What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
Cybereason.webp 2021-05-26 12:52:12 Ransomware Trends: Six Notable Ransomware Attacks from 2021 (lien direct) Ransomware Trends: Six Notable Ransomware Attacks from 2021 The security community witnessed triple-digit growth in the number of publicly disclosed ransomware incidents in 2020. As noted in a previous blog post on Five Things You Need to Know About Ransomware Attacks, ransomware attacks grew 715% in H1 2020 compared to the first half of the previous year. Ransomware incidents for 2020 overall increased by more than 150%. Ransomware
Cybereason.webp 2021-05-24 20:59:01 Record Setting $40M Ransom Paid to Attackers (lien direct) Record Setting $40M Ransom Paid to Attackers CNA, one of the largest U.S. commercial and casualty insurance companies, reportedly met a $40 million ransom demand after suffering a ransomware infection earlier in the year. As of this writing, that's the largest ransom demand ever reported to have been paid by a company following a ransomware attack. Ransomware
Cybereason.webp 2021-05-17 13:48:43 DarkSide Gang and the New Golden Age of Piracy (lien direct) DarkSide Gang and the New Golden Age of Piracy Late on Friday May 7, 2021, Colonial Pipeline, the company that runs the largest gasoline pipeline in the US, shut down operations following a ransomware attack on their systems. It later emerged that a relatively new ransomware-as-a-service criminal organization known as DarkSide was behind the attack - but there was a twist. Ransomware
Cybereason.webp 2021-05-14 20:21:22 Solving the Ransomware Crisis (lien direct) Solving the Ransomware Crisis Ransomware attacks are trivial to execute and there is little, if any, risk and no penalties for the attackers. As a victim, there are no good choices once an organization is hit by ransomware. You can ignore the ransom demand and restore your data from backups and take your chances with the risk of data exposure. At the same time, the reality is that it doesn't pay to pay--it is not a guarantee that you will get all of the data back in a usable state. In addition, when you pay the ransom you are essentially funding these criminals who are acting as terrorists. The chances are that you are funding additional research and development of the next exploit or ransomware variant, so paying the ransom just makes the problem bigger. Organizations that pay the ransom also risk putting a bullseye on their backs-making themselves attractive targets for future ransomware attacks because they have established that they're willing to pay. The only good option is to avoid having your data stolen or encrypted in the first place, which is why it needs to be a global priority to solve this crisis. Ransomware
Cybereason.webp 2021-05-11 22:19:35 Webinar: Cybereason vs. DarkSide Ransomware (lien direct) Webinar: Cybereason vs. DarkSide Ransomware Colonial Pipeline was recently the victim of a devastating attack that shut down U.S. operations across the East Coast, threatening an already tenuous economic recovery effort. This attack against critical infrastructure by the DarkSide Ransomware gang highlights the urgent need for better ransomware prevention, detection and response. Ransomware
Cybereason.webp 2021-05-10 19:57:09 Inside the DarkSide Ransomware Attack on Colonial Pipeline (lien direct) Inside the DarkSide Ransomware Attack on Colonial Pipeline On May 8, the Colonial Pipeline Company announced that it had fallen victim to a ransomware attack a day earlier. The pipeline operations include transporting 100 million gallons of fuel daily to meet the needs of consumers across the entire eastern seaboard of the U.S. from Texas to New York, according to the website of the refined products pipeline company. Ransomware
Cybereason.webp 2021-05-05 13:10:23 Three Keys to a Reliable Ransomware Defense Strategy (lien direct) Three Keys to a Reliable Ransomware Defense Strategy As we noted in a previous blog post, ransomware attacks are becoming more frequent and more costly. Reports reveal that there were 304 million ransomware attacks in 2020 - 62% more than the total number of ransomware attacks for 2019. The estimated cost of those incidents increased from $11.5 billion to $20 billion during that same time period. Average ransom costs also rose from $5,900 to $8,100 between those two years, with associated downtime losses growing from $141,000 to $283,000. Ransomware
Cybereason.webp 2021-04-28 12:59:38 Five Things You Need to Know About Ransomware Attacks (lien direct) Five Things You Need to Know About Ransomware Attacks The digital threat landscape as a whole is constantly changing and evolving. That can make it difficult to keep track of new developments for specific threats like ransomware. Don't worry though, Cybereason has got you covered. Ransomware Threat
Cybereason.webp 2021-04-27 14:52:51 Cybereason vs. Avaddon Ransomware (lien direct) Cybereason vs. Avaddon Ransomware Over the last few months, the Cybereason Nocturnus Team has been tracking the activity of the Avaddon Ransomware. It has been active since June 2020 and is operating with the Ransomware-as-a-Service (RaaS) and double extortion models, targeting sectors such as healthcare. Avaddon is distributed via malspam campaigns, where the victim is being lured to download the malware loader. Ransomware Malware
Cybereason.webp 2021-04-22 13:03:55 Sodinokibi Ransomware Gang Extorts Apple Through Supply Chain Attack (lien direct) Sodinokibi Ransomware Gang Extorts Apple Through Supply Chain Attack The Sodinokibi ransomware gang is trying to extort Apple following an attack against one of the tech giant's business partners. According to Bloomberg News, someone using the moniker “Unknown” announced on April 18 that the Sodinokibi/REvil gang was about to disclose their “largest attack ever.” Ransomware
Cybereason.webp 2021-04-19 13:25:54 Ransomware Decoded: Preventing Modern Ransomware Attacks (lien direct) Ransomware Decoded: Preventing Modern Ransomware Attacks Many types of malware silently persist on the network, move laterally, communicate with their C2, or obfuscate their behaviors to prevent detection. In contrast to this, traditional ransomware was all about coming in with a big splash and causing immediate damage. Ransomware Malware
Cybereason.webp 2021-04-14 13:01:39 Rise of Double-Extortion Shines Spotlight on Ransomware Prevention (lien direct) Rise of Double-Extortion Shines Spotlight on Ransomware Prevention Double extortion is a tactic employed by some ransomware gangs. It begins when a crypto-malware strain steals information stored on a victim's machine before launching its encryption routine. Ransomware
Cybereason.webp 2021-04-05 17:01:42 Ransomware Defense: Three Implementations Every Security Team Needs (lien direct) Ransomware Defense: Three Implementations Every Security Team Needs Few will be shocked to hear that ransomware attacks are continuing to accelerate at a torrid pace - but the more concerning trend is the effectiveness of ransomware at creating chaos and paralyzing business operations. Ransomware
Cybereason.webp 2021-04-01 14:02:27 Cybereason vs. DarkSide Ransomware (lien direct) Cybereason vs. DarkSide Ransomware DarkSide is a relatively new ransomware strain that made its first appearance in August 2020. DarkSide follows the RaaS (ransomware-as-a-service) model, and, according to Hack Forums, the DarkSide team recently made an announcement that DarkSide 2.0 has been released. According to the group, it is equipped with the fastest encryption speed on the market, and even includes Windows and Linux versions. Ransomware Hack
Cybereason.webp 2021-03-30 17:26:15 DearCry Ransomware and the HAFNIUM Attacks – What You Need to Know (lien direct) DearCry Ransomware and the HAFNIUM Attacks – What You Need to Know The widespread HAFNIUM attacks were just the beginning of the problems stemming from multiple vulnerabilities in Microsoft's Exchange offering that were recently disclosed. According to Bleeping Computer, users began submitting new ransomware attack reports to the ID-Ransomware identification site on March 9 that site creator Michael Gillespie later determined had likely originated on Microsoft Exchange servers. Ransomware
Cybereason.webp 2021-03-23 16:54:20 Sodinokibi/REvil Ransomware Gang Hit Acer with $50M Ransom Demand (lien direct) Sodinokibi/REvil Ransomware Gang Hit Acer with $50M Ransom Demand The Sodinokibi/REvil ransomware gang has reportedly infected Taiwanese multinational electronics corporation Acer and demanded a ransom of $50 million. Those responsible for the Sodinokibi ransomware strain announced on their data leaks website that they had breached the computer giant. Ransomware
Cybereason.webp 2021-03-12 16:31:30 Webinar: The State of Ransomware (lien direct) Webinar: The State of Ransomware Ransomware continues to evolve and despite what many in the industry had thought was a lull in the use of ransomware by cyber criminals; it hasn't gone away and has returned with a vengeance. Ransomware
Cybereason.webp 2021-02-19 13:40:58 Kia Motors America: Ransomware Not Behind Extended Systems Outage (lien direct) Kia Motors America: Ransomware Not Behind Extended Systems Outage Kia Motors America stated that a ransomware attack was not the apparent cause of an extended systems outage affecting the automobile dealer's IT systems. It all started with an error message… Ransomware
Cybereason.webp 2021-02-16 13:00:00 Cybereason vs. NetWalker Ransomware (lien direct) Cybereason vs. NetWalker Ransomware The NetWalker ransomware has been one of the most notorious ransomware families over the course of the past year, targeting organizations in the US and Europe including several healthcare organizations, despite several known threat actors publicly claiming to abstain from targeting such organizations due to COVID-19. Ransomware Threat
Cybereason.webp 2021-02-08 18:47:37 Extortionists Publish Data Stolen from Two Healthcare Service Providers (lien direct) Extortionists Publish Data Stolen from Two Healthcare Service Providers An attacker group published information stolen from two healthcare service providers in a reported attempt to extort them for money. On February 5, NBC News reported that a well-known ransomware group had published tens of thousands of files to a data leaks website on the dark web. Among those files were scanned diagnostic results, letters to health insurers and a folder containing background checks on employees. Ransomware
Cybereason.webp 2021-01-26 14:00:00 (Déjà vu) Cybereason vs. RansomEXX Ransomware (lien direct) Cybereason vs. RansomEXX Ransomware Research by: Daniel Frank Ransomware
Cybereason.webp 2021-01-12 14:03:32 (Déjà vu) Cybereason vs. Conti Ransomware (lien direct) Cybereason vs. Conti Ransomware Research by: Lior Rochberger Ransomware
Cybereason.webp 2021-01-11 21:35:00 Cybereason and Intel Introduce Hardware-Enabled Ransomware Protections for Businesses (lien direct) Cybereason and Intel Introduce Hardware-Enabled Ransomware Protections for Businesses Ransomware can literally put organizations and lives at risk, as witnessed in 2020 with the continuous onslaught of attacks against the healthcare industry, research organizations working on COVID-19 vaccines, telecommunication centers, financial institutions, the public sector and companies across every industry vertical. Ransomware
Cybereason.webp 2020-12-23 14:00:00 Cybereason vs. Clop Ransomware (lien direct) Cybereason vs. Clop Ransomware Research by: Daniel Frank Ransomware
Cybereason.webp 2020-12-10 16:00:31 Cybereason vs. Ryuk Ransomware (lien direct) Cybereason vs. Ryuk Ransomware Ryuk ransomware has been infecting victims since around 2018, and is believed to be based on the source code of Hermes ransomware, which was sold on an internet hacking forum back in 2017. Since its inception, Ryuk has been used to target large organizations to great effect, having accumulated as much as $61.26 million (as of Feb 2020) in ransom payments according to federal investigations.  Ransomware
Cybereason.webp 2020-11-26 01:51:59 Cybereason vs. Egregor Ransomware (lien direct) Cybereason vs. Egregor Ransomware Research by: Lior Rochberger Ransomware
Cybereason.webp 2020-11-19 16:19:51 Cybereason vs. MedusaLocker Ransomware (lien direct) Cybereason vs. MedusaLocker Ransomware Research by: Tom Fakterman and Assaf Dahan Ransomware
Cybereason.webp 2020-10-30 19:55:19 Law Enforcement Warns of Imminent Ransomware Threat to U.S. Hospitals (lien direct) Law Enforcement Warns of Imminent Ransomware Threat to U.S. Hospitals On October 29, the U.S. Cybersecurity & Infrastructure Security Agency (CISA) published a joint alert with the Federal Bureau of Investigations (FBI) and the Department of Health and Human Services (HHS). In it, the organizations claimed to “have credible information of an increased and imminent cybercrime threat to U.S. hospitals and healthcare providers.” CISA, the FBI and HHS attributed the threat to the digital criminal enterprise behind TrickBot, malware which is capable of targeting victims with ransomware. Ransomware Malware Threat
Cybereason.webp 2020-10-30 10:54:33 Ryuk Ransomware: Mitigation and Defense Action Items (lien direct) Ryuk Ransomware: Mitigation and Defense Action Items The FBI, DHS, and HHS are warning of imminent Ryuk ransomware attacks targeting hospitals in the US. The story is being covered broadly by the industry media, including  Krebs and various media outlets. Ransomware
Cybereason.webp 2020-09-24 18:56:25 German Ransomware Attack: A Rallying Cry for Bullish Diligence (lien direct) German Ransomware Attack: A Rallying Cry for Bullish Diligence According to recent reports, a woman in Germany died after a ransomware attack against a hospital system forced her to be rerouted to a more remote facility, delaying critical treatment by an hour. This event is undoubtedly a tragedy for the woman, her family, for Germany, and for the security community. Ransomware
Cybereason.webp 2020-07-06 19:13:11 What Modern Ransomware Looks Like (lien direct) What Modern Ransomware Looks Like Over the past year, we have seen many different types of ransomware attacks evolving, especially evolving into multistage ransomware that not only ransoms data, but also exfiltrates as much data as possible. Below is a brief overview of three of the most common modern ransomware attacks we are seeing today.  Ransomware
Cybereason.webp 2020-06-30 16:27:31 Ransomware: Weapons of Mass Disruption (lien direct) Ransomware: Weapons of Mass Disruption May 12th 2020 marked the 3 year anniversary of the WannaCry ransomware attack. Estimated to have affected hundreds of thousands of endpoints across 150 countries all around the world, the total damages as a result of the WannaCry attack have reached up to 4 billion USD, according to some accounts. Ransomware Wannacry
Cybereason.webp 2020-06-24 16:18:05 How to Design a Prevention Stack to Stop Ransomware (lien direct) How to Design a Prevention Stack to Stop Ransomware Today, any random Google search for “ransomware attack” will result in a new story of an organization impacted by ransomware, and usually not for the first time. Ransomware attacks are an efficient and effective weapon for criminals who want to harm any business through crucial data loss, damaged productivity, and injured brand reputation.  These attacks often have a big price tag attached to them, a combination of the business paying the ransom and the actual downtime the business suffers because of the attack. Ransomware
Cybereason.webp 2020-06-11 04:15:00 Cybereason\'s Newest Honeypot Shows How Multistage Ransomware Attacks Should Have Critical Infrastructure Providers on High Alert (lien direct) Cybereason's Newest Honeypot Shows How Multistage Ransomware Attacks Should Have Critical Infrastructure Providers on High Alert Introduction Earlier this year, Cybereason launched its latest honeypot to analyze the tactics, techniques, and procedures used by state-sponsored groups and cyber crime actors to target critical infrastructure providers. This honeypot was a follow up to a previous successful honeypot launched two years ago in 2018 looking at the same industry. The honeypot was built to look like an electricity company with operations in North America and Europe.  In this new research, the Cybereason team identified multiple attackers executing ransomware operations involving data theft, the stealing of user credentials, and lateral movement across the victims network to compromise as many endpoints as possible. This includes critical assets like the domain controllers, which could take  between several minutes to several hours to properly infiltrate. Ransomware capabilities were deployed early on in the hacking operation, but it was not immediately detonated. The ransomware was designed to detonate only after preliminary stages of the attack finished across all compromised endpoints in order to achieve maximum impact on the victim. This operational attack pattern attempts to impact as many victim assets as possible, representing a higher risk to organizations compared to ransomware attacks that impact the single machine they initially access. However, this operational pattern also represents an opportunity for defenders with a rapid detection and response process to detect the attack at its early stages and respond effectively before ransomware is able to impact the environment.  Given the results of this research, we conclude that multistage ransomware attacks on critical infrastructure providers are increasingly dangerous and more prevalent.  Check out a condensed, high level version of this report on our threat alerts page. Background We live in a world of insecurity where hackers have the advantage over the vast majority of enterprises trying to protect their computer networks. No where is that more evident than with critical infrastructure providers, who are facing a constant barrage of cyberattacks from motivated and oftentimes well-funded groups of cybercriminals and state-sponsored actors. Ransomware
Last update at: 2024-06-30 10:08:05
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter