News & Updates

Make them pay: Hackers devise new tactics to ensure ransomware payment

Ransomware remains one of the biggest cyber threats that organizations and governments continue to face. However, hackers are engineering new ways to extract ransom from their victims as organizations take a conscious call to decline ransom payment demands.

With the fall of the most notorious ransomware gang Conti in May 2022, it was assumed that ransomware attacks would see a major decline. However, Tenable found that 35.5% of breaches in 2022 were the result of a ransomware attack, a minor 2.5% decrease from 2021. Similarly, in the fourth quarter of 2022 ransomware victim count declined by 5.1% versus the third quarter, according to Trend Micro.

To read this article in full, please click here

News & Updates

Dutch Hacker Steals Data from Company, Blackmails Them and Gets Arrested the Next Day

Authorities arrested a hacker in Purmerend, Netherlands on accusations that he
stole data on hundreds of thousands of customers from a company then tried to
blackmail the firm by threatening to publish the information.

Theft of information from computer systems usually follows ransomware attacks,
but criminals sometimes only try to exfiltrate data. According to the police
press release, the attacker hit a Haarlem-based company, stealing information on
hundreds of thousands of customers.

“The p

Cybersecurity Tools

Warning! New DDoS Botnet Malware Exploits Critical Ruckus RCE Vulnerability

AndoryuBot new malware aims to infect unpatched Wi-Fi access points to enlist them in DDoS attacks. To this end, threat actors exploit a critical Ruckus vulnerability in the Wireless Admin panel. The flaw is tracked as CVE-2023-25717 and enables hackers to perform remote code execution (RCE) by sending unauthenticated HTTP GET requests to unpatched devices. […]

The post Warning! New DDoS Botnet Malware Exploits Critical Ruckus RCE Vulnerability appeared first on Heimdal Security Blog.

News & Updates

Mastermind Behind Twitter 2020 Hack Pleads Guilty and Faces up to 70 Years in Prison

A U.K. national has pleaded guilty in connection with the July 2020 Twitter attack affecting numerous high-profile accounts and defrauding other users of the platform.
Joseph James O’Connor, who also went by the online alias PlugwalkJoe, admitted to “his role in cyberstalking and multiple schemes that involve computer hacking, including the July 2020 hack of Twitter,” the U.S. Department of
News & Updates

International security agencies warn of Russian “Snake” malware threat

Security agencies from five countries have issued a joint advisory revealing technical details about a sophisticated espionage tool used by Russian cyber actors against their targets. “Snake malware” and its variants have been a core component in Russian espionage operations carried out by Center 16 of Russia’s Federal Security Service (FSB) for nearly two decades, according to the security notice.

Identified in infrastructure in over 50 countries across North America, South America, Europe, Africa, Asia, and Australia, Snake’s custom communications protocols employ encryption and fragmentation for confidentiality and are designed to hamper detection and collection efforts. Globally, the FSB has used Snake to collect sensitive intelligence from high-priority targets such as government networks, research facilities, and journalists.

To read this article in full, please click here

News & Updates

US disrupts Russia-linked Snake implant’s network

The US government announced to have disrupted the peer-to-peer (P2P) network of computers compromised by the Snake malware. The Snake implant is one of the most sophisticated implants used by Russia-linked threat actors for cyberespionage purposes. The malware has been designed and used by Center 16 of Russia’s Federal Security Service (FSB) in cyber espionage […]

The post US disrupts Russia-linked Snake implant’s network appeared first on Security Affairs.

Threats

Detecting Abused Legitimate Tools Applied by Hackers in the Human-Operated Ransomware Attacks

With the constantly changing cyber threat landscape and the increasing sophistication of the adversary toolkit, information exchange between cybersecurity experts is of paramount value.  On January 25 and 26, 2023, the global cyber defender community welcomed the sixth JSAC2023 conference for security analysts aimed to boost their expertise in the field. This annual cybersecurity event […]

The post Detecting Abused Legitimate Tools Applied by Hackers in the Human-Operated Ransomware Attacks appeared first on SOC Prime.

Cybersecurity Tools

Catches of the Month: Phishing Scams for May 2023

Welcome to our May 2023 review of phishing attacks, in which we explore the latest email scams and the tactics that cyber criminals use to trick people into handing over personal data. This month, we look at another scam taking advantage of the public’s fascination with ChatGPT, another data breach at Booking.com, and another news story about blue checkmarks – but this time it’s not at the tech company you’re thinking of. Another ChatGPT threat vector emerges Since the emergence of ChatGPT last year, IT Governance has covered the cyber security implications it’s having in comprehensive detail. There were stories of

The post Catches of the Month: Phishing Scams for May 2023 appeared first on IT Governance UK Blog.

News & Updates

U.S. Government Neutralizes Russia’s Most Sophisticated Snake Cyber Espionage Tool

The U.S. government on Tuesday announced the court-authorized disruption of a global network compromised by an advanced malware strain known as Snake wielded by Russia’s Federal Security Service (FSB).
Snake, dubbed the “most sophisticated cyber espionage tool,” is the handiwork of a Russian state-sponsored group called Turla (aka Iron Hunter, Secret Blizzard, SUMMIT, Uroburos, Venomous Bear,
Scroll to Top