorus Hacker Group

exploits ransomware
2022-09-08 https://thehackernews.com/2022/09/microsoft-warns-of-ransomware-attacks.html
Microsoft"s threat intelligence division on Wednesday assessed that a subgroup of the Iranian threat actor tracked as Phosphorus is conducting ransomware attacks as a "form of moonlighting" for personal gain. The tech giant, which is monitoring the activity cluster under the moniker DEV-0270 (aka Nemesis Kitten), said it"s operated by a company that functions under the public aliases Secnerd and "

Autosummary: "


Ex-members of the Conti ransomware gang target Ukraine

exploits ransomware
2022-09-08 https://securityaffairs.co/wordpress/135447/cyber-crime/conti-ransomware-members-target-ukraine.html

Some members of the Conti ransomware gang were involved in financially motivated attacks targeting Ukraine from April to August 2022. Researchers from Google’s Threat Analysis Group (TAG) reported that some former members of the Conti cybercrime group were involved in five different campaigns targeting Ukraine between April and August 2022. The activities overlap with operations […]

The post Ex-members of the Conti ransomware gang target Ukraine appeared first on Security Affairs.

"

Autosummary: “UAC-0098 activities are representative examples of blurring lines between financially motivated and government backed groups in Eastern Europe, illustrating a trend of threat actors changing their targeting to align with regional geopolitical interests.” concludes TAG. "


Warning issued about Vice Society ransomware gang after attacks on schools

exploits ransomware
2022-09-08 https://www.tripwire.com/state-of-security/security-data-protection/warning-issued-vice-society-ransomware-gang/
A ransomware gang that has been increasingly disproportionately targeting the education sector is the subject of a joint warning issued by the FBI, CISA, and MS-ISAC. Read more in my article on the Tripwire State of Security blog. "

Autosummary: As well as strongly discouraging victims from paying any ransom to Vice Society, the FBI is also urging victims to share information that might help disrupt or even dismantle the criminal group: “The FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with Vice Society actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.” "


Google: Former Conti cybercrime gang members now targeting Ukraine

ransomware
2022-09-07 https://www.bleepingcomputer.com/news/security/google-former-conti-cybercrime-gang-members-now-targeting-ukraine/
Google says some former Conti ransomware gang members, now part of a threat group tracked as UAC-0098, are targeting Ukrainian organizations and European non-governmental organizations (NGOs). [...] "

Autosummary: " This group"s attacks were observed between mid-April to mid-June, with frequent changes in its tactics, techniques, and procedures (TTPs), tooling, and lures, while targeting Ukrainian orgs (such as hotel chains) and impersonating the National Cyber Police of Ukraine or representatives of Elon Musk and StarLink. "


Most IT leaders think partners, customers make their business a ransomware target

exploits ransomware
2022-09-07 https://www.helpnetsecurity.com/2022/09/07/most-it-leaders-think-partners-customers-make-their-business-a-ransomware-target/

Global organizations are increasingly at risk of ransomware compromise via their extensive supply chains. During May and June 2022 Sapio Research polled 2,958 IT decision-makers across 26 countries. The research revealed that 79% of global IT leaders believe their partners and customers are making their own organization a more attractive ransomware target. The challenge is particularly acute considering that potentially less well-secured SMBs make up a “significant” portion of the supply chain 52% of these … More

The post Most IT leaders think partners, customers make their business a ransomware target appeared first on Help Net Security.

"

Autosummary: "


QNAP tells NAS users to “take immediate action” after new wave of DeadBolt ransomware attacks

exploits ransomware
2022-09-07 https://grahamcluley.com/qnap-tells-nas-users-to-take-immediate-action-after-new-wave-of-deadbolt-ransomware-attacks/
Owners of QNAP NAS drives have been advised to "take immediate action" in the wake of a new wave of DeadBolt ransomware attacks. "

Autosummary: "


Some Members of Conti Group Targeting Ukraine in Financially Motivated Attacks

financial ransomware
2022-09-07 https://thehackernews.com/2022/09/some-members-of-conti-group-targeting.html
Former members of the Conti cybercrime cartel have been implicated in five different campaigns targeting Ukraine from April to August 2022. The findings, which come from Google"s Threat Analysis Group (TAG), builds upon a prior report published in July 2022, detailing the continued cyber activity aimed at the Eastern European nation amid the ongoing Russo-Ukrainian war. "UAC-0098 is a threat "

Autosummary: The findings, which come from Google"s Threat Analysis Group (TAG), builds upon a prior report published in July 2022, detailing the continued cyber activity aimed at the Eastern European nation amid the ongoing Russo-Ukrainian war. "


Google says former Conti ransomware members now attack Ukraine

exploits ransomware
2022-09-07 https://www.bleepingcomputer.com/news/security/google-says-former-conti-ransomware-members-now-attack-ukraine/
Google says some former Conti cybercrime gang members, now part of a threat group tracked as UAC-0098, are targeting Ukrainian organizations and European non-governmental organizations (NGOs). [...] "

Autosummary: " This group"s attacks were observed between mid-April to mid-June, with frequent changes in its tactics, techniques, and procedures (TTPs), tooling, and lures, while targeting Ukrainian orgs (such as hotel chains) and impersonating the National Cyber Police of Ukraine or representatives of Elon Musk and StarLink. "


Warning issued about Vice Society ransomware targeting the education sector

exploits ransomware
2022-09-07 https://www.malwarebytes.com/blog/news/2022/09/authorities-issue-warning-about-vice-society-ransomware-targeting-the-education-sector

Categories: News

Categories: Ransomware

Tags: FBI

Tags: CISA

Tags: StopRansomware

Tags: Vice Society

Tags: HelloKitty

Tags: SonicWall

Tags: PrintNightmare

Tags: LAUSD

The FBI, CISA, and the MS-ISAC have released a joint Cybersecurity Advisory after observing Vice Society threat actors disproportionately targeting the education sector with ransomware attacks.

(Read more...)

The post Warning issued about Vice Society ransomware targeting the education sector appeared first on Malwarebytes Labs.

"

Autosummary: Authentication Require all accounts with password logins to meet the required standards for developing and managing password policies: Require multifactor authentication wherever you can—particularly for webmail, VPNs, and critical systems Review domain controllers, servers, workstations, and active directories for new and/or unrecognized accounts Audit user accounts with administrative privileges and configure access controls according to the principle of least privilege Implement time-based access for accounts set at the admin level and higher Use long passwords (CISA says 8 characters, we say you can do better than that) and password managers Store passwords using industry best practice password hashing functions Implement password rate limits and lockouts Avoid frequent password resets (once a year is fine) Avoid reusing passwords Disable password “hints” Require administrator credentials to install software Software Use anti-malware software, and keep all operating systems, software, and firmware up to date. Backups Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (i.e., hard drive, storage device, the cloud). "


Second largest U.S. school district LAUSD hit by ransomware

exploits ransomware
2022-09-06 https://www.bleepingcomputer.com/news/security/second-largest-us-school-district-lausd-hit-by-ransomware/
Los Angeles Unified (LAUSD), the second largest school district in the U.S., disclosed that a ransomware attack hit its Information Technology (IT) systems over the weekend. [...] "

Autosummary: "After the District contacted officials over the holiday weekend, the White House brought together the Department of Education, the Federal Bureau of Investigation (FBI) and the Department of Homeland Security"s Cybersecurity and Infrastructure Security Agency (CISA) to provide rapid, incident response support to Los Angeles Unified, building on the immediate support by local law enforcement agencies," the district said. "


QNAP Warns of New DeadBolt Ransomware Attacks Exploiting Photo Station Flaw

exploits ransomware
2022-09-06 https://thehackernews.com/2022/09/qnap-warns-of-new-deadbolt-ransomware.html
QNAP has issued a new advisory urging users of its network-attached storage (NAS) devices to upgrade to the latest version of Photo Station following yet another wave of DeadBolt ransomware attacks in the wild by exploiting a zero-day flaw in the software. The Taiwanese company said it detected the attacks on September 3 and that "the campaign appears to target QNAP NAS devices running Photo "

Autosummary: "


FBI warns of Vice Society ransomware attacks on school districts

exploits ransomware
2022-09-06 https://www.bleepingcomputer.com/news/security/fbi-warns-of-vice-society-ransomware-attacks-on-school-districts/
FBI, CISA, and MS-ISAC warned today of U.S. school districts being increasingly targeted by the Vice Society ransomware group, with more attacks expected after the new school year start. [...] "

Autosummary: "The FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with Vice Society actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file," the federal law enforcement agency said. "


The Los Angeles Unified School District hit by a ransomware attack

exploits ransomware
2022-09-06 https://securityaffairs.co/wordpress/135411/cyber-crime/los-angeles-unified-school-district-ransomware.html

One of the US largest School districts, the Los Angeles Unified School District, suffered a ransomware attack during the weekend. The Los Angeles Unified School District is one of the largest school distinct in the US, it was hit by a ransomware attack during the Labor Day weekend. The security breach took place a few […]

The post The Los Angeles Unified School District hit by a ransomware attack appeared first on Security Affairs.

"

Autosummary: "


SecureAuth Arculix offers passwordless desktop SSO and continuous authentication

ransomware
2022-09-05 https://www.helpnetsecurity.com/2022/09/05/arculix-secureauth/

SecureAuth has released Arculix, an access management and continuous authentication platform. Driven by SecureAuth’s patented risk-based behavioral modeling engine, Arculix provides end users with a frictionless and passwordless digital journey. The platform takes into account an identity’s level of assurance based on user, device and browser trust that employs artificial intelligence and machine learning (AI/ML) to determine anomalous behavior. Arculix enables organizations to accelerate their Zero Trust initiatives by ensuring the right digital identities have … More

The post SecureAuth Arculix offers passwordless desktop SSO and continuous authentication appeared first on Help Net Security.

"

Autosummary: “Identity security remains a top concern and investment area for most enterprise and government organizations especially given that universal adoption of passwordless log-in technology is encouraged by leaders such as Apple, Google, Meta, Microsoft, Twitter, and more,” said Jay Bretzmann, Research Vice President for Security Products, IDC. "


Windows Defender identified Chromium, Electron apps as Hive Ransomware

exploits ransomware
2022-09-05 https://securityaffairs.co/wordpress/135326/security/windows-defender-flase-positive.html

Microsoft released a Windows Defender update to fix a problem that caused Defender antivirus to identify Chromium, Electron, as malware Microsoft released a Windows Defender update to fix a problem that caused Defender antivirus software to identify the app based on the Chromium browser engine or the Electron JavaScript framework as malware. Multiple users reported […]

The post Windows Defender identified Chromium, Electron apps as Hive Ransomware appeared first on Security Affairs.

"

Autosummary: "


QNAP: New DeadBolt ransomware attacks exploit Photo Station bug

exploits ransomware
2022-09-05 https://www.bleepingcomputer.com/news/security/qnap-new-deadbolt-ransomware-attacks-exploit-photo-station-bug/
QNAP is warning customers of ongoing DeadBolt ransomware attacks that started on Saturday by exploiting a zero-day vulnerability in Photo Station. [...] "

Autosummary: QTS 5.0.1: Photo Station 6.1.2 and later QTS 5.0.0/4.5.x: Photo Station 6.0.22 and later QTS 4.3.6: Photo Station 5.7.18 and later QTS 4.3.3: Photo Station 5.4.15 and later QTS 4.2.6: Photo Station 5.2.14 and later Alternatively, QNAP suggests users replace Photo Station with QuMagie, a safer photo storage management tool for QNAP NAS devices. "


QNAP patches zero-day used in new Deadbolt ransomware attacks

exploits ransomware
2022-09-05 https://www.bleepingcomputer.com/news/security/qnap-patches-zero-day-used-in-new-deadbolt-ransomware-attacks/
QNAP is warning customers of ongoing DeadBolt ransomware attacks that started on Saturday by exploiting a zero-day vulnerability in Photo Station. [...] "

Autosummary: QTS 5.0.1: Photo Station 6.1.2 and later QTS 5.0.0/4.5.x: Photo Station 6.0.22 and later QTS 4.3.6: Photo Station 5.7.18 and later QTS 4.3.3: Photo Station 5.4.15 and later QTS 4.2.6: Photo Station 5.2.14 and later Alternatively, QNAP suggests users replace Photo Station with QuMagie, a safer photo storage management tool for QNAP NAS devices. "


QNAP warns new Deadbolt ransomware attacks exploiting zero-day

exploits ransomware
2022-09-05 https://securityaffairs.co/wordpress/135347/malware/qnap-deadbolt-ransomware-new-attacks.html

QNAP warns customers of ongoing DeadBolt ransomware attacks that are exploiting a zero-day vulnerability in Photo Station. QNAP warns customers of an ongoing wave of DeadBolt ransomware attacks, threat actors are exploiting a zero-day vulnerability in Photo Station. The attacks started on Saturday meantime the Taiwanese vendor has addressed the vulnerability. “QNAP Systems, Inc. today […]

The post QNAP warns new Deadbolt ransomware attacks exploiting zero-day appeared first on Security Affairs.

"

Autosummary: Linkedin Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


San Francisco 49ers: Blackbyte ransomware gang stole info of 20K people

exploits ransomware
2022-09-02 https://www.bleepingcomputer.com/news/security/san-francisco-49ers-blackbyte-ransomware-gang-stole-info-of-20k-people/
NFL"s San Francisco 49ers are mailing notification letters confirming a data breach affecting more than 20,000 individuals following a ransomware attack that hit its network earlier this year. [...] "

Autosummary: "


Another Ransomware For Linux Likely In Development

exploits ransomware
2022-09-02 https://securityaffairs.co/wordpress/135218/malware/linux-ransomware-under-development.html

Uptycs researchers recently spotted a new Linux ransomware that appears to be under active development. The Uptycs Threat Research team recently observed an Executable and Linkable Format (ELF) ransomware which encrypts the files inside Linux systems based on the given folder path. We observed that the dropped README note matches exactly with the DarkAngels ransomware […]

The post Another Ransomware For Linux Likely In Development appeared first on Security Affairs.

"

Autosummary: Figure 3: pthread usage inside the ransomware binary The start_routine()(FUN_0041cf55) (see Figure 4) function performs the following steps to encrypt target files: Opens the target file and sets the write lock on it using fcntl(). "


Hive ransomware hits Damart clothing store with $2 million ransom

exploits ransomware
2022-09-02 https://www.bleepingcomputer.com/news/security/hive-ransomware-hits-damart-clothing-store-with-2-million-ransom/
Damart, a French clothing company with over 130 stores across the world, is being extorted for $2 million after a cyberattack from the Hive ransomware gang. [...] "

Autosummary: Damart homepage as seen on August 15, 2022 At that time, following a request for comment from BleepingComputer, Damart stated the following: "Damart, the mail order clothing brand, based in Bingley, West Yorkshire, has confirmed that there was an attempt to intrude into their IT systems, which they were rapidly able to intercept with strong security protocols. "


BlackCat ransomware claims attack on Italian energy agency

exploits ransomware industry
2022-09-02 https://www.bleepingcomputer.com/news/security/blackcat-ransomware-claims-attack-on-italian-energy-agency/
The BlackCat/ALPHV ransomware gang claimed responsibility for an attack that hit the systems of Italy"s energy agency Gestore dei Servizi Energetici SpA (GSE) over the weekend. [...] "

Autosummary: The attackers say that the stolen files contain confidential data, including contracts, reports, project information, accounting documents, and other internal documentation. "


Damart clothing store hit by Hive ransomware, $2 million demanded

exploits ransomware
2022-09-02 https://www.bleepingcomputer.com/news/security/damart-clothing-store-hit-by-hive-ransomware-2-million-demanded/
Damart, a French clothing company with over 130 stores across the world, is being extorted for $2 million after a cyberattack from the Hive ransomware gang. [...] "

Autosummary: Damart homepage as seen on August 15, 2022 At that time, following a request for comment from BleepingComputer, Damart stated the following: "Damart, the mail order clothing brand, based in Bingley, West Yorkshire, has confirmed that there was an attempt to intrude into their IT systems, which they were rapidly able to intercept with strong security protocols. "


Researchers Detail Emerging Cross-Platform BianLian Ransomware Attacks

exploits ransomware
2022-09-01 https://thehackernews.com/2022/09/researchers-detail-emerging-cross.html
The operators of the emerging cross-platform BianLian ransomware have increased their command-and-control (C2) infrastructure this month, a development that alludes to an increase in the group"s operational tempo. BianLian, written in the Go programming language, was first discovered in mid-July 2022 and has claimed 15 victim organizations as of September 1, cybersecurity firm [redacted] said in "

Autosummary: According to Cyble, which detailed the modus operandi of the ransomware earlier this month, targeted companies span several industry sectors such as media, banking, energy, manufacturing, education, healthcare, and professional services. "


Ragnar Locker ransomware gang claims to have stolen data from TAP Air Portugal

exploits ransomware
2022-09-01 https://securityaffairs.co/wordpress/135168/data-breach/ragnar-locker-ransomware-tap-air-portugal.html

The Ragnar Locker ransomware gang claims to have hacked the Portuguese state-owned flag carrier airline TAP Air Portugal and stolen customers’ data. The Ragnar Locker ransomware added the Portuguese state-owned flag carrier airline TAP Air Portugal to its leak site and claims to have stolen customers’ data. On August 26, the Portugues company announced via […]

The post Ragnar Locker ransomware gang claims to have stolen data from TAP Air Portugal appeared first on Security Affairs.

"

Autosummary: The ransomware group published screenshots of the stolen data, which allegedly includes names, addresses, email addresses, phone numbers, corporate IDs, travel information, nationality, gender, and other personal information. "


New ransomware hits Windows, Linux servers of Chile govt agency

exploits latam ransomware
2022-09-01 https://www.bleepingcomputer.com/news/security/new-ransomware-hits-windows-linux-servers-of-chile-govt-agency/
Chile"s national computer security and incident response team (CSIRT) has announced that a ransomware attack has impacted operations and online services of a government agency in the country. [...] "

Autosummary: "The ransomware would use the NTRUEncrypt public key encryption algorithm, targeting log files (.log), executable files (.exe), dynamic library files (.dll), swap files (.vswp), virtual disks (. vmdk), snapshot (.vmsn) files, and virtual machine memory (.vmem) files, among others," - Chile CSIRT According to CSIRT, the malware used in this attack also had functions for stealing credentials from web browsers, list removable devices for encryption, and evade antivirus detection using execution timeouts. "


Montenegro hit by ransomware attack, hackers demand $10 million

exploits ransomware
2022-09-01 https://www.bleepingcomputer.com/news/security/montenegro-hit-by-ransomware-attack-hackers-demand-10-million/
The government of Montenegro has admitted that its previous allegations about Russian threat actors attacking critical infrastructure in the country were false and now blames ransomware for the damage to its IT infrastructure that has caused extensive service disruptions. [...] "

Autosummary: "


Should ransomware payments be banned? A few considerations

exploits ransomware
2022-08-31 https://www.helpnetsecurity.com/2022/08/31/should-ransomware-payments-be-banned-considerations-video/

Several U.S. states have recently moved to ban local and state agencies and organizations funded by taxpayers’ dollars from paying off ransomware gangs, and a few more are gearing up to it. In this Help Net Security video interview, Alex Iftimie, Partner at Morrison & Foerster (MoFo), talks about the possible repercussions of such legislation and, in general, about the evolving nature of ransomware attacks and the current global efforts aimed at fighting the ransomware … More

The post Should ransomware payments be banned? A few considerations appeared first on Help Net Security.

"

Autosummary: "


Ragnar Locker ransomware claims attack on Portugal"s flag airline

exploits ransomware
2022-08-31 https://www.bleepingcomputer.com/news/security/ragnar-locker-ransomware-claims-attack-on-portugals-flag-airline/
The Ragnar Locker ransomware gang has claimed an attack on the flag carrier of Portugal, TAP Air Portugal, disclosed by the airline last Friday.  [...] "

Autosummary: Ragnar Locker also shared a screenshot of a spreadsheet containing what looks like customer information stolen from TAP"s servers, including names, dates of birth, emails, and addresses. "


Outdated infrastructure not up to today’s ransomware challenges

exploits ransomware
2022-08-30 https://www.helpnetsecurity.com/2022/08/30/outdated-infrastructure-manage-data/

A global research commissioned by Cohesity reveals that nearly half of respondents say their company depends on outdated, legacy backup and recovery infrastructure to manage and protect their data. In some cases, this technology is more than 20 years old and was designed long before today’s multicloud era and onslaught of sophisticated cyberattacks plaguing enterprises globally. Challenges pertaining to outdated infrastructure could easily be compounded by the fact that many IT and security teams don’t … More

The post Outdated infrastructure not up to today’s ransomware challenges appeared first on Help Net Security.

"

Autosummary: The findings are as follows (respondents were asked to check all that apply): integration between IT and security systems (41%) lack of coordination between IT and Security (38%) lack of an automated disaster recovery system (34%) antiquated backup and recovery systems (32%) lack of a recent, clean, immutable copy of data (32%) lack of and timely detailed alerts (31%) With respect to the lack of coordination between IT and Security, this coincides with other findings from this survey denoting that a gap often exists between IT and SecOps that puts businesses and security postures at risk. "


World’s largest distributors of books Baker & Taylor hit by ransomware

exploits ransomware
2022-08-30 https://securityaffairs.co/wordpress/135026/cyber-crime/baker-taylor-ransomware.html

Baker & Taylor, one of the world’s largest distributors of books, revealed that it was hit by a ransomware attack. Baker & Taylor, one of the world’s largest distributors of books worldwide, suffered a ransomware attack on August 23. The incident impacted the company’s phone systems, offices, and service centers. On August 24, the company […]

The post World’s largest distributors of books Baker & Taylor hit by ransomware appeared first on Security Affairs.

"

Autosummary: "


Leading library services firm Baker & Taylor hit by ransomware

exploits ransomware
2022-08-29 https://www.bleepingcomputer.com/news/security/leading-library-services-firm-baker-and-taylor-hit-by-ransomware/
Baker & Taylor, which describes itself as the world"s largest distributor of books to libraries worldwide, today confirmed it"s still working on restoring systems after being hit by ransomware more than a week ago. [...] "

Autosummary: "


New Golang-based "Agenda Ransomware" Can Be Customized For Each Victim

exploits ransomware
2022-08-29 https://thehackernews.com/2022/08/new-golang-based-agenda-ransomware-can.html
A new ransomware strain written in Golang dubbed "Agenda" has been spotted in the wild, targeting healthcare and education entities in Indonesia, Saudi Arabia, South Africa, and Thailand. "Agenda can reboot systems in safe mode, attempts to stop many server-specific processes and services, and has multiple modes to run," Trend Micro researchers said in an analysis last week. Qilin, the threat "

Autosummary: "


New Agenda Ransomware appears in the threat landscape

exploits ransomware
2022-08-28 https://securityaffairs.co/wordpress/134911/cyber-crime/agenda-ransomware.html

Trend Micro researchers warn of a new ransomware family called Agenda, which has been used in attacks on organizations in Asia and Africa. Trend Micro researchers recently discovered a new piece of targeted ransomware, tracked as Agenda, that was written in the Go programming language. The ransomware was employed in a targeted attack against one of […]

The post New Agenda Ransomware appears in the threat landscape appeared first on Security Affairs.

"

Autosummary: Agenda reboots the victim’s machine in safe mode and then encrypt files upon reboot, a technique adopted by other ransomware gangs REvil, The threat actor gained access via RDP to Active Directory using leaked accounts, then used scanning tools Nmap.exe and Nping.exe for scanning the network. "


LockBit ransomware gang gets aggressive with triple-extortion tactic

exploits ransomware
2022-08-28 https://www.bleepingcomputer.com/news/security/lockbit-ransomware-gang-gets-aggressive-with-triple-extortion-tactic/
LockBit ransomware gang announced that it is improving defenses against distributed denial-of-service (DDoS) attacks and working to take the operation to triple extortion level. [...] "

Autosummary: LockBit getting into DDoS Earlier this week, LockBitSupp, the public-facing figure of the LockBit ransomware operation, announced that the group is back in business with a larger infrastructure to give access to leaks unfazed by DDoS attacks. "


The Week in Ransomware - August 26th 2022 - Fighting back

exploits ransomware
2022-08-26 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-august-26th-2022-fighting-back/
We saw a bit of ransomware drama this week, mostly centered around LockBit, who saw their data leak sites taken down by a DDoS attack after they started leaking the allegedly stolen Entrust data. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @VK_Intel, @LawrenceAbrams, @jorntvdw, @billtoulas, @demonslay335, @PolarToffee, @Ionut_Ilascu, @Seifreed, @fwosar, @DanielGallagher, @struppigel, @BleepinComputer, @malwareforme, @serghei, @FourOctets, @malwrhunterteam, @TrendMicro, @GossiTheDog, @AlvieriD, @ValeryMarchive, @Cyberknow20, @VenezuelaBTH, @S0ufi4n3, @vxunderground, @AShukuhi, @pcrisk, and @ddd1ms. According to our information, the investigators in charge of the cyberattack that led to the outbreak of the LockBit ransomware, last weekend, at the Sud-Francilien hospital center (CHSF), in Corbeil-Essonnes , currently suspect that the hijacking of a publisher"s support account served as the initial intrusion vector. "


Avast Ransomware Shield for businesses prevents unauthorised access

exploits ransomware
2022-08-25 https://www.helpnetsecurity.com/2022/08/25/avast-ransomware-shield/

Avast has launched a Ransomware Shield for businesses, offering organizations an extra layer of protection against ransomware attacks. This will ensure businesses can secure their files and customer data, with proactive protection which prevents unauthorized access. The new feature is available as part of the Avast Essential, Premium, and Ultimate Business Security packages for businesses for both Windows and MacOS. Despite observing a decline in ransomware attacks in Q4 2021 and Q1 2022, ransomware attacks … More

The post Avast Ransomware Shield for businesses prevents unauthorised access appeared first on Help Net Security.

"

Autosummary: "


We need to think about ransomware differently

exploits ransomware
2022-08-25 https://www.helpnetsecurity.com/2022/08/25/think-about-ransomware-differently-video/

In this Help Net Security video, David Mahdi, Chief Strategy Officer & CISO Advisory at Sectigo, talks about how ransomware isn’t solely a malware problem, bad actors want access to your data, so it really is a data security and access problem. When we look at what ransomware does, it leverages users’ access within an organization to encrypt sensitive files (and often also steal). The authentication given to a user defines the level of damage … More

The post We need to think about ransomware differently appeared first on Help Net Security.

"

Autosummary: "


CISOs see little need for a point solution to cover ransomware risk

exploits ransomware
2022-08-24 https://www.helpnetsecurity.com/2022/08/24/point-solution-ransomware-video/

Nearly half of enterprises have fallen victim to a ransomware attack, of which nearly all have had little choice but to heed their attackers, according to the Q2 CISO Circuit report from YL Ventures. The financial disruption, privacy implications and operational failure danger caused by ransomware are often too critical to suffer. This is especially true in cases involving critical infrastructure, including water treatment and hospital networks.   For now, CISOs see little need for a … More

The post CISOs see little need for a point solution to cover ransomware risk appeared first on Help Net Security.

"

Autosummary: "


France hospital Center Hospitalier Sud Francilien suffered ransomware attack

exploits ransomware
2022-08-24 https://securityaffairs.co/wordpress/134771/cyber-crime/center-hospitalier-sud-francilien-ransomware.html

A French hospital, the Center Hospitalier Sud Francilien (CHSF), suffered a cyberattack on Sunday and was forced to refer patients to other structures. The Center Hospitalier Sud Francilien (CHSF), a hospital southeast of Paris, has suffered a ransomware attack over the weekend. The attack disrupted the emergency services and surgeries and forced the hospital to refer patients […]

The post France hospital Center Hospitalier Sud Francilien suffered ransomware attack appeared first on Security Affairs.

"

Autosummary: The announcement states that the attack does not impact the operation and security of the hospital building, and all networks remain in operation (telephone with the exception of fax, automated distribution flows, etc.). "


RansomEXX claims ransomware attack on Sea-Doo, Ski-Doo maker

exploits ransomware
2022-08-24 https://www.bleepingcomputer.com/news/security/ransomexx-claims-ransomware-attack-on-sea-doo-ski-doo-maker/
The RansomEXX ransomware gang is claiming responsibility for the cyberattack against Bombardier Recreational Products (BRP), disclosed by the company on August 8, 2022. [...] "

Autosummary: On August 15, 2022, BRP provided an update on the situation, saying that four manufacturing sites in Canada, Finland, the U.S., and Austria resumed production, with the rest to follow suit by the end of that week. "


Quantum ransomware attack disrupts govt agency in Dominican Republic

exploits ransomware
2022-08-24 https://www.bleepingcomputer.com/news/security/quantum-ransomware-attack-disrupts-govt-agency-in-dominican-republic/
The Dominican Republic"s Instituto Agrario Dominicano has suffered a Quantum ransomware attack that encrypted multiple services and workstations throughout the government agency. [...] "

Autosummary: Quantum ransom note Source: BleepingComputer Quantum is becoming a major player among enterprise-targeting ransomware operations, linked to an attack on PFC that impacted over 650 healthcare orgs The ransomware gang is believed to have become an offshoot of the Conti ransomware operation, which took over the previous rebrand of the MountLocker ransomware operation. "


Lockbit leak sites hit by mysterious DDoS attack after Entrust hack

ransomware
2022-08-23 https://securityaffairs.co/wordpress/134707/cyber-crime/lockbit-hacked-entrust.html

LockBit ransomware gang claims to have hacked the IT giant Entrust and started leaking the stolen files. Entrust Corp., provides software and hardware used to issue financial cards, e-passport production, user authentication for those looking to access secure networks or conduct financial transactions, trust certificated for websites, mobile credentials, and connected devices. The Lockbit ransomware […]

The post Lockbit leak sites hit by mysterious DDoS attack after Entrust hack appeared first on Security Affairs.

"

Autosummary: Lockbit: "We"re being DDoS"d because of the Entrust hack" vx-underground: "How do you know it"s because of the Entrust breach?" Lockbit: pic.twitter.com/HUO2hdTbwz — vx-underground (@vxunderground) August 21, 2022 The news was confirmed by BleepingComputer who reached representatives from the group: “Ddos attack began immediately after the publication of data and negotiations, of course it was them, who else needs it? "


What businesses can do to anticipate and mitigate ransomware threats

exploits ransomware
2022-08-23 https://www.helpnetsecurity.com/2022/08/23/anticipate-mitigate-ransomware-threats-video/

In this Help Net Security video, Kevin Holvoet, Cyber Threat Intelligence Instructor, SANS Institute, discusses ransomware and Ransomware as a Service (Raas) attacks, and illustrates how preparedness with a proper top-down response is critical for business continuity in case of an attack.

The post What businesses can do to anticipate and mitigate ransomware threats appeared first on Help Net Security.

"

Autosummary: "


The Rise of Data Exfiltration and Why It Is a Greater Risk Than Ransomware

exploits ransomware
2022-08-23 https://thehackernews.com/2022/08/the-rise-of-data-exfiltration-and-why.html
Ransomware is the de facto threat organizations have faced over the past few years. Threat actors were making easy money by exploiting the high valuation of cryptocurrencies and their victims" lack of adequate preparation.  Think about bad security policies, untested backups, patch management practices not up-to-par, and so forth. It resulted in easy growth for ransomware extortion, a crime that "

Autosummary: Earlier this year, incidents at Nvidia, Microsoft, and several other companies have highlighted how big of a problem it"s become – and how, for some organizations, it may be a threat that"s even bigger than ransomware. After so many years of alarming headlines, most organizations have deployed ransomware protection in the form of better backup strategies, more fine-tuned and granular data access, and better rules and monitoring for detecting unwanted file changes. Staying quietly, rather than flashing "you"ve been hacked" messages on computer screens, allows attackers to "see" more information flows in the network and to do more in-depth reconnaissance of systems after gaining entry. "


French hospital hit by $10M ransomware attack, sends patients elsewhere

exploits ransomware
2022-08-23 https://www.bleepingcomputer.com/news/security/french-hospital-hit-by-10m-ransomware-attack-sends-patients-elsewhere/
The Center Hospitalier Sud Francilien (CHSF), a 1000-bed hospital located 28km from the center of Paris, suffered a cyberattack on Sunday, which has resulted in the medical center referring patients to other establishments and postponing appointments for surgeries. [...] "

Autosummary: "


New "Donut Leaks" extortion gang linked to recent ransomware attacks

exploits ransomware
2022-08-23 https://www.bleepingcomputer.com/news/security/new-donut-leaks-extortion-gang-linked-to-recent-ransomware-attacks/
A new data extortion group named "Donut Leaks" is linked to recent cyberattacks, including those on Greek natural gas company DESFA, UK architectural firm Sheppard Robson, and multinational construction company Sando. [...] "

Autosummary: Donut Leaks data leak site Source: BleepingComputer The stolen data storage server runs the File Browser application, which allows visitors to browse through all of the stolen data stored on the server, broken down by the victim. "


Hackers demand $10 million from Paris hospital after ransomware attack

exploits ransomware
2022-08-23 https://www.bitdefender.com/blog/hotforsecurity/hackers-demand-10-million-from-paris-hospital-after-ransomware-attack/
Malicious hackers are demanding $10 million from a French hospital they hit with ransomware last weekend. The Hospital Center Sud Francilien (CHSF) in Corbeil-Essonnes, south-east of Paris, was struck late on Saturday night, causing major disruption to health services. Read more in my article on the Hot for Security blog. "

Autosummary: "


Businesses expect the government to increase its financial assistance for all ransomware incidents

financial exploits government ransomware
2022-08-22 https://www.helpnetsecurity.com/2022/08/22/ransomware-demands-videos/

Businesses are increasingly concerned about how they will meet ransomware demands. Only 19 percent of those surveyed have ransomware coverage limits above $600,000, while over half (59 percent) hoped the government would cover damages when future attacks are linked to other nation-states, according to BlackBerry Limited and Corvus Insurance. This Help Net Security video uncovers why businesses look for government help with ransomware demand costs.

The post Businesses expect the government to increase its financial assistance for all ransomware incidents appeared first on Help Net Security.

"

Autosummary: "


Lockbit ransomware blames Entrust for DDoS attacks on leak sites

exploits ransomware
2022-08-22 https://www.bleepingcomputer.com/news/security/lockbit-ransomware-blames-entrust-for-ddos-attacks-on-leak-sites/
The LockBit ransomware operation"s data leak sites have been shut down over the weekend due to a DDoS attack telling them to remove Entrust"s allegedly stolen data. [...] "

Autosummary: Alleged Entrust data leaked on LockBit"s data leak site Source: Dominic Alvieri Soon after they started leaking data, researchers began reporting that the ransomware gang"s Tor data leak sites were unavailable due to a DDoS attack. So, at this point, it is unclear if Entrust, an affiliated cybersecurity company, or simply a rival threat actor is taking advantage of the situation by conducting the attacks. "


Greek natural gas operator suffers ransomware-related data breach

financial exploits ransomware
2022-08-22 https://www.bleepingcomputer.com/news/security/greek-natural-gas-operator-suffers-ransomware-related-data-breach/
Greece"s largest natural gas distributor DESFA confirmed on Saturday that they suffered a limited scope data breach and IT system outage following a cyberattack. [...] "

Autosummary: The upcoming winter is expected to be plagued by shortages, power cuts, rationing, and soaring energy prices, leaving consumers even more vulnerable to ransomware attacks against gas suppliers. "


The Week in Ransomware - August 19th 2022 - Evolving extortion tactics

exploits ransomware industry
2022-08-19 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-august-19th-2022-evolving-extortion-tactics/
Bringing you the latest ransomware news, including new research, tactics, and cyberattacks. We also saw the return of the BlackByte ransomware operation, who has started to use new extortion tactics. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @billtoulas, @LawrenceAbrams, @PolarToffee, @BleepinComputer, @Seifreed, @jorntvdw, @fwosar, @serghei, @struppigel, @FourOctets, @demonslay335, @malwrhunterteam, @Ionut_Ilascu, @malwareforme, @VK_Intel, @DanielGallagher, @juanbrodersen, @AlvieriD, @Cyberknow20, @Intel_by_KELA, @MauroEldritch, @luisezegarra, @Cleafy, and @pcrisk. "


BlackByte ransomware v2 is out with new extortion novelties

exploits ransomware
2022-08-18 https://securityaffairs.co/wordpress/134531/cyber-crime/blackbyte-ransomware-v2.html

A new version of the BlackByte ransomware appeared in the threat landscape, version 2.0 uses extortion techniques similar to LockBit ones. BlackByte ransomware Version 2.0 appeared in the threat landscape after a short break, the latest version has a new data leak site. It is interesting to note that the group introduced some novelties in the […]

The post BlackByte ransomware v2 is out with new extortion novelties appeared first on Security Affairs.

"

Autosummary: "


LockBit claims ransomware attack on security giant Entrust

exploits ransomware
2022-08-18 https://www.bleepingcomputer.com/news/security/lockbit-claims-ransomware-attack-on-security-giant-entrust/
The LockBit ransomware gang has claimed responsibility for the June cyberattack on digital security giant Entrust. [...] "

Autosummary: "


LockBit claims ransomware attack on security giant Entrust, leaks data

exploits ransomware
2022-08-18 https://www.bleepingcomputer.com/news/security/lockbit-claims-ransomware-attack-on-security-giant-entrust-leaks-data/
The LockBit ransomware gang has claimed responsibility for the June cyberattack on digital security giant Entrust. [...] "

Autosummary: Update 8/21/22: LockBit leaks alleged Entrust data LockBit began leaking Entrust"s data Friday evening, first sharing screenshots of some of the allegedly stolen data, with the threat actors saying they would leak further data later that evening. "


BlackByte ransomware gang is back with new extortion tactics

exploits ransomware industry
2022-08-17 https://www.bleepingcomputer.com/news/security/blackbyte-ransomware-gang-is-back-with-new-extortion-tactics/
The BlackByte ransomware is back with version 2.0 of their operation, including a new data leak site utilizing new extortion techniques borrowed from LockBit. [...] "

Autosummary: "


Argentina"s Judiciary of Córdoba hit by PLAY ransomware attack

exploits latam ransomware
2022-08-16 https://www.bleepingcomputer.com/news/security/argentinas-judiciary-of-c-rdoba-hit-by-play-ransomware-attack/
Argentina"s Judiciary of Córdoba has shut down its IT systems after suffering a ransomware attack, reportedly at the hands of the new "Play" ransomware operation. [...] "

Autosummary: " Justicia Córdoba"s website is suffering an outage Source: BleepingComputer Attack linked to Play ransomware While the Judiciary has not disclosed details of the attack, journalist Luis Ernest Zegarra tweeted that they were hit by ransomware that appends the ".Play" extension to encrypted files. "


Russian State Hackers Continue to Attack Ukrainian Entities with Infostealer Malware

exploits government ransomware
2022-08-16 https://thehackernews.com/2022/08/russian-state-hackers-continue-to.html
Russian state-sponsored actors are continuing to strike Ukrainian entities with information-stealing malware as part of what"s suspected to be an espionage operation. Symantec, a division of Broadcom Software, attributed the malicious campaign to a threat actor tracked Shuckworm, also known as Actinium, Armageddon, Gamaredon, Primitive Bear, and Trident Ursa. The findings have been corroborated "

Autosummary: Symantec, a division of Broadcom Software, attributed the malicious campaign to a threat actor tracked Shuckworm, also known as Actinium, Armageddon, Gamaredon, Primitive Bear, and Trident Ursa. "


Russia-linked Gamaredon APT continues to target Ukraine

ransomware
2022-08-16 https://securityaffairs.co/wordpress/134438/apt/gamaredon-continues-target-ukraine.html

Russia-linked Gamaredon APT group targets Ukrainian entities with PowerShell info-stealer malware dubbed GammaLoad. Russia-linked Gamaredon APT group (aka Shuckworm, Actinium, Armageddon, Primitive Bear, and Trident Ursa) targets Ukrainian entities with PowerShell info-stealer malware dubbed GammaLoad, Symantec warns. The Computer Emergency Response Team of Ukraine (CERT-UA) confirmed the ongoing cyber espionage campaign. Symantec and TrendMicro first discovered the Gamaredon […]

The post Russia-linked Gamaredon APT continues to target Ukraine appeared first on Security Affairs.

"

Autosummary: Russia-linked Gamaredon APT group (aka Shuckworm, Actinium, Armageddon, Primitive Bear, and Trident Ursa) targets Ukrainian entities with PowerShell info-stealer malware dubbed GammaLoad, Symantec warns. "


U.K. Water Supplier Hit with Clop Ransomware Attack

exploits ransomware
2022-08-16 https://threatpost.com/water-supplier-hit-clop-ransomware/180422/
The incident disrupted corporate IT systems at one company while attackers misidentified the victim in a post on its website that leaked stolen data. "

Autosummary: The breached data, published online after ransom negotiations between Clop and its victim broke down, also includes passports, screenshots from water-treatment SCADA systems, driver’s licenses and more, the report said. "


CISA and FBI issue alert about Zeppelin ransomware

exploits ransomware
2022-08-16 https://www.malwarebytes.com/blog/news/2022/08/cisa-and-fbi-issue-alert-about-zeppelin-ransomware

Categories: News

Categories: Ransomware

Tags: Zeppelin

Tags: ransomware

Tags: RDP

Tags: Sonicwall

Tags: phishing

Tags: malvertising

Tags: backups

Tags: authentication

Tags: mfa

Tags: patching

Tags: EDR

The FBI and CISA have issued a joint Cybersecurity Advisory (CSA) to raise awareness about Zeppelin ransomware

(Read more...)

The post CISA and FBI issue alert about Zeppelin ransomware appeared first on Malwarebytes Labs.

"

Autosummary: Backups Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (i.e., hard drive, storage device, the cloud). While anyone can fall victim to these threat actors, the FBI noted that this malware has been used to target a wide range of businesses and critical infrastructure organizations, including defense contractors, educational institutions, manufacturers, technology companies, and especially organizations in the healthcare and medical industries.Posted: August 16, 2022 by The FBI and CISA have issued a joint Cybersecurity Advisory (CSA) to raise awareness about Zeppelin ransomware The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have released a joint Cybersecurity Advisory (CSA) about Zeppelin ransomware. "


CISA, FBI shared a joint advisory to warn of Zeppelin ransomware attacks

exploits ransomware
2022-08-14 https://securityaffairs.co/wordpress/134350/cyber-crime/zeppelin-ransomware-joint-alert.html

The US Cybersecurity and Infrastructure Security Agency (CISA) and the FBI are warning of Zeppelin ransomware attacks. The US Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have published a joint advisory to warn of Zeppelin ransomware attacks. The Zeppelin ransomware first appeared on the threat landscape in November 2019 […]

The post CISA, FBI shared a joint advisory to warn of Zeppelin ransomware attacks appeared first on Security Affairs.

"

Autosummary: To mitigate the risks of ransomware attacks, organizations are recommended to define a recovery plan, implement multi-factor authentication, keep all operating systems, software, and firmware up to date, enforce a strong passwords policy, segment networks, disable unused ports and services, audit user accounts and domain controllers, implement a least-privilege access policy, review domain controllers, servers, workstations, and active directories, maintain offline backups of data, and identify, detect, and investigate abnormal activity and potential traversal of the indicated ransomware with a networking monitoring tool. "


SOVA malware adds ransomware feature to encrypt Android devices

exploits ransomware
2022-08-13 https://www.bleepingcomputer.com/news/security/sova-malware-adds-ransomware-feature-to-encrypt-android-devices/
The SOVA Android banking trojan continues to evolve with new features, code improvements, and the addition of a new ransomware feature that encrypts files on mobile devices. [...] "

Autosummary: Moreover, it features refactored and improved code that helps it operate more stealthy on the compromised device, while its latest version, 5.0, adds a ransomware module. "


Organizations would like the government to help with ransomware demand costs

exploits government ransomware
2022-08-12 https://www.helpnetsecurity.com/2022/08/12/government-help-ransomware/

Businesses are increasingly concerned about how they will meet ransomware demands. Only 19 percent of those surveyed have ransomware coverage limits above $600,000, while over half (59 percent) hoped the government would cover damages when future attacks are linked to other nation-states, according to BlackBerry Limited and Corvus Insurance. SMBs, who have become a favorite criminal target, are especially feeling the heat. Of businesses with under 1,500 employees, only 14 percent have a coverage limit … More

The post Organizations would like the government to help with ransomware demand costs appeared first on Help Net Security.

"

Autosummary: Only 19 percent of those surveyed have ransomware coverage limits above $600,000, while over half (59 percent) hoped the government would cover damages when future attacks are linked to other nation-states, according to BlackBerry Limited and Corvus Insurance. "


Malicious PyPI packages drop ransomware, fileless malware

exploits ransomware
2022-08-12 https://www.helpnetsecurity.com/2022/08/12/malicious-pypi-packages-drop-ransomware-fileless-malware-video/

In this Help Net Security video, Ax Sharma, Senior Security Researcher at Sonatype, discusses newly found PyPI packages that pack ransomware, and another package that appears to be safe but silently drops fileless malware to mine cryptocurrency (Monero) on the infected system – all while evading detection.

The post Malicious PyPI packages drop ransomware, fileless malware appeared first on Help Net Security.

"

Autosummary: "


U.S. Government Offers $10 Million Reward for Information on Conti Ransomware Gang

exploits government ransomware
2022-08-12 https://thehackernews.com/2022/08/us-government-offers-10-million-reward.html
The U.S. State Department on Thursday announced a $10 million reward for information related to five individuals associated with the Conti ransomware group. The reward offer, first reported by WIRED, is also notable for the fact that it marks the first time the face of a Conti associate, known as "Target," has been unmasked. The four other associates have been referred to as "Tramp," "Dandis," " "

Autosummary: "


BazarCall attacks have revolutionized ransomware operations

exploits ransomware
2022-08-12 https://securityaffairs.co/wordpress/134302/cyber-crime/bazarcall-revolutionized-ransomware-operations.html

The Conti ransomware gang is using BazarCall phishing attacks as an initial attack vector to access targeted networks. BazarCall attack, aka call back phishing, is an attack vector that utilizes targeted phishing methodology and was first used by the Ryuk ransomware gang in 2020/2021. The BazarCall attack chain is composed of the following stages: Stage […]

The post BazarCall attacks have revolutionized ransomware operations appeared first on Security Affairs.

"

Autosummary: The adoption of Callback phishing campaigns has impacted the strategy of ransomware gangs, experts observed targeted attacks aimed at Finance, Technology, Legal, and Insurance industries. It involved large investments into hiring spammers, OSINT specialists, designers, call center operators, and expanding the number of network intruders. "


Feds: Zeppelin Ransomware Resurfaces with New Compromise, Encryption Tactics

exploits ransomware industry
2022-08-12 https://threatpost.com/zeppelin-ransomware-resurfaces/180405/
The CISA has seen a resurgence of the malware targeting a range of verticals and critical infrastructure organizations by exploiting RDP, firewall vulnerabilities. "

Autosummary: Multiple Encryption Once Zeppelin ransomware is executed on a network, each encrypted file is appended with a randomized nine-digit hexadecimal number as a file extension, e.g., file.txt.txt.C59-E0C-929, according to the CISA. "


The US offers a $10M rewards for info on the Conti ransomware gang’s members

exploits ransomware
2022-08-12 https://securityaffairs.co/wordpress/134326/cyber-crime/conti-ransomware-reward.html

The U.S. State Department announced a $10 million reward for information related to five individuals associated with the Conti ransomware gang. The U.S. State Department announced a $10 million reward for information on five prominent members of the Conti ransomware gang. The government will also reward people that will provide details about Conti and its affiliated groups TrickBot and Wizard […]

The post The US offers a $10M rewards for info on the Conti ransomware gang’s members appeared first on Security Affairs.

"

Autosummary: “That photo is the first time the US government has ever identified a malicious actor associated with Conti,” The other members of the Conti gang for which the US Government is offering a reward are referred to as “Tramp,” “Dandis,” “Professor,” and “Reshaev.” "


The Week in Ransomware - August 12th 2022 - Attacking the defenders

exploits ransomware
2022-08-12 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-august-12th-2022-attacking-the-defenders/
It was a very busy week for ransomware news and attacks, especially with the disclosure that Cisco was breached by a threat actor affiliated with the Yanluowang ransomware gang. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @demonslay335, @Ionut_Ilascu, @PolarToffee, @malwareforme, @LawrenceAbrams, @DanielGallagher, @VK_Intel, @fwosar, @struppigel, @Seifreed, @BleepinComputer, @billtoulas, @serghei, @malwrhunterteam, @FourOctets, @jorntvdw, @fiskerlarsen, @Sophos, @y_advintel, @AdvIntel, @Cyberknow20, @kaspersky, @PaloAltoNtwks, @AhnLab_SecuInfo, @ReversingLabs, @pcrisk, @Amigo_A_, @jamiemaccol, @Jarnecki, and @PogoWasRight. Finally, the US government published a picture of a Conti ransomware member for the first, asking people to provide info on members named "Target," "Tramp," "Dandis," "Professor," and "Reshaev." "


ActZero Ransomware Readiness Assessment strenghtens ransomware defense for SMEs

exploits ransomware
2022-08-11 https://www.helpnetsecurity.com/2022/08/11/actzero-ransomware-readiness-assessment/

ActZero has launched a Ransomware Readiness Assessment for small and medium-sized enterprises (SMEs). The program simulates a ransomware attack sequence, which can expose vulnerabilities and lateral pathways left open by existing tools. With this valuable visibility businesses can start reducing risk immediately. Adversaries expect small businesses to lack proper ransomware defenses. With ActZero MDR, they can now prove them wrong. Adversaries are turning up the pressure on their victims, demanding average ransoms nearing $1M, and … More

The post ActZero Ransomware Readiness Assessment strenghtens ransomware defense for SMEs appeared first on Help Net Security.

"

Autosummary: Over the past few months of assessment activity, ActZero has discovered that, on average, its MDR service was able to detect and block 89% of all common and recent ransomware events techniques and tactics, including emerging threats. "


Hackers Behind Cuba Ransomware Attacks Using New RAT Malware

exploits ransomware
2022-08-11 https://thehackernews.com/2022/08/hackers-behind-cuba-ransomware-attacks.html
Threat actors associated with the Cuba ransomware have been linked to previously undocumented tactics, techniques and procedures (TTPs), including a new remote access trojan called ROMCOM RAT on compromised systems. The new findings come from Palo Alto Networks" Unit 42 threat intelligence team, which is tracking the double extortion ransomware group under the constellation-themed moniker "

Autosummary: "Cuba ransomware is distributed through Hancitor malware, a loader known for dropping or executing stealers, such as Remote Access Trojans (RATs) and other types of ransomware, onto victims" networks," according to a December 2021 alert from the U.S. Federal Bureau of Investigation (FBI)." In the intervening months, the ransomware operation has received an upgrade with an aim to "optimize its execution, minimize unintended system behavior, and provide technical support to the ransomware victims if they choose to negotiate," per Trend Micro. "


FBI: Zeppelin ransomware may encrypt devices multiple times in attacks

exploits ransomware
2022-08-11 https://www.bleepingcomputer.com/news/security/fbi-zeppelin-ransomware-may-encrypt-devices-multiple-times-in-attacks/
The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) warned US organizations today that attackers deploying Zeppelin ransomware might encrypt their files multiple times. [...] "

Autosummary: "


UK NHS service recovery may take a month after MSP ransomware attack

exploits ransomware
2022-08-11 https://www.bleepingcomputer.com/news/security/uk-nhs-service-recovery-may-take-a-month-after-msp-ransomware-attack/
Managed service provider (MSP) Advanced confirmed that a ransomware attack on its systems caused the disruption of emergency services (111) from the United Kingdom"s National Health Service (NHS). [...] "

Autosummary: "


AA22-223A: #StopRansomware: Zeppelin Ransomware

exploits ransomware
2022-08-11 https://us-cert.cisa.gov/ncas/alerts/aa22-223a
Original release date: August 11, 2022

Summary

Actions to take today to mitigate cyber threats from ransomware:

• Prioritize remediating known exploited vulnerabilities.
• Train users to recognize and report phishing attempts.
• Enable and enforce multifactor authentication.

Note: this joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint CSA to disseminate known Zeppelin ransomware IOCs and TTPs associated with ransomware variants identified through FBI investigations as recently as 21 June 2022.

The FBI and CISA encourage organizations to implement the recommendations in the Mitigations section of this CSA to reduce the likelihood and impact of ransomware incidents.

Download the PDF version of this report: pdf, 999 kb

Download the YARA signature for Zeppelin: YARA Signature, .yar 125 kb

Technical Details

Note: this advisory uses the MITRE ATT&CK® for Enterprise framework, version 11. See MITRE ATT&CK for Enterprise for all referenced tactics and techniques.

Zep "

Autosummary: Any reference to specific commercial products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA or the FBI.125 kb Mitigations The FBI and CISA recommend network defenders apply the following mitigations to limit potential adversarial use of common system and network discovery techniques and to reduce the risk of compromise by Zeppelin ransomware: Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (i.e., hard drive, storage device, the cloud).REPORTING The FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with Zeppelin actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.From 2019 through at least June 2022, actors have used this malware to target a wide range of businesses and critical infrastructure organizations, including defense contractors, educational institutions, manufacturers, technology companies, and especially organizations in the healthcare and medical industries. to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location (i.e., hard drive, storage device, the cloud).Once the ransomware is executed, a randomized nine-digit hexadecimal number is appended to each encrypted file as a file extension, e.g., file.txt.txt.C59-E0C-929 [T1486]. with password logins (e.g., service account, admin accounts, and domain admin accounts) with National Institute for Standards and Technology (NIST) standards for developing and managing password policies. "


Cisco has been hacked by a ransomware gang

exploits ransomware
2022-08-11 https://www.helpnetsecurity.com/2022/08/11/cisco-hacked/

U.S. networking giant Cisco Systems has been hacked, the company confirmed on Wednesday, after Yanluowang ransomware operators claimed the attack on their leak site. #Yanluowang #ransomware is claiming to have breached #Cisco ! Without any further information, the group released a list of 8110 lines,showing folder names and possibly exfiltrated files.The word #Cisco only appears 94 times. More information in the screenshots below: pic.twitter.com/2c5shCSbF9 — Gitworm (@Gi7w0rm) August 10, 2022 But according to Cisco’s Talos … More

The post Cisco has been hacked by a ransomware gang appeared first on Help Net Security.

"

Autosummary: The attackers then: Escalated their privileges to “admin”, allowing them to log in to various systems (and this is when Cisco Security’s IT team noticed something was amiss) Dropped remote access and offensive security tools Added backdoor accounts and persistence mechanisms “Following initial access to the environment, the threat actor conducted a variety of activities for the purposes of maintaining access, minimizing forensic artifacts, and increasing their level of access to systems within the environment,” the team explained. "


Cisco Confirms It"s Been Hacked by Yanluowang Ransomware Gang

exploits ransomware
2022-08-11 https://thehackernews.com/2022/08/cisco-confirms-its-been-hacked-by.html
Networking equipment major Cisco on Wednesday confirmed it was the victim of a cyberattack on May 24, 2022 after the attackers got hold of an employee"s personal Google account that contained passwords synced from their web browser. "Initial access to the Cisco VPN was achieved via the successful compromise of a Cisco employee"s personal Google account," Cisco Talos said in a detailed write-up. "

Autosummary: Furthermore, the actor is said to have deployed a variety of tools, including remote access utilities like LogMeIn and TeamViewer, offensive security tools such as Cobalt Strike, PowerSploit, Mimikatz, and Impacket aimed at increasing their level of access to systems within the network. "


US govt will pay you $10 million for info on Conti ransomware members

exploits ransomware
2022-08-11 https://www.bleepingcomputer.com/news/security/us-govt-will-pay-you-10-million-for-info-on-conti-ransomware-members/
The U.S. State Department announced a $10 million reward today for information on five high-ranking Conti ransomware members, including showing the face of one of the members for the first time. [...] "

Autosummary: U.S. govt reveals the first face of a Conti member Today, for the first time, the State Department revealed the face of a known Conti ransomware operator known as "Target," offering rewards of up to $10 million for information on him and four other members known as "Tramp," "Dandis," "Professor," and "Reshaev." After rebranding from Ryuk to Conti in the summer of 2020, the ransomware gang quickly rose in prominence as they attacked high-profile victims, including City of Tulsa, Broward County Public Schools, Advantech, and Ireland"s Health Service Executive (HSE) and Department of Health (DoH). "


Experts Uncover Details on Maui Ransomware Attack by North Korean Hackers

exploits ransomware
2022-08-10 https://thehackernews.com/2022/08/experts-uncover-details-on-maui.html
The first ever incident possibly involving the ransomware family known as Maui occurred on April 15, 2021, aimed at an unnamed Japanese housing company. The disclosure from Kaspersky arrives a month after U.S. cybersecurity and intelligence agencies issued an advisory about the use of the ransomware strain by North Korean government-backed hackers to target the healthcare sector since at least "

Autosummary: "Stonefly specializes in mounting highly selective targeted attacks against targets that could yield intelligence to assist strategically important sectors such as energy, aerospace, and military equipment," Symantec, a division of Broadcom Software, said in April. "


Cisco hacked by Yanluowang ransomware gang, 2.8GB allegedly stolen

exploits ransomware
2022-08-10 https://www.bleepingcomputer.com/news/security/cisco-hacked-by-yanluowang-ransomware-gang-28gb-allegedly-stolen/
Cisco confirmed today that the Yanluowang ransomware group breached its corporate network in late May and that the actor tried to extort them under the threat of leaking stolen files online. [...] "

Autosummary: "After obtaining initial access, the threat actor conducted a variety of activities to maintain access, minimize forensic artifacts, and increase their level of access to systems within the environment," Cisco Talos said. "


Hacker uses new RAT malware in Cuba Ransomware attacks

exploits ransomware
2022-08-10 https://www.bleepingcomputer.com/news/security/hacker-uses-new-rat-malware-in-cuba-ransomware-attacks/
A member of the Cuba ransomware operation is employing previously unseen tactics, techniques, and procedures (TTPs), including a novel RAT (remote access trojan) and a new local privilege escalation tool. [...] "

Autosummary: ROMCOM RAT supports ten commands as listed below: Return connected drive information Return file listings for a specified directory Start up a reverse shell under the name svchelper.exe within the %ProgramData% folder Upload data to C2 as ZIP file, using IShellDispatch to copy files Download data and write to worker.txt in the %ProgramData% folder Delete a specified file Delete a specified directory Spawn a process with PID "


7-Eleven Denmark confirms ransomware attack behind store closures

exploits ransomware
2022-08-10 https://www.bleepingcomputer.com/news/security/7-eleven-denmark-confirms-ransomware-attack-behind-store-closures/
7-Eleven Denmark has confirmed that a ransomware attack was behind the closure of 175 stores in the country on Monday. [...] "

Autosummary: "


Automotive supplier breached by 3 ransomware gangs in 2 weeks

exploits ransomware industry
2022-08-10 https://www.bleepingcomputer.com/news/security/automotive-supplier-breached-by-3-ransomware-gangs-in-2-weeks/
An automotive supplier had its systems breached and files encrypted by three different ransomware gangs over a two-week span in May, two of the attacks happening within just two hours. [...] "

Autosummary: Breached three times within two months After the initial compromise, LockBit, Hive, and ALPHV/BlackCat affiliates also gained access to the victim"s network on April 20, May 1, and May 15, respectively. "


Cisco was hacked by the Yanluowang ransomware gang

exploits ransomware
2022-08-10 https://securityaffairs.co/wordpress/134278/hacking/yanluowang-ransomware-hacked-cisco.html

Cisco discloses a security breach, the Yanluowang ransomware group breached its corporate network in late May and stole internal data. Cisco disclosed a security breach, the Yanluowang ransomware group breached its corporate network in late May and stole internal data. The investigation conducted by Cisco Security Incident Response (CSIRT) and Cisco Talos revealed that threat […]

The post Cisco was hacked by the Yanluowang ransomware gang appeared first on Security Affairs.

"

Autosummary: “After obtaining the user’s credentials, the attacker attempted to bypass multifactor authentication (MFA) using a variety of techniques, including voice phishing (aka “vishing”) and MFA fatigue, the process of sending a high volume of push requests to the target’s mobile device until the user accepts, either accidentally or simply to attempt to silence the repeated push notifications they are receiving.” "


NetRise Platform provides continuous monitoring of XIoT firmware vulnerabilities

ransomware industry
2022-08-09 https://www.helpnetsecurity.com/2022/08/09/netrise-platform/

NetRise released the NetRise Platform, which is providing insights into shared vulnerabilities across XIoT firmware images in an organization. NetRise is a cloud-based SaaS platform that analyzes and monitors the firmware of XIoT devices. The firmware images are then dissected, presenting all of the key data, artifacts, and risk in an easy-to-consume interface. As a result, NetRise reduces the time and cost of firmware security programs allowing organizations to find and remediate previously undetected issues. … More

The post NetRise Platform provides continuous monitoring of XIoT firmware vulnerabilities appeared first on Help Net Security.

"

Autosummary: NetRise continuously monitors and analyzes artifacts within firmware to identify and prioritize: NetRise continuously monitors and analyzes artifacts within firmware to identify and prioritize: Vulnerabilities (known and unknown) Compliance adherence Software bill of materials (SBOM) Misconfigurations Overall risk Key features: Vulnerability identification and Monitoring Comprehensive SBOM Risk comparisons of new firmware versions to existing versions Vulnerability and other risk prioritization Correlation across all monitored devices Firmware repository to query when new vulnerabilities are identified “NetRise provides the perfect solution for mapping XIoT devices to traditional security processes,” said Michael Scott, Co-Founder & CTO of NetRise. "


Three ransomware gangs consecutively attacked the same network

exploits ransomware
2022-08-09 https://www.helpnetsecurity.com/2022/08/09/ransomware-gangs-attacks/

Hive, LockBit and BlackCat, three prominent ransomware gangs, consecutively attacked the same network, according to Sophos. The first two attacks took place within two hours, and the third attack took place two weeks later. Each ransomware gang left its own ransom demand, and some of the files were triple encrypted. “It’s bad enough to get one ransomware note, let alone three,” said John Shier, senior security advisor at Sophos. “Multiple attackers create a whole new … More

The post Three ransomware gangs consecutively attacked the same network appeared first on Help Net Security.

"

Autosummary: Most of the initial infections for the attacks highlighted in the whitepaper occurred through either an unpatched vulnerability, with some of the most notable being Log4Shell, ProxyLogon, and ProxyShell, or poorly configured, unsecured Remote Desktop Protocol (RDP) servers. "


Maui ransomware operation linked to North Korean "Andariel" hackers

exploits ransomware
2022-08-09 https://www.bleepingcomputer.com/news/security/maui-ransomware-operation-linked-to-north-korean-andariel-hackers/
The Maui ransomware operation has been linked to the North Korean state-sponsored hacking group "Andariel," known for using malicious cyber activities to generate revenue and causing discord in South Korea. [...] "

Autosummary: Andariel has been linked to ransomware attacks in the recent past, targeting South Korean companies in media, construction, manufacturing, and network services. "


Experts linked Maui ransomware to North Korean Andariel APT

exploits ransomware
2022-08-09 https://securityaffairs.co/wordpress/134195/malware/maui-ransomware-andariel-apt.html

Cybersecurity researchers from Kaspersky linked the Maui ransomware to the North Korea-backed Andariel APT group. Kaspersky linked with medium confidence the Maui ransomware operation to the North Korea-backed APT group Andariel, which is considered a division of the Lazarus APT Group,  North Korean nation-state actors used Maui ransomware to encrypt servers providing healthcare services, including electronic […]

The post Experts linked Maui ransomware to North Korean Andariel APT appeared first on Security Affairs.

"

Autosummary: "


Can your EDR handle a ransomware attack? 6-point checklist for an anti-ransomware EDR

exploits ransomware
2022-08-09 https://www.malwarebytes.com/blog/business/2022/08/can-your-edr-handle-a-ransomware-attack-6-point-checklist-for-an-anti-ransomware-edr

Categories: Business

In this post, a cybersecurity expert gives his 6-point checklist of features your EDR should have to stop ransomware.

(Read more...)

The post Can your EDR handle a ransomware attack? 6-point checklist for an anti-ransomware EDR appeared first on Malwarebytes Labs.

"

Autosummary: Businesses, especially small-to-medium sized ones with limited budget or IT resources, need to make sure that their EDR is cost-effective, easy-to-use, and able to reliably stop the growing ransomware threat.Robert Zamani, Regional Vice President, Americans Solutions Engineering To avoid unnecessary complexity in figuring out the origin of a ransomware threat, your EDR solution should have an industry standardized way of describing the attack—such as MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge). In this post, Robert Zamani, Regional Vice President, Americans Solutions Engineering at Malwarebytes, gives his 6-point checklist of features your EDR should have to stop ransomware. “Your ransomware rollback should store changes to data files on the system in a local cache for 72 hours (no ransomware actually exceeds 24 hours), which can be used to help revert changes caused by ransomware,” Zamani says.Thorough containment, eradication, and recovery options Look to an EDR to mitigate unforeseen threats and ultimately a new method of ransomware (exploitation of trust), says Zamani. "


Could criminalizing ransomware payments put a stop to the current crime wave?

exploits ransomware
2022-08-08 https://www.helpnetsecurity.com/2022/08/08/criminalizing-ransomware-payments-video/

In this Help Net Security video, Charl van der Walt, Head of Security Research, Orange Cyberdefense, discusses whether criminalizing ransomware payments could quell the current crime wave by cutting off the flow of funds that motivates cybercriminals.

The post Could criminalizing ransomware payments put a stop to the current crime wave? appeared first on Help Net Security.

"

Autosummary: "


GwisinLocker ransomware exclusively targets South Korea

exploits ransomware
2022-08-07 https://securityaffairs.co/wordpress/134105/cyber-crime/gwisinlocker-ransowmare-south-korea.html

Researchers spotted a new family of ransomware, named GwisinLocker, that encrypts Windows and Linux ESXi servers. Researchers warn of a new ransomware called GwisinLocker which is able to encrypt Windows and Linux ESXi servers. The ransomware targets South Korean healthcare, industrial, and pharmaceutical companies, its name comes from the name of the author ‘Gwisin’ (ghost […]

The post GwisinLocker ransomware exclusively targets South Korea appeared first on Security Affairs.

"

Autosummary: Linkedin Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


New GwisinLocker ransomware encrypts Windows and Linux ESXi servers

exploits ransomware
2022-08-06 https://www.bleepingcomputer.com/news/security/new-gwisinlocker-ransomware-encrypts-windows-and-linux-esxi-servers/
A new ransomware family called "GwisinLocker" targets South Korean healthcare, industrial, and pharmaceutical companies with Windows and Linux encryptors, including support for encrypting VMware ESXi servers and virtual machines. [...] "

Autosummary: The command-line arguments for the GwisinLocker Linxu encryptor are listed below: Usage: Usage -h, --help show this help message and exit Options -p, --vp= Comma-separated list of paths to encrypt -m, --vm= Kills VM processes if 1; Stops services and processes if 2 -s, --vs= Seconds to sleep before execution -z, --sf= Skip encrypting ESXi-related files (those excluded in the configuration) "


The Week in Ransomware - August 5th 2022 - A look at cyber insurance

exploits ransomware
2022-08-05 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-august-5th-2022-a-look-at-cyber-insurance/
For the most part, it has been a quiet week on the ransomware front, with a few new reports, product developments, and attacks revealed. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @billtoulas, @malwrhunterteam, @DanielGallagher, @FourOctets, @struppigel, @VK_Intel, @Ionut_Ilascu, @demonslay335, @BleepinComputer, @Seifreed, @PolarToffee, @malwareforme, @jorntvdw, @fwosar, @LawrenceAbrams, @serghei, @secuninja, @pcrisk, @siri_urz, @Dschwarcz, @Balgan, and @Mandiant. "


ActZero releases Blueprint for Ransomware Defense to improve cybersecurity posture for enterprises

exploits ransomware ciber
2022-08-05 https://www.helpnetsecurity.com/2022/08/06/actzero-blueprint-for-ransomware-defense/

ActZero has launched the Ransomware Task Force’s (RTF) “Blueprint for Ransomware Defense”. Aimed at small- and medium-sized enterprises (SMEs) that have limited cybersecurity expertise, the Blueprint provides a set of achievable ransomware safeguards to harden their IT environments. ActZero contributed to the development of the Blueprint, and is actively engaging with its clients, partners, and prospects to encourage adoption. The RTF’s 2021 report called for the cybersecurity community to “develop a clear, actionable framework for … More

The post ActZero releases Blueprint for Ransomware Defense to improve cybersecurity posture for enterprises appeared first on Help Net Security.

"

Autosummary: The RTF’s 2021 report called for the cybersecurity community to “develop a clear, actionable framework for ransomware mitigation, response, and recovery”. "


A third of organizations experience a ransomware attack once a week

exploits ransomware
2022-08-04 https://www.helpnetsecurity.com/2022/08/04/organizations-experience-ransomware-attack/

Ransomware attacks show no sign of slowing. According to new research published by Menlo Security, a third of organizations experience a ransomware attack at least once a week, with one in 10 experiencing them more than once a day. The research, conducted among 500+ IT security decision makers at US and UK organizations with more than 1,000 employees, highlights the impact this is having on security professionals’ own wellbeing. When asked what keeps them awake … More

The post A third of organizations experience a ransomware attack once a week appeared first on Help Net Security.

"

Autosummary: According to the report, around half of organizations (61% US and 44% UK) have been the victim of a successful ransomware attack in the last 18 months, with customers and prospects the most likely entry point for an attack. "


87% of the ransomware found on the dark web has been delivered via malicious macros

exploits ransomware
2022-08-03 https://www.helpnetsecurity.com/2022/08/03/ransomware-malicious-macros/

Venafi announced the findings of a dark web investigation into ransomware spread via malicious macros. Conducted in partnership with criminal intelligence provider Forensic Pathways between November 2021 and March 2022, the research analyzed 35 million dark web URLs, including marketplaces and forums, using the Forensic Pathways Dark Search Engine. The findings uncovered 475 webpages of sophisticated ransomware products and services, with several high-profile groups aggressively marketing ransomware-as-a-service. 87% of the ransomware found on the dark … More

The post 87% of the ransomware found on the dark web has been delivered via malicious macros appeared first on Help Net Security.

"

Autosummary: Many strains of ransomware being sold — such as Babuk, GoldenEye, Darkside/BlackCat, Egregor, HiddenTear and WannaCry — have been successfully used in high-profile attacks. "


Power semiconductor component manufacturer Semikron suffered a ransomware attack

exploits ransomware industry
2022-08-03 https://securityaffairs.co/wordpress/133975/cyber-crime/semikron-cyber-attack.html

Semikron, a German-based independent manufacturer of power semiconductor components, suffered a ransomware cyberattck. Semikron is a German-based independent manufacturer of power semiconductor components, it employs more than 3,000 people in 24 subsidiaries worldwide, with production sites in Germany, Brazil, China, France, India, Italy, Slovakia and the USA. The company confirmed it has suffered a cyberattack conducted by a professional […]

The post Power semiconductor component manufacturer Semikron suffered a ransomware attack appeared first on Security Affairs.

"

Autosummary: "


Spanish research agency still recovering after ransomware attack

exploits ransomware
2022-08-03 https://www.bleepingcomputer.com/news/security/spanish-research-agency-still-recovering-after-ransomware-attack/
The Spanish National Research Council (CSIC) last month was hit by a ransomware attack that is now attributed to Russian hackers. [...] "

Autosummary: "


How to protect Windows 10 and 11 PCs from ransomware

exploits ransomware
2022-08-02 https://www.computerworld.com/article/3245585/how-to-protect-windows-10-from-ransomware.html#tk.rss_security

CryptoLocker. WannaCry. DarkSide. Conti. MedusaLocker. The ransomware threat isn’t going away anytime soon; the news brings constant reports of new waves of this pernicious type of malware washing across the world. It’s popular in large part because of the immediate financial payoff for attackers: It works by encrypting the files on your hard disk, then demands that you pay a ransom, frequently in Bitcoin or other cryptocurrency, to decrypt them.

But you needn’t be a victim. There’s plenty that Windows 10 and 11 users can do to protect themselves against it. In this article, I’ll show you how to keep yourself safe, including how to use an anti-ransomware tool built into Windows.

To read this article in full, please click here

"

Autosummary: Most backup and storage services, including Microsoft OneDrive, Google Drive, Carbonite, Dropbox and many others, use versioning.They can use the Group Policy Management Console, the Windows Security Center, or PowerShell to turn on Controlled Folder Access for users on a network, customize which folders should be protected, and let additional applications access the folders beyond the Microsoft defaults.From the screen that appears, click Add an allowed app, navigate to the executable file of the program you want to add, click Open, and then confirm you want to add the file. If you decide at any point to remove a folder, get back to the “Protected folders” screen, click the folder you want to remove, and then click Remove.They can only decrypt data that’s been encrypted with certain specific pieces or families of ransomware, including REvil/Sodinokibi, DarkSide, MaMoCrypt, WannaRen and several others.In addition to Documents, Windows system folders include Desktop, Music, Pictures, and Videos. Hint: If you’re not sure where executable files are located for programs you want to add to the whitelist, look for the folder name with the program’s name in the Windows\Program Files or Windows\Program Files (x86) folders, then look for an executable file in that folder.As with adding folders to the list of protected folders, you can remove the app by getting back to this screen, clicking the application you want to remove, then clicking Remove. By default, the feature is not turned on, so if you want to protect yourself against ransomware, you’ll have to tell it to get to work. "


What is ransomware and how can you defend your business from it?

exploits ransomware
2022-08-02 https://thehackernews.com/2022/08/what-is-ransomware-how-to-defend-your.html
Ransomware is a kind of malware used by cybercriminals to stop users from accessing their systems or files; the cybercriminals then threaten to leak, destroy or withhold sensitive information unless a ransom is paid. Ransomware attacks can target either the data held on computer systems (known as locker ransomware) or devices (crypto-ransomware). In both instances, once a ransom is paid, threat "

Autosummary: Oliver Pinson-Roxburgh, CEO of Defense.com, the all-in-one cybersecurity platform, shares knowledge and advice in this article on how ransomware works, how damaging it can be, and how your business can mitigate ransomware attacks from occurring. Exploiting vulnerable systems Ransomware can also be deployed by exploiting unpatched and outdated systems, as was the case in 2017, when a security vulnerability in Microsoft Windows, EternalBlue (MS17-010), led to the global WannaCry ransomware attack that spread to over 150 countries. In summary With ransomware groups continually looking for vulnerabilities to exploit, it"s important that businesses develop robust strategies to prevent ransomware threats: ensure your staff takes regular security awareness training, set up threat monitoring tools to detect and alert you of vulnerabilities, and implement endpoint protection to protect your devices across your network. There are three key elements to a ransomware attack: Access In order to deploy malware to encrypt files and gain control, cybercriminals need to initially gain access to an organization"s systems. "


LockBit Ransomware Abuses Windows Defender to Deploy Cobalt Strike Payload

exploits ransomware
2022-08-02 https://thehackernews.com/2022/08/lockbit-ransomware-abuses-windows.html
A threat actor associated with the LockBit 3.0 ransomware-as-a-service (RaaS) operation has been observed abusing the Windows Defender command-line tool to decrypt and load Cobalt Strike payloads.  According to a report published by SentinelOne last week, the incident occurred after obtaining initial access via the Log4Shell vulnerability against an unpatched VMware Horizon Server. "Once initial "

Autosummary: "Once initial access had been achieved, the threat actors performed a series of enumeration commands and attempted to run multiple post-exploitation tools, including Meterpreter, PowerShell Empire, and a new way to side-load Cobalt Strike," researchers Julio Dantas, James Haughom, and Julien Reisdorffer said. "


LockBit 3.0 affiliate sideloads Cobalt Strike through Windows Defender

ransomware
2022-08-02 https://securityaffairs.co/wordpress/133925/cyber-crime/lockbit-3-0-abuse-windows-defender.html

An affiliate of the LockBit 3.0 RaaS operation has been abusing the Windows Defender command-line tool to deploy Cobalt Strike payloads. During a recent investigation, SentinelOne researchers observed threat actors associated with the LockBit 3.0 ransomware-as-a-service (RaaS) operation abusing the Windows Defender command line tool MpCmdRun.exe to decrypt and load Cobalt Strike payloads. The attackers initially compromise the target […]

The post LockBit 3.0 affiliate sideloads Cobalt Strike through Windows Defender appeared first on Security Affairs.

"

Autosummary: "


Microsoft Defender now better at blocking ransomware on Windows 11

exploits ransomware
2022-08-02 https://www.bleepingcomputer.com/news/microsoft/microsoft-defender-now-better-at-blocking-ransomware-on-windows-11/
Microsoft has released new Windows 11 builds to the Beta Channel with improved Microsoft Defender for Endpoint ransomware attack blocking capabilities. [...] "

Autosummary: "


Semiconductor manufacturer Semikron hit by LV ransomware attack

exploits ransomware industry
2022-08-02 https://www.bleepingcomputer.com/news/security/semiconductor-manufacturer-semikron-hit-by-lv-ransomware-attack/
German power electronics manufacturer Semikron has disclosed that it was hit by a ransomware attack that partially encrypted the company"s network. [...] "

Autosummary: "


Accenture acquires Tenbu to expand data and AI capabilities across the cloud continuum

ransomware
2022-08-02 https://www.helpnetsecurity.com/2022/08/03/accenture-tenbu/

Accenture has acquired Tenbu. With more than 150 certifications, Tenbu’s team of 170 data specialists will join the Data & AI team within Accenture Cloud First. Terms of the acquisition were not disclosed. “Our goal is to help clients with total enterprise reinvention by building their digital core, optimizing operations and accelerating growth – and cloud data and AI are fundamental to a strong digital core,” said Karthik Narain, global lead for Accenture Cloud First. … More

The post Accenture acquires Tenbu to expand data and AI capabilities across the cloud continuum appeared first on Help Net Security.

"

Autosummary: "


BlackCat ransomware claims attack on European gas pipeline

exploits ransomware
2022-08-01 https://www.bleepingcomputer.com/news/security/blackcat-ransomware-claims-attack-on-european-gas-pipeline/
The ransomware group known as ALPHV (aka BlackCat) has assumed over the weekend responsibility for the cyberattack that hit Creos Luxembourg last week, a natural gas pipeline and electricity network operator in the central European country. [...] "

Autosummary: BlackCat strikes gas again The ALPHV/BlackCat ransomware group added Creos to its extortion site on Saturday, threatening to publish 180,000 stolen files totaling 150 GB in size, including contracts, agreements, passports, bills, and emails. "


ALPHV/BlackCat ransomware gang claims to have stolen data from Creos Luxembourg S.A.

exploits ransomware
2022-08-01 https://securityaffairs.co/wordpress/133899/cyber-crime/alphv-blackcat-ransomware-creos-luxembourg.html

The ALPHV/BlackCat ransomware gang claims to have breached the European gas pipeline Creos Luxembourg S.A. The ALPHV/BlackCat ransomware gang claims to have hacked the European gas pipeline Creos Luxembourg S.A. Creos Luxembourg S.A. owns and manages electricity networks and natural gas pipelines in the Grand Duchy of Luxembourg. In this capacity, the company plans, constructs […]

The post ALPHV/BlackCat ransomware gang claims to have stolen data from Creos Luxembourg S.A. appeared first on Security Affairs.

"

Autosummary: In this capacity, the company plans, constructs and maintains high, medium and low-voltage electricity networks and high, medium and low-pressure natural gas pipelines, which it owns or which it is responsible for managing. BlackCat has been operating since at least November 2021, and launched major attacks in January to disrupt OilTanking GmbH, a German fuel company, and in February 2022, the attack on an aviation company, Swissport. "


Reading the “ENISA THREAT LANDSCAPE FOR RANSOMWARE ATTACKS” report

exploits ransomware
2022-07-30 https://securityaffairs.co/wordpress/133827/malware/enisa-threat-landscape-for-ransomware-attacks.html

I’m proud to announce the release of the “ENISA THREAT LANDSCAPE FOR RANSOMWARE ATTACKS” report, Enjoy it! Ransomware has become one of the most dangerous threats for organizations worldwide. Cybercriminal organizations and ransomware gangs have devised new business models that are attracting a broad range of advanced threat actors. It is quite easy today for […]

The post Reading the “ENISA THREAT LANDSCAPE FOR RANSOMWARE ATTACKS” report appeared first on Security Affairs.

"

Autosummary: "


LockBit operator abuses Windows Defender to load Cobalt Strike

ransomware
2022-07-29 https://www.bleepingcomputer.com/news/security/lockbit-operator-abuses-windows-defender-to-load-cobalt-strike/
Security analysts have observed an affiliate of the LockBit 3.0 ransomware operation abusing a Windows Defender command line tool to decrypt and load Cobalt Strike beacons on the target systems. [...] "

Autosummary: "


The ransomware landscape changes as fewer victims decide to pay

exploits ransomware
2022-07-29 https://blog.malwarebytes.com/ransomware/2022/07/the-ransomware-landscape-changes-as-less-victims-decide-to-pay/

A considerable drop in the median of ransom payments and several other circumstances are causing the ransomware landscape to change.

The post The ransomware landscape changes as fewer victims decide to pay appeared first on Malwarebytes Labs.

"

Autosummary: Groups like Conti were absorbed by existing and new Ransomware-as-a-Service (RaaS) groups such as Black Basta, BlackCat, Hive, and Quantum. Different targets With the shift from large botnets as the initial foothold to targeted attacks, the affiliates can not only be more picky when it comes to their victims, some can also choose between RaaS providers or decide to proceed on their own. "


LockBit ransomware abuses Windows Defender to load Cobalt Strike

exploits ransomware
2022-07-29 https://www.bleepingcomputer.com/news/security/lockbit-ransomware-abuses-windows-defender-to-load-cobalt-strike/
Security analysts have observed an affiliate of the LockBit 3.0 ransomware operation abusing a Windows Defender command line tool to decrypt and load Cobalt Strike beacons on the target systems. [...] "

Autosummary: "


Infortrend introduces WORM and MFA features on EonStor GS to keep data safe from ransomware

exploits ransomware
2022-07-28 https://www.helpnetsecurity.com/2022/07/28/infortrend-eonstor-gs/

Infortrend Technology introduces immutable object storage or write-once-read-many (WORM) and multi-factor authentication (MFA) security features to their EonStor GS unified storage solutions, ensuring the safety of stored data, specifically against ransomware. Ransomware attacks today are still rising, showing that the traditional ways to prevent these threats such as firewalls and antivirus are not full-proof methods. Therefore, enterprises have started utilizing immutable or WORM storage repositories to take advantage of its write-once-read-many characteristics to protect archived … More

The post Infortrend introduces WORM and MFA features on EonStor GS to keep data safe from ransomware appeared first on Help Net Security.

"

Autosummary: "


The strange similarities between Lockbit 3.0 and Blackmatter ransomware

exploits ransomware
2022-07-27 https://securityaffairs.co/wordpress/133697/malware/lockbit-3-0-blackmatter-ransomware.html

Researchers found similarities between LockBit 3.0 ransomware and BlackMatter, which is a rebranded variant of the DarkSide ransomware. Cybersecurity researchers have found similarities between the latest version of the LockBit ransomware, LockBit 3.0, and the BlackMatter ransomware. The Lockbit 3.0 ransomware was released in June with important novelties such as a bug bounty program, Zcash payment, and new extortion […]

The post The strange similarities between Lockbit 3.0 and Blackmatter ransomware appeared first on Security Affairs.

"

Autosummary: “With the release of this latest variant — and the launch of LockBit’s bug bounty program, which rewards its affiliates — we expect the LockBit ransomware group to be even more active in the coming days.” concludes the report. "


Simplifying the fight against ransomware: An expert explains

exploits ransomware
2022-07-27 https://blog.malwarebytes.com/business/2022/07/simplifying-the-fight-against-ransomware-an-expert-explains/

In this post, a security expert breaks down three tips on how businesses can have an easier time dealing with ransomware attacks.

The post Simplifying the fight against ransomware: An expert explains appeared first on Malwarebytes Labs.

"

Autosummary: Finally, these features are valuable for detecting and thwarting all malware , not just ransomware: Exploit prevention Behavioral detection of never-before-seen malware Malicious website blocking Brute force protection , not just ransomware: On the ease-of-use front, Robert Zamani, Regional Vice President, Americans Solutions Engineering at Malwarebytes, also has four suggestions when choosing an EDR platform: Ask about the time required to set up the management console and whether it’s cloud-based .Choose an effective and easy-to-use Endpoint Detection and Response (EDR) software When it comes to ransomware, resource-constrained organizations with small-to-non-existent security teams are in greater need of EDR—but many EDR products are designed for large enterprises with large and highly-skilled security teams.Avoid common mistakes in prevention, detection and response Often, a customer who gets hit with ransomware has security software but they either have it disabled or it’s outdated or limited in its ability, thanks to poor configuration, Kujawa says. The importance of “knowing thy enemy” Most ransomware attacks are not sophisticated, state-sponsored cyber operations, Kujawa says. "


LockBit claims ransomware attack on Italian tax agency

exploits ransomware
2022-07-26 https://www.bleepingcomputer.com/news/security/lockbit-claims-ransomware-attack-on-italian-tax-agency/
Italian authorities are investigating claims made by the LockBit ransomware gang that they breached the network of the Italian Internal Revenue Service (L"Agenzia delle Entrate). [...] "

Autosummary: "


No More Ransom helps millions of ransomware victims in 6 years

exploits ransomware
2022-07-26 https://www.bleepingcomputer.com/news/security/no-more-ransom-helps-millions-of-ransomware-victims-in-6-years/
The No More Ransom project celebrates its sixth anniversary today after helping millions of ransomware victims recover their files for free. [...] "

Autosummary: "


Experts Find Similarities Between New LockBit 3.0 and BlackMatter Ransomware

exploits ransomware
2022-07-26 https://thehackernews.com/2022/07/experts-find-similarities-between.html
Cybersecurity researchers have reiterated similarities between the latest iteration of the LockBit ransomware and BlackMatter, a rebranded variant of the DarkSide ransomware strain that closed shop in November 2021. The new version of LockBit, called LockBit 3.0 aka LockBit Black, was released in June 2022, launching a brand new leak site and what"s the very first ransomware bug bounty program, "

Autosummary: "Latin America has seen the largest increase in attacks, spotting one out of 23 organizations impacted weekly, a 43% increase YoY, compared to one out of 33 in Q2 2021, followed by Asia region that has seen a 33% increase YoY, reaching one out of 17 organizations impacted weekly," the Israeli cybersecurity firm said. "


Lockbit ransomware gang claims to have breached the Italian Revenue Agency

exploits ransomware
2022-07-25 https://securityaffairs.co/wordpress/133640/cyber-crime/lockbit-ransomware-italian-revenue-agency.html

The ransomware group Lockbit claims to have stolen 78 GB of files from the Italian Revenue Agency (Agenzia delle Entrate). The ransomware gang Lockbit claims to have hacked the Italian Revenue Agency (Agenzia delle Entrate) and added the government agency to the list of victims reported on its dark web leak site. “The Revenue Agency, operational since 1 January […]

The post Lockbit ransomware gang claims to have breached the Italian Revenue Agency appeared first on Security Affairs.

"

Autosummary: The group claims to have stolen 78GB of data, including company documents, scans, financial reports, and contracts, it plans to release screenshots of files and samples very soon. "


The Week in Ransomware - July 22nd 2022 - Attacks abound

exploits ransomware
2022-07-23 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-july-22nd-2022-attacks-abound/
New ransomware operations continue to be launched this week, with the new Luna ransomware found to be targeting both Windows and VMware ESXi servers. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @serghei, @VK_Intel, @jorntvdw, @DanielGallagher, @struppigel, @PolarToffee, @FourOctets, @Seifreed, @malwrhunterteam, @Ionut_Ilascu, @LawrenceAbrams, @demonslay335, @billtoulas, @BleepinComputer, @fwosar, @malwareforme, @AdvIntel, @AuCyble, @kaspersky, @pcrisk, @corintxt, @Amigo_A_, and @jgreigj. "


FBI seized $500,000 worth of bitcoin obtained from Maui ransomware attacks

exploits ransomware
2022-07-23 https://securityaffairs.co/wordpress/133587/cyber-warfare-2/fbi-seized-bitcoin-maui-ransomware.html

The U.S. DoJ seized $500,000 worth of Bitcoin from North Korea-linked threat actors who are behind the Maui ransomware. The U.S. Department of Justice (DoJ) has seized $500,000 worth of Bitcoin from North Korean threat actors who used the Maui ransomware to target several organizations worldwide. “The Justice Department today announced a complaint filed in […]

The post FBI seized $500,000 worth of bitcoin obtained from Maui ransomware attacks appeared first on Security Affairs.

"

Autosummary: “The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Department of the Treasury (Treasury) are releasing this joint Cybersecurity Advisory (CSA) to provide information on Maui ransomware, which has been used by North Korean state-sponsored cyber actors since at least May 2021 to target Healthcare and Public Health (HPH) Sector organizations.” reads the advisory published by US authorties. "


Digital security giant Entrust breached by ransomware gang

exploits ransomware
2022-07-22 https://www.bleepingcomputer.com/news/security/digital-security-giant-entrust-breached-by-ransomware-gang/
Digital security giant Entrust has confirmed that it suffered a cyberattack where threat actors breached their network and stole data from internal systems. [...] "

Autosummary: This includes US government agencies, such as the Department of Energy, Department of Homeland Security, the Department of the Treasury, the Department of Health & Human Services, the Department of Veterans Affairs, the Department of Agriculture, and many more. "


New Redeemer ransomware version promoted on hacker forums

exploits ransomware
2022-07-21 https://www.bleepingcomputer.com/news/security/new-redeemer-ransomware-version-promoted-on-hacker-forums/
A threat actor is promoting a new version of their free-to-use "Redeemer" ransomware builder on hacker forums, offering unskilled threat actors an easy entry to the world of encryption-backed extortion attacks. [...] "

Autosummary: According to its author, the new version 2.0 release was written entirely in C++ and works on Windows Vista, 7, 8, 10, and 11, featuring multi-threaded performance and a medium AV detection rate. "


FBI Seizes $500,000 Ransomware Payments and Crypto from North Korean Hackers

exploits ransomware
2022-07-21 https://thehackernews.com/2022/07/fbi-seizes-500000-ransomware-payments.html
The U.S. Department of Justice (DoJ) has announced the seizure of $500,000 worth of Bitcoin from North Korean hackers who extorted digital payments from several organizations by using a new ransomware strain known as Maui. "The seized funds include ransoms paid by healthcare providers in Kansas and Colorado," the DoJ said in a press release issued Tuesday. The recovery of the bitcoin ransoms "

Autosummary: "


How Conti ransomware hacked and encrypted the Costa Rican government

exploits latam government ransomware
2022-07-21 https://www.bleepingcomputer.com/news/security/how-conti-ransomware-hacked-and-encrypted-the-costa-rican-government/
Details have emerged on how the Conti ransomware gang breached the Costa Rican government, showing the attack"s precision and the speed of moving from initial access to the final stage of encrypting devices. [...] "

Autosummary: A diagram of the attack flow: Conti ransomware attack flow on Costa Rica source:AdvIntel Post-attack: national emergency, Conti shut down According to a note on the Conti leak site, the ransom demand was initially $10 million and then increased to $20 million when Costa Rica refused to pay. "


The rise and continuing popularity of LinkedIn-themed phishing

financial ransomware
2022-07-21 https://www.helpnetsecurity.com/2022/07/21/linkedin-phishing/

Phishing emails impersonating LinkedIn continue to make the bulk of all brand phishing attempts; according to Check Point, 45% of all email phishing attempts in Q2 2022 imitated the style of communication of the professional social media platform, with the goal of directing targets to a spoofed LinkedIn login page and collecting their account credentials. The phishers are generally trying to pique the targets’ interest with fake messages claiming that they “have appeared in X … More

The post The rise and continuing popularity of LinkedIn-themed phishing appeared first on Help Net Security.

"

Autosummary: As noted before, LinkedIn-themed phishing emails are more likely to come in the form of fake notifications about messages, contacts and searches featuring the target, occasionally even mentioning that people from specific high-profile companies have been looking at the target’s profile. "


Demo: Your data has been encrypted! Stopping ransomware attacks with Malwarebytes EDR

exploits ransomware
2022-07-21 https://blog.malwarebytes.com/business/2022/07/demo-your-data-has-been-encrypted-stopping-ransomware-attacks-with-malwarebytes-edr/

Malwarebytes Endpoint Detection and Response can fight—and defeat—advanced ransomware that other security solutions miss. In this post, we’ll walk through what it looks like to deal with a ransomware attack using Malwarebytes EDR.

The post Demo: Your data has been encrypted! Stopping ransomware attacks with Malwarebytes EDR appeared first on Malwarebytes Labs.

"

Autosummary: What worse, ransomware gangs have increased their attacks on a range of vulnerable industries, with disruptions to business operations, million-dollar ransom demands, data exfiltration, and extortion. Accelerate and simplify your ransomware defense with Malwarebytes EDR In this post, we seamlessly looked at the activity that ransomware exhibited, found a recovery plan for it, then implemented that plan. Part 4: Remediating the ransomware Below, we see a process here with a large amount of file activity, namely file renames. Part 3: Isolating the endpoint infected with ransomware Now, as we’re continuing our investigation, we’re looking at this and deciding it looks pretty suspicious – it’s probably unwanted or a potentially damaging activity. So for example, if we hover over the disable Windows Firewall behavior that we saw, on the left, you’ll see that we’ve been partnering with the MITRE foundation and using its attack framework to give you context and a common set of terms that you can use to identify and understand these tactics. "


New Luna ransomware encrypts Windows, Linux, and ESXi systems

exploits ransomware
2022-07-20 https://www.bleepingcomputer.com/news/security/new-luna-ransomware-encrypts-windows-linux-and-esxi-systems/
A new ransomware family dubbed Luna can be used to encrypt devices running several operating systems, including Windows, Linux, and ESXi systems. [...] "

Autosummary: Luna ransomware command-line arguments (Kaspersky) Rust-based cross-platform ransomware The group behind this new ransomware developed this new strain in Rust and took advantage of its platform-agnostic nature to port it to multiple platforms with very few changes to the source code. "


FBI recovers $500,000 healthcare orgs paid to Maui ransomware

exploits ransomware
2022-07-20 https://www.bleepingcomputer.com/news/security/fbi-recovers-500-000-healthcare-orgs-paid-to-maui-ransomware/
The U.S. Department of Justice has announced the seizure of approximately $500,000 in Bitcoin, paid by American health care providers to the operators of the Maui ransomware strain. [...] "

Autosummary: "


Will new EU crypto rules change how ransomware is played?

exploits ransomware
2022-07-20 https://www.computerworld.com/article/3667281/will-new-eu-crypto-rules-change-how-ransomware-is-played.html#tk.rss_security

Cryptocurrency has always been the payment method of choice for bad guys. Get hit with an enterprise ransomware attack and plan to pay? You’ll need crypto. The key reason cyberthieves love cryptocurrency so much is that it is far harder to trace payments. 

That is why a move being attempted by the European Union has so much potential. The EU — in a move that will likely be mimicked by many other regional regulatory forces, including in the United States — is putting in place tracking requirements for all cryptocurrency. 

If it is successful, and the EU has an excellent track record on precisely these kinds of changes, cryptocurrency may quickly fade as the thief’s payment of choice.

To read this article in full, please click here

"

Autosummary: By the way, the EU in this document also listed “non-cooperative jurisdictions for tax purposes,” which include American Samoa, Fiji Guam, Palau, Panama, Samoa, Trinidad, Tobago, the U.S. Virgin Islands, and Vanuatu. That all said, cryptocurrency exchanges are, sort of, mostly legal operations. "


New Rust-based Ransomware Family Targets Windows, Linux, and ESXi Systems

exploits ransomware
2022-07-20 https://thehackernews.com/2022/07/new-rust-based-ransomware-family.html
Kaspersky security researchers have disclosed details of a brand-new ransomware family written in Rust, making it the third strain after BlackCat and Hive to use the programming language. Luna, as it"s called, is "fairly simple" and can run on Windows, Linux, and ESXi systems, with the malware banking on a combination of Curve25519 and AES for encryption. "Both the Linux and ESXi "

Autosummary: "


Another ransomware payment recovered by the Justice Department

exploits ransomware
2022-07-20 https://blog.malwarebytes.com/ransomware/2022/07/another-ransomware-payment-recovered-by-the-justice-department/

The Justice Department announced it was able to forfeit ransomware payments made by health care organizations in Kansas and Colorado.

The post Another ransomware payment recovered by the Justice Department appeared first on Malwarebytes Labs.

"

Autosummary: Maui ransomware Deputy Attorney General Lisa O. Monaco said at the International Conference on Cyber Security: “Thanks to rapid reporting and cooperation from a victim, the FBI and Justice Department prosecutors have disrupted the activities of a North Korean state-sponsored group deploying ransomware known as ‘Maui.’” Malwarebytes recently reported on the North Korean APT that targets US healthcare sector with Maui ransomware. Although Maui may be a little different from run-of-the-mill ransomware, the steps to protect against it are not: Maintain offsite, offline backups of data and test them regularly. "


New Luna ransomware targets Windows, Linux and ESXi systems

exploits ransomware
2022-07-20 https://securityaffairs.co/wordpress/133454/cyber-crime/luna-ransomware-rust.html

Kaspersky researchers discovered a new ransomware family written in Rust, named Luna, that targets Windows, Linux, and ESXi systems. Researchers from Kaspersky Lab detailed a new ransomware family named Luna, which is written in Rust and is able to target Windows, Linux, and ESXi systems. Luna ransomware is the third ransomware family that is written […]

The post New Luna ransomware targets Windows, Linux and ESXi systems appeared first on Security Affairs.

"

Autosummary: The move aims at expanding potential targets, the support for VMware ESXi was already implemented by many ransomware families, including LockBit, HelloKitty, BlackMatter, and REvil. "


82% of global insurers expect the rise in cyber insurance premiums to continue

ransomware
2022-07-19 https://www.helpnetsecurity.com/2022/07/19/rise-cyber-insurance-premiums/

A Panaseer survey of global insurers across the UK and US found that 82% are expecting the rise in premiums to continue, with 74% of insurers agreeing that their inability to accurately understand a customer’s security posture is impacting price increases. Insurers also see the increasing cost of ransomware as a leading factor (78%) affecting premium rises, with largest ransom pay-outs by insurers in the last two years averaging £3.26m in the UK and $3.52m … More

The post 82% of global insurers expect the rise in cyber insurance premiums to continue appeared first on Help Net Security.

"

Autosummary: This is closely followed by security awareness (36%), along with application security (32%), vulnerability management (31%), privileged access management (31%) and patch management (30%), highlighting that insurers expect to see evidence of a layered, multi-faceted approach to cybersecurity. "


Building materials giant Knauf hit by Black Basta ransomware gang

exploits ransomware
2022-07-19 https://www.bleepingcomputer.com/news/security/building-materials-giant-knauf-hit-by-black-basta-ransomware-gang/
The Knauf Group has announced it has been the target of a cyberattack that has disrupted its business operations, forcing its global IT team to shut down all IT systems to isolate the incident. [...] "

Autosummary: Black Basta leaked 20% of the stolen files Bleeping Computer has seen samples of email communication, user credentials, employee contact information, production documents, and ID scans. "


Conceal and Carahsoft join forces to protect government customers from ransomware

exploits government ransomware
2022-07-19 https://www.helpnetsecurity.com/2022/07/20/conceal-carahsoft/

Conceal announced a partnership with Carahsoft to protect government agencies from ransomware using the Conceal Platform which incorporates intelligence-grade, zero trust technology. “Conceal has developed a powerful new approach to ransomware protection that uses isolation to prevent malware from targeting an organization’s users and infrastructure, and executing on endpoints,” said Craig P. Abod, Carahsoft President. “This partnership allows Carahsoft and our reseller partners to provide our Government customers with unprecedented security for their end users, … More

The post Conceal and Carahsoft join forces to protect government customers from ransomware appeared first on Help Net Security.

"

Autosummary: "


North Korean Hackers Targeting Small and Midsize Businesses with H0lyGh0st Ransomware

exploits ransomware
2022-07-15 https://thehackernews.com/2022/07/north-korean-hackers-targeting-small.html
An emerging threat cluster originating from North Korea has been linked to developing and using ransomware in cyberattacks targeting small businesses since September 2021. The group, which calls itself H0lyGh0st after the ransomware payload of the same name, is being tracked by the Microsoft Threat Intelligence Center under the moniker DEV-0530, a designation assigned for unknown, emerging, or a "

Autosummary: " The ransomware threat evolves in a post-Conti world The development also comes as the ransomware landscape is evolving with existing and new ransomware groups, namely LockBit, Hive, Lilith, RedAlert (aka N13V), and 0mega, even as the Conti gang formally shuttered its operations in response to a massive leak of its internal chats. "


RedAlert, LILITH, and 0mega, 3 new ransomware in the wild

exploits ransomware
2022-07-15 https://securityaffairs.co/wordpress/133248/cyber-crime/lilith-redalert-0mega-ransomware.html

Cyble researchers warn of three new ransomware operations named Lilith, RedAlert and 0mega targeting organizations worldwide. Researchers from threat intelligence firm Cyble warn of new ransomware gangs that surfaced recently, named Lilith, RedAlert, and 0mega. RedAlert (aka N13V) targets both Windows and Linux VMWare ESXi servers of target organizations. The name RedAlert comes after a string […]

The post RedAlert, LILITH, and 0mega, 3 new ransomware in the wild  appeared first on Security Affairs.

"

Autosummary: The ransomware targets a limited types of files, including log files (.log), swap files(.vswp), virtual disks(.vmdk), snapshot files (.vmsn) and memory files(.vmem) of VMware ESXi virtual machines. Researchers from threat intelligence firm Cyble warn of new ransomware gangs that surfaced recently, named Lilith, RedAlert, and 0mega. "


Holy Ghost ransomware operation is linked to North Korea

exploits ransomware
2022-07-15 https://securityaffairs.co/wordpress/133255/hacking/holy-ghost-ransomware-north-korea.html

Microsoft researchers linked the Holy Ghost ransomware (H0lyGh0st) operation to North Korea-linked threat actors. The Microsoft Threat Intelligence Center (MSTIC) researchers linked the activity of the Holy Ghost ransomware (H0lyGh0st) operation to a North Korea-linked group they tracked as DEV-0530. The Holy Ghost ransomware gang has been active since June 2021 and it conducted ransomware […]

The post Holy Ghost ransomware operation is linked to North Korea appeared first on Security Affairs.

"

Autosummary: The Microsoft Threat Intelligence Center (MSTIC) researchers linked the activity of the Holy Ghost ransomware (H0lyGh0st) operation to a North Korea-linked group they tracked as DEV-0530. "


Emerging H0lyGh0st Ransomware Tied to North Korea

exploits ransomware
2022-07-15 https://threatpost.com/h0lygh0st-ransomware-north-korea/180232/
Microsoft has linked a threat that emerged in June 2021 and targets small-to-mid-sized businesses to state-sponsored actors tracked as DEV-0530. "

Autosummary: The group has successfully compromised small-to-mid-sized businesses—including manufacturing organizations, banks, schools, and event and meeting planning companies—in multiple countries starting as early as September, researchers from MTIC and Microsoft Digital Security Unit (MDSU) said in a blog post published Thursday. Later in the group’s evolution, between October 2021 and May 2022, MSTIC observed a cluster of new DEV-0530 ransomware variants written in Go, which they classify as SiennaBlue variants, they said. "


Catalogic DPX 4.8.1 strengthens ransomware protection for customers

exploits ransomware
2022-07-14 https://www.helpnetsecurity.com/2022/07/14/catalogic-dpx-4-8-1/

Catalogic Software released the newest version of Catalogic DPX, the company’s enterprise data protection software. DPX 4.8.1 introduces GuardMode, a feature providing early detection of ransomware and DPX vPlus, cloud data protection for Microsoft 365 and other open virtualization platforms. “Cybercriminals are constantly innovating, costing US victims $49.2 million in losses to ransomware attacks last year alone – and that is just based on incidents reported to the FBI,” said Krista Macomber, Senior Analyst, Evaluator … More

The post Catalogic DPX 4.8.1 strengthens ransomware protection for customers appeared first on Help Net Security.

"

Autosummary: With DPX vPlus, Catalogic provides data protection for Microsoft 365, and other open virtualization platforms such as RHV/oVirt, Acropolis, XenServer, Oracle VM and KVM. "


Elden Ring maker Bandai Namco hit by ransomware and data leaks

exploits ransomware
2022-07-14 https://blog.malwarebytes.com/ransomware/2022/07/elden-ring-maker-bandai-namco-hit-by-ransomware-and-data-leaks/

We take a look at a major ransomware attack impacting video game giant Bandai Namco, laced with the potential threat of data leakage.

The post Elden Ring maker Bandai Namco hit by ransomware and data leaks appeared first on Malwarebytes Labs.

"

Autosummary: Eurogamer published a Bandai Namco statement, which reads as follows: On 3rd July, 2022, Bandai Namco Holdings Inc. confirmed that it experienced an unauthorised access by third party to the internal systems of several Group companies in Asian regions (excluding Japan).In addition, there is a possibility that customer information related to the Toys and Hobby Business in Asian regions (excluding Japan) was included in the servers and PCs, and we are currently identifying the status about existence of leakage, scope of the damage, and investigating the cause. "


Holy Ghost ransomware operation linked to North Korean hackers

exploits ransomware
2022-07-14 https://www.bleepingcomputer.com/news/security/holy-ghost-ransomware-operation-linked-to-north-korean-hackers/
For more than a year, North Korean hackers have been running a ransomware operation called HolyGhost, attacking small businesses in various countries. [...] "

Autosummary: Microsoft tracks the newer variants as SiennaBlue (HolyRS.exe, HolyLocker.exe, and BTLC.exe) and notes that their functionality expanded over time to include multiple encryption options, string obfuscation, public key management, and internet/intranet support. "


Microsoft links Holy Ghost ransomware operation to North Korean hackers

exploits ransomware
2022-07-14 https://www.bleepingcomputer.com/news/security/microsoft-links-holy-ghost-ransomware-operation-to-north-korean-hackers/
For more than a year, North Korean hackers have been running a ransomware operation called HolyGhost, attacking small businesses in various countries. [...] "

Autosummary: Microsoft tracks the newer variants as SiennaBlue (HolyRS.exe, HolyLocker.exe, and BTLC.exe) and notes that their functionality expanded over time to include multiple encryption options, string obfuscation, public key management, and internet/intranet support. "


Rise in ransomware drives IT leaders to implement data encryption

exploits ransomware
2022-07-13 https://www.helpnetsecurity.com/2022/07/13/implement-data-encryption-video/

The number of UK organizations implementing data encryption as a core part of their cybersecurity strategy has continued to rise, with 32% introducing a policy to encrypt all corporate information as standard in the last year. In total, 47% now require the encryption of all data, whether it’s at rest or in transit, according to Apricorn. This Help Net Security video highlights how remote working and rise in ransomware drive IT leaders to manage risk … More

The post Rise in ransomware drives IT leaders to implement data encryption appeared first on Help Net Security.

"

Autosummary: "


Cobalt Strikes again: UAC-0056 continues to target Ukraine in its latest campaign

ransomware
2022-07-13 https://blog.malwarebytes.com/threat-intelligence/2022/07/cobalt-strikes-again-uac-0056-continues-to-target-ukraine-in-its-latest-campaign/

While the war in Ukraine still rages, various threat actors continue to launch cyber attacks against its government entities. In this blog we review the latest campaign from the UAC-0056 threat group.

The post Cobalt Strikes again: UAC-0056 continues to target Ukraine in its latest campaign appeared first on Malwarebytes Labs.

"

Autosummary: 024054ff04e0fd75a4765dd705067a6b336caa751f0a804fefce787382ac45c1 14736be09a7652d206cd6ab35375116ec4fad499bb1b47567e4fd56dcfcd22ea 474a0f0bb5b17a1bb024e08a0bb46277ba03392ee95766870c981658c4c2300d Payloads 0709a8f18c8436deea0b57deab55afbcea17657cb0186cbf0f6fcbb551661470 aadd8c7c248915c5da49c976f24aeb98ccc426fb31d1d6913519694a7bb9351a fb2a9dcfcf41c493fb7348ff867bb3cad9962a04c9dfd5b1afa115f7ff737346 501d4741a0aa8784e9feeb9f960f259c09cbceccb206f355209c851b7f094eff Cobalt Strike beacon and payloads 136.144.41[.]177 syriahr[.]eu/s/Xnk75JwUcIebkrmENtufIiiKEmoqBN/field-keywords/ syriahr[.]eu/nzXlLVas-VALvDh9lopkC/avp/amznussraps/ skreatortemp[.]site imolaoggi[.]euThis file looked familiar to us and for good reason because the macro is nearly identical to the document we analyzed in our initial blog: Figure 2: Detail of Vacancies and GoElephant dropper macros In the most recent attack reported by UA-CERT (Humanitarian catastrophe of Ukraine since February 24, 2022.xls) we see an almost identical macro to the one used in another decoy document called Help Ukraine.xls: Figure 3: Detail of Help Ukraine and Humanitarian catastrophe macros The Help Ukraine lure, to our knowledge, has never been publicly documented before: Figure 4: Help Ukraine lure used in late July We were able to identify 7 different samples with that theme, including one (258a9665af7120d0d80766c119e48a4035ee3b68676076bf3ed6462c644fe7d0) that has some similarities with a previous attack: Figure 5: Similarities between different versions Also, in the past we have found comments regarding to a domain named ExcelVBA[.]ru.This shellcode can be 32 or 64 bit, and is a Cobalt Strike beacon with the following configuration: BeaconType – HTTPS Port – 443 SleepTime – 30000 PublicKey_MD5 – defb5d95ce99e1ebbf421a1a38d9cb64 C2Server – skreatortemp.site,/s/08u1XdxChhMrLYdTasfnOMQpbsLkpq3o/field-keywords/ UserAgent – Mozilla/5.0_Frsg_stredf_o21_rutyyyrui_type (Windows NT 10.0; Win64; x64; Trident/7.0; D-M1-200309AC;D-M1-MSSP1; rv:11.0) like Gecko_10984gap HttpPostUri – /nBz07hg5l3C9wuWVCGV-5xHHu1amjf76F2A8i/avp/amznussraps/ Watermark – 1580103824 By having a Cobalt Strike instance running on the victim’s machine, it is now fully compromised. "


New Lilith ransomware emerges with extortion site, lists first victim

exploits ransomware
2022-07-13 https://www.bleepingcomputer.com/news/security/new-lilith-ransomware-emerges-with-extortion-site-lists-first-victim/
A new ransomware operation has been launched under the name "Lilith," and it has already posted its first victim on a data leak site created to support double-extortion attacks. [...] "

Autosummary: A look at Lilith Upon execution, Lilith attempts to terminate processes that match entries on a hardcoded list, including Outlook, SQL, Thunderbird, Steam, PowerPoint, WordPad, Firefox, and more. "


Bandai Namco confirms hack after ALPHV ransomware data leak threat

exploits ransomware
2022-07-13 https://www.bleepingcomputer.com/news/security/bandai-namco-confirms-hack-after-alphv-ransomware-data-leak-threat/
Game publishing giant Bandai Namco has confirmed that they suffered a cyberattack that may have resulted in the theft of customers" personal data. [...] "

Autosummary: Bandai Namco is a Japanese publisher of numerous popular video games, including Elden Ring, Dark Souls, Pac-Man, Tekken, Gundam, Soulcalibur, and many more. "


Qakbot operations continue to evolve to avoid detection

ransomware
2022-07-13 https://securityaffairs.co/wordpress/133191/malware/qakbot-continues-to-evolve.html

Experts warn that operators behind the Qakbot malware operation are improving their attack chain in an attempt to avoid detection. Qakbot, also known as QBot, QuackBot and Pinkslipbot, is an info-stealing malware that has been active since 2008. The malware spreads via malspam campaigns, it inserts replies in active email threads. The threat continues to […]

The post Qakbot operations continue to evolve to avoid detection appeared first on Security Affairs.

"

Autosummary: “Other more subtle techniques are being deployed by threat actors to prevent automated detection and raise the odds that their attack will work, including obfuscating code, leveraging multiple URLs to deliver the payload, using unknown file extension names to deliver the payload, and altering the steps of the process by introducing new layers between initial compromise, delivery, and final execution.” "


BlackCat (aka ALPHV) ransomware is increasing stakes up to $2.5 million in demands

exploits ransomware
2022-07-11 https://www.helpnetsecurity.com/2022/07/11/blackcat-alphv-ransomware/

The notorious cybercriminal syndicate competes with Conti and Lockbit 3.0. They introduced an advanced search by stolen victim’s passwords, and confidential documents leaked in the TOR network. Resecurity (USA), a Los Angeles-based cybersecurity company protecting Fortune 500 companies, has detected a significant increase in the value of ransom demand requests by the notorious Blackcat ransomware gang. According to experts, the notorious cybercriminal syndicate actively competes with Conti and the updated Lockbit 3.0, and recently introduced … More

The post BlackCat (aka ALPHV) ransomware is increasing stakes up to $2.5 million in demands appeared first on Help Net Security.

"

Autosummary: BlackCat has been operating since at least November 2021, and launched major attacks in January to disrupt OilTanking GmbH, a German fuel company, and in February 2022, the attack on an aviation company, Swissport. Blackcat ransomware is one of the fastest-growing Ransomware-as-a-Service (RaaS) underground groups practicing so called “quadruple extortion” by pressing victims to pay – leveraging encryption, data theft, denial of service (DoS) and harassment. "


BlackCat (aka ALPHV) Ransomware is Increasing Stakes up to $2,5M in Demands

exploits ransomware
2022-07-11 https://securityaffairs.co/wordpress/133107/cyber-crime/blackcat-alphv-ransomware-demands.html

BlackCat (aka ALPHV) Ransomware gang introduced an advanced search by stolen victim’s passwords, and confidential documents. The notorious cybercriminal syndicate BlackCat competes with Conti and Lockbit 3.0. They introduced an advanced search by stolen victim’s passwords, and confidential documents leaked in the TOR network Resecurity (USA), a Los Angeles-based cybersecurity company protecting Fortune 500 companies, […]

The post BlackCat (aka ALPHV) Ransomware is Increasing Stakes up to $2,5M in Demands appeared first on Security Affairs.

"

Autosummary: BlackCat has been operating since at least November 2021, and launched major attacks in January to disrupt OilTanking GmbH, a German fuel company, and in February 2022, the attack on an aviation company, Swissport.They introduced an advanced search by stolen victim’s passwords, and confidential documents leaked in the TOR network Resecurity (USA), a Los Angeles-based cybersecurity company protecting Fortune 500 companies, has detected a significant increase in the value of ransom demand requests by the notorious Blackcat ransomware gang. "


Experts warn of the new 0mega ransomware operation

exploits ransomware
2022-07-11 https://securityaffairs.co/wordpress/133098/malware/0mega-ransomware.html

BleepingComputer reported a new ransomware operation named 0mega that is targeting organizations worldwide. 0mega is a new ransomware operation that is targeting organizations worldwide using a double-extortion model, BleepingComputer reported. The ransomware operation has been active at least since May 2022 and already claimed to have breached multiple organizations. Victims of the ransomware reported that […]

The post Experts warn of the new 0mega ransomware operation appeared first on Security Affairs.

"

Autosummary: "


French telephone operator La Poste Mobile suffered a ransomware attack

exploits ransomware
2022-07-10 https://securityaffairs.co/wordpress/133080/cyber-crime/la-poste-mobile-ransomware.html

French virtual mobile telephone operator La Poste Mobile was hit by a ransomware attack that impacted administrative and management services.  The ransomware attack hit the virtual mobile telephone operator La Poste Mobile on July 4 and paralyzed administrative and management services.  The company pointed out that threat actors may have accessed data of its customers, […]

The post French telephone operator La Poste Mobile suffered a ransomware attack appeared first on Security Affairs.

"

Autosummary: La réalité matérielle de l"attaque ne fait pas un doute, même si celle-ci était presque passée inaperçue… #ransomware https://t.co/Ef7u7jOah0 — Valéry Rieß-Marchive (@ValeryMarchive) July 8, 2022 The gang has been active since at least 2019 and today it is one of the most active ransomware gangs. "


North Korean APT targets US healthcare sector with Maui ransomware

exploits ransomware
2022-07-10 https://blog.malwarebytes.com/ransomware/2022/07/north-korean-apt-targets-us-healthcare-sector-with-maui-ransomware/

CISA warns of an unusual ransomware.

The post North Korean APT targets US healthcare sector with Maui ransomware appeared first on Malwarebytes Labs.

"

Autosummary: State-sponsored North Korean threat actors have been targeting the US Healthcare and Public Health (HPH) sector for the past year using the Maui ransomware, according to a joint cybersecurity advisory (CSA) from the FBI, Cybersecurity and Infrastructure Security Agency (CISA), and the Department of the Treasury. North Korean state-sponsored cyber-actors used Maui ransomware in these incidents to encrypt servers responsible for healthcare services—including electronic health records services, diagnostics services, imaging services, and intranet services. "


Evolution of the LockBit Ransomware operation relies on new techniques

exploits ransomware
2022-07-09 https://securityaffairs.co/wordpress/133027/cyber-crime/lockbit-2-0-evolution.html

Experts documented the evolution of the LockBit ransomware that leverages multiple techniques to infect targets and evade detection. The Cybereason Global Security Operations Center (GSOC) Team published the Cybereason Threat Analysis Reports that investigates the threat landscape and provides recommendations to mitigate their attacks. The researchers focused on the evolution of the Lockbit ransomware, they detailed two infections occurring […]

The post Evolution of the LockBit Ransomware operation relies on new techniques appeared first on Security Affairs.

"

Autosummary: “In other cases, affiliates would use a more traditional phishing email that will allow them to remotely connect to a network via an employee’s computer, or utilize malicious attachments, downloads, application patch exploits or vulnerabilities to gain access to a network.” "


New Checkmate ransomware target QNAP NAS devices

exploits ransomware
2022-07-08 https://securityaffairs.co/wordpress/132989/malware/checkmate-ransomware-targets-qnap-nas.html

Taiwanese vendor QNAP wars of a new strain of ransomware, dubbed Checkmate, that is targeting its NAS devices. The Taiwanese vendor QNAP is warning of a new family of ransomware targeting its NAS devices using weak passwords. Threat actors are targeting devices exposed online with the SMB service enabled, they perform brute-force attacks against accounts […]

The post New Checkmate ransomware target QNAP NAS devices appeared first on Security Affairs.

"

Autosummary: In June, Bleeping Computer and MalwareHunterTeam researchers, citing user reports and sample submissions on the ID Ransomware platform, warned of a new wave of ech0raix ransomware attacks targeting QNAP Network Attached Storage (NAS) devices. Updating QTS, QuTS hero, or QuTScloud Log on to QTS, QuTS hero or QuTScloud as administrator. "


Free decryptor released for AstraLocker, Yashma ransomware victims

exploits ransomware
2022-07-08 https://www.bleepingcomputer.com/news/security/free-decryptor-released-for-astralocker-yashma-ransomware-victims/
New Zealand-based cybersecurity firm Emsisoft has released a free decryption tool to help AstraLocker and Yashma ransomware victims recover their files without paying a ransom. [...] "

Autosummary: The list of previously released decryption tools includes Ragnarok, Avaddon, SynAck, AES-NI, Shade, FilesLocker, TeslaCrypt, Crysis, Ziggy, and FonixLocker. "


Checkmate ransomware hits QNAP NAS devices

exploits ransomware
2022-07-08 https://www.helpnetsecurity.com/2022/07/08/checkmate-ransomware-qnap-nas/

QNAP Systems is warning about Checkmate, a new piece of ransomware targeting users of its network-attached storage (NAS) appliances. “Preliminary investigation indicates that Checkmate attacks via SMB services exposed to the internet, and employs a dictionary attack to break accounts with weak passwords,” the company says. “Once the attacker successfully logs in to a device, they encrypt data in shared folders and leave a ransom note with the file name ‘!CHECKMATE_DECRYPTION_README’ in each folder.” About … More

The post Checkmate ransomware hits QNAP NAS devices appeared first on Help Net Security.

"

Autosummary: "


Researchers Detail Techniques LockBit Ransomware Using to Infect its Targets

exploits ransomware
2022-07-08 https://thehackernews.com/2022/07/researchers-detail-techniques-lockbit.html
LockBit ransomware attacks are constantly evolving by making use of a wide range of techniques to infect targets while also taking steps to disable endpoint security solutions. "The affiliates that use LockBit"s services conduct their attacks according to their preference and use different tools and techniques to achieve their goal," Cybereason security analysts Loïc Castel and Gal Romano said. "

Autosummary: " LockBit, which operates on a ransomware-as-a-service (RaaS) model like most groups, was first observed in September 2019 and has since emerged as the most dominant ransomware strain this year, surpassing other well-known groups like Conti, Hive, and BlackCat. "


U.S. Healthcare Orgs Targeted with Maui Ransomware

exploits ransomware
2022-07-08 https://threatpost.com/healthcare-maui-ransomware/180154/
State-sponsored actors are deploying the unique malware--which targets specific files and leaves no ransomware note--in ongoing attacks. "

Autosummary: “For truly organizational crippling ransomware attacks, threat actors need to manually identify the important assets and the weak points to truly take down a victim,” observed John Bambenek, principal threat hunter at Netenrich, a security and operations analytics SaaS firm, in an email to Threatpost. “Cyber criminals want to get paid quickly and effectively, and with little information for the victim the attack is increasingly malicious in nature,” observed James McQuiggan, security awareness advocate at security firm KnowBe4, in an e-mail to Threatpost. "


Emsisoft: Victims of AstraLocker and Yashma ransomware can recover their files for free

exploits ransomware
2022-07-08 https://securityaffairs.co/wordpress/133014/malware/emsisoft-astralocker-yashma-decryptor.html

Emsisoft has released a free decryption tool that allows victims of the AstraLocker and Yashma ransomware to recover their files without paying a ransom. Cybersecurity firm Emsisoft released a free decryptor tool that allows victims of the AstraLocker and Yashma ransomware to recover their files without paying a ransom. The security firm states that the […]

The post Emsisoft: Victims of AstraLocker and Yashma ransomware can recover their files for free appeared first on Security Affairs.

"

Autosummary: The Yashma decryptor released by the company works for the Chaos-based versions using .AstraLocker or a random .[a-z0-9]{4} extension. "


The Week in Ransomware - July 8th 2022 - One down, many to go

exploits ransomware
2022-07-08 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-july-8th-2022-one-down-many-to-go/
While we continue to see new ransomware operations launch, we also received some good news this week, with another ransomware shutting down. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @BleepinComputer, @LawrenceAbrams, @fwosar, @VK_Intel, @demonslay335, @Seifreed, @struppigel, @FourOctets, @malwareforme, @DanielGallagher, @PolarToffee, @serghei, @jorntvdw, @Ionut_Ilascu, @malwrhunterteam, @billtoulas, @PogoWasRight, @ValeryMarchive, @vxunderground, @emsisoft, @Unit42_Intel, @AdvIntel, @CISecurity, @pcrisk, and @Amigo_A_. This week, information about attacks also became public, including IT services giant SHI, Quantum ransomware hitting PFC, and the US government warning that the Maui ransomware is targeting healthcare. "


New 0mega ransomware targets businesses in double-extortion attacks

exploits ransomware
2022-07-08 https://www.bleepingcomputer.com/news/security/new-0mega-ransomware-targets-businesses-in-double-extortion-attacks/
A new ransomware operation named "0mega" targets organizations worldwide in double-extortion attacks and demands millions of dollars in ransoms. [...] "

Autosummary: "


Healthcare organizations targeted with Maui ransomware

exploits ransomware
2022-07-07 https://www.helpnetsecurity.com/2022/07/07/healthcare-maui-ransomware/

A less known ransomware threat dubbed Maui has been and is likely to continue hitting healthcare organizations, a new CISA alert warns. Maui is unusual in many ways: it does not show a ransom note, it does not rely upon external infrastructure to receive encryption keys, and it does not encrypt files and/or systems indiscriminately. Instead, its operators – believed to be North Korean state-sponsored cyber actors – operate it manually and choose which things … More

The post Healthcare organizations targeted with Maui ransomware appeared first on Help Net Security.

"

Autosummary: Maui ransomware encryption At the inner layer, files are encrypted using AES with a unique 16-byte key for each file, and the AES keys are RSA-encrypted using a key pair generated the first time Maui is run, Silas Cutler, Principal Reverse Engineer at Stairwell, explained. "


Smashing Security podcast #282: Raising money through ransomware, China’s mega-leak, and hackers for hire

financial exploits ransomware
2022-07-07 https://grahamcluley.com/smashing-security-podcast-282/
A hacked university might have made a profit after paying a cryptocurrency ransom, China suffers possibly the biggest data breach in history, and Reuters investigates digital mercenaries. All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, joined this … Continue reading "Smashing Security podcast #282: Raising money through ransomware, China’s mega-leak, and hackers for hire" "

Autosummary: "


North Korean Maui Ransomware Actively Targeting U.S. Healthcare Organizations

exploits ransomware
2022-07-07 https://thehackernews.com/2022/07/north-korean-maui-ransomware-actively.html
In a new joint cybersecurity advisory, U.S. cybersecurity and intelligence agencies have warned about the use of Maui ransomware by North Korean government-backed hackers to target the healthcare sector since at least May 2021. "North Korean state-sponsored cyber actors used Maui ransomware in these incidents to encrypt servers responsible for healthcare services—including electronic health "

Autosummary: "North Korean state-sponsored cyber actors used Maui ransomware in these incidents to encrypt servers responsible for healthcare services—including electronic health records services, diagnostics services, imaging services, and intranet services," the authorities noted. "


Quantum ransomware attack affects 657 healthcare orgs

exploits ransomware
2022-07-07 https://www.bleepingcomputer.com/news/security/quantum-ransomware-attack-affects-657-healthcare-orgs/
Professional Finance Company Inc. (PFC), a full-service accounts receivables management company, says that a ransomware attack in late February led to a data breach affecting over 600 healthcare organizations. [...] "

Autosummary: This is part of Conti"s new modus operandi where its members have either infiltrated or taken control of other ransomware operations such as Hive, AvosLocker, BlackCat, and Hello Kitty or data extortion gangs like Karakurt, BlackByte, and the Bazarcall collective. "


QNAP warns of new Checkmate ransomware targeting NAS devices

exploits ransomware
2022-07-07 https://www.bleepingcomputer.com/news/security/qnap-warns-of-new-checkmate-ransomware-targeting-nas-devices/
Taiwan-based network-attached storage (NAS) vendor QNAP warned customers to secure their devices against attacks using Checkmate ransomware to encrypt data. [...] "

Autosummary: You should also disable SMB 1 by logging into QTS, QuTS hero, or QuTScloud, going to Control Panel > Network & File > Win/Mac/NFS/WebDAV > Microsoft Networking, and selecting "SMB 2 or higher" after clicking on Advanced Options. "


North Korea-linked APTs use Maui Ransomware to target the Healthcare industry

exploits ransomware industry
2022-07-07 https://securityaffairs.co/wordpress/132978/malware/maui-ransomware-joint-alert.html

US authorities have issued a joint advisory warning of North Korea-linked APTs using Maui ransomware in attacks against the Healthcare sector. The FBI, CISA, and the U.S. Treasury Department issued a joint advisory that warn of North-Korea-linked threat actors using Maui ransomware in attacks aimed at organizations in the Healthcare sector. “The Federal Bureau of […]

The post North Korea-linked APTs use Maui Ransomware to target the Healthcare industry appeared first on Security Affairs.

"

Autosummary: "


Atera integrates with Malwarebytes to protect organizations against ransomware attacks

exploits ransomware
2022-07-07 https://www.helpnetsecurity.com/2022/07/08/atera-malwarebytes/

Atera announced a new integration with Malwarebytes, a provider of real-time cyber protection. Atera is the first remote management company to offer an integration that automates licensing and provisioning of the Malwarebytes OneView platform. This partnership plays an integral role for Atera to provide streamlined and maximized security operations for its community of more than 10,000 customers across 105 countries. “With workplaces continuing to evolve and employees working from anywhere in the world, the risk … More

The post Atera integrates with Malwarebytes to protect organizations against ransomware attacks appeared first on Help Net Security.

"

Autosummary: "


Hive Ransomware Upgrades to Rust for More Sophisticated Encryption Method

exploits ransomware
2022-07-06 https://thehackernews.com/2022/07/hive-ransomware-upgrades-to-rust-for.html
The operators of the Hive ransomware-as-a-service (RaaS) scheme have overhauled their file-encrypting software to fully migrate to Rust and adopt a more sophisticated encryption method. "With its latest variant carrying several major upgrades, Hive also proves it"s one of the fastest evolving ransomware families, exemplifying the continuously changing ransomware ecosystem," Microsoft Threat "

Autosummary: "


Bitter APT Hackers Continue to Target Bangladesh Military Entities

ransomware
2022-07-06 https://thehackernews.com/2022/07/bitter-apt-hackers-continue-to-target.html
Military entities located in Bangladesh continue to be at the receiving end of sustained cyberattacks by an advanced persistent threat tracked as Bitter. "Through malicious document files and intermediate malware stages the threat actors conduct espionage by deploying Remote Access Trojans," cybersecurity firm SECUINFRA said in a new write-up published on July 5. The findings from the "

Autosummary: "


New Hive ransomware variant is written in Rust and use improved encryption method

exploits ransomware
2022-07-06 https://securityaffairs.co/wordpress/132914/malware/hive-ransomware-new-variant.html

Hive ransomware operators have improved their file-encrypting module by migrating to Rust language and adopting a more sophisticated encryption method. The operators of the Hive ransomware upgraded their malware by migrating the malware to the Rust language and implementing a more sophisticated encryption method, Microsoft researchers warn. “The upgrades in the latest variant are effectively […]

The post New Hive ransomware variant is written in Rust and use improved encryption method appeared first on Security Affairs.

"

Autosummary: The porting to Rust language provides the following advantages: It offers memory, data type, and thread safety It has deep control over low-level resources It has a user-friendly syntax It has several mechanisms for concurrency and parallelism, thus enabling fast and safe file encryption It has a good variety of cryptographic libraries It’s relatively more difficult to reverse-engineer The most important change in the latest Hive variant is the encryption mechanism it adopts. "


US govt warns of Maui ransomware attacks against healthcare orgs

exploits ransomware
2022-07-06 https://www.bleepingcomputer.com/news/security/us-govt-warns-of-maui-ransomware-attacks-against-healthcare-orgs/
The FBI, CISA, and the U.S. Treasury Department issued today a joint advisory warning of North-Korean-backed threat actors using Maui ransomware in attacks against Healthcare and Public Health (HPH) organizations. [...] "

Autosummary: "


AA22-187A: North Korean State-Sponsored Cyber Actors Use Maui Ransomware to Target the Healthcare and Public Health Sector

exploits government ransomware
2022-07-06 https://us-cert.cisa.gov/ncas/alerts/aa22-187a
Original release date: July 6, 2022

Summary

The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Department of the Treasury (Treasury) are releasing this joint Cybersecurity Advisory (CSA) to provide information on Maui ransomware, which has been used by North Korean state-sponsored cyber actors since at least May 2021 to target Healthcare and Public Health (HPH) Sector organizations.

This joint CSA provides information—including tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs)—on Maui ransomware obtained from FBI incident response activities and industry analysis of a Maui sample. The FBI, CISA, and Treasury urge HPH Sector organizations as well as other critical infrastructure organizations to apply the recommendations in the Mitigations section of this CSA to reduce the likelihood of compromise from ransomware operations. Victims of Maui ransomware should report the incident to their local FBI field office or CISA. 

The FBI, CISA, and Treasury highly discourage paying ransoms as doing so does not guarantee files and records will be recovered and may pose sanctions risks. Note: in September 2021, Treasury issued an updated advisory highlighting the sanctions risks associated with ransomware payments and the proactive steps companies can take to mitigate such risks. Specifically, the updated advisory encourages U.S. entities to adopt and improve cybersecurity practices and report ransomware attacks to, and fully cooperate with, law enforcement. The updated advisory states that when affected parties take these proactive steps, Treasury’s Office of Foreign Assets Control (OFAC) would be more likely to resolve apparent sanctions violations involving ransomware attacks with a non-public enforcement response.

For more information on state-sponsored North Korean maliciou "

Autosummary: Mitigations The FBI, CISA, and Treasury urge HPH Sector organizations to: Limit access to data by deploying public key infrastructure and digital certificates to authenticate connections with the network, Internet of Things (IoT) medical devices, and the electronic health record system, as well as to ensure data packages are not manipulated while in transit from man-in-the-middle attacks.In addition, the FBI, CISA, and Treasury urge all organizations, including HPH Sector organizations, to apply the following recommendations to prepare for, mitigate/prevent, and respond to ransomware incidents.Summary The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Department of the Treasury (Treasury) are releasing this joint Cybersecurity Advisory (CSA) to provide information on Maui ransomware, which has been used by North Korean state-sponsored cyber actors since at least May 2021 to target Healthcare and Public Health (HPH) Sector organizations. Apply incident response best practices found in the joint Cybersecurity Advisory, Technical Approaches to Uncovering and Remediating Malicious Activity, developed by CISA and the cybersecurity authorities of Australia, Canada, New Zealand, and the United Kingdom.Regardless of whether you or your organization have decided to pay the ransom, the FBI, CISA, and Treasury urge you to promptly report ransomware incidents to the FBI at a local FBI Field Office, CISA at us-cert.cisa.gov/report, or the USSS at a USSS Field Office.For breaches involving electronic health information, you may need to notify the Federal Trade Commission (FTC) or the Department of Health and Human Services, and, in some cases, the media.Request for Information The FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, bitcoin wallet information, the decryptor file, and/or benign samples of encrypted files.North Korean state-sponsored cyber actors used Maui ransomware in these incidents to encrypt servers responsible for healthcare services—including electronic health records services, diagnostics services, imaging services, and intranet services. "


Researchers Share Techniques to Uncover Anonymized Ransomware Sites on Dark Web

exploits ransomware
2022-07-05 https://thehackernews.com/2022/07/researchers-share-techniques-to-uncover.html
Cybersecurity researchers have detailed the various measures ransomware actors have taken to obscure their true identity online as well as the hosting location of their web server infrastructure. "Most ransomware operators use hosting providers outside their country of origin (such as Sweden, Germany, and Singapore) to host their ransomware operations sites," Cisco Talos researcher Paul Eubanks "

Autosummary: While ransomware groups are known to rely on the dark web to conceal their illicit activities ranging from leaking stolen data to negotiating payments with victims, Talos disclosed that it was able to identify "public IP addresses hosting the same threat actor infrastructure as those on the dark web." "The methods we used to identify the public internet IPs involved matching threat actors" [self-signed] TLS certificate serial numbers and page elements with those indexed on the public internet," Eubanks said. "


AstraLocker ransomware operators shut down their operations

exploits ransomware
2022-07-05 https://securityaffairs.co/wordpress/132871/malware/astralocker-ransomware-shut-down.html

AstraLocker ransomware operators told BleepingComputer they’re shutting down their operations and are releasing decryptors. AstraLocker ransomware operators told BleepingComputer they’re shutting down the operation and provided decryptors to the VirusTotal malware analysis platform. AstraLocker is based on the source code of the Babuk Locker (Babyk) ransomware that was leaked online on June 2021. BleepingComputer tested the […]

The post AstraLocker ransomware operators shut down their operations appeared first on Security Affairs.

"

Autosummary: "


New RedAlert Ransomware targets Windows, Linux VMware ESXi servers

exploits ransomware
2022-07-05 https://www.bleepingcomputer.com/news/security/new-redalert-ransomware-targets-windows-linux-vmware-esxi-servers/
A new ransomware operation called RedAlert, or N13V, encrypts both Windows and Linux VMWare ESXi servers in attacks on corporate networks. [...] "

Autosummary: DEBUG TESTS -h Show this message When running the ransomware with the " -w " argument, the Linux encryptor will shut down all running VMware ESXi virtual machines using the following esxcli command: esxcli --formatter=csv --format-param=fields=="WorldID,DisplayName" vm process list | tail -n +2 | awk -F $"," "{system("esxcli vm process kill --type=force --world-id=" $1)}" When encrypting files, the ransomware utilizes the NTRUEncrypt public-key encryption algorithm, which support various "Parameter Sets" that offer different levels of security. "


AstraLocker ransomware shuts down and releases decryptors

exploits ransomware
2022-07-04 https://www.bleepingcomputer.com/news/security/astralocker-ransomware-shuts-down-and-releases-decryptors/
The threat actor behind the lesser-known AstraLocker ransomware told BleepingComputer they"re shutting down the operation and plan to switch to cryptojacking. [...] "

Autosummary: The list of decryption tools released in the past includes Avaddon, Ragnarok, SynAck, TeslaCrypt, Crysis, AES-NI, Shade, FilesLocker, Ziggy, and FonixLocker. "


A ransomware attack forced publishing giant Macmillan to shuts down its systems

exploits ransomware
2022-07-02 https://securityaffairs.co/wordpress/132792/cyber-crime/macmillan-ransomware-attack.html

A cyber attack forced the American publishing giant Macmillan to shut down its IT systems.  The publishing giant Macmillan has been hit by a cyberattack that forced the company to shut down its IT infrastructure to prevent the threat from spreading within its network. The company spokesman Erin Coffey told different media outlets that attackers have encrypted […]

The post A ransomware attack forced publishing giant Macmillan to shuts down its systems appeared first on Security Affairs.

"

Autosummary: "


The Week in Ransomware - July 1st 2022 - Bug Bounties

exploits ransomware
2022-07-01 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-july-1st-2022-bug-bounties/
It has been relatively busy this week with new ransomware attacks unveiled, a bug bounty program introduced, and new tactics used by the threat actors to distribute their encryptors. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @PolarToffee, @fwosar, @struppigel, @BleepinComputer, @serghei, @Ionut_Ilascu, @DanielGallagher, @malwrhunterteam, @LawrenceAbrams, @VK_Intel, @billtoulas, @jorntvdw, @malwareforme, @FourOctets, @demonslay335, @Seifreed, @ReversingLabs, @ValeryMarchive, @TrendMicro, @kisa118, @ahnlab, @PogoWasRight, @Amigo_A_, @Kangxiaopao, and @pcrisk. Finally, we also learned about various attacks this week, including those on Macmillan, Fitzgibbon Hospital, Med. "


AstraLocker 2.0 ransomware isn’t going to give you your files back

exploits ransomware
2022-07-01 https://blog.malwarebytes.com/ransomware/2022/07/astralocker-2-0-ransomware-isnt-going-to-give-you-your-files-back/

Through malice or carelessness, AstraLocker breaks the "circle of trust".

The post AstraLocker 2.0 ransomware isn’t going to give you your files back appeared first on Malwarebytes Labs.

"

Autosummary: Reaffirming (and then breaking) the circle of trust When decryption doesn’t happen, either because of a poor quality decryptor, or because no decryption process actually exists, the ransomware author’s so-called circle of trust is broken. In a ransomware attack, criminals typically break into a victim’s network via a trojan that has already infected a computer, by exploiting a software vulnerability on an Internet-facing server, or with stolen Remote Desktop Protocol (RDP) credentials. In its rush to encrypt, AstraLocker still manages to do some standard ransomware things: It tries to disable security programs; it also stops applications running that might prevent encryption from taking place; and it avoids virtual machines, which might indicate it’s being run by researchers in a lab. "


EMEA continues to be a hotspot for malware threats

exploits ransomware
2022-06-30 https://www.helpnetsecurity.com/2022/06/30/emea-malware-threats/

Ransomware detections in the first quarter of this year doubled the total volume reported for 2021, according to the latest quarterly Internet Security Report from the WatchGuard Threat Lab. Researchers also found that the Emotet botnet came back in a big way, the infamous Log4Shell vulnerability tripled its attack efforts and malicious cryptomining activity increased. Although findings from the Threat Lab’s Q4 2021 report showed ransomware attacks trending down year over year, that all changed … More

The post EMEA continues to be a hotspot for malware threats appeared first on Help Net Security.

"

Autosummary: Other key findings from this Internet Security Report include: Log4Shell makes its debut on the top 10 network attacks list Publicly disclosed in early December 2021, the Apache Log4j2 vulnerability, also known as Log4Shell, debuted on the top 10 network attack list fashionably late this quarter. “Based on the early spike in ransomware this year and data from previous quarters, we predict 2022 will break our record for annual ransomware detections,” said Corey Nachreiner, chief security officer at WatchGuard. "


Smashing Security podcast #281: Debug ransomware and win $1,000,000, period-tracking apps, and AI gets emotional

exploits ransomware
2022-06-30 https://grahamcluley.com/smashing-security-podcast-281/
A new version of the LockBit ransomware offers a bug bounty, women uninstall period-tracking apps in fear of how their data might be used against them, and Microsoft"s facial recognition tech no longer wants to know how you"re feeling. All this and much more is discussed in the latest edition of the award-winning "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Thom Langford from The Host Unknown podcast. Plus don"t miss our featured interview with Bitwarden founder and CTO Kyle Spearrin. "

Autosummary: Integrating directly into development tools, workflows, and automation pipelines, Snyk makes it easy for teams to find, prioritize, and fix security vulnerabilities in code, dependencies, containers, and infrastructure as code. "


Ex-Canadian Government Employee Pleads Guilty Over NetWalker Ransomware Attacks

exploits government ransomware
2022-06-30 https://thehackernews.com/2022/06/ex-canadian-government-employee-pleads.html
A former Canadian government employee this week agreed to plead guilty in the U.S. to charges related to his involvement with the NetWalker ransomware syndicate. Sebastien Vachon-Desjardins, who was extradited to the U.S. on March 10, 2022, is accused of conspiracy to commit computer fraud and wire fraud, intentional damage to a protected computer, and transmitting a demand in relation to "

Autosummary: "


A Guide to Surviving a Ransomware Attack

exploits ransomware
2022-06-30 https://threatpost.com/a-guide-to-surviving-a-ransomware-attack/180110/
Oliver Tavakoli, CTO at Vectra AI, gives us hope that surviving a ransomware attack is possible, so long as we apply preparation and intentionality to our defense posture. "

Autosummary: Attacker Skill and Persistence The skills of the attackers and the skills of the defenders – plus some elements of luck – generally determine the possible extent to which an attack could progress: Low skills: Some attackers may be skilled at attacking organizations with lagging security practices but will often meet their match in organizations that have robust defenses Some attackers may be skilled at attacking organizations with lagging security practices but will often meet their match in organizations that have robust defenses Wrong skills: Attackers with skills and tooling useful in attacking traditional data centers will have trouble breaking into targets who have moved everything to the cloud Attackers with skills and tooling useful in attacking traditional data centers will have trouble breaking into targets who have moved everything to the cloud Bad luck: Organizations who are generally locked down but may have a temporary exposure which an attacker happens to stumble across Organizations who are generally locked down but may have a temporary exposure which an attacker happens to stumble across Good luck: Organizations who have left a persistent opening (e.g., open RDP access to the outside in an AWS enclave) may have a run of good luck as no attacker encounters it Attacker Goal Attack groups may also specialize in leak-centered vs. operation-centered goals. Takeaways You should tabletop various scenarios covering attackers pursuing both leak-centered and operations-centered goals and consider your reactions to partial and complete success by the attackers: Know the extent of your cyber insurance policy and what limitations it has. "


Black Basta ransomware – what you need to know

exploits ransomware
2022-06-30 https://www.tripwire.com/state-of-security/security-data-protection/black-basta-ransomware-what-you-need-to-know/
Although only active for the past couple of months, the Black Basta ransomware is thought to have already hit almost 50 organisations. Read more in my article on the Tripwire State of Security blog. "

Autosummary: Victims have reportedly been hit in countries around the world including the United States, UK, India, Canada, Australia, New Zealand, and UAE. "


Macmillan shuts down systems after likely ransomware attack

exploits ransomware
2022-06-30 https://www.bleepingcomputer.com/news/security/macmillan-shuts-down-systems-after-likely-ransomware-attack/
Publishing giant Macmillan was forced to shut down their network and offices while recovering from a security incident that appears to be a ransomware attack. [...] "

Autosummary: "


Korean cybersecurity agency released a free decryptor for Hive ransomware

exploits ransomware ciber
2022-06-30 https://securityaffairs.co/wordpress/132770/malware/hive-ransomware-decryptor.html

Good news for the victims of the Hive ransomware, Korean security researchers have released a free decryptor for some versions. Good news for the victims of the Hive ransomware, the South Korean cybersecurity agency KISA has released a free decryptor for versions from v1 till v4. “The Korea Internet & Security Agency (KISA) is distributing […]

The post Korean cybersecurity agency released a free decryptor for Hive ransomware appeared first on Security Affairs.

"

Autosummary: The results of the tests demonstrated the efficiency of the method, the master key recovered 92% succeeded in decrypting approximately 72% of the files, while the master key restored 96% succeeded in decrypting approximately 82% of the files, and the master key restored 98% succeeded in decrypting approximately 98% of the files. "


Codenotary SBOM Operator for Kubernetes provides continuously updated info on software supply chain

ransomware
2022-06-29 https://www.helpnetsecurity.com/2022/06/29/codenotary-sbom-operator-for-kubernetes/

Codenotary launched SBOM Operator for Kubernetes in both its open source Community Attestation Service, as well as Codenotary’s Trustcenter, the company’s flagship product, that mitigates the risk of software supply chain attacks by tracking all software and software dependencies running in Kubernetes. Codenotary provides the easiest way to generate SBOMs (Software Bill of Materials) of running container images and maintaining up-to-date records of all builds, and dependencies. This allows for immediate risk mitigation in the … More

The post Codenotary SBOM Operator for Kubernetes provides continuously updated info on software supply chain appeared first on Help Net Security.

"

Autosummary: "


Walmart denies being hit by Yanluowang ransomware attack

exploits ransomware
2022-06-29 https://www.bleepingcomputer.com/news/security/walmart-denies-being-hit-by-yanluowang-ransomware-attack/
American retailer Walmart has denied being hit with a ransomware attack by the Yanluowang gang after the hackers claimed to encrypt thousands of computers. [...] "

Autosummary: "


Peer Software partners with Pulsar Security to help enterprise customers combat ransomware attacks

exploits ransomware
2022-06-28 https://www.helpnetsecurity.com/2022/06/28/peer-software-pulsar-security/

Peer Software announced the formation of a strategic alliance with Pulsar Security. Through the alliance, Peer Software will leverage Pulsar Security’s team of cyber security experts to continuously monitor and analyze emerging and evolving ransomware and malware attack patterns on unstructured data. PeerGFS, an enterprise-class software solution that eases the deployment of a modern distributed file system across multi-site, on-premises and cloud storage, will utilize these attack patterns to enable an additional layer of cyber … More

The post Peer Software partners with Pulsar Security to help enterprise customers combat ransomware attacks appeared first on Help Net Security.

"

Autosummary: "


Detection, isolation, and negotiation: Improving your ransomware preparedness and response

exploits ransomware
2022-06-28 https://www.helpnetsecurity.com/2022/06/28/improving-ransomware-preparedness/

The risks presented by ransomware and cyber extortion events have likely found a place in your own security team’s discussions, and rightfully so. Ransomware attacks have proliferated in the last decade. The numbers are staggering if not overwhelming, and make it abundantly clear that ransomware attacks are not a threat that any organization, however big or small and across industries, can afford to ignore. It follows, then, that proactively protecting company assets and mitigating cyber … More

The post Detection, isolation, and negotiation: Improving your ransomware preparedness and response appeared first on Help Net Security.

"

Autosummary: Further pressure There are other means threat actors use to add pressure to negotiations outside of the ransomware attack itself, including: Implementing DDoS attacks Emailing employees directly about the attack Claiming to have data they have not actually exfiltrated to make the situation seem more dire Contacting executives or clients of the victims to make them aware of the attack Posting sensitive PII on public-facing forums or social media Leaving backdoors that make it possible for the ransomware attackers to carry out a second attack against the same organization Being the victim of a cyber extortion attack is stressful and challenging.Without a threat readiness and response plan in place, the damage of a ransomware or cyber extortion event could reverberate across your organizations, resulting in data loss, service inaccessibility, operational interruptions, loss of trust and competitive market advantage, and other costly and lasting repercussions.It is always advisable to use a professional who is familiar with threat actor engagement, ransomware attacks, and the legal obligations of ransomware victims; knowledge of current cyber extortion trends, threat actor TTPs, and threat actor groups is also important. "


Mitel VoIP Bug Exploited in Ransomware Attacks

exploits ransomware
2022-06-28 https://threatpost.com/mitel-voip-bug-exploited/180079/
Researchers warn threat actors are using a novel remote code execution exploit to gain initial access to victim’s environments. "

Autosummary: This included the initial undocumented exploit used to compromise the device, the tools subsequently downloaded by the threat actor to the device, and even evidence of specific anti-forensic measures taken by the threat actor,” said Bennett. “The device was taken offline and imaged for further analysis, leading to the discovery of a novel remote code execution exploit used by the threat actor to gain initial access to the environment,” Patrick Bennet wrote in a blog post. "


LockBit 3.0 introduces important novelties, including a bug bounty program

exploits ransomware
2022-06-28 https://securityaffairs.co/wordpress/132701/cyber-crime/lockbit-3-0.html

The LockBit ransomware operators released LockBit 3.0 with important novelties, including a bug bounty program and Zcash payments. The Lockbit ransomware operation has released LockBit 3.0, which has important noveòties such as a bug bounty program, Zcash payment, and new extortion tactics. The gang has been active since at least 2019 and today it is […]

The post LockBit 3.0 introduces important novelties, including a bug bounty program appeared first on Security Affairs.

"

Autosummary: Linkedin Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


LockBit 3.0 introduces the first ransomware bug bounty program

exploits ransomware
2022-06-27 https://www.bleepingcomputer.com/news/security/lockbit-30-introduces-the-first-ransomware-bug-bounty-program/
The LockBit ransomware operation has released "LockBit 3.0," introducing the first ransomware bug bounty program and leaking new extortion tactics and Zcash cryptocurrency payment options. [...] "

Autosummary: The following are the various bug bounty categories offered by the LockBit 3.0 operation: Web Site Bugs: XSS vulnerabilities, mysql injections, getting a shell to the site and more, will be paid depending on the severity of the bug, the main direction is to get a decryptor through bugs web site, as well as access to the history of correspondence with encrypted companies. XSS vulnerabilities, mysql injections, getting a shell to the site and more, will be paid depending on the severity of the bug, the main direction is to get a decryptor through bugs web site, as well as access to the history of correspondence with encrypted companies.BleepingComputer LockBit 3.0 bug bounty program With the release of LockBit 3.0, the operation has introduced the first bug bounty program offered by a ransomware gang, asking security researchers to submit bug reports in return for rewards ranging between $1,000 and $1 million. "


Cybersecurity Experts Warn of Emerging Threat of "Black Basta" Ransomware

exploits ransomware ciber
2022-06-27 https://thehackernews.com/2022/06/cybersecurity-experts-warn-of-emerging.html
The Black Basta ransomware-as-a-service (RaaS) syndicate has amassed nearly 50 victims in the U.S., Canada, the U.K., Australia, and New Zealand within two months of its emergence in the wild, making it a prominent threat in a short window. "Black Basta has been observed targeting a range of industries, including manufacturing, construction, transportation, telcos, pharmaceuticals, cosmetics, "

Autosummary: The top five sectors historically targeted by Conti have been manufacturing (14%), real estate (11.1%), logistics (8.2%), professional services (7.1%), and trade (5.5%), with the operators specifically singling out companies in the U.S. (58.4%), Canada (7%), the U.K. (6.6%), Germany (5.8%), France (3.9%), and Italy (3.1%). "


Vice Society claims ransomware attack on Med. University of Innsbruck

exploits ransomware
2022-06-27 https://www.bleepingcomputer.com/news/security/vice-society-claims-ransomware-attack-on-med-university-of-innsbruck/
The Vice Society ransomware gang has claimed responsibility for last week"s cyberattack against the Medical University of Innsbruck, which caused severe IT service disruption and the alleged theft of data. [...] "

Autosummary: If a ransomware attack is indeed the reason behind last week"s disruption, the fact that the hackers posted all data and not just a sample, a full week after the attack occurred, could mean that the negotiations for a ransom payment have reached a dead end, or never took place. "


China-linked APT Bronze Starlight deploys ransomware as a smokescreen

exploits ransomware
2022-06-26 https://securityaffairs.co/wordpress/132624/apt/bronze-starlight-deploy-ransomware.html

China-linked APT Bronze Starlight is deploying post-intrusion ransomware families as a diversionary action to its cyber espionage operations. Researchers from Secureworks reported that a China-linked APT group, tracked as Bronze Starlight (APT10), is deploying post-intrusion ransomware families to cover up the cyber espionage operations. The experts observed an activity cluster involving post-intrusion ransomware such as […]

The post China-linked APT Bronze Starlight deploys ransomware as a smokescreen appeared first on Security Affairs.

"

Autosummary: The experts observed an activity cluster involving post-intrusion ransomware such as LockFile, Atom Silo, Rook, Night Sky, Pandora, and LockBit 2.0. "


Fake copyright infringement emails install LockBit ransomware

exploits ransomware
2022-06-26 https://www.bleepingcomputer.com/news/security/fake-copyright-infringement-emails-install-lockbit-ransomware/
LockBit ransomware affiliates are using an interesting trick to get people into infecting their devices by disguising their malware as copyright claims. [...] "

Autosummary: Victims listed by each ransomware operation in May 2022 (NCC Group) The notorious ransomware operation recorded a whopping 95 victims in May alone, whereas Conti, BlackBasta, Hive, and BlackCat collectively had 65. "


Despite known security issues, VPN usage continues to thrive

ransomware
2022-06-24 https://www.helpnetsecurity.com/2022/06/24/vpn-usage-continues-to-thrive/

VPN usage is still prevalent among 90% of security teams who have highlighted cost, time, and difficulty as reasons to not move forward with ZTNA adoption, according to a new survey conducted by Sapio Research. Furthermore, 97% say that adopting a zero trust model is a priority, with 93% of organizations having committed a budget to enhance their VPN or move toward ZTNA within the next year or two. The last two years have shifted … More

The post Despite known security issues, VPN usage continues to thrive appeared first on Help Net Security.

"

Autosummary: Key drivers for ZTNA A majority of the respondents (97%) stated that adopting a zero trust model is a priority for their organization, where 44% said they have plans to roll out zero trust but are in the early stages, while 53% said they have already begun to roll out zero trust solutions. "


State-Backed Hackers Using Ransomware as a Decoy for Cyber Espionage Attacks

exploits government ransomware
2022-06-24 https://thehackernews.com/2022/06/state-backed-hackers-using-ransomware.html
A China-based advanced persistent threat (APT) group is possibly deploying short-lived ransomware families as a decoy to cover up the true operational and tactical objectives behind its campaigns. The activity cluster, attributed to a hacking group dubbed Bronze Starlight by Secureworks, involves the deployment of post-intrusion ransomware such as LockFile, Atom Silo, Rook, Night Sky, Pandora, "

Autosummary: In less than a year, the group is said to have cycled through as many as six different ransomware strains such as LockFile (August 2021), Atom Silo (October), Rook (November), Night Sky (December), Pandora (February 2022), and most recently LockBit 2.0 (April). "


Conti ransomware finally shuts down data leak, negotiation sites

exploits ransomware
2022-06-24 https://www.bleepingcomputer.com/news/security/conti-ransomware-finally-shuts-down-data-leak-negotiation-sites/
The Conti ransomware operation has finally shut down its last public-facing infrastructure, consisting of two Tor servers used to leak data and negotiate with victims, closing the final chapter of the notorious cybercrime brand. [...] "

Autosummary: To make matters worse for the gang, other security researchers, and some suspect Ukrainian law enforcement, began doxing Conti/TrickBot members on Twitter and conversations, addresses, social media accounts, and more. "


Hackers Exploit Mitel VoIP Zero-Day in Likely Ransomware Attack

exploits ransomware
2022-06-24 https://thehackernews.com/2022/06/hackers-exploit-mitel-voip-zero-day-bug.html
A suspected ransomware intrusion against an unnamed target leveraged a Mitel VoIP appliance as an entry point to achieve remote code execution and gain initial access to the environment. The findings come from cybersecurity firm CrowdStrike, which traced the source of the attack to a Linux-based Mitel VoIP device sitting on the network perimeter, while also identifying a previously unknown "

Autosummary: "


Threat actors continue to exploit Log4Shell in VMware Horizon Systems

exploits ransomware
2022-06-24 https://securityaffairs.co/wordpress/132569/security/log4shell-ongoing-exploitation.html

The U.S. CISA and the Coast Guard Cyber Command (CGCYBER) warn of attacks exploiting the Log4Shell flaw in VMware Horizon servers. The U.S. Cybersecurity and Infrastructure Security Agency (CISA), along with the Coast Guard Cyber Command (CGCYBER), published a joint advisory to warn of hacking attempts exploiting the Log4Shell flaw in VMware Horizon servers to […]

The post Threat actors continue to exploit Log4Shell in VMware Horizon Systems appeared first on Security Affairs.

"

Autosummary: “CISA and the United States Coast Guard Cyber Command (CGCYBER) have released a joint Cybersecurity Advisory (CSA) to warn network defenders that cyber threat actors, including state-sponsored advanced persistent threat (APT) actors, have continued to exploit CVE-2021-44228 (Log4Shell) in VMware Horizon® and Unified Access Gateway (UAG) servers to obtain initial access to organizations that did not apply available patches.” reads the advisory. "


Mitel zero-day used by hackers in suspected ransomware attack

exploits ransomware
2022-06-24 https://www.bleepingcomputer.com/news/security/mitel-zero-day-used-by-hackers-in-suspected-ransomware-attack/
Hackers used a zero-day exploit on Linux-based Mitel MiVoice VOIP appliances for initial access in what is believed to be the beginning of a ransomware attack. [...] "

Autosummary: A Mitel zero-day RCE vulnerability The vulnerability lies in the Mitel Service Appliance component of MiVoice Connect, used in SA 100, SA 400, and Virtual SA, allowing an attacker to perform remote code execution (RCE) in the context of the Service Appliance. "


The Week in Ransomware - June 24th 2022 - Splinter Cells

exploits ransomware
2022-06-24 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-june-24th-2022-splinter-cells/
The Conti ransomware gang has finally ended their charade and turned off their Tor data leak and negotiation sites, effectively shutting down the operation. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @serghei, @jorntvdw, @struppigel, @Seifreed, @PolarToffee, @malwareforme, @VK_Intel, @BleepinComputer, @malwrhunterteam, @Ionut_Ilascu, @LawrenceAbrams, @DanielGallagher, @fwosar, @FourOctets, @billtoulas, @demonslay335, @CrowdStrike, @felipepayao, @y_advintel, @AdvIntel, @Secureworks, @GroupIB, @GossiTheDog, @juanbrodersen, @PogoWasRight, @pcrisk, @BrettCallow, and @Amigo_A_. "


Conti ransomware hacking spree breaches over 40 orgs in a month

exploits ransomware
2022-06-23 https://www.bleepingcomputer.com/news/security/conti-ransomware-hacking-spree-breaches-over-40-orgs-in-a-month/
The Conti cybercrime syndicate runs one of the most aggressive ransomware operations and has grown highly organized, to the point that affiliates were able to hack more than 40 companies in a little over a month. [...] "

Autosummary: “Conti’s increased activity and the data leak suggest that ransomware is no longer a game between average malware developers, but an illicit RaaS industry that gives jobs to thousands of cybercriminals worldwide with various specializations” - Ivan Pisarev, Head of Dynamic Malware Analysis Team at Group-IB’s Threat Intelligence team At the top of the ransomware game Conti is currently one of the top three ransomware gangs in terms of attack frequency, falling second after LockBit this year, as per data collected from the first quarter of 2022. "


Automotive hose manufacturer hit by ransomware, shuts down production control system

exploits ransomware
2022-06-23 https://www.helpnetsecurity.com/2022/06/23/nichirin-ransomware/

A US subsidiary of Nichirin Co., a Japan-based company manufacturing and selling automotive hoses and hose parts, has been hit with ransomware, which resulted in the shut down of the subsidiary’s network and production control system. What happened? According to a press release published by Nichirin Co. on Wednesday, the affected subsidiary is Texas-based NICHIRIN-FLEX U.S.A., which experienced “unauthorized access from the outside” on June 14, 2022, and resulted in their server(s?) getting infected with … More

The post Automotive hose manufacturer hit by ransomware, shuts down production control system appeared first on Help Net Security.

"

Autosummary: According to a press release published by Nichirin Co. on Wednesday, the affected subsidiary is Texas-based NICHIRIN-FLEX U.S.A., which experienced “unauthorized access from the outside” on June 14, 2022, and resulted in their server(s?) getting infected with ransomware. "


Automotive hose maker Nichirin hit by ransomware attack

exploits ransomware
2022-06-23 https://www.bleepingcomputer.com/news/security/automotive-hose-maker-nichirin-hit-by-ransomware-attack/
Nichirin-Flex U.S.A, a subsidiary of the Japanese car and motorcycle hose maker Nichirin, has been hit by a ransomware attack causing the company to take the network offline. [...] "

Autosummary: "


Chinese hackers use ransomware as decoy for cyber espionage

exploits ransomware
2022-06-23 https://www.bleepingcomputer.com/news/security/chinese-hackers-use-ransomware-as-decoy-for-cyber-espionage/
Two Chinese hacking groups conducting cyber espionage and stealing intellectual property from Japanese and western companies are deploying ransomware as a decoy to cover up their malicious activities. [...] "

Autosummary: C2 domain configured in the observed beacons (Secureworks) The activity and victimology of LockFile, AtomSilo, Rook, Night Sky, and Pandora are unsual compared to financially motivated ransomware operations, targeting a small number of victims over a brief period and then abandon the project altogether. "


Conti ransomware group’s pulse stops, but did it fake its own death?

exploits ransomware
2022-06-23 https://blog.malwarebytes.com/ransomware/2022/06/conti-ransomware-disappears-did-it-fake-its-own-death/

The leak site essential to the operation of Conti ransomware has disappeared, but everything may not be as it appears.

The post Conti ransomware group’s pulse stops, but did it fake its own death? appeared first on Malwarebytes Labs.

"

Autosummary: However, while anything that stops Conti from terrorising businesses, schools, and hospitals is welcome, the disappearance of its leak site is unlikely to make potential ransomware victims any safer, sadly.As our May ransomware report revealed, despite the noise it generated from its attacks on Costa Rica, Conti’s activity was significantly depressed in May, while the activity of gangs with alleged links to Conti increased, driven largely by the rise of BlackBasta. "


AA22-174A: Malicious Cyber Actors Continue to Exploit Log4Shell in VMware Horizon Systems

exploits ransomware
2022-06-23 https://us-cert.cisa.gov/ncas/alerts/aa22-174a
Original release date: June 23, 2022

Summary

Actions to take today:
• Install fixed builds, updating all affected VMware Horizon and UAG systems to the latest versions. If updates or workarounds were not promptly applied following VMware’s release of updates for Log4Shell in December 2021, treat all affected VMware systems as compromised.
• Minimize the internet-facing attack surface by hosting essential services on a segregated demilitarized (DMZ) zone, ensuring strict network perimeter access controls, and implementing regularly updated web application firewalls (WAFs) in front of public-facing services

The Cybersecurity and Infrastructure Security Agency (CISA) and United States Coast Guard Cyber Command (CGCYBER) are releasing this joint Cybersecurity Advisory (CSA) to warn network defenders that cyber threat actors, including state-sponsored advanced persistent threat (APT) actors, have continued to exploit CVE-2021-44228 (Log4Shell) in VMware Horizon® and Unified Access Gateway (UAG) servers to obtain initial access to organizations that did not apply available patches or workarounds.

Since December 2021, multiple threat actor groups have exploited Log4Shell on unpatched, public-facing VMware Horizon and UAG servers. As part of this exploitation, suspected APT actors implanted loader malware on compromised systems with embedded executables enabling remote command and control (C2). In one confirmed compromise, these APT actors were able to move laterally inside the network, gain access to a disaster recovery network, and collect and exfiltrate sensitive data.

This CSA provides the suspected APT actors’ tactics, techniques, and procedures (TTPs), information on the loader malware, and indicators of compromise (IOCs). The information is derived from two related incident response engagements and malware analysis of samples discovered on the victims’ networks.

CI "

Autosummary: The Cybersecurity and Infrastructure Security Agency (CISA) and United States Coast Guard Cyber Command (CGCYBER) are releasing this joint Cybersecurity Advisory (CSA) to warn network defenders that cyber threat actors, including state-sponsored advanced persistent threat (APT) actors, have continued to exploit CVE-2021-44228 (Log4Shell) in VMware Horizon® and Unified Access Gateway (UAG) servers to obtain initial access to organizations that did not apply available patches or workarounds. This CSA provides the suspected APT actors’ tactics, techniques, and procedures (TTPs), information on the loader malware, and indicators of compromise (IOCs). Log4Shell is a remote code execution vulnerability affecting the Apache® Log4j library and a variety of products using Log4j, such as consumer and enterprise services, websites, applications, and other products, including certain versions of VMware Horizon and UAG.Minimize the internet-facing attack surface by hosting essential services on a segregated demilitarized (DMZ) zone, ensuring strict network perimeter access controls, and implementing regularly updated web application firewalls (WAFs) in front of public-facing services Note: this advisory uses the MITRE ATT&CK for Enterprise framework, version 11.[T1021.001] to multiple other hosts in the production environment, including a security management server, a certificate server, a database containing sensitive law enforcement data, and a mail relay server. Note: the second threat actor group had access to the organization"s test and production environments, and on or around April 13, 2022, leveraged CVE-2022-22954 to implant the Dingo J-spy webshell. VMware made fixes available in December 2021 and confirmed exploitation in the wild on December 10, 2021.[1] Since December 2021, multiple cyber threat actor groups have exploited [T1190] Log4Shell on unpatched, public-facing VMware Horizon and UAG servers to obtain initial accessWhen executed, two randomly named *.tmp files are written to the disk at the location C:\Users\<USER>\AppData\Local\Temp\ and the embedded executable attempts to connect to hard-coded C2 server 192.95.20[.]8 over port 4443 , a non-standard port [TT571]. "


Cato Networks detects and interrupts ransomware with network-based ransomware protection

exploits ransomware
2022-06-22 https://www.helpnetsecurity.com/2022/06/22/cato-sase-cloud/

Cato Networks introduced network-based ransomware protection for the Cato SASE Cloud. Using heuristic algorithms and deep network insight, Cato detects and prevents the spread of ransomware across the enterprise without having to deploy endpoint agents. Infected machines are identified and immediately isolated for remediation. “Ransomware protection has become job one for every CISO and CIO, but too often enterprise defense strategies remain vulnerable whether by threat actors bypassing endpoint defenses or by manipulating insiders to … More

The post Cato Networks detects and interrupts ransomware with network-based ransomware protection appeared first on Help Net Security.

"

Autosummary: "


Mitigate Ransomware in a Remote-First World

exploits ransomware
2022-06-21 https://thehackernews.com/2022/06/mitigate-ransomware-in-remote-first.html
Ransomware has been a thorn in the side of cybersecurity teams for years. With the move to remote and hybrid work, this insidious threat has become even more of a challenge for organizations everywhere. 2021 was a case study in ransomware due to the wide variety of attacks, significant financial and economic impact, and diverse ways that organizations responded. These attacks should be seen as a "

Autosummary: If anything, these threat actors have made their operations an enterprise, creating scalable, repeatable, and profitable campaigns.Hybrid work has forced organizations to introduce a bring-your-own-device (BYOD) model, which means unmanaged personal devices have access to sensitive data.Because smartphones and tablets are used for both work and personal reasons, employees can be targeted through multiple apps such as SMS, social media platforms, and third party messaging apps. "


Office 365 Config Loophole Opens OneDrive, SharePoint Data to Ransomware Attack

exploits ransomware
2022-06-21 https://threatpost.com/office-365-opens-ransomware-attacks-on-onedrive-sharepoint/180010/
A reported a "potentially dangerous piece of functionality" allows an attacker to launch an attack on cloud infrastructure and ransom files stored in SharePoint and OneDrive. "

Autosummary: “In some cases, the attacker may exfiltrate the unencrypted files as part of a double extortion tactic, ” said researchers Microsoft Responds When asked, Microsoft commented “the configuration functionality for versioning settings within lists is working as intended,” according to Proofpoint. Those files, stored via “auto-save” and backed-up in the cloud, typically leave end users with the impression data is shielded from a ransomware attack. "


QNAP NAS devices hit by DeadBolt and ech0raix ransomware

exploits ransomware
2022-06-20 https://www.helpnetsecurity.com/2022/06/20/qnap-nas-deadbolt-ech0raix/

Taiwan-based QNAP Systems is warning consumers and organizations using their network-attached storage (NAS) appliances of a new DeadBolt ransomware campaign. There also appears to be a new ech0raix/QNAPCrypt campaign in progress, according to various sources, though QNAP is yet to comment on that. NAS devices are ideal targets NAS devices are mostly used by consumers and small-to-medium businesses to store, manage and share files and backups. This makes them a tempting target for criminals wielding … More

The post QNAP NAS devices hit by DeadBolt and ech0raix ransomware appeared first on Help Net Security.

"

Autosummary: Attackers generally focus on hitting QNAP and Synology NAS devices, but those by other manufacturers (Western Digital, Seagate, Zyxel, etc.) are also occasionally targeted. "


Do You Have Ransomware Insurance? Look at the Fine Print

exploits ransomware
2022-06-20 https://thehackernews.com/2022/06/do-you-have-ransomware-insurance-look.html
Insurance exists to protect the insured party against catastrophe, but the insurer needs protection so that its policies are not abused – and that"s where the fine print comes in. However, in the case of ransomware insurance, the fine print is becoming contentious and arguably undermining the usefulness of ransomware insurance. In this article, we"ll outline why, particularly given the current "

Autosummary: The claim ended up on court a short while later, but it took over three years for the court to come to a decision – ruling in Merck"s favor on this occasion, stating that Ace American, like many other insurers, has not sufficiently changed the wording in its policy exclusions to ensure that the insured – Merck – fully understood that a cyberattack launched in the context of an act of war would mean that the policy coverage is not valid. However, when the company tried to claim on its USD 1.75bn "all-risk" insurance policy, Ace American initially refused to pay the claim, arguing that it was subject to an "Acts of War" exclusion clause. When an organization suffers from a ransomware attack, how does the insurer – or the claimant – prove that a specific organization was behind an attack, and by consequence, what the motivation for the attack was – e.g. war? In this article, we"ll outline why, particularly given the current climate, war exclusion clauses are increasingly rendering ransomware insurance of reduced value – and why your organization should focus on protecting itself instead. "


Experts warn of a new eCh0raix ransomware campaign targeting QNAP NAS

exploits ransomware
2022-06-19 https://securityaffairs.co/wordpress/132410/cyber-crime/ech0raix-ransomware-attacks.html

Experts warn of a new ech0raix ransomware campaign targeting QNAP Network Attached Storage (NAS) devices. Bleeping Computer and MalwareHunterTeam researchers, citing user reports and sample submissions on the ID Ransomware platform, warn of a new wave of ech0raix ransomware attacks targeting QNAP Network Attached Storage (NAS) devices. The ransomware, tracked by Intezer as “QNAPCrypt” and “eCh0raix” by Anomali, is […]

The post Experts warn of a new eCh0raix ransomware campaign targeting QNAP NAS appeared first on Security Affairs.

"

Autosummary: Please vote for Security Affairs and Pierluigi Paganini in every category that includes them (e.g. sections “The Underdogs – Best Personal (non-commercial) Security Blog” and “The Tech Whizz – Best Technical Blog”) To nominate, please visit: https://docs.google.com/forms/d/e/1FAIpQLSdNDzjvToMSq36YkIHQWwhma90SR0E9rLndflZ3Cu_gVI2Axw/viewform Follow me on Twitter: @securityaffairs and Facebook Pierluigi Paganini (SecurityAffairs – hacking, QNAP) "


Atlassian Confluence Flaw Being Used to Deploy Ransomware and Crypto Miners

exploits ransomware
2022-06-18 https://thehackernews.com/2022/06/atlassian-confluence-flaw-being-used-to.html
A recently patched critical security flaw in Atlassian Confluence Server and Data Center products is being actively weaponized in real-world attacks to drop cryptocurrency miners and ransomware payloads. In at least two of the Windows-related incidents observed by cybersecurity vendor Sophos, adversaries exploited the vulnerability to deliver Cerber ransomware and a crypto miner called z0miner "

Autosummary: "


QNAP NAS devices targeted by surge of eCh0raix ransomware attacks

exploits ransomware
2022-06-18 https://www.bleepingcomputer.com/news/security/qnap-nas-devices-targeted-by-surge-of-ech0raix-ransomware-attacks/
This week a new series of ech0raix ransomware has started targeting vulnerable QNAP Network Attached Storage (NAS) devices according to user reports and sample submissions on the ID-Ransomware platform. [...] "

Autosummary: "


Cyber criminals continue to target and exploit people

exploits ransomware
2022-06-17 https://www.helpnetsecurity.com/2022/06/17/user-risk/

Proofpoint unveiled its annual Human Factor report, which provides a comprehensive examination of the three main facets of user risk — vulnerability, attacks, and privilege — and how threat actors continue their ceaseless creativity as they exploit the many opportunities presented by people. The report dives deep into user risk, drawing on data and insight from a year’s worth of research, covering threats detected, mitigated, and resolved across one of the largest datasets in cybersecurity. … More

The post Cyber criminals continue to target and exploit people appeared first on Help Net Security.

"

Autosummary: The report dives deep into user risk, drawing on data and insight from a year’s worth of research, covering threats detected, mitigated, and resolved across one of the largest datasets in cybersecurity. "


QNAP "thoroughly investigating" new DeadBolt ransomware attacks

exploits ransomware
2022-06-17 https://www.bleepingcomputer.com/news/security/qnap-thoroughly-investigating-new-deadbolt-ransomware-attacks/
Network-attached storage (NAS) vendor QNAP once again warned customers on Friday to secure their devices against a new campaign of attacks pushing DeadBolt ransomware. [...] "

Autosummary: DeadBolt ransomware As seen during previous attacks targeting QNAP NAS devices in late January and hitting thousands of victims, DeadBolt ransomware hijacks the device"s login page to display a screen stating, "WARNING: "


QNAP warns of new DeadBolt ransomware attack locking up NAS devices

exploits ransomware
2022-06-17 https://www.bitdefender.com/blog/hotforsecurity/qnap-warns-of-new-deadbolt-ransomware-attack-locking-up-nas-devices/
Owners of NAS drives manufactured by QNAP have been advised that the company is "thoroughly investigating" reports that a new variant of the DeadBolt ransomware is targeting devices, locking up data and demanding victims pay a fee to extortionists. Read more in my article on the Hot for Security blog. "

Autosummary: "


Which stolen data are ransomware gangs most likely to disclose?

exploits ransomware
2022-06-17 https://www.helpnetsecurity.com/2022/06/17/ransomware-data-disclosed/

If your organization gets hit by a ransomware gang that has also managed to steal company data before hitting the “encrypt” button, which types of data are more likely to end up being disclosed as you debate internally on whether you should pay the ransomware gang off? Rapid7 analysts analyzed 161 data disclosures performed by ransomware gangs using the double extortion approach between April 2020 and February 2022, and found that: The most commonly leaked … More

The post Which stolen data are ransomware gangs most likely to disclose? appeared first on Help Net Security.

"

Autosummary: Files containing intellectual property (e.g., trade secrets, research data, etc.) are rarely disclosed (12%) by ransomware gangs, but if the organization is part of the pharmaceutical industry, the risk of IP data being disclosed is considerably higher (43%), “likely due to the high value placed on research and development within this industry.” "


The Week in Ransomware - June 17th 2022 - Have I Been Ransomed?

exploits ransomware
2022-06-17 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-june-17th-2022-have-i-been-ransomed/
Ransomware operations are constantly evolving their tactics to pressure victims to pay. For example, this week, we saw a new extortion tactic come into play with the creation of dedicated websites to extort victims with searchable data. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @serghei, @jorntvdw, @malwareforme, @VK_Intel, @struppigel, @DanielGallagher, @PolarToffee, @LawrenceAbrams, @Ionut_Ilascu, @fwosar, @billtoulas, @BleepinComputer, @Seifreed, @malwrhunterteam, @FourOctets, @demonslay335, @pcrisk, @proofpoint, @PogoWasRight, @BrettCallow, @Unit42_Intel, and @Amigo_A_. "


Microsoft Office 365 feature can help cloud ransomware attacks

exploits ransomware
2022-06-16 https://www.bleepingcomputer.com/news/security/microsoft-office-365-feature-can-help-cloud-ransomware-attacks/
Security researchers are warning that threat actors could hijack Office 365 accounts to encrypt for a ransom the files stored in SharePoint and OneDrive services that companies use for cloud-based collaboration, document management and storage. [...] "

Autosummary: Versioning setting on document lists (Microsoft) With a file version limit set to “1,” when the attacker encrypts or edits the file twice, the original document will no longer be available through OneDrive and cannot be restored. "


Malicious apps continue to spread through the Google Play Store

ransomware
2022-06-16 https://securityaffairs.co/wordpress/132305/malware/malware-google-play-store.html

Researchers at antivirus firm Dr. Web discovered malware in the Google Play Store that was downloaded two million times. An investigation conducted by the antivirus firm Dr. Web in May resulted in the discovery of multiple adware and information-stealing malware on the official Google Play Store. However, the experts warn that info-stealing Trojans are the […]

The post Malicious apps continue to spread through the Google Play Store appeared first on Security Affairs.

"

Autosummary: Please vote for Security Affairs and Pierluigi Paganini in every category that includes them (e.g. sections “The Underdogs – Best Personal (non-commercial) Security Blog” and “The Tech Whizz – Best Technical Blog”) To nominate, please visit: https://docs.google.com/forms/d/e/1FAIpQLSdNDzjvToMSq36YkIHQWwhma90SR0E9rLndflZ3Cu_gVI2Axw/viewform Follow me on Twitter: @securityaffairs and Facebook Pierluigi Paganini (SecurityAffairs – hacking, malware) "


BlackCat Ransomware Gang Targeting Unpatched Microsoft Exchange Servers

exploits ransomware
2022-06-16 https://thehackernews.com/2022/06/blackcat-ransomware-gang-targeting.html
Microsoft is warning that the BlackCat ransomware crew is leveraging exploits for unpatched Exchange server vulnerabilities to gain access to targeted networks. Upon gaining an entry point, the attackers swiftly moved to gather information about the compromised machines, followed by carrying out credential theft and lateral movement activities, before harvesting intellectual property and "

Autosummary: "


A Microsoft Office 365 Feature Could Help Ransomware Hackers Hold Cloud Files Hostage

exploits ransomware
2022-06-16 https://thehackernews.com/2022/06/a-microsoft-office-365-feature-could.html
A "dangerous piece of functionality" has been discovered in Microsoft 365 suite that could be potentially abused by a malicious actor to ransom files stored on SharePoint and OneDrive and launch attacks on cloud infrastructure. The cloud ransomware attack makes it possible to launch file-encrypting malware to "encrypt files stored on SharePoint and OneDrive in a way that makes them unrecoverable "

Autosummary: To mitigate such attacks, it"s recommended to enforce a strong password policy, mandate multi-factor authentication (MFA), prevent large-scale data downloads to unmanaged devices, and maintain periodic external backups of cloud files with sensitive data. "


BlackCat Ransomware affiliates target unpatched Microsoft Exchange servers

exploits ransomware
2022-06-16 https://securityaffairs.co/wordpress/132343/hacking/blackcat-ransomware-targets-unpatched-microsoft-exchange.html

The BlackCat ransomware gang is targeting unpatched Exchange servers to compromise target networks, Microsoft warns. Microsoft researchers have observed BlackCat ransomware gang targeting unpatched Exchange servers to compromise organizations worldwide. The compromise of Exchange servers allows threat actors to access the target networks, perform internal reconnaissance and lateral movement activities, and steal sensitive documents before encrypting them. “For example, […]

The post BlackCat Ransomware affiliates target unpatched Microsoft Exchange servers appeared first on Security Affairs.

"

Autosummary: In addition, at least two known affiliates are now adopting BlackCat: DEV-0237 (known for previously deploying Ryuk, Conti, and Hive) and DEV-0504 (previously deployed Ryuk, REvil, BlackMatter, and Conti).” “For discovered devices, the attackers attempted to navigate to various network shares and used the Remote Desktop client (mstsc.exe) to sign into these devices, once again using the compromised account credentials.” continues the analysis. "


Why do organizations need to prioritize ransomware preparedness?

exploits ransomware
2022-06-14 https://www.helpnetsecurity.com/2022/06/14/reported-ransomware-attack/

Hitachi Vantara and Enterprise Strategy Group (ESG) announced the findings of a survey of more than 600 IT and cybersecurity professionals, which revealed that 79% respondents reported a ransomware attack at their company within the last year. More troubling for organizations is the degree with which these attacks are successful. The survey found that 73% report that they have been financially or operationally impacted by these attacks. As noted in the report, “Every lost bit … More

The post Why do organizations need to prioritize ransomware preparedness? appeared first on Help Net Security.

"

Autosummary: "


Once is never enough: The need for continuous penetration testing

ransomware
2022-06-14 https://www.helpnetsecurity.com/2022/06/14/need-for-continuous-penetration-testing/

If you Google “How often should I do penetration testing?”, the first answer that pops up is “once a year.” Indeed, even industry-leading standards like PCI-DSS dictate that external penetration testing be conducted annually (or after significant changes to infrastructure or applications), while internal penetration testing takes place annually, with segmentation testing occurring every six months. Yet today’s cybercriminals don’t work on annual schedules. They don’t wait until pen testing time rolls around and the … More

The post Once is never enough: The need for continuous penetration testing appeared first on Help Net Security.

"

Autosummary: Indeed, even industry-leading standards like PCI-DSS dictate that external penetration testing be conducted annually (or after significant changes to infrastructure or applications), while internal penetration testing takes place annually, with segmentation testing occurring every six months.When a new API is connected, a new server added, or a new version released – that snapshot is no longer valid, even if the next round of pen testing is a year away. "


Hello XD Ransomware Installing Backdoor on Targeted Windows and Linux Systems

exploits ransomware
2022-06-13 https://thehackernews.com/2022/06/hello-xd-ransomware-installing-backdoor.html
Windows and Linux systems are being targeted by a ransomware variant called HelloXD, with the infections also involving the deployment of a backdoor to facilitate persistent remote access to infected hosts. "Unlike other ransomware groups, this ransomware family doesn"t have an active leak site; instead it prefers to direct the impacted victim to negotiations through Tox chat and onion-based "

Autosummary: " Unit 42 said it linked the likely Russian developer behind HelloXD — who goes by the online aliases x4k, L4ckyguy, unKn0wn, unk0w, _unkn0wn, and x4kme — to further malicious activities such as selling proof-of-concept (PoC) exploits and custom Kali Linux distributions by piecing together the actor"s digital trail. "


HelloXD Ransomware operators install MicroBackdoor on target systems

exploits ransomware
2022-06-13 https://securityaffairs.co/wordpress/132207/malware/helloxd-ransomware-installs-microbackdoor.html

Experts observed the HelloXD ransomware deploying a backdoor to facilitate persistent remote access to infected hosts. The HelloXD ransomware first appeared in the threat landscape on November 30, 2021, it borrows the code from Babuk ransomware, which is available in Russian-speaking hacking forums since September 2021. Unlike other ransomware operations, this ransomware gang doesn’t use a […]

The post HelloXD Ransomware operators install MicroBackdoor on target systems appeared first on Security Affairs.

"

Autosummary: The analysis of the MicroBackdoor sample revealed an embedded IP address in the configuration, the IP belongs to a threat actor that is likely the developer: x4k (aka L4ckyguy, unKn0wn, unk0w, _unkn0wn, and x4kme). "


Microsoft: Exchange servers hacked to deploy BlackCat ransomware

exploits ransomware
2022-06-13 https://www.bleepingcomputer.com/news/security/microsoft-exchange-servers-hacked-to-deploy-blackcat-ransomware/
Microsoft says BlackCat ransomware affiliates are now attacking Microsoft Exchange servers using exploits targeting unpatched vulnerabilities. [...] "

Autosummary: Two weeks after the initial compromise using an unpatched Exchange server as an entry vector, the threat actor deployed BlackCat ransomware payloads across the network via PsExec. "While the common entry vectors for these threat actors include remote desktop applications and compromised credentials, we also saw a threat actor leverage Exchange server vulnerabilities to gain target network access," the Microsoft 365 Defender Threat Intelligence Team said. "


Hello XD ransomware now drops a backdoor while encrypting

exploits ransomware
2022-06-12 https://www.bleepingcomputer.com/news/security/hello-xd-ransomware-now-drops-a-backdoor-while-encrypting/
Cybersecurity researchers report increased activity of the Hello XD ransomware, whose operators are now deploying an upgraded sample featuring stronger encryption. [...] "

Autosummary: Samples of X4KME online presence (Unit 42) Additionally, the same hacker has posted on forums to offer proof-of-concept (PoC) exploits, crypter services, custom Kali Linux distributions, and malware-hosting and distribution services. "


Confluence servers hacked to deploy AvosLocker, Cerber2021 ransomware

exploits ransomware
2022-06-11 https://www.bleepingcomputer.com/news/security/confluence-servers-hacked-to-deploy-avoslocker-cerber2021-ransomware/
Ransomware gangs are now targeting a recently patched and actively exploited remote code execution (RCE) vulnerability affecting Atlassian Confluence Server and Data Center instances for initial access to corporate networks. [...] "

Autosummary: Widely exploited in the wild Since cybersecurity firm Volexity disclosed CVE-2022-26134 as an actively exploited zero-day bug last week, CISA has also ordered federal agencies to mitigate the flaw by blocking all internet traffic to Confluence servers on their networks. "


Vice Society ransomware gang adds the Italian City of Palermo to its data leak site

exploits government ransomware
2022-06-10 https://securityaffairs.co/wordpress/132122/cyber-crime/city-of-palermo-vice-society-ransomware.html

The Vice Society group has claimed responsibility for the ransomware attack that hit the Italian city of Palermo forcing the IT admins to shut down its infrastructure. The Vice Society ransomware group has claimed responsibility for the recent cyber attack that hit the city of Palermo in the South of Italy. In response to the […]

The post Vice Society ransomware gang adds the Italian City of Palermo to its data leak site appeared first on Security Affairs.

"

Autosummary: Sispi (Palermo Innovazione System), which is the municipal company that is responsible for the technical management of the municipal IT and telematic system of the Municipality of Palermo, confirmed the ransomware attack a few days later, but at this time it doesn’t confirm the data breach. "


Experts spotted a new variant of the Cuba Ransomware with optimized infection techniques

exploits ransomware
2022-06-10 https://securityaffairs.co/wordpress/132134/malware/cuba-ransomware-new-variant.html

The Cuba ransomware operators are back and employed a new version of its malware in recent attacks. Cuba ransomware has been active since at least January 2020. Its operators have a data leak site, where they post exfiltrated data from their victims who refused to pay the ransom. The ransomware encrypts files on the targeted systems […]

The post Experts spotted a new variant of the Cuba Ransomware with optimized infection techniques appeared first on Security Affairs.

"

Autosummary: Linkedin Share this: Email Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


The Week in Ransomware - June 10th 2022 - Targeting Linux

exploits ransomware
2022-06-10 https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-june-10th-2022-targeting-linux/
It has been relatively quiet this week with many companies and researchers at the RSA conference. However, we still had some interesting ransomware reports released this week. [...] "

Autosummary: Contributors and those who provided new ransomware information and stories this week include: @billtoulas, @VK_Intel, @demonslay335, @DanielGallagher, @Ionut_Ilascu, @LawrenceAbrams, @fwosar, @malwrhunterteam, @jorntvdw, @malwareforme, @FourOctets, @serghei, @PolarToffee, @Seifreed, @struppigel, @BleepinComputer, @TrendMicro, @uptycs, @NCCGroupInfosec, @Intel_by_KELA, @y_advintel, @Avast, @BrettCallow, @ValeryMarchive, and @pcrisk. "


BlackBasta is the latest ransomware to target ESXi virtual machines on Linux

exploits ransomware
2022-06-09 https://blog.malwarebytes.com/ransomware/2022/06/blackbasta-is-the-latest-ransomware-to-target-esxi-virtual-machines-on-linux/

BlackBasta, a newish ransomware group that is somehow linked to Conti, has a new Linux variant of its malware that targets VMware ESXi virtual machines.

The post BlackBasta is the latest ransomware to target ESXi virtual machines on Linux appeared first on Malwarebytes Labs.

"

Autosummary: (Source: Uptycs) A section of the ransom note reads: Your data are stolen and encrypted The data will be published on TOR website if you do not pay the ransom You can contact us and decrypt one file for free on this TOR site (you should download and install TOR browser first https://torproject.org) {URL redacted} Protect your Linux ESXi VM against ransomware attacks Vincent Bariteau, Threat Intelligence Support Analyst at Malwarebytes, recommends organizations follow these best practices to protect their Linux servers against ransomware attacks if they’re using ESXi VM: Harden the SSH (Secure Shell) access to allow only a specific user to use it. "


Vice Society ransomware claims attack on Italian city of Palermo

exploits government ransomware
2022-06-09 https://www.bleepingcomputer.com/news/security/vice-society-ransomware-claims-attack-on-italian-city-of-palermo/
The Vice Society ransomware group has claimed responsibility for the recent cyber attack on the city of Palermo in Italy, which has caused a large-scale service outage. [...] "

Autosummary: "


Bizarre ransomware sells decryptor on Roblox Game Pass store

exploits ransomware
2022-06-09 https://www.bleepingcomputer.com/news/security/bizarre-ransomware-sells-decryptor-on-roblox-game-pass-store/
A new ransomware is taking the unusual approach of selling its decryptor on the Roblox gaming platform using the service"s in-game Robux currency. [...] "

Autosummary: Files encrypted by the Chaos ransomware variant Source: BleepingComputer What makes the new WannaFriendMe ransomware stand out is that instead of demanding cryptocurrency as a ransom payment, it requires victims to purchase a decryptor from Roblox"s Game Pass store using Robux, as can be read in the ransom note below: ----- "


Roblox Game Pass store used to sell ransomware decryptor

exploits ransomware
2022-06-09 https://www.bleepingcomputer.com/news/security/roblox-game-pass-store-used-to-sell-ransomware-decryptor/
A new ransomware is taking the unusual approach of selling its decryptor on the Roblox gaming platform using the service"s in-game Robux currency. [...] "

Autosummary: Files encrypted by the Chaos ransomware variant Source: BleepingComputer What makes the new WannaFriendMe ransomware stand out is that instead of demanding cryptocurrency as a ransom payment, it requires victims to purchase a decryptor from Roblox"s Game Pass store using Robux, as can be read in the ransom note below: ----- "


Qbot – known channel for ransomware – delivered via phishing and Follina exploit

financial exploits ransomware
2022-06-08 https://www.helpnetsecurity.com/2022/06/08/qbot-follina-exploit/

More than a week has passed since Microsoft acknowledged the existence of the “Follina” vulnerability (CVE-2022-30190), after reports of it being exploited in the wild began to crop up here and there. Since then, other state-backed threat actors have started exploiting it, but now one of the most active Qbot (QakBot) malware affiliates has also been spotted leveraging Follina. Archive contains an IMG with a Word doc, shortcut file, and DLL. The LNK will execute … More

The post Qbot – known channel for ransomware – delivered via phishing and Follina exploit appeared first on Help Net Security.

"

Autosummary: Match following filename pattern [0-9]{8}\_[0-9]{6}.htmlhttps://t.co/xaKa60O3hW pic.twitter.com/L2MQ8vMfyQ — Ankit Anubhav (@ankit_anubhav) June 8, 2022 Follina exploitation leads to Qbot installation Setting aside for a moment the fact that Qbot is an effective information stealer and backdoor in its own right, this latest development should worry most organizations, as a variety of Ransomware-as-a-Service (RaaS) operators use Qbot to secure a foothold into corporate networks before deploying ransomware. "


Paying Ransomware Paints Bigger Bullseye on Target’s Back

exploits ransomware
2022-06-08 https://threatpost.com/paying-ransomware-bullseye-back/179915/
Ransomware attackers often strike targets twice, regardless of whether the ransom was paid. "

Autosummary: “The fact that ransomware gangs strike so quickly a second and third time isn’t surprising, because they will try to profit in any possible way,” wrote Bill Keeler, senior director of global public relations at Cybereason, in a written exchange with Threatpost. "


Black Basta Ransomware Teams Up with Malware Stalwart Qbot

exploits ransomware
2022-06-08 https://threatpost.com/black-basta-ransomware-qbot/179909/
The novel cybercriminal group tapped the ever-evolving info-stealing trojan to move laterally on a network in a recent attack, researchers have found. "

Autosummary: Black Basta, a ransomware group that emerged in April, leveraged Qbot, (a.k.a. Quakbot), to move laterally on a compromised network, researchers from security consulting firm NCC Group wrote in a blog post published this week. Once it’s deployed, Black Basta ransomware itself, like many ransomware variants, doesn’t encrypt the entire file, researchers found. "


Black Basta ransomware now supports encrypting VMware ESXi servers

exploits ransomware
2022-06-08 https://securityaffairs.co/wordpress/132037/hacking/black-basta-ransomware-vmware-esxi.html

Black Basta ransomware gang implemented a new feature to encrypt VMware ESXi virtual machines (VMs) running on Linux servers. The Black Basta ransomware gang now supports encryption of VMware ESXi virtual machines (VMs) running on Linux servers. Researchers from Uptycs first reported the discovery of the new Black Basta ransomware variant that supports encryption of […]

The post Black Basta ransomware now supports encrypting VMware ESXi servers appeared first on Security Affairs.

"

Autosummary: "


Cuba ransomware returns to extorting victims with updated encryptor

exploits ransomware
2022-06-08 https://www.bleepingcomputer.com/news/security/cuba-ransomware-returns-to-extorting-victims-with-updated-encryptor/
The Cuba ransomware operation has returned to regular operations with a new version of its malware found used in recent attacks. [...] "

Autosummary: While the updates to Cuba ransomware did not change much in terms of overall functionality, we have reason to believe that the updates aim to optimize its execution, minimize unintended system behavior, and provide technical support to the ransomware victims if they choose to negotiate. "


Linux version of Black Basta ransomware targets VMware ESXi servers

exploits ransomware
2022-06-07 https://www.bleepingcomputer.com/news/security/linux-version-of-black-basta-ransomware-targets-vmware-esxi-servers/
Black Basta is the latest ransomware gang to add support for encrypting VMware ESXi virtual machines running on enterprise Linux servers. [...] "

Autosummary: Emsisoft CTO Fabian Wosar has previously told BleepingComputer that other ransomware gangs (besides the ones we reported on), including Babuk, RansomExx/Defray, Mespinoza, GoGoogle, Snatch, PureLocker, and DarkSide, have also developed and used their own Linux encryptors. "


Evil Corp Cybercrime Group Shifts to LockBit Ransomware to Evade Sanctions

exploits ransomware
2022-06-07 https://thehackernews.com/2022/06/evil-corp-cybercrime-group-shifts-to.html
The threat cluster dubbed UNC2165, which shares numerous overlaps with a Russia-based cybercrime group known as Evil Corp, has been linked to multiple LockBit ransomware intrusions in an attempt to get around sanctions imposed by the U.S. Treasury in December 2019. "These actors have shifted away from using exclusive ransomware variants to LockBit — a well-known ransomware as a service (RaaS) — "

Autosummary: Mandiant said it noted further similarities between UNC2165 and an Evil Corp-connected cyber espionage activity tracked by Swiss cybersecurity firm PRODAFT under the name SilverFish aimed at government entities and Fortune 500 companies in the E.U and the U.S. A successful initial compromise is followed by a string of actions as part of the attack lifecycle, including privilege escalation, internal reconnaissance, lateral movement, and maintaining long-term remote access, before delivering the ransomware payloads. "


Evil Corp gang starts using LockBit Ransomware to evade sanctions

exploits ransomware
2022-06-07 https://securityaffairs.co/wordpress/132031/cyber-crime/evil-corp-lockbit-ransomware.html

Mandiant researchers associate multiple LockBit ransomware attacks with the notorious Evil Corp Cybercrime Group. Mandiant researchers have investigated multiple LOCKBIT ransomware attacks that have been attributed to the financially motivated threat actor UNC2165. The researchers also noticed that the group shares numerous overlaps with the cybercrime gang Evil Corp. The UNC2165 group has been active since at […]

The post Evil Corp gang starts using LockBit Ransomware to evade sanctions appeared first on Security Affairs.

"

Autosummary: Linkedin Share this: Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


Black Basta ransomware operators leverage QBot for lateral movements

exploits ransomware
2022-06-07 https://securityaffairs.co/wordpress/132018/hacking/black-basta-ransomware-qbot.html

The QBot malware operation has partnered with Black Basta ransomware group to target organizations worldwide. Researchers from NCC Group spotted a new partnership in the threat landscape between the Black Basta ransomware group and the QBot malware operation. Black Basta has been active since April 2022, like other ransomware operations, it implements a double-extortion attack […]

The post Black Basta ransomware operators leverage QBot for lateral movements appeared first on Security Affairs.

"

Autosummary: Linkedin Share this: Twitter Print LinkedIn Facebook More Tumblr Pocket Share On "


RSA 2022: Prometheus ransomware’s flaws inspired researchers to try to build a near-universal decryption tool

exploits ransomware
2022-06-06 https://blog.malwarebytes.com/security-world/2022/06/rsa-2022-prometheus-ransomwares-flaws-inspired-researchers-to-try-to-build-a-near-universal-decryption-tool/

Prometheus ransomware contained a weak random number generator that inspired researchers to try and build a one-size-fits-all decryptor.

The post RSA 2022: Prometheus ransomware’s flaws inspired researchers to try to build a near-universal decryption tool appeared first on Malwarebytes Labs.

"

Autosummary: Prometheus—a ransomware build based on Thanos that locked up victims’ computers in the summer of 2021—included a major “vulnerability” that led security researchers at IBM to try and build a one-size-fits-all ransomware decryptor that could work against multiple ransomware variants, including Prometheus, AtomSilo, LockFile, Bandana, Chaos, and PartyTicket. "


Lockbit ransomware gang claims to have hacked cybersecurity giant Mandiant

exploits ransomware
2022-06-06 https://securityaffairs.co/wordpress/132011/cyber-crime/lockbit-claims-mandiant-hack.html

LockBit ransomware gang claims to have hacked the cybersecurity firm Mandiant, which is investigating the alleged security breach. Today the LockBit ransomware gang has added the cybersecurity firm Mandiant to the list of victims published on its darkweb leak site. Mandiant is investigating the claims of the ransomware gang, the cybercrime group declared to have […]

The post Lockbit ransomware gang claims to have hacked cybersecurity giant Mandiant appeared first on Security Affairs.

"

Autosummary: "


Conti Leaks Reveal Ransomware Gang"s Interest in Firmware-based Attacks

exploits ransomware
2022-06-03 https://thehackernews.com/2022/06/conti-leaks-reveal-ransomware-gangs.html
An analysis of leaked chats from the notorious Conti ransomware group earlier this year has revealed that the syndicate has been working on a set of firmware attack techniques that could offer a path to accessing privileged code on compromised devices. "Control over firmware gives attackers virtually unmatched powers both to directly cause damage and to enable other long-term strategic goals," "

Autosummary: "


Old Hacks Die Hard: Ransomware, Social Engineering Top Verizon DBIR Threats – Again

exploits ransomware
2022-06-03 https://threatpost.com/old-hacks-die-hard-ransomware-social-engineering-top-verizon-dbir-threats-again/179864/
Deja-Vu data from this year"s DBIR report feels like we are stuck in the movie "Groundhog Day." "

Autosummary: According to Verizon, 82% of this year’s data breaches involved the “human element” – “the Use of stolen credentials, Phishing, Misuse, or simply an Error.” In general, the results of DBIR merely confirm well-established trends, such as the growing threats of ransomware – up 13% this year – and the inescapability of the “human element”, which was tied to 82% of all breaches. "


Evil Corp Pivots LockBit to Dodge U.S. Sanctions

ransomware
2022-06-03 https://threatpost.com/evil-corp-pivots-to-lockbit-to-dodge-u-s-sanctions/179858/
The cybercriminal group is distancing itself from its previous branding by shifting tactics and tools once again in an aim to continue to profit from its nefarious activity. "

Autosummary: “For cybercriminals, it’s a similar concept,” observed James McQuiggan, security awareness advocate at security firm KnowBe4, said in an email to Threatpost. "


Researchers Demonstrate Ransomware for IoT Devices That Targets IT and OT Networks

exploits ransomware
2022-06-02 https://thehackernews.com/2022/06/researchers-demonstrate-ransomware-for.html
As ransomware infections have evolved from purely encrypting data to schemes such as double and triple extortion, a new attack vector is likely to set the stage for future campaigns. Called Ransomware for IoT or R4IoT by Forescout, it"s a "novel, proof-of-concept ransomware that exploits an IoT device to gain access and move laterally in an IT [information technology] network and impact the OT [ "

Autosummary: "


Cybercriminals Expand Attack Radius and Ransomware Pain Points

exploits ransomware
2022-06-02 https://threatpost.com/criminals-expand-attack-radius/179832/
Melissa Bischoping, security researcher with Tanium and Infosec Insiders columnist, urges firms to consider the upstream and downstream impact of "triple extortion" ransomware attacks. "

Autosummary: Diligence & Awareness The most important takeaway from this ransomware evolution is that organizations with business connections to a breached organization, such as the ADA in this scenario, should be closely monitoring official update channels, identifying what (if any) of their own data may be at risk, and focus on threat-informed defensive measures.When a compromise takes place, the opportunity for “pay-for-decrypt” profits, as well as data or credential/access resale, leads to double- or triple-extortion ransomware. Facing the Future With the evolution of the strategy and tactics used by ransomware actors, it is essential that organizations have a big-picture perspective for defense, detection, and response and recovery. In May of 2021, Ireland’s public health system, the Health Service Executive, was victimized by a ransomware attack that had significant reverberations.” "


Airline passengers left stranded after ransomware attack

exploits ransomware
2022-05-25 https://www.bitdefender.com/blog/hotforsecurity/airline-passengers-left-stranded-after-ransomware-attack/
An Indian airline says that an "attempted ransomware attack" against its IT infrastructure caused flights to be delayed or canceled, and left passengers stranded. Read more in my article on the Hot for Security blog. "

Autosummary: "


The downside of ‘debugging’ ransomware

exploits ransomware
2022-05-16 https://www.welivesecurity.com/2022/05/16/downside-debugging-ransomware/

The decision to release a ransomware decryptor involves a delicate balancing act between helping victims recover their data and alerting criminals to errors in their code

The post The downside of ‘debugging’ ransomware appeared first on WeLiveSecurity

"

Autosummary: These decisions are based on a careful assessment of many factors, such as how prolific the ransomware is, its severity, how quickly the ransomware authors patch coding bugs and flaws in their own software, and so forth. Dealing with ransomware, both its operators and the ransomware code itself, is a tricky process, and it is often a game of chess that can take weeks or months or even years to play out as the good guys battle the bad guys.They can recommend, assist with the process of incident response, and perhaps, send their support, but that is also reactive and offers little comfort to a freshly gutted business. "


US college set to permanently close after 157 years, following ransomware attack

exploits ransomware
2022-05-11 https://www.bitdefender.com/blog/hotforsecurity/us-college-set-to-permanently-close-after-157-years-following-ransomware-attack/
A predominantly Black college, based in Illinois, USA, is closing its doors after 157 years - citing the challenges it faced due to the Coronavirus pandemic, and the aftermath of a ransomware attack. Read more in my article on the Hot for Security blog. "

Autosummary: Lincoln College explained that it had managed to survive multiple catastrophes and challenges, including economic crises, a major campus fire, the Spanish flu epidemic of 1918, the Great Depression, World War II, the 2008 global financial crisis, but this time it was different. "