What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
InfoSecurityMag.webp 2024-04-15 12:35:00 Chipmaker Giant Nexperia confirme la cyberattaque au milieu des réclamations du groupe ransomware
Chipmaker Giant Nexperia Confirms Cyber-Attack Amid Ransomware Group Claims
(lien direct)
Nexperia a confirmé que ses serveurs informatiques étaient accessibles par les attaquants, le groupe Ransomware Dunghill prétendant avoir volé des conceptions de puces et d'autres documents sensibles
Nexperia confirmed its IT servers were accessed by attackers, with the Dunghill ransomware group claiming to have stolen chip designs and other sensitive documents
Ransomware ★★
RecordedFuture.webp 2024-04-15 12:18:08 La société de semi-conducteurs appartenant à des Chinois Nexperia a frappé par une attaque de ransomware
Chinese-owned semiconductor company Nexperia hit by ransomware attack
(lien direct)
Nexperia a confirmé que ses serveurs informatiques étaient accessibles par les attaquants, le groupe Ransomware Dunghill prétendant avoir volé des conceptions de puces et d'autres documents sensibles
Nexperia confirmed its IT servers were accessed by attackers, with the Dunghill ransomware group claiming to have stolen chip designs and other sensitive documents
Ransomware ★★
bleepingcomputer.webp 2024-04-15 12:00:01 Chipmaker Nexperia confirme la violation après la fuite de gangs de ransomware qui divulgue
Chipmaker Nexperia confirms breach after ransomware gang leaks data
(lien direct)
Le fabricant de puces néerlandais Nexperia a confirmé à la fin de la semaine dernière que les pirates ont violé son réseau en mars 2024 après qu'un gang de ransomware ait divulgué des échantillons de données prétendument volées.[...]
Dutch chipmaker Nexperia confirmed late last week that hackers breached its network in March 2024 after a ransomware gang leaked samples of allegedly stolen data. [...]
Ransomware ★★
Checkpoint.webp 2024-04-15 11:16:11 15 avril & # 8211;Rapport de renseignement sur les menaces
15th April – Threat Intelligence Report
(lien direct)
> Pour les dernières découvertes en cyberLes principales attaques et violation du géant de l'optique japonaise Hoya Corporation ont été victimes d'une attaque de ransomware qui a eu un impact sur sa principale infrastructure informatique et diverses divisions commerciales.Hunters International Ransomware Gang a revendiqué la responsabilité de l'attaque et [& # 8230;]
>For the latest discoveries in cyber research for the week of 15th April, please download our Threat_Intelligence Bulletin. TOP ATTACKS AND BREACHES Japanese optics giant Hoya Corporation has been a victim of a ransomware attack that impacted its major IT infrastructure and various business divisions. Hunters International ransomware gang claimed responsibility for the attack and […]
Ransomware Threat ★★
bleepingcomputer.webp 2024-04-15 11:01:54 Daixin Ransomware Gang affirme une attaque sur les hôtels Omni
Daixin ransomware gang claims attack on Omni Hotels
(lien direct)
Le gang de ransomware de l'équipe de Daixin a revendiqué une récente cyberattaque sur Omni Hotels & Resorts et menace désormais de publier des clients sensibles si une rançon n'est pas payée.[...]
The Daixin Team ransomware gang claimed a recent cyberattack on Omni Hotels & Resorts and is now threatening to publish customers\' sensitive information if a ransom is not paid. [...]
Ransomware ★★
SecureList.webp 2024-04-15 10:00:28 Utilisation du constructeur de verrouillage pour générer des ransomwares ciblés
Using the LockBit builder to generate targeted ransomware
(lien direct)
Les chercheurs de Kaspersky revisitent le constructeur Lockbit 3.0 divulgué et partagent des informations sur un incident réel impliquant une variante de ransomware ciblée personnalisée créée avec ce constructeur.
Kaspersky researchers revisit the leaked LockBit 3.0 builder and share insights into a real-life incident involving a custom targeted ransomware variant created with this builder.
Ransomware ★★
WiredThreatLevel.webp 2024-04-13 10:30:00 Roku Breach frappe 567 000 utilisateurs
Roku Breach Hits 567,000 Users
(lien direct)
Plus: Apple prévient les utilisateurs d'iPhone des attaques de logiciels espions, la CISA émet une directive d'urgence sur une violation de Microsoft et un pirate de ransomware enchevêtrement avec un gestionnaire de RH non impressionné nommé Beth.
Plus: Apple warns iPhone users about spyware attacks, CISA issues an emergency directive about a Microsoft breach, and a ransomware hacker tangles with an unimpressed HR manager named Beth.
Ransomware Mobile ★★
TechRepublic.webp 2024-04-12 15:44:26 Étude Sophos: 94% des victimes de ransomwares ont leurs sauvegardes ciblées par les attaquants
Sophos Study: 94% of Ransomware Victims Have Their Backups Targeted By Attackers
(lien direct)
La recherche a révélé que les criminels peuvent exiger une rançon plus élevée lorsqu'ils compromettent les données de sauvegarde d'une organisation dans une attaque de ransomware.Découvrez les conseils d'experts en sécurité sur la façon de protéger correctement votre sauvegarde.
Research has found that criminals can demand higher ransom when they compromise an organisation\'s backup data in a ransomware attack. Discover advice from security experts on how to properly protect your backup.
Ransomware Studies ★★★
bleepingcomputer.webp 2024-04-11 14:15:24 Le géant de l'optique Hoya a frappé avec une demande de ransomware de 10 millions de dollars
Optics giant Hoya hit with $10 million ransomware demand
(lien direct)
Une récente cyberattaque sur Hoya Corporation a été réalisée par l'opération de ransomware \\ 'Hunters International \', qui exigeait une rançon de 10 millions de dollars pour un décrypteur de dossier et de ne pas publier des fichiers volés pendant l'attaque.[...]
A recent cyberattack on Hoya Corporation was conducted by the \'Hunters International\' ransomware operation, which demanded a $10 million ransom for a file decryptor and not to release files stolen during the attack. [...]
Ransomware ★★★
securityintelligence.webp 2024-04-11 13:00:00 Les paiements de ransomwares atteignent un haut tous les temps, mais ce n'est pas toute l'histoire
Ransomware payouts hit all-time high, but that\\'s not the whole story
(lien direct)
> Les paiements de ransomwares ont atteint un sommet de 1,1 milliard de dollars en 2023, après une forte baisse du total des paiements en 2022. Certains facteurs qui peuvent avoir contribué à la baisse en 2022 étaient le conflit ukrainautorités judiciaires.En 2023, cependant, les paiements de ransomwares sont revenus à [& # 8230;]
>Ransomware payments hit an all-time high of $1.1 billion in 2023, following a steep drop in total payouts in 2022. Some factors that may have contributed to the decline in 2022 were the Ukraine conflict, fewer victims paying ransoms and cyber group takedowns by legal authorities. In 2023, however, ransomware payouts came roaring back to […]
Ransomware ★★
The_State_of_Security.webp 2024-04-11 10:00:55 Dragonforce Ransomware - ce que vous devez savoir
DragonForce Ransomware - What You Need To Know
(lien direct)
Que se passe-t-il?Une souche relativement nouvelle de ransomwares appelée DragonForce a fait la une des journaux après une série d'attaques de haut niveau.Comme de nombreux autres groupes de ransomwares, Dragonforce tente d'extorquer de l'argent de ses victimes de deux manières - verrouiller les entreprises de leurs ordinateurs et de leurs données par le cryptage, et exfiltrant les données de systèmes compromis avec la menace de le libérer à d'autres via le Web Dark.Jusqu'à présent, si normal.Comment Dragonforce est-il arrivé à l'importance?La première attaque de ransomware connue de DragonForce était contre la loterie de l'Ohio.Dans ce cas, Dragonforce s'est vanté qu'il avait ...
What\'s going on? A relatively new strain of ransomware called DragonForce has making the headlines after a series of high-profile attacks. Like many other ransomware groups, DragonForce attempts to extort money from its victims in two ways - locking companies out of their computers and data through encryption, and exfiltrating data from compromised systems with the threat of releasing it to others via the dark web. So far, so normal. How did DragonForce come to prominence? DragonForce\'s earliest known ransomware attack was against the Ohio Lottery . In that case, DragonForce boasted it had...
Ransomware Threat ★★
ProofPoint.webp 2024-04-11 06:23:43 FAQS de l'état de l'État 2024 du rapport Phish, partie 1: Le paysage des menaces
FAQs from the 2024 State of the Phish Report, Part 1: The Threat Landscape
(lien direct)
In this two-part blog series, we will address many of the frequently asked questions submitted by attendees. In our first installment, we address questions related to the threat landscape.   Understanding the threat landscape is paramount in crafting a human-centric security strategy. That\'s the goal behind our 10th annual State of the Phish report. When you know what threats are out there and how people are interacting with them, you can create a modern cybersecurity strategy that puts the complexity of human behavior and interaction at the forefront. Our report was launched a month ago. Since then, we\'ve followed up with a few webinars to discuss key findings from the report, including:  Threat landscape findings:  Over 1 million phishing threats involved EvilProxy, which bypasses multifactor authentication (MFA). Yet, 89% of security pros still believe that MFA provides complete protection against account takeover.  BEC threat actors benefit from generative AI. Proofpoint detected and stopped over 66 million targeted business email compromise (BEC) attacks per month on average in 2023.  User behavior and attitude findings:  71% of surveyed users took at least one risky action, and 96% of them knew that those actions were associated with risk.  58% of those risky actions were related to social engineering tactics.  85% of security pros believed that most employees know they are responsible for security. Yet nearly 60% of employees either weren\'t sure or disagreed.  These findings inspired hundreds of questions from audiences across the world. What follows are some of the questions that repeatedly came up. Frequently asked questions  What are the definitions of BEC and TOAD?   Business email compromise (BEC) essentially means fraud perpetrated through email. It can take many forms, such as advance fee fraud, payroll redirection, fraudulent invoicing or even extortion. BEC typically involves a deception, such as the spoofing of a trusted third party\'s domain or the impersonation of an executive (or literally anyone the recipient trusts).   BEC is hard to detect because it is generally pure social engineering. In other words, there is often no credential harvesting portal or malicious payload involved. Threat actors most often use benign conversation to engage the victim. Once the victim is hooked, attackers then convince that person to act in favor of them, such as wiring money to a specified account.  Similarly, telephone-oriented attack delivery (TOAD) attacks also use benign conversations. But, in this case, a threat actor\'s goal is to motivate the victim to make a phone call. From there, they will walk their target through a set of steps, which usually involve tricking the victim into giving up their credentials or installing a piece of malware on their computer.  TOAD attacks have been associated with high-profile malware families known to lead to ransomware, as well as with a wide variety of remote access tools like AnyDesk that provide the threat actors direct access to victims\' machines. The end goal might still be fraud; for example, there have been cases where payment was solicited for “IT services” or software (Norton LifeLock). But the key differentiator for TOAD, compared with BEC, is the pivot out of the email space to a phone call., is the pivot out of the email space to the phone.  What is the difference between TOAD and vishing?  TOAD often starts with an email and requires victims to call the fraudulent number within that email. Vishing, on the other hand, generally refers to fraudulent solicitation of personally identifiable information (PII) and may or may not involve email (it could result from a direct call). Some TOAD attempts may fall into this category, but most perpetrators focus on getting software installed on a victim\'s machine.   How do you see artificial intelligence (AI) affecting phishing? What are security best practices to help defend against these novel phishing attacks?  AI allows threat actors to tighten up grammatical and s Ransomware Malware Tool Threat Cloud Technical ★★★
RecordedFuture.webp 2024-04-10 20:26:45 Les universités du Nouveau-Mexique, l'Oklahoma répondent aux attaques de ransomwares
Universities in New Mexico, Oklahoma respond to ransomware attacks
(lien direct)
In this two-part blog series, we will address many of the frequently asked questions submitted by attendees. In our first installment, we address questions related to the threat landscape.   Understanding the threat landscape is paramount in crafting a human-centric security strategy. That\'s the goal behind our 10th annual State of the Phish report. When you know what threats are out there and how people are interacting with them, you can create a modern cybersecurity strategy that puts the complexity of human behavior and interaction at the forefront. Our report was launched a month ago. Since then, we\'ve followed up with a few webinars to discuss key findings from the report, including:  Threat landscape findings:  Over 1 million phishing threats involved EvilProxy, which bypasses multifactor authentication (MFA). Yet, 89% of security pros still believe that MFA provides complete protection against account takeover.  BEC threat actors benefit from generative AI. Proofpoint detected and stopped over 66 million targeted business email compromise (BEC) attacks per month on average in 2023.  User behavior and attitude findings:  71% of surveyed users took at least one risky action, and 96% of them knew that those actions were associated with risk.  58% of those risky actions were related to social engineering tactics.  85% of security pros believed that most employees know they are responsible for security. Yet nearly 60% of employees either weren\'t sure or disagreed.  These findings inspired hundreds of questions from audiences across the world. What follows are some of the questions that repeatedly came up. Frequently asked questions  What are the definitions of BEC and TOAD?   Business email compromise (BEC) essentially means fraud perpetrated through email. It can take many forms, such as advance fee fraud, payroll redirection, fraudulent invoicing or even extortion. BEC typically involves a deception, such as the spoofing of a trusted third party\'s domain or the impersonation of an executive (or literally anyone the recipient trusts).   BEC is hard to detect because it is generally pure social engineering. In other words, there is often no credential harvesting portal or malicious payload involved. Threat actors most often use benign conversation to engage the victim. Once the victim is hooked, attackers then convince that person to act in favor of them, such as wiring money to a specified account.  Similarly, telephone-oriented attack delivery (TOAD) attacks also use benign conversations. But, in this case, a threat actor\'s goal is to motivate the victim to make a phone call. From there, they will walk their target through a set of steps, which usually involve tricking the victim into giving up their credentials or installing a piece of malware on their computer.  TOAD attacks have been associated with high-profile malware families known to lead to ransomware, as well as with a wide variety of remote access tools like AnyDesk that provide the threat actors direct access to victims\' machines. The end goal might still be fraud; for example, there have been cases where payment was solicited for “IT services” or software (Norton LifeLock). But the key differentiator for TOAD, compared with BEC, is the pivot out of the email space to a phone call., is the pivot out of the email space to the phone.  What is the difference between TOAD and vishing?  TOAD often starts with an email and requires victims to call the fraudulent number within that email. Vishing, on the other hand, generally refers to fraudulent solicitation of personally identifiable information (PII) and may or may not involve email (it could result from a direct call). Some TOAD attempts may fall into this category, but most perpetrators focus on getting software installed on a victim\'s machine.   How do you see artificial intelligence (AI) affecting phishing? What are security best practices to help defend against these novel phishing attacks?  AI allows threat actors to tighten up grammatical and s Ransomware ★★
DarkReading.webp 2024-04-10 17:42:30 Le gang de Medusa frappe à nouveau, frappe près de 300 propriétaires de Fort Worth
Medusa Gang Strikes Again, Hits Nearly 300 Fort Worth Property Owners
(lien direct)
Bien qu'une agence municipale assure au public que peu de gens sont touchés, des centaines ont leurs données rançonnées pour 100 000 $ par le gang de ransomware.
Though a municipal agency assures the public that few are affected, hundreds have their data held ransom for $100,000 by the ransomware gang.
Ransomware ★★★
RecordedFuture.webp 2024-04-10 15:00:12 Après avoir échoué une attaque de ransomware, les pirates ont volé des données sur 533k de personnes de la Wisconsin Insurance Company
After failed ransomware attack, hackers stole data on 533k people from Wisconsin insurance company
(lien direct)
L'une des plus grandes compagnies d'assurance maladie du Wisconsin a déclaré que les pirates qui avaient lancé une attaque de ransomware défaillante étaient toujours en mesure de voler des trox d'informations sensibles sur plus d'un demi-million de personnes.Dans des avis sur son site Web et avec les régulateurs, Group Health Cooperative du South Central Wisconsin (GHC-SCW) a déclaré que son équipe informatique a découvert
One of the largest health insurance companies in Wisconsin said hackers that launched a failed ransomware attack were still able to steal troves of sensitive information on more than half a million people. In notices on its website and with regulators, Group Health Cooperative of South Central Wisconsin (GHC-SCW) said its IT team discovered
Ransomware Data Breach ★★
Checkpoint.webp 2024-04-10 13:00:24 Changements de paysages d'attaque et de secteurs au T1 2024 avec une augmentation de 28% des cyberattaques à l'échelle mondiale
Shifting Attack Landscapes and Sectors in Q1 2024 with a 28% increase in cyber attacks globally
(lien direct)
> Augmentation récurrente des cyberattaques: le premier trimestre 2024 a connu une augmentation marquée de 28% du nombre moyen de cyberattaques par organisation à partir du dernier trimestre de 2023, bien qu'une augmentation de 5% de la fonction d'attaques soutenues par l'industrie soutenue: le fournisseur de matérielL'industrie a connu une augmentation substantielle de 37% de cyberattaques en glissement annuel, alors que le secteur de l'éducation / de la recherche, du gouvernement / militaire et de la santé a maintenu ses pistes en tant que secteurs les plus attaqués du premier trimestre 2024, contrastant les variances régionales: la région de l'Afrique a connu une augmentation notable de 20% dansLes cyberattaques, par opposition à l'Amérique latine, qui ont signalé une diminution de 20% des ransomwares en YOY continue de monter: l'Europe [& # 8230;]
>Recurring increase in cyber attacks: Q1 2024 saw a marked 28% increase in the average number of cyber attacks per organization from the last quarter of 2023, though a 5% increase in Q1 YoY Sustained Industry Attacks focus: The Hardware Vendor industry saw a substantial rise of 37% cyber attacks YoY, as the Education/Research, Government/Military and Healthcare sector maintained their leads as the most heavily attacked sectors in Q1 2024 Contrasting Regional Variances: The Africa region saw a notable 20% increase in cyber attacks, as opposed to Latin America, which reported a 20% decrease YoY Ransomware continues to surge: Europe […]
Ransomware Medical ★★★
globalsecuritymag.webp 2024-04-10 11:23:55 (Déjà vu) March 2024\'s Most Wanted Malware: Hackers Discover New Infection Chain Method to Deliver Remcos (lien direct) mars 2024 \\ est le malware le plus recherché: les pirates découvrent une nouvelle méthode de chaîne d'infection pour livrer des remcos Les chercheurs ont découvert une nouvelle méthode de déploiement des remcos de Troie (rat) d'accès à distance, contournant les mesures de sécurité communes pour obtenir un accès non autorisé aux victimes \\ '.Pendant ce temps, Blackbasta est entré dans les trois premiers des groupes de ransomwares les plus recherchés et les communications ont sauté à la troisième place dans les industries les plus exploitées - mise à jour malveillant
March 2024\'s Most Wanted Malware: Hackers Discover New Infection Chain Method to Deliver Remcos Researchers have discovered a new method of deploying the Remote Access Trojan (RAT) Remcos, bypassing common security measures to gain unauthorised access to victims\' devices. Meanwhile, Blackbasta entered the top three of the most wanted ransomware groups and Communications jumped into third place in the most exploited industries - Malware Update
Ransomware Malware ★★
AlienVault.webp 2024-04-10 10:00:00 Les risques de sécurité du chat Microsoft Bing AI pour le moment
The Security Risks of Microsoft Bing AI Chat at this Time
(lien direct)
The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  AI has long since been an intriguing topic for every tech-savvy person, and the concept of AI chatbots is not entirely new. In 2023, AI chatbots will be all the world can talk about, especially after the release of ChatGPT by OpenAI. Still, there was a past when AI chatbots, specifically Bing’s AI chatbot, Sydney, managed to wreak havoc over the internet and had to be forcefully shut down. Now, in 2023, with the world relatively more technologically advanced, AI chatbots have appeared with more gist and fervor. Almost every tech giant is on its way to producing large Language Model chatbots like chatGPT, with Google successfully releasing its Bard and Microsoft and returning to Sydney. However, despite the technological advancements, it seems that there remains a significant part of the risks that these tech giants, specifically Microsoft, have managed to ignore while releasing their chatbots. What is Microsoft Bing AI Chat Used for? Microsoft has released the Bing AI chat in collaboration with OpenAI after the release of ChatGPT. This AI chatbot is a relatively advanced version of ChatGPT 3, known as ChatGPT 4, promising more creativity and accuracy. Therefore, unlike ChatGPT 3, the Bing AI chatbot has several uses, including the ability to generate new content such as images, code, and texts. Apart from that, the chatbot also serves as a conversational web search engine and answers questions about current events, history, random facts, and almost every other topic in a concise and conversational manner. Moreover, it also allows image inputs, such that users can upload images in the chatbot and ask questions related to them. Since the chatbot has several impressive features, its use quickly spread in various industries, specifically within the creative industry. It is a handy tool for generating ideas, research, content, and graphics. However, one major problem with its adoption is the various cybersecurity issues and risks that the chatbot poses. The problem with these cybersecurity issues is that it is not possible to mitigate them through traditional security tools like VPN, antivirus, etc., which is a significant reason why chatbots are still not as popular as they should be. Is Microsoft Bing AI Chat Safe? Like ChatGPT, Microsoft Bing Chat is fairly new, and although many users claim that it is far better in terms of responses and research, its security is something to remain skeptical over. The modern version of the Microsoft AI chatbot is formed in partnership with OpenAI and is a better version of ChatGPT. However, despite that, the chatbot has several privacy and security issues, such as: The chatbot may spy on Microsoft employees through their webcams. Microsoft is bringing ads to Bing, which marketers often use to track users and gather personal information for targeted advertisements. The chatbot stores users\' information, and certain employees can access it, which breaches users\' privacy. - Microsoft’s staff can read chatbot conversations; therefore, sharing sensitive information is vulnerable. The chatbot can be used to aid in several cybersecurity attacks, such as aiding in spear phishing attacks and creating ransomware codes. Bing AI chat has a feature that lets the chatbot “see” what web pages are open on the users\' other tabs. The chatbot has been known to be vulnerable to prompt injection attacks that leave users vulnerable to data theft and scams. Vulnerabilities in the chatbot have led to data le Ransomware Tool Vulnerability ChatGPT ★★
The_Hackers_News.webp 2024-04-09 16:54:00 Cl0p \\'s Ransomware Rampage - Mesures de sécurité pour 2024
CL0P\\'s Ransomware Rampage - Security Measures for 2024
(lien direct)
2023 CL0P Growth & NBSP; Émergeant début 2019, CL0P a été présenté pour la première fois comme une version plus avancée de son prédécesseur le ransomware \\ 'Cryptomix \', provoqué par son propriétaire Ransomware CL0P, une organisation de cybercriminalité.Au fil des ans, le groupe est resté actif avec des campagnes importantes de 2020 à 2022. Mais en 2023, le gang de ransomware CL0P s'est amené à de nouveaux sommets et est devenu l'un des
2023 CL0P Growth  Emerging in early 2019, CL0P was first introduced as a more advanced version of its predecessor the \'CryptoMix\' ransomware, brought about by its owner CL0P ransomware, a cybercrime organisation. Over the years the group remained active with significant campaigns throughout 2020 to 2022. But in 2023 the CL0P ransomware gang took itself to new heights and became one of the
Ransomware ★★
RecordedFuture.webp 2024-04-09 15:16:07 Genios de la société de base de données allemande confirme l'attaque des ransomwares
German database company Genios confirms ransomware attack
(lien direct)
GBI Genios, une société de base de données utilisé par de nombreuses organisations de médias en Allemagne, a annoncé mardi que ses serveurs n'étaient pas disponibles «en raison d'une attaque de pirate massive».Dans un article sur LinkedIn, Genios a déclaré que l'incident était une attaque de ransomware et a mis en garde: "Malheureusement, nous devons assumer une panne pendant plusieurs jours."«Nos options de communication sont
GBI Genios, a database company used by numerous media organizations in Germany, announced on Tuesday its servers were unavailable “due to a massive hacker attack.” In a post on LinkedIn, Genios said the incident was a ransomware attack and cautioned, “unfortunately we have to assume an outage for several days.” “Our communication options are
Ransomware ★★
RecordedFuture.webp 2024-04-09 14:03:25 Les chercheurs découvrent un nouveau gang de ransomware \\ 'muliaka \\' attaquant des entreprises russes
Researchers discover new ransomware gang \\'Muliaka\\' attacking Russian businesses
(lien direct)
Un gang de ransomware auparavant inconnu a attaqué les entreprises russes avec des logiciels malveillants basés sur le code source divulgué du groupe de piratage Conti.Le gang, que les chercheurs de la société de cybersécurité basée à Moscou F.A.C.C.T.ont surnommé «muliaka» ou eau boueuse en anglais, a laissé des traces minimales de ses attaques mais a probablement été active depuis
A previously unknown ransomware gang has been attacking Russian businesses with malware based on the leaked source code from the Conti hacking group. The gang, which researchers at the Moscow-based cybersecurity company F.A.C.C.T. have dubbed “Muliaka," or Muddy Water in English, has left minimal traces from its attacks but has likely been active since
Ransomware Malware ★★
DarkReading.webp 2024-04-09 14:00:00 Cadres, directives et ampli;Les primes à elles seules ont vaincu les ransomwares de vaincre
Frameworks, Guidelines & Bounties Alone Won\\'t Defeat Ransomware
(lien direct)
Nous avons besoin de plus que des approches de «bricolage» des menaces qui atteignent clairement le niveau des problèmes de sécurité nationale.
We need more than "do-it-yourself" approaches to threats that clearly rise to the level of national security issues.
Ransomware ★★
globalsecuritymag.webp 2024-04-09 13:04:47 Panzura, LLC a annoncé la disponibilité de la détection et du sauvetage de Panzura
Panzura, LLC announced the availability of Panzura Detect and Rescue
(lien direct)
Panzura lance une solution de détection et de récupération des ransomwares en temps réel La détection et le sauvetage de Panzura offrent une détection des menaces de ransomware à proximité et une récupération rapide guidée par des experts, permettant aux entreprises de prendre une position proactive contre la menace croissante de ransomware - revues de produits
Panzura Launches Near Real-Time Ransomware Detection and Recovery Solution Panzura Detect and Rescue offers near real-time ransomware threat detection and expert-guided rapid recovery, allowing businesses to take a proactive stance against the mounting threat of ransomware - Product Reviews
Ransomware Threat ★★
Checkpoint.webp 2024-04-09 13:00:24 Mars 2024 \\'s Mostware le plus recherché: les pirates découvrent une nouvelle méthode de la chaîne d'infection pour livrer des remcos
March 2024\\'s Most Wanted Malware: Hackers Discover New Infection Chain Method to Deliver Remcos
(lien direct)
> Les chercheurs ont découvert une nouvelle méthode de déploiement des remcos de Troie (rat) d'accès à distance, contournant les mesures de sécurité communes pour obtenir un accès non autorisé aux victimes \\ '.Pendant ce temps, Blackbasta est entré dans les trois premiers des groupes de ransomwares les plus recherchés et les communications ont sauté à la troisième place dans les industries les plus exploitées que notre dernier indice de menace mondial pour les chercheurs de mars 2024 a révélé des pirates en utilisant des fichiers de disque dur virtuel (VHD) pour déployer un accès à distance Trojan (Rat) remcos.Pendant ce temps, Lockbit3 est resté le groupe de ransomwares le plus répandu en mars malgré le retrait des forces de l'ordre en février, bien que sa fréquence sur les 200 points de contrôle ait surveillé les ransomwares [& # 8230;]
>Researchers have discovered a new method of deploying the Remote Access Trojan (RAT) Remcos, bypassing common security measures to gain unauthorized access to victims\' devices. Meanwhile, Blackbasta entered the top three of the most wanted ransomware groups and Communications jumped into third place in the most exploited industries  Our latest Global Threat Index for March 2024 saw researchers reveal hackers utilizing Virtual Hard Disk (VHD) files to deploy Remote Access Trojan (RAT) Remcos. Meanwhile, Lockbit3 remained the most prevalent ransomware group in March despite the law enforcement takedown in February, although its frequency on the 200 Check Point monitored ransomware […]
Ransomware Malware Threat Legislation ★★
RecordedFuture.webp 2024-04-09 12:53:08 MEDUSA Cybercrime Gang prend le crédit pour une autre attaque contre la municipalité américaine
Medusa cybercrime gang takes credit for another attack on US municipality
(lien direct)
Le MEDUSA Ransomware Group affirme qu'il est responsable d'une attaque contre une agence gouvernementale au Texas. & NBSP;Le district d'évaluation du comté de Tarrant - qui détermine la valeur des propriétés à des fins fiscales dans la région de Fort Worth - a confirmé à la future nouvelle enregistrée il y a deux semaines qu'il a été victime d'une attaque de ransomware. & Nbsp;Sur
The Medusa ransomware group says it is responsible for an attack on a government agency in Texas.  The Tarrant County Appraisal District - which determines property values for tax purposes in the Fort Worth area - confirmed to Recorded Future News two weeks ago that it was a victim of a ransomware attack.  On
Ransomware ★★
SecurityWeek.webp 2024-04-09 10:18:23 Deuxième groupe de ransomwares extorquant le changement de santé
Second Ransomware Group Extorting Change Healthcare
(lien direct)
> RansomHub extorque les soins de santé des changements, menaçant de publier des données volées dans une attaque de ransomware Blackcat de février 2024.
>RansomHub is extorting Change Healthcare, threatening to release data stolen in a February 2024 BlackCat ransomware attack.
Ransomware Medical ★★
AlienVault.webp 2024-04-09 10:00:00 La menace cachée à la vue: analyse des attaques sous-textuelles dans les communications numériques
The Hidden Threat in Plain Sight: Analyzing Subtextual Attacks in Digital Communications
(lien direct)
The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In our always-online world, we\'re facing a new kind of cyber threat that\'s just as sneaky as it is harmful: subtextual attacks. These aren\'t your run-of-the-mill security breaches; they\'re cunningly crafted messages that may look harmless—but they actually carry a dangerous payload within them. Join me as we take a closer look at this under-the-radar, but still dangerous, threat. We\'ll explore how these deceptive messages can sneak past our defenses, trick people into taking unwanted actions, and steal sensitive information without ever tripping an alarm. The Rise of Subtextual Attacks Unlike traditional cyber attacks, which are often direct and identifiable, subtextual attacks rely on subtlety and deception. Attackers craft messages that on the surface appear harmless or unrelated to any malicious activity. However, embedded within these communications are instructions, links, or information that can compromise security, manipulate behavior, or extract sensitive data. And not only is big data paramount in advertising and other avenues, but it’s also like keeping everything in your wallet—it’s convenient, helpful even, but signals to attackers that you’re indeed willing to put all your eggs in one basket when it comes to communications. These attacks exploit the nuances of language and context and require a sophisticated understanding of human communication and digital interaction patterns. For instance, a seemingly benign email might include a specific choice of words or phrases that, when interpreted correctly, reveal a hidden command or a disguised link to a malicious site. Psychological Manipulation Through Subtext Subtextual attacks also leverage psychological manipulation, influencing individuals to act in ways that compromise security or divulge confidential information. By understanding the psychological triggers and behavioral patterns of targets, attackers craft messages that subtly guide the recipient\'s actions. For instance, an attacker might use social engineering techniques combined with subtextual cues to convince a user to bypass normal security protocols. An email that seems to come from a trusted colleague or superior, containing subtle suggestions or cues, can be more effective in eliciting certain actions than a direct request or command. Attackers can also exploit the principle of urgency or scarcity, embedding subtle cues in communications that prompt the recipient to act quickly, bypassing their usual critical thinking or security procedures. The Evolution of Digital Forensics To combat the growing rise of subtextual attacks, the field of digital forensics has evolved significantly over the past decade. Initially focused on recovering and analyzing electronic information to investigate crime, digital forensics now incorporates advanced linguistic analysis, data pattern recognition, and machine learning to detect hidden threats. Modern digital forensic tools can analyze vast qua Ransomware Tool Vulnerability Threat Medical ★★
DarkReading.webp 2024-04-08 20:49:32 Round 2: Modifier les soins de santé ciblés dans la deuxième attaque de ransomware
Round 2: Change Healthcare Targeted in Second Ransomware Attack
(lien direct)
RansomHub, qui est supposé avoir un certain lien avec ALPHV, a volé 4 To de données sensibles de la société de soins de santé assiégée.
RansomHub, which is speculated to have some connection to ALPHV, has stolen 4TB of sensitive data from the beleaguered healthcare company.
Ransomware Medical ★★
RecordedFuture.webp 2024-04-08 19:32:02 \\ 'ils mentent \\': Palau nie les allégations de Ransomware Gang au cours de la cyberattaque récente
\\'They\\'re lying\\': Palau denies claims by ransomware gang over recent cyberattack
(lien direct)
Le gouvernement de Palau a nié plusieurs nouvelles affirmations par un gang de ransomware que les deux parties étaient en contact à la suite d'une attaque le mois dernier. & NBSP;Le gang de ransomware de Dragonforce a officiellement publié des Palao sur son site de fuite dimanche, menaçant de publier des données volées au gouvernement de l'île de la nation \\ en trois jours. & Nbsp;Le groupe a répondu à un
The government of Palau denied several new claims by a ransomware gang that the two sides were in contact following an attack last month.  The DragonForce ransomware gang officially posted Palau to its leak site on Sunday, threatening to publish data stolen from the island-nation\'s government in three days.  The group responded to a
Ransomware ★★
The_Hackers_News.webp 2024-04-08 16:53:00 La baisse des attaques des ransomwares en 2024 et ce que cela signifie
The Drop in Ransomware Attacks in 2024 and What it Means
(lien direct)
L'industrie & nbsp; les ransomwares ont bondi en 2023 & NBSP; car il a vu une augmentation alarmante de 55,5% des victimes du monde entier, atteignant une échelle de 5 070. & NBSP; Mais 2024 commence à montrer une image très différente. & NBSP; Alors que les chiffres sont en flèche au quatrième trimestre 2023 avec 1309 cas., au premier trimestre 2024, l'industrie du ransomware était tombée à 1 048 cas.Il s'agit d'une diminution de 22% des attaques de ransomwares par rapport au T4 2023. Chiffre
The ransomware industry surged in 2023 as it saw an alarming 55.5% increase in victims worldwide, reaching a staggering 5,070. But 2024 is starting off showing a very different picture. While the numbers skyrocketed in Q4 2023 with 1309 cases, in Q1 2024, the ransomware industry was down to 1,048 cases. This is a 22% decrease in ransomware attacks compared to Q4 2023. Figure
Ransomware ★★★
RiskIQ.webp 2024-04-08 15:09:15 Faits saillants hebdomadaires, 8 avril 2024
Weekly OSINT Highlights, 8 April 2024
(lien direct)
Last week\'s OSINT reporting reveals several key trends emerge in the realm of cybersecurity threats. Firstly, there is a notable diversification and sophistication in attack techniques employed by threat actors, ranging from traditional malware distribution through phishing emails to advanced methods like DLL hijacking and API unhooking for evading detection. Secondly, the threat landscape is characterized by the presence of various actors, including state-sponsored groups like Earth Freybug (a subset of APT41) engaging in cyberespionage and financially motivated attacks, as well as cybercrime actors orchestrating malware campaigns such as Agent Tesla and Rhadamanthys. Thirdly, the targets of these attacks span across different sectors and regions, with organizations in America, Australia, and European countries facing significant threats. Additionally, the emergence of cross-platform malware like DinodasRAT highlights the adaptability of threat actors to target diverse systems, emphasizing the need for robust cybersecurity measures across all platforms. Overall, these trends underscore the dynamic and evolving nature of cyber threats, necessitating continuous vigilance and proactive defense strategies from organizations and cybersecurity professionals. **1. [Latrodectus Loader Malware Overview](https://sip.security.microsoft.com/intel-explorer/articles/b4fe59bf)** Latrodectus is a new downloader malware, distinct from IcedID, designed to download payloads and execute arbitrary commands. It shares characteristics with IcedID, indicating possible common developers. **2. [Earth Freybug Cyberespionage Campaign](https://sip.security.microsoft.com/intel-explorer/articles/327771c8)** Earth Freybug, a subset of APT41, engages in cyberespionage and financially motivated attacks since at least 2012. The attack involved sophisticated techniques like DLL hijacking and API unhooking to deploy UNAPIMON, evading detection and enabling malicious commands execution. **3. [Agent Tesla Malware Campaign](https://sip.security.microsoft.com/intel-explorer/articles/cbdfe243)** Agent Tesla malware targets American and Australian organizations through phishing campaigns aimed at stealing email credentials. Check Point Research identified two connected cybercrime actors behind the operation. **4. [DinodasRAT Linux Version Analysis](https://sip.security.microsoft.com/intel-explorer/articles/57ab8662)** DinodasRAT, associated with the Chinese threat actor LuoYu, is a cross-platform backdoor primarily targeting Linux servers. The latest version introduces advanced evasion capabilities and is installed to gain additional footholds in networks. **5. [Rhadamanthys Information Stealer Malware](https://sip.security.microsoft.com/intel-explorer/articles/bf8b5bc1)** Rhadamanthys utilizes Google Ads tracking to distribute itself, disguising as popular software installers. After installation, it injects into legitimate Windows files for data theft, exploiting users through deceptive ad redirects. **6. [Sophisticated Phishing Email Malware](https://sip.security.microsoft.com/intel-explorer/articles/abfabfa1)** A phishing email campaign employs ZIP file attachments leading to a series of malicious file downloads, culminating in the deployment of PowerShell scripts to gather system information and download further malware. **7. [AceCryptor Cryptors-as-a-Service (CaaS)](https://sip.security.microsoft.com/intel-explorer/articles/e3595388)** AceCryptor is a prevalent cryptor-as-a-service utilized in Rescoms campaigns, particularly in European countries. Threat actors behind these campaigns abuse compromised accounts to send spam emails, aiming to obtain credentials for further attacks. ## Learn More For the latest security research from the Microsoft Threat Intelligence community, check out the Microsoft Threat Intelligence Blog: [https://aka.ms/threatintelblog](https://aka.ms/threatintelblog).  Microsoft customers can use the following reports in Microsoft Defender Threat Intelligence to ge Ransomware Spam Malware Tool Threat Cloud APT 41 ★★★
RecordedFuture.webp 2024-04-08 14:04:13 Le gouvernement britannique a exhorté à monter sur le pied avant \\ 'avec des ransomwares au lieu d'absorber les coups de poing \\'
UK government urged to get on \\'forward foot\\' with ransomware instead of \\'absorbing the punches\\'
(lien direct)
Les responsables de Westminster sont invités à mettre plus d'argent derrière les opérations pour perturber les gangs de ransomware à la suite d'un nombre croissant d'attaques ayant un large éventail de services. & NBSP;L'objectif actuel du gouvernement britannique pour lutter contre la crise des ransomwares - encourageant les organisations à améliorer leur cybersécurité et à se préparer à récupérer rapidement
Officials in Westminster are being urged to put more money behind operations to disrupt ransomware gangs in the wake of a growing number of attacks impacting a wide range of services.  The British government\'s current focus for tackling the ransomware crisis - encouraging organizations to improve their cybersecurity, and to prepare to recover quickly
Ransomware ★★
News.webp 2024-04-08 13:00:09 Changer les soins de santé fait face à un deuxième dilemme de ransomware des semaines après l'attaque d'ALPHV
Change Healthcare faces second ransomware dilemma weeks after ALPHV attack
(lien direct)
Les théories abondent sur qui est vraiment responsable Change Healthcare serait extorqué par un deuxième gang de ransomwares, quelques semaines seulement après s'être remis d'une attaque alphv.…
Theories abound over who\'s truly responsible Change Healthcare is allegedly being extorted by a second ransomware gang, mere weeks after recovering from an ALPHV attack.…
Ransomware Medical ★★
silicon.fr.webp 2024-04-08 10:38:41 En miroir de la NIS2, l\'ANSSI américaine s\'interroge sur les ransomwares (lien direct) Chargée d'établir un cadre de signalement des attaques par ransomware, la CISA en questionne encore de multiples aspects. Ransomware ★★★
News.webp 2024-04-08 06:28:13 Chef de l'unité de cyber-espion israélienne exposée ... par sa propre erreur de confidentialité
Head of Israeli cyber spy unit exposed ... by his own privacy mistake
(lien direct)
plus: un autre gouvernement local entravé par les ransomwares;Énorme augmentation des logiciels malveillants infostabilité;et les vulns critiques en bref protéger votre vie privée en ligne est difficile.Si dur, en fait, que même un grand espion israélien qui a réussi à rester incognito pendant 20 ans s'est retrouvé exposé après une erreur de base.…
PLUS: Another local government hobbled by ransomware; Huge rise in infostealing malware; and critical vulns In Brief  Protecting your privacy online is hard. So hard, in fact, that even a top Israeli spy who managed to stay incognito for 20 years has found himself exposed after one basic error.…
Ransomware Malware ★★★
DarkReading.webp 2024-04-05 19:48:48 Panera pain alimente les soupçons des ransomwares avec silence
Panera Bread Fuels Ransomware Suspicions With Silence
(lien direct)
La chaîne de restaurants n'a pas fourni d'informations sur ce qui a conduit à une panne informatique généralisée, et les clients et les employés demandent des réponses.
The restaurant chain hasn\'t provided any information regarding what led to a widespread IT outage, and customers and employees are asking for answers.
Ransomware ★★
RecordedFuture.webp 2024-04-05 19:15:19 Tentative de piratage sur New York continue une vague de cyberattaques contre les gouvernements municipaux
Attempted hack on NYC continues wave of cyberattacks against municipal governments
(lien direct)
2024 a déjà vu des dizaines de gouvernements locaux critiqués par des incidents de ransomwares et des cyberattaques, limitant les services de millions de personnes aux États-Unis.Le dernier incident de haut niveau concerne New York, qui a été contraint de retirer un site Web de paie de la ville hors ligne et de le retirer de la vue du public après avoir traité un incident de phishing.
2024 has already seen dozens of local governments slammed by ransomware incidents and cyberattacks, limiting services for millions of people across the United States. The latest high-profile incident involves New York City, which was forced to take a city payroll website offline and remove it from public view after dealing with a phishing incident.
Ransomware Hack ★★
bleepingcomputer.webp 2024-04-05 17:59:20 La semaine en ransomware - 5 avril 2024 - Machines virtuelles attaquées
The Week in Ransomware - April 5th 2024 - Virtual Machines under Attack
(lien direct)
Les attaques de ransomware ciblant VMware ESXi et d'autres plates-formes de machines virtuelles font des ravages parmi l'entreprise, provoquant une perturbation et une perte de services généralisées.[...]
Ransomware attacks targeting VMware ESXi and other virtual machine platforms are wreaking havoc among the enterprise, causing widespread disruption and loss of services. [...]
Ransomware ★★
CS.webp 2024-04-05 17:25:00 Alphv intensifie le blanchiment du changement de santé des soins de santé
ALPHV steps up laundering of Change Healthcare ransom payments
(lien direct)
> Alors que le groupe de ransomwares se déplace pour cacher ses 22 millions de dollars, son encoche d'affiliation est à la hauteur après avoir été affaibli en paiement.
>As the ransomware group moves to hide its $22 million, its affiliate notchy is laying low after reportedly being stiffed on payment. 
Ransomware Medical ★★
Checkpoint.webp 2024-04-05 13:00:05 Protéger le maillon le plus faible: comment les erreurs humaines peuvent mettre une entreprise en risque
Protecting the weakest link: how human errors can put a company in risk
(lien direct)
> selon & # 8220; le rapport mondial des risques 2022 & # 8221;95% des problèmes de cybersécurité proviennent des erreurs humaines.Le logiciel de point de contrôle met en évidence les mesures essentielles que les entreprises doivent mettre en œuvre pour assurer leur protection.Dans l'ère numérique d'aujourd'hui, la cybersécurité est devenue une priorité pour les entreprises, car les cyberattaques peuvent endommager leur économie et leur réputation.Selon Check Point, 71% des entreprises ont été victimes d'attaques de ransomwares en 2023, avec un paiement moyen de 4,35 millions de dollars.Les employés sont le premier lien de la chaîne de cybersécurité et le point d'entrée le plus vulnérable.Les statistiques brossent un tableau d'étournage de l'impact de l'erreur humaine dans la cybersécurité.Selon [& # 8230;]
>According to “The Global Risks Report 2022” 95% of cybersecurity issues originate from human errors. Check Point Software highlights essential measures that companies must implement to ensure their protection. In today’s digital age, cybersecurity has become a priority for businesses, as cyber attacks can damage their economy and reputation. According to Check Point, 71% of businesses were victims of ransomware attacks in 2023, with an average payout of $4.35 million. Employees are the first link in the cybersecurity chain and the most vulnerable entry point. Statistics paint a starling picture of the impact of human error in cybersecurity. According to […]
Ransomware ★★
bleepingcomputer.webp 2024-04-05 09:52:22 Panera Bread d'une semaine d'une semaine provoquée par une attaque de ransomware
Panera Bread week-long IT outage caused by ransomware attack
(lien direct)
La récente panne de Panera Bread \\ d'une semaine a été causée par une attaque de ransomware, selon des personnes familières avec la question et les e-mails vus par BleepingComputer.[...]
Panera Bread\'s recent week-long outage was caused by a ransomware attack, according to people familiar with the matter and emails seen by BleepingComputer. [...]
Ransomware ★★★
ProofPoint.webp 2024-04-05 06:00:25 Amélioration de la détection et de la réponse: plaider en matière de tromperies
Improving Detection and Response: Making the Case for Deceptions
(lien direct)
Let\'s face it, most enterprises find it incredibly difficult to detect and remove attackers once they\'ve taken over user credentials, exploited hosts or both. In the meantime, attackers are working on their next moves. That means data gets stolen and ransomware gets deployed all too often.   And attackers have ample time to accomplish their goals. In July 2023, the reported median dwell time was eight days. That\'s the time between when an attacker accesses their victim\'s systems and when the attack is either detected or executed.   Combine that data point with another one-that attackers take only 16 hours to reach Active Directory once they have landed-and the takeaway is that threats go undetected for an average of seven days. That\'s more than enough time for a minor security incident to turn into a major business-impacting breach.   How can you find and stop attackers more quickly? The answer lies in your approach. Let\'s take a closer look at how security teams typically try to detect attackers. Then, we can better understand why deceptions can work better.   What is the problem with current detection methods?  Organizations and their security vendors have evolved when it comes to techniques for detecting active threats. In general, detection tools have focused on two approaches-finding files or network traffic that are “known-bad” and detecting suspicious or risky activity or behavior.   Often called signature-based detection, finding “known-bad” is a broadly used tool in the detection toolbox. It includes finding known-bad files like malware, or detecting traffic from known-bad IPs or domains. It makes you think of the good old days of antivirus software running on endpoints, and about the different types of network monitoring or web filtering systems that are commonplace today.   The advantage of this approach is that it\'s relatively inexpensive to build, buy, deploy and manage. The major disadvantage is that it isn\'t very effective against increasingly sophisticated threat actors who have an unending supply of techniques to get around them.   Keeping up with what is known-bad-while important and helpful-is also a bit like a dog chasing its tail, given the infinite internet and the ingenuity of malicious actors.  The rise of behavior-based detection  About 20 years ago, behavioral-based detections emerged in response to the need for better detection. Without going into detail, these probabilistic or risk-based detection techniques found their way into endpoint and network-based security systems as well as SIEM, email, user and entity behavior analytics (UEBA), and other security systems.   The upside of this approach is that it\'s much more nuanced. Plus, it can find malicious actors that signature-based systems miss. The downside is that, by definition, it can generate a lot of false positives and false negatives, depending on how it\'s tuned.   Also, the high cost to build and operate behavior-based systems-considering the cost of data integration, collection, tuning, storage and computing-means that this approach is out of reach for many organizations. This discussion is not intended to discount the present and future benefits of newer analytic techniques such as artificial intelligence and machine learning. I believe that continued investments in behavior-based detections can pay off with the continued growth of security data, analytics and computing power. However, I also believe we should more seriously consider a third and less-tried technique for detection.  Re-thinking detection   Is it time to expand our view of detection techniques? That\'s the fundamental question. But multiple related questions are also essential:  Should we be thinking differently about what\'s the best way to actively detect threats?  Is there a higher-fidelity way to detect attackers that is cost-effective and easy to deploy and manage?  Is there another less-tried approach for detecting threat actors-beyond signature-based and behavior-based methods-that can dra Ransomware Malware Tool Vulnerability Threat ★★
DarkReading.webp 2024-04-04 22:29:05 Sexi Ransomware désire les hyperviseurs VMware dans la campagne en cours
SEXi Ransomware Desires VMware Hypervisors in Ongoing Campaign
(lien direct)
Une variante BABUK a été impliquée dans au moins quatre attaques contre les serveurs VMware ESXi au cours des six dernières semaines, dans un cas exigeant 140 millions de dollars d'une entreprise de centre de données chilien.
A Babuk variant has been involved in at least four attacks on VMware EXSi servers in the last six weeks, in one case demanding $140 million from a Chilean data center company.
Ransomware ★★★
RecordedFuture.webp 2024-04-04 21:07:53 \\ 'Une attaque contre la réputation de Palau \\': les responsables se demandent qui était vraiment derrière l'incident du ransomware
\\'An attack on the reputation of Palau\\': officials question who was really behind ransomware incident
(lien direct)
Les employés du gouvernement sur l'île de Palau sont entrés en œuvre le 14 mars et ont démarré leurs ordinateurs comme n'importe quel autre jour.Mais lorsque les écrans Windows ne se chargeraient pas, ils l'ont appelé. & Nbsp;Ils ont rapidement découvert deux notes de rançon distinctes: une sur une feuille de papier dans l'imprimante du gang de ransomware de verrouillage
Government employees on the island of Palau came into work on March 14 and booted up their computers like any other day. But when the Windows screens wouldn\'t load they called up IT.  They quickly discovered two separate ransom notes: one on a sheet of paper in the printer from the LockBit ransomware gang
Ransomware ★★
InfoSecurityMag.webp 2024-04-04 16:30:00 Lockbit se précipite après le retrait, repopule le site de fuite avec de vieilles violations
LockBit Scrambles After Takedown, Repopulates Leak Site with Old Breaches
(lien direct)
Un rapport micro tendance montre une baisse claire du nombre d'infections réelles associées au ransomware de verrouillage suivant l'opération Cronos
A Trend Micro report shows a clear drop in the number of actual infections associated with the LockBit ransomware following Operation Cronos
Ransomware Prediction ★★
InfoSecurityMag.webp 2024-04-04 16:00:00 Systèmes informatiques du comté de Jackson frappés par une attaque de ransomware
Jackson County IT Systems Hit By Ransomware Attack
(lien direct)
Un état d'urgence a été déclaré, causé par des incohérences opérationnelles à travers les infrastructures numériques
A state of emergency was declared, caused by operational inconsistencies across digital infrastructure
Ransomware ★★
TechRepublic.webp 2024-04-04 15:06:24 Les menaces de ransomware en Asie-Pacifique dépendent du pays et du secteur, explique Rapid7
Asia-Pacific Ransomware Threats Depend on Country and Sector, Says Rapid7
(lien direct)
Les agents de cybersécurité ont été avertis d'examiner les menaces de ransomware spécifiques auxquelles sont confrontés leur pays et leur industrie, tout en fermant les voies communes utilisées par des courtiers à accès qualifié.
Cyber security operatives have been warned to look at the specific ransomware threats facing their country and industry, while closing down common pathways being used by skilled access brokers.
Ransomware ★★
Blog.webp 2024-04-04 13:23:08 New Red Ransomware Group (Red Cryptoapp) expose les victimes sur Wall of Shame
New Red Ransomware Group (Red CryptoApp) Exposes Victims on Wall of Shame
(lien direct)
> Par waqas Un nouveau groupe de ransomwares, Red CryptoApp (Red Ransomware Group), fait bouger les choses.Contrairement à d'autres, ils humilient les victimes en publiant leurs noms sur un «mur de honte».Découvrez comment Red Cryptoapp cible les victimes, quelles industries sont en danger et comment vous protéger. Ceci est un article de HackRead.com Lire la publication originale: New Red Ransomware Group (Red Cryptoapp) expose les victimes sur Wall of Shame
>By Waqas A new ransomware group, Red CryptoApp (Red Ransomware Group), is shaking things up. Unlike others, they humiliate victims by publishing their names on a "wall of shame." Learn how Red CryptoApp targets victims, what industries are at risk, and how to protect yourself. This is a post from HackRead.com Read the original post: New Red Ransomware Group (Red CryptoApp) Exposes Victims on Wall of Shame
Ransomware ★★
InfoSecurityMag.webp 2024-04-04 12:00:00 Leicester Council confirme les documents confidentiels divulgués dans l'attaque des ransomwares
Leicester Council Confirms Confidential Documents Leaked in Ransomware Attack
(lien direct)
Le conseil municipal de Leicester a confirmé qu'environ 25 documents sensibles ont été divulgués en ligne, y compris des informations d'identité personnelle, à la suite des réclamations du gang de la rançon Inc
Leicester City Council confirmed around 25 sensitive documents have been leaked online, including personal ID information, following claims by the Inc Ransom gang
Ransomware ★★
RecordedFuture.webp 2024-04-04 11:56:12 Le conseil municipal de Leicester confirme l'attaque des ransomwares après la fuite de documents confidentiels
Leicester City Council confirms ransomware attack after confidential documents leaked
(lien direct)
Le conseil municipal de Leicester en Angleterre a confirmé que le cyber-incident du mois dernier était une attaque de ransomware après avoir été informé que les criminels derrière l'incident avaient téléchargé des documents volés sur leur site d'extorsion Web sombre.Inc Ransom avait affirmé être à l'origine de l'attaque plus tôt cette semaine, ce qui a incité le directeur stratégique de Leicester \\, Richard Sword,
Leicester City Council in England has confirmed that last month\'s cyber incident was a ransomware attack after being made aware that the criminals behind the incident had uploaded stolen documents to their dark web extortion site. INC Ransom had claimed to be behind the attack earlier this week, prompting Leicester\'s strategic director, Richard Sword,
Ransomware ★★
Last update at: 2024-06-01 00:08:04
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter