What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
globalsecuritymag.webp 2024-06-06 15:38:00 Pourquoi la loi européenne sur la cyberrésilience doit revoir son approche de l\'open source (lien direct) Pourquoi la loi européenne sur la cyberrésilience doit revoir son approche de l'open source Par Alois Reitbauer, Chief Technology Strategist chez Dynatrace - Points de Vue Legislation
InfoSecurityMag.webp 2024-06-06 12:30:00 # Infosec2024: les rapports obligatoires des ransomwares seraient une décision positive, disent les experts
#Infosec2024: Mandatory Ransomware Reporting Would Be Positive Move, Say Experts
(lien direct)
Les experts de la police, des assurances et du secteur privé soutiennent que les propositions du gouvernement britannique sur les paiements des ransomwares pourraient bénéficier à la communauté
Police, insurance and private sector security experts argue UK government proposals on ransomware payments could benefit the community
Ransomware Legislation
knowbe4.webp 2024-06-06 12:27:15 «Opération Endgame» se termine par l'arrestation de 4 suspects cybercriminaux et 100 serveurs
“Operation Endgame” Ends with the Arrest of 4 Cybercriminal Suspects and 100 Servers
(lien direct)
La saison 1 de Les efforts coordonnés entre les agences d'application de la loi dans neuf pays ont entraîné une perturbation majeure des logiciels malveillants d'un groupe de menaces et ransomware opérations.
“Operation Endgame” Season 1 Ends with the Arrests of 4 Cybercriminal Suspects and 100 Servers Coordinated efforts between law enforcement agencies across nine countries has resulted in a major disruption of a threat group\'s malware and ransomware operations.
Malware Threat Legislation
SecurityWeek.webp 2024-06-06 11:37:41 Interpol et le FBI rompent un programme cyber en Moldavie pour obtenir l'asile pour les criminels recherchés
Interpol and FBI Break Up a Cyber Scheme in Moldova to Get Asylum for Wanted Criminals
(lien direct)
> Une opération multinationale par Interpol et le FBI ont réprimé les tentatives de Moldavie pour saboter l'un des outils clés de l'agence de police internationale, le système de préavis rouge.
>A multinational operation by Interpol and the FBI cracked down on attempts in Moldova to sabotage one of the international police agency\'s key tools, the Red Notice system.
Tool Legislation
CS.webp 2024-06-05 21:36:56 Le Congrès doit intervenir dans l'harmonisation de la cybersécurité, dit un responsable de la Maison Blanche
Congress needs to step in on cybersecurity harmonization, White House official says
(lien direct)
> Nicholas Leiserson d'ONCD \\ approuve le projet de loi du sénateur Gary Peters qui créerait un comité interagentif pour gérer les cyber réglementation.
>ONCD\'s Nicholas Leiserson endorses draft legislation from Sen. Gary Peters that would create an interagency committee to handle cyber regulations.
Legislation
AlienVault.webp 2024-06-05 10:00:00 Pourquoi les pare-feu ne suffisent pas dans le paysage de la cybersécurité d'aujourd'hui
Why Firewalls Are Not Enough in Today\\'s Cybersecurity Landscape
(lien direct)
The content of this post is solely the responsibility of the author.  LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Firewall technology has mirrored the complexities in network security, evolving significantly over time. Originally serving as basic traffic regulators based on IP addresses, firewalls advanced to stateful inspection models, offering a more nuanced approach to network security. This evolution continued with the emergence of Next-Generation Firewalls (NGFWs), which brought even greater depth through data analysis and application-level inspection. Yet, even with these advancements, firewalls struggle to contend with the increasingly sophisticated nature of cyberthreats. The modern digital landscape presents formidable challenges like zero-day attacks, highly evasive malware, encrypted threats, and social engineering tactics, often surpassing the capabilities of traditional firewall defenses. The discovery of CVE-2023-36845 in September 2023, affecting nearly 12,000 Juniper firewall devices, is a case in point. This zero-day exploit enabled unauthorized actors to execute arbitrary code, circumventing established security measures and exposing critical networks to risk. Incidents like this highlight the growing need for a dynamic and comprehensive approach to network security, one that extends beyond the traditional firewall paradigm. Human Element – The Weakest Link in Firewall Security While the discovery of CVEs highlights vulnerabilities to zero-day exploits, it also brings to the forefront another critical challenge in firewall security: human error. Beyond the sophisticated external threats, the internal risks posed by misconfiguration due to human oversight are equally significant. These errors, often subtle, can drastically weaken the protective capabilities of firewalls. Misconfigurations in Firewall Security Misconfigurations in firewall security, frequently a result of human error, can significantly compromise the effectiveness of these crucial security barriers. These misconfigurations can take various forms, each posing unique risks to network integrity. Common types of firewall misconfigurations include: Improper Access Control Lists (ACLs) Setup: ACLs define who can access what resources in a network. Misconfigurations here might involve setting rules that are too permissive, inadvertently allowing unauthorized users to access sensitive areas of the network. An example could be erroneously allowing traffic from untrusted sources or failing to restrict access to critical internal resources. Faulty VPN Configurations: Virtual Private Networks (VPNs) are essential for secure remote access. Misconfigured VPNs can create vulnerabilities, especially if they are not properly integrated with the firewall\'s rule set. Common errors include not enforcing strong authentication or neglecting to restrict access based on user roles and permissions. Outdated or Redundant Firewall Rules: Over time, the network environment changes, but firewall rules may not be updated accordingly. Outdated rules can create security gaps or unnecessary complexity. Redundant or conflicting rules can also lead to confusion in policy enforcement, potentially leaving the network open to exploitation. Incorrect Port Management: Open ports are necessary for network communication, but unnecessary open ports can be explo Malware Tool Vulnerability Threat Legislation Industrial
knowbe4.webp 2024-06-04 11:58:59 Améliorez la conformité NIS2: élevez votre cybersécurité avec sensibilisation et culture avant la date limite
Enhance NIS2 Compliance: Elevate Your Cybersecurity with Awareness & Culture Before The Deadline
(lien direct)
nis2 La directive NIS2, également connue sous le nom de directive sur le réseau et la sécurité de l'information, est un élément de loi crucial conçu pour améliorer la cybersécurité et protéger les infrastructures critiques à travers l'Union européenne (UE). La directive précédente NIS, il aborde ses lacunes et étend sa portée pour améliorer les exigences de sécurité, les obligations de déclaration et les capacités de gestion des crises.En tant qu'entreprise opérant dans l'UE, se conformant à La directive NIS2 est essentiel pour protéger vos systèmes, atténuer les cybermenaces et assurer la résilience.
NIS2 The NIS2 Directive, also known as the Network and Information Security Directive, is a crucial piece of legislation designed to enhance cybersecurity and protect critical infrastructure across the European Union (EU).Building on the previous NIS Directive, it addresses its shortcomings and expands its scope to improve security requirements, reporting obligations, and crisis management capabilities. As a business operating in the EU, complying with the NIS2 Directive is essential to safeguard your systems, mitigate cyber threats, and ensure resilience.
Legislation ★★
DarkReading.webp 2024-06-03 19:48:34 La chasse à Europol \\ commence pour Emotet Malware Mastermind
Europol\\'s Hunt Begins for Emotet Malware Mastermind
(lien direct)
L'opération internationale des forces de l'ordre Endgame déplace sa répression pour se concentrer sur les adversaires individuels.
International law enforcement Operation Endgame shifts its crackdown to focus on individual adversaries.
Malware Legislation ★★
The_Hackers_News.webp 2024-06-03 19:15:00 Les autorités augmentent les efforts pour capturer le cerveau derrière Emotet
Authorities Ramp Up Efforts to Capture the Mastermind Behind Emotet
(lien direct)
Les autorités de l'application des lois derrière l'Opération Endgame recherchent des informations liées à une personne qui porte le nom impair et qui serait le cerveau derrière le malware Emotet. & NBSP; On dit également que Odd est censé passer par les surnoms Aron, C700, CBD748, Ivanov Odd, Mors, Morse, Veron au cours des dernières années, selon une vidéo publiée par les agences. "Avec qui travaille-t-il? Quel est le sien
Law enforcement authorities behind Operation Endgame are seeking information related to an individual who goes by the name Odd and is allegedly the mastermind behind the Emotet malware.  Odd is also said to go by the nicknames Aron, C700, Cbd748, Ivanov Odd, Mors, Morse, Veron over the past few years, according to a video released by the agencies. "Who is he working with? What is his
Malware Legislation ★★
InfoSecurityMag.webp 2024-06-03 14:45:00 Les ransomwares augmentent malgré les démontages des forces de l'ordre
Ransomware Rises Despite Law Enforcement Takedowns
(lien direct)
L'activité des ransomwares a augmenté en 2023, en partie alimentée par de nouveaux groupes et des partenariats entre les groupes, Mandiant a observé
Ransomware activity rose in 2023, partly fueled by new groups and partnerships between groups, Mandiant has observed
Ransomware Legislation ★★★
Mandiant.webp 2024-06-03 14:00:00 Ransomwares rebonds: la menace d'extorsion augmente en 2023, les attaquants s'appuient sur les outils accessibles au public et légitimes
Ransomware Rebounds: Extortion Threat Surges in 2023, Attackers Rely on Publicly Available and Legitimate Tools
(lien direct)
Written by: Bavi Sadayappan, Zach Riddle, Jordan Nuce, Joshua Shilko, Jeremy Kennelly
  A version of this blog post was published to the Mandiant Advantage portal on April 18, 2024. Executive Summary In 2023, Mandiant observed an increase in ransomware activity as compared to 2022, based on a significant rise in posts on data leak sites and a moderate increase in Mandiant-led ransomware investigations. Mandiant observed an increase in the proportion of new ransomware variants compared to new families, with around one third of new families observed in 2023 being variants of previously identified ransomware families.  Actors engaged in the post-compromise deployment of ransomware continue to predominately rely on commercially available and legitimate tools to facilitate their intrusion operations. Notably, we continue to observe a decline in the use of Cobalt Strike BEACON, and a corresponding increase in the use of legitimate remote access tools. In almost one third of incidents, ransomware was deployed within 48 hours of initial attacker access. Seventy-six percent (76%) of ransomware deployments took place outside of work hours, with the majority occurring in the early morning.  Mandiant\'s recommendations to assist in addressing the threat posed by ransomware are captured in our Ransomware Protection and Containment Strategies: Practical Guidance for Hardening and Protecting Infrastructure, Identities and Endpoints white paper. Introduction Threat actors have remained driven to conduct ransomware operations due to their profitability, particularly in comparison to other types of cyber crime. Mandiant observed an increase in ransomware activity in 2023 compared to 2022, including a 75% increase in posts on data leak sites (DLS), and an over 20% increase in Mandiant-led investigations involving ransomware from 2022 to 2023 (Figure 1). These observations are consistent with other reporting, which shows a record-breaking more than $1 billion USD paid to ransomware attackers in 2023.  This illustrates that the slight dip in extortion activity observed in 2022 was an anomaly, potentially due to factors such as the invasion of Ukraine and the leaked CONTI chats. The current resurgence in extortion activity is likely driven by various factors, including the resettling of the cyber criminal ecosystem following a tumultuous year in 2022, new entrants, and new partnerships and ransomware service offerings by actors previously associated with prolific groups that had been disrupted. This blog post provides an overview of the ransomware landscape and common tactics, techniques, and procedures (TTPs) directly observed by Mandiant in 2023 ransomware incidents. Our analysis of TTPs relies primarily on data from Mandiant incident response engagements and therefore represe
Ransomware Data Breach Spam Malware Tool Vulnerability Threat Legislation Prediction Medical Cloud Commercial ★★★
SecurityWeek.webp 2024-06-03 13:11:06 Identités des cybercriminels liés aux chargeurs de logiciels malveillants révélés
Identities of Cybercriminals Linked to Malware Loaders Revealed
(lien direct)
> Les forces de l'ordre révèlent l'identité de huit cybercriminels liés à des chargeurs de logiciels malveillants récemment perturbés.
>Law enforcement reveals the identities of eight cybercriminals linked to recently disrupted malware loaders.
Malware Legislation ★★
RiskIQ.webp 2024-06-03 12:56:15 Les efforts d'influence russe convergent les Jeux olympiques de Paris 2024
Russian Influence efforts converge on 2024 Paris Olympics Games
(lien direct)
## Snapshot In the summer of 2023, a curious set of videos crept into social media platforms. Telegram feeds that normally promoted pro-Kremlin narratives suddenly began promoting a film called “Olympics Has Fallen.” Users were encouraged to scan a QR code that directed them to a Telegram channel of the same name. Upon arriving at this channel, viewers encountered a feature-length film with a similar aesthetic and a play on the title of the American political action movie “Olympus Has Fallen,” released more than a decade earlier.(1) AI-generated audio impersonating the voice of film actor Tom Cruise narrated a strange, meandering script disparaging the International Olympic Committee\'s leadership. Nearly a year later and with less than 80 days until the opening of the 2024 Paris Olympic Games, the Microsoft Threat Analysis Center (MTAC) has observed a network of Russia-affiliated actors pursuing a range of malign influence campaigns against France, French President Emmanuel Marcon, the International Olympic Committee (IOC), and the Paris Games. These campaigns may forewarn coming online threats to this summer\'s international competition. ## Activity Overview ### Russia\'s long history of disparaging the Olympic Games Modern Russia, as well as its predecessor the Soviet Union, has a longstanding tradition of seeking to undermine the Olympic Games. If they cannot participate in or win the Games, then they seek to undercut, defame, and degrade the international competition in the minds of participants, spectators, and global audiences. The Soviet Union boycotted the 1984 Summer Games held in Los Angeles and sought to influence other countries to do the same. US State Department officials linked Soviet actors to a campaign that covertly distributed leaflets to Olympic committees in countries including Zimbabwe, Sri Lanka, and South Korea.(2) The leaflets claimed non-white competitors would be targeted by US extremists-a claim that follows a tried-and-true active measures strategy: using divisive social issues to sow discord among a target audience.(3) A recurring aspect of Russian malign influence is its ability to resurface themes at a later time in a different country. Remarkably, four decades later, we are witnessing similar claims of anticipated extremist violence emerging in the context of the Paris Games this summer. Separately, in 2016, Russian hackers penetrated the World Anti-Doping Agency and revealed private medical information about American athletes Serena Williams, Venus Williams, and Simone Biles.(4) Two years later, the “Olympic Destroyer” cyberattack against the 2018 Winter Olympics in Pyeongchang, South Korea, managed to take some of the Winter Games\' internal servers offline. The US Department of Justice charged two Russian GRU officers in connection to the hack in 2020.(5) The slow burn of Russian President Vladimir Putin and the Kremlin\'s displeasure with the IOC and the ability to participate in the Olympics-an event of longstanding pride to the Russian government-has intensified in recent years. In 2017, the IOC concluded extensive investigations into Russia\'s state-sponsored use of performance-enhancing drugs across several Olympic Games in 2017 which resulted in Russia being formally barred from participating in the 2018 Winter Games.(6) Last year, in 2023, the IOC confirmed that Russian citizens would be allowed to compete in Paris but only as neutral athletes prohibited from sporting the flag or colors of the Russian Federation.(7) Shortly after this decision, MTAC began detecting a range of foreign malign influence operations that continue today, and we suspect may intensify as the 2024 Paris Opening Ceremony approaches.(8) ### Old world tactics meet the age of AI Starting in June 2023, prolific Russian influence actors-which Microsoft tracks as Storm-1679 and Storm-1099-pivoted their operations to take aim at the 2024 Olympic Games and French President Emmanuel Macron. These ongoing Russian influence operations have two cent Hack Tool Threat Legislation Medical ★★★
bleepingcomputer.webp 2024-05-31 12:40:00 Europol identifie 8 cybercriminels liés aux botnets de chargeur de logiciels malveillants
Europol identifies 8 cybercriminals tied to malware loader botnets
(lien direct)
Europol et les forces de l'ordre allemands ont révélé l'identité de huit cybercriminels liés aux divers compteurs et chargeurs de logiciels malveillants perturbés dans le cadre de l'opération de l'opération d'application de la loi de fin de partie.[...]
Europol and German law enforcement have revealed the identities of eight cybercriminals linked to the various malware droppers and loaders disrupted as part of the Operation Endgame law enforcement operation. [...]
Malware Legislation
DarkReading.webp 2024-05-30 20:20:19 Les flics essaignent l'infrastructure de botnet de cybercriminalité mondiale dans 2 OP massifs
Cops Swarm Global Cybercrime Botnet Infrastructure in 2 Massive Ops
(lien direct)
Europol a entrepris le retrait de botnet de logiciel malveillant tandis que les forces de l'ordre américaines ont démantelé un botnet de cybercriminalité tentaculaire pour la location.
Europol undertook dropper malware botnet takedown while US law enforcement dismantled a sprawling cybercrime botnet for hire.
Malware Legislation ★★★
ArsTechnica.webp 2024-05-30 19:41:08 L'opération d'application de la loi vise une cybercriminalité souvent négligée
Law enforcement operation takes aim at an often-overlooked cybercrime lynchpin
(lien direct)
Les responsables espèrent rompre un composant crucial pour le paysage des logiciels malveillants plus large.
Officials hope to sever a component crucial to the larger malware landscape.
Malware Legislation ★★★
News.webp 2024-05-30 18:00:07 Les flics euro perturbent les droppers de logiciels malveillants, saisissent des milliers de domaines
Euro cops disrupt malware droppers, seize thousands of domains
(lien direct)
Opération Endgame commence juste: \\ 'Restez à l'écoute, \' dit Europol Une opération internationale d'application de la loi dirigée par Europol a débuté avec l'annonce de plusieurs arrestations, fouilles, convulsions et démontage deMALWORED PROPPERS ET LEURS OPÉRATEURS.…
Operation Endgame just beginning: \'Stay tuned,\' says Europol An international law enforcement operation led by Europol has kicked off with the announcement of multiple arrests, searches, seizures and takedowns of malware droppers and their operators.…
Malware Legislation ★★★
CS.webp 2024-05-30 16:42:15 L'opération de police mondiale frappe contre les infrastructures de logiciels malveillants
Global police operation strikes against malware infrastructure
(lien direct)
> \\ 'Opération Endgame \' Variants de logiciels malveillants bien connus ciblés utilisés pour faciliter les ransomwares et autres cybercriminaux graves.
>\'Operation Endgame\' targeted well-known malware variants used to facilitate ransomware and other serious cybercrime.
Ransomware Malware Legislation ★★★★
The_Hackers_News.webp 2024-05-30 16:10:00 Europol arrête plus de 100 serveurs liés à IceDID, TrickBot et autres logiciels malveillants
Europol Shuts Down 100+ Servers Linked to IcedID, TrickBot, and Other Malware
(lien direct)
Europol a déclaré jeudi qu'il avait fermé l'infrastructure associée à plusieurs opérations de chargeur de logiciels malveillants telles que IceDID, SystemBC, Pikabot, SmokeLoader, Bumblebee et TrickBot dans le cadre d'un effort coordonné de l'effort d'application de la loi Opération Endgame. "Les actions se sont concentrées sur la perturbation des services criminels en arrêtant des objectifs de grande valeur, en supprimant les infrastructures criminelles et
Europol on Thursday said it shut down the infrastructure associated with several malware loader operations such as IcedID, SystemBC, PikaBot, SmokeLoader, Bumblebee, and TrickBot as part of a coordinated law enforcement effort codenamed Operation Endgame. "The actions focused on disrupting criminal services through arresting High Value Targets, taking down the criminal infrastructures and
Malware Legislation ★★
securityintelligence.webp 2024-05-30 16:00:00 Détails importants sur les rapports de ransomwares Circia
Important details about CIRCIA ransomware reporting
(lien direct)
> En mars 2022, l'administration Biden a signé la loi sur la Cyber ​​Incident Reportation for Critical Infrastructure Act of 2022 (Circia).Cette législation historique tâche l'agence de sécurité de cybersécurité et d'infrastructure (CISA) pour élaborer et mettre en œuvre des réglementations obligeant les entités couvertes à signaler les cyber-incidents couverts et les paiements de ransomwares.Les rapports d'incident Circia sont destinés à permettre [& # 8230;]
>In March 2022, the Biden Administration signed into law the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA). This landmark legislation tasks the Cybersecurity and Infrastructure Security Agency (CISA) to develop and implement regulations requiring covered entities to report covered cyber incidents and ransomware payments. The CIRCIA incident reports are meant to enable […]
Ransomware Legislation ★★★
Chercheur.webp 2024-05-30 15:19:44 \\ 'Opération Endgame \\' frappe les plates-formes de livraison de logiciels malveillants
\\'Operation Endgame\\' Hits Malware Delivery Platforms
(lien direct)
Les organismes d'application de la loi aux États-Unis et en Europe ont annoncé aujourd'hui l'opération Endgame, une action coordonnée contre certaines des plates-formes de cybercriminalité les plus populaires pour fournir des ransomwares et des logiciels malveillants de volume de données.Surnommé "la plus grande opération de tous les temps contre les botnets", l'effort international est présenté comme la salve d'ouverture dans une campagne en cours ciblant les "droppers" ou les "chargeurs" de logiciels malveillants avancés comme Icedid, Smokeloader et Trickbot.
Law enforcement agencies in the United States and Europe today announced Operation Endgame, a coordinated action against some of the most popular cybercrime platforms for delivering ransomware and data-stealing malware. Dubbed "the largest ever operation against botnets," the international effort is being billed as the opening salvo in an ongoing campaign targeting advanced malware "droppers" or "loaders" like IcedID, Smokeloader and Trickbot.
Ransomware Malware Legislation ★★★★
News.webp 2024-05-30 13:00:06 Le travailleur informatique a poursuivi \\ 'Vengeful \\' cyber-harcèlement de policier qui a publié un billet Jaywalking
IT worker sued over \\'vengeful\\' cyber harassment of policeman who issued a jaywalking ticket
(lien direct)
Son employeur de l'hôpital est également poursuivi pour ne pas avoir intervenu plus tôt dans un procès civil en cours, un travailleur informatique est accusé d'avoir lancé une "cyber-campagne destructrice de haine et de vengeance" contre un policier etSa famille après avoir reçu un billet pour Jaywalking.…
His hospital employer is also being sued for not stepping in sooner In an ongoing civil lawsuit, an IT worker is accused of launching a "destructive cyber campaign of hate and revenge" against a police officer and his family after being issued with a ticket for jaywalking.…
Legislation ★★
SecurityWeek.webp 2024-05-30 12:24:30 Trickbot et autres gouttes de logiciels malveillants perturbés par les forces de l'ordre
TrickBot and Other Malware Droppers Disrupted by Law Enforcement
(lien direct)
> Le botnet Trickbot et d'autres gouttes de logiciels malveillants ont été ciblés par les forces de l'ordre internationales dans l'opération Endgame.
>The TrickBot botnet and other malware droppers have been targeted by international law enforcement in Operation Endgame.
Malware Legislation ★★
InfoSecurityMag.webp 2024-05-30 10:05:00 L'opération dirigée par les États-Unis élimine le plus grand botnet de World \\
US-Led Operation Takes Down World\\'s Largest Botnet
(lien direct)
Une opération mondiale d'application de la loi a perturbé le 911 S5 Botnet, un réseau mondial d'appareils compromis utilisés pour faciliter l'activité criminelle
A global law enforcement operation has disrupted the 911 S5 botnet, a global network of compromised devices used to facilitate criminal activity
Legislation ★★
ProofPoint.webp 2024-05-30 08:26:14 Les principaux botnets perturbés par le retrait mondial des forces de l'ordre
Major Botnets Disrupted via Global Law Enforcement Takedown
(lien direct)
Global law enforcement recently announced Operation Endgame, a widespread effort to disrupt malware and botnet infrastructure and identify the alleged individuals associated with the activity. In a press release, Europol called it the “largest ever operation against botnets, which play a major role in the deployment of ransomware.” In collaboration with private sector partners including Proofpoint, the efforts disrupted the infrastructure of IcedID, SystemBC, Pikabot, SmokeLoader, Bumblebee, and Trickbot. Per Europol, in conjunction with the malware disruption, the coordinated action led to four arrests, over 100 servers taken down across 10 countries, over 2,000 domains brought under the control of law enforcement, and illegal assets frozen. Malware Details SmokeLoader SmokeLoader is a downloader that first appeared in 2011 and is popular among threat actors. It is a modular malware with various stealer and remote access capabilities, and its main function is to install follow-on payloads. Proofpoint observed SmokeLoader in hundreds of campaigns since 2015, and it was historically used by major initial access brokers including briefly by TA577 and TA511 in 2020. Many SmokeLoader campaigns are not attributed to tracked threat actors, as the malware is broadly available for purchase on various forums. Its author claims to only sell to Russian-speaking users.  Proofpoint has observed approximately a dozen SmokeLoader campaigns in 2024, with the malware leading to the installation of Rhadamanthys, Amadey, and various ransomware. Many SmokeLoader campaigns from 2023 through 2024 are attributed to an actor known as UAC-0006 that targets Ukrainian organizations with phishing lures related to “accounts” or “payments.” Example macro-enabled document delivering SmokeLoader in a May 2024 campaign. CERT-UA attributes this activity to UAC-0006. SystemBC SystemBC is a proxy malware and backdoor leveraging SOCKS5 first identified by Proofpoint in 2019. Initially observed being delivered by exploit kits, it eventually became a popular malware used in ransomware-as-a-service operations. Proofpoint rarely observes SystemBC in email threat data, as it is typically deployed post-compromise. However, our researchers observed it used in a handful of campaigns from TA577 and TA544, as well as dropped by TA542 following Emotet infections. IcedID IcedID is a malware originally classified as a banking trojan and first detected by Proofpoint in 2017. It also acted as a loader for other malware, including ransomware. The well-known IcedID version consists of an initial loader which contacts a Loader C2 server, downloads the standard DLL Loader, which then delivers the standard IcedID Bot. Proofpoint has observed nearly 1,000 IcedID campaigns since 2017. This malware was a favored payload by numerous initial access brokers including TA511, TA551, TA578, and occasionally TA577 and TA544, as well as numerous unattributed threats It was also observed dropped by TA542, the Emotet threat actor, which was the only actor observed using the “IcedID Lite” variant Proofpoint identified in 2022. IcedID was often the first step to ransomware, with the malware being observed as a first-stage payload in campaigns leading to ransomware including Egregor, Sodinokibi, Maze, Dragon Locker, and Nokoyawa. Proofpoint has not observed IcedID in campaign data since November 2023, after which researchers observed campaigns leveraging the new Latrodectus malware. It is likely the IcedID developers are also behind Latrodectus malware. IcedID\'s widespread use by advanced cybercriminal threats made it a formidable malware on the ecrime landscape. Its disruption is great news for defenders. Pikabot Pikabot is a malware that has two components, a loader and a core module, designed to execute arbitrary commands and load additional payloads. Pikabot\'s main objective is to download follow-on malware. Pikabot first appeared in campaign data in March 2023 used by TA577 and has since been almost exclusively used by this actor. Pikab Ransomware Malware Threat Legislation Technical ★★★
The_State_of_Security.webp 2024-05-30 07:39:13 "Le plus grand botnet de tous les temps" a perturbé.911 S5 \\'s Mastermind arrêté
"Largest Botnet Ever" Disrupted. 911 S5\\'s Alleged Mastermind Arrested
(lien direct)
Un vaste réseau de millions d'ordinateurs compromis, utilisés pour faciliter un large éventail de cybercriminaux, a été perturbé par une opération multinationale d'application de la loi.Le botnet 911 S5, décrit comme «le plus grand botnet du monde \\ de tous les temps» par le réalisateur du FBI Christopher Wray, a fait saisir son infrastructure et ses actifs et son cerveau présumé arêté et inculpé.Yunhe Wang, 35 ans, un double citoyen de Chine et St. Kitts et Nevis, est allégué avec des co-conspirateurs pour avoir exploité le 911 S5 Botnet et créé et distribué des logiciels malveillants pour compromettre et détourner des millions de fenêtres ...
A vast network of millions of compromised computers, being used to facilitate a wide range of cybercrime, has been disrupted by a multinational law enforcement operation. The 911 S5 botnet, described as "likely the world\'s largest botnet ever" by FBI Director Christopher Wray, has had its infrastructure and assets seized and its alleged mastermind arrested and charged. 35-year-old YunHe Wang, a dual citizen of China and St. Kitts and Nevis, is alleged with co-conspirators to have operated the 911 S5 botnet and created and distributed malware to compromise and hijack millions of Windows...
Malware Legislation ★★
bleepingcomputer.webp 2024-05-30 04:35:39 Police seize over 100 malware loader servers, arrest four cybercriminals (lien direct) Une opération internationale d'application de la loi CodeNamed \\ 'Operation Endgame \' a saisi plus de 100 serveurs dans le monde utilisés par plusieurs opérations de chargeur de logiciels malveillants majeures, notamment Icedid, Pikabot, Trickbot, Bumblebee, SmokeLoader et SystemBC.[...]
An international law enforcement operation codenamed \'Operation Endgame\' has seized over 100 servers worldwide used by multiple major malware loader operations, including IcedID, Pikabot, Trickbot, Bumblebee, Smokeloader, and SystemBC. [...]
Malware Legislation ★★
bleepingcomputer.webp 2024-05-30 04:35:39 La police saisit plus de 100 serveurs de chargeur de logiciels malveillants, arrêtez quatre cybercriminels
Police seize over 100 malware loader servers, arrest four cybercriminals
(lien direct)
Une opération internationale d'application de la loi CodeNamed \\ 'Operation Endgame \' a saisi plus de 100 serveurs dans le monde utilisés par plusieurs opérations de chargeur de logiciels malveillants majeures, notamment Icedid, Pikabot, Trickbot, Bumblebee, SmokeLoader et SystemBC.[...]
An international law enforcement operation codenamed \'Operation Endgame\' has seized over 100 servers worldwide used by multiple major malware loader operations, including IcedID, Pikabot, Trickbot, Bumblebee, Smokeloader, and SystemBC. [...]
Malware Legislation ★★
BBC.webp 2024-05-30 04:00:22 L'un des plus grands botnets du monde \\ a été abattu, nous dit que nous dit
One of world\\'s biggest botnets taken down, US says
(lien direct)
Les organismes d'application de la loi du monde entier ont fermé un prétendu réseau mondial de logiciels malveillants qui a volé 5,9 milliards de dollars.
Law enforcement agencies from around the world have shut down an alleged global malware network which stole $5.9bn.
Malware Legislation
DarkReading.webp 2024-05-29 21:32:32 Le site de fuite BreachForums revient à vie des semaines après le retrait du FBI
Leak Site BreachForums Springs Back to Life Weeks After FBI Takedown
(lien direct)
Il n'est pas clair si un ensemble de données à vendre sur le site contiendrait des données de plus de 500 millions d'utilisateurs de Ticketmaster est réel ou simplement appât l'application de la loi.
It\'s unclear whether a dataset for sale on the site allegedly containing data from more than 500 million TicketMaster users is real or just law enforcement bait.
Legislation
RecordedFuture.webp 2024-05-29 19:39:52 La police indienne arrête cinq accusés de trafic de personnes dans des composés d'escroquerie
Indian police arrest five accused of trafficking people into scam compounds
(lien direct)
Il n'est pas clair si un ensemble de données à vendre sur le site contiendrait des données de plus de 500 millions d'utilisateurs de Ticketmaster est réel ou simplement appât l'application de la loi.
It\'s unclear whether a dataset for sale on the site allegedly containing data from more than 500 million TicketMaster users is real or just law enforcement bait.
Legislation
The_Hackers_News.webp 2024-05-29 17:20:00 Sentiments américains de 31 ans à 10 ans pour blanchir 4,5 millions de dollars d'escroqueries par e-mail
U.S. Sentences 31-Year-Old to 10 Years for Laundering $4.5M in Email Scams
(lien direct)
Le ministère américain de la Justice (DOJ) a condamné un homme de 31 ans à 10 ans de prison pour avoir blanchi plus de 4,5 millions de dollars grâce à des programmes de compromis par courrier électronique (BEC) et des escroqueries romanes. Malachi Mullings, 31 ans, de Sandy Springs, en Géorgie, a plaidé coupable aux infractions de blanchiment d'argent en janvier 2023. Selon des documents judiciaires, Mullings aurait ouvert 20 comptes bancaires dans le
The U.S. Department of Justice (DoJ) has sentenced a 31-year-old man to 10 years in prison for laundering more than $4.5 million through business email compromise (BEC) schemes and romance scams. Malachi Mullings, 31, of Sandy Springs, Georgia pleaded guilty to the money laundering offenses in January 2023. According to court documents, Mullings is said to have opened 20 bank accounts in the
Legislation ★★
The_Hackers_News.webp 2024-05-29 12:41:00 BreachForums revient quelques semaines seulement après la crise du FBI - pot de miel ou erreur?
BreachForums Returns Just Weeks After FBI Seizure - Honeypot or Blunder?
(lien direct)
Le bazar criminel en ligne BreachForums a été ressuscité deux semaines après une action coordonnée par les États-Unis. Les chercheurs en cybersécurité et les trackers du Web Dark Brett Callow, Dark Web Informer et Falconfeeds ont révélé le retour en ligne du site \\ sur BreachForums [.] ST & # 8211;l'un des sites démantelés & # 8211;par un utilisateur nommé Shinyhunters,
The online criminal bazaar BreachForums has been resurrected merely two weeks after a U.S.-led coordinated law enforcement action dismantled and seized control of its infrastructure. Cybersecurity researchers and dark web trackers Brett Callow, Dark Web Informer, and FalconFeeds revealed the site\'s online return at breachforums[.]st – one of the dismantled sites – by a user named ShinyHunters,
Legislation ★★★
News.webp 2024-05-28 18:45:10 BreachForums revient, quelques semaines après le retrait dirigé par FBI
BreachForums returns, just weeks after FBI-led takedown
(lien direct)
Le site Web Whack-A-Mole empire BreachForums est de retour en ligne quelques semaines seulement après que le célèbre site de fuite de ransomware a été saisi par les forces de l'ordre.… Ransomware Legislation ★★★★
The_Hackers_News.webp 2024-05-28 18:20:00 Indian National plaide coupable à 37 millions de dollars de vol de crypto-monnaie
Indian National Pleads Guilty to $37 Million Cryptocurrency Theft Scheme
(lien direct)
Un ressortissant indien a plaidé coupable aux États-Unis pour avoir volé plus de 37 millions de dollars en créant un site Web qui a mis l'identité de la plate-forme d'échange de crypto-monnaie Coinbase. Chirag Tomar, 30 ans, a plaidé coupable à une complot de fraude filaire, qui entraîne une peine maximale de 20 ans de prison et une amende de 250 000 $.Il a été arrêté le 20 décembre 2023 en entrant dans le pays. "Tomar et
An Indian national has pleaded guilty in the U.S. over charges of stealing more than $37 million by setting up a website that impersonated the Coinbase cryptocurrency exchange platform. Chirag Tomar, 30, pleaded guilty to wire fraud conspiracy, which carries a maximum sentence of 20 years in prison and a $250,000 fine. He was arrested on December 20, 2023, upon entering the country. "Tomar and
Legislation ★★★
Cybereason.webp 2024-05-28 17:59:38 Podcast de vie malveillante: le prince nigérian
Malicious Life Podcast: The Nigerian Prince
(lien direct)
Le prince nigérian Dans cet épisode de ML, nous explorons l'histoire de la célèbre arnaque du prince nigérian, également connu sous le nom de 419 ou arnaque des frais avancés, de ses racines dans une prison parisienne pendant la Révolution française,à la raison économique et sociale pour laquelle cette arnaque particulière est devenue si populaire auprès des jeunes africains.De plus, l'IA rendra ces escroqueries plus dangereuses - ou, contre-intuitivement, aller à l'encontre des intérêts des escrocs?
the nigerian prince In this episode of ML, we\'re exploring the history of the well-known Nigerian Prince scam, also known as 419 or advanced fee scam, from its roots in a Parisian prison during the French Revolution, to the economic and social reason why this particular scam became so popular with African youth. Also, will AI make such scams more dangerous - or, counter intuitively, go against the interests of scammers?
Legislation ★★★
Blog.webp 2024-05-28 13:44:34 Breach Forums Return to Clearnet and Dark Web Despite FBI Seizure (lien direct) > Par waqas Une histoire de cybercriminalité émergente et d'embarras pour la première agence d'application de la loi du monde. . Ceci est un article de HackRead.com Lire le post original: Les forums de violation reviennent à Clearnet et Dark Web malgré la crise du FBI
>By Waqas A tale of emerging cybercrime and embarrassment for the world\'s premier law enforcement agency. This is a post from HackRead.com Read the original post: Breach Forums Return to Clearnet and Dark Web Despite FBI Seizure
Legislation
Blog.webp 2024-05-28 13:44:34 Les forums de violation reviennent à Clearnet et Dark Web malgré la crise du FBI
Breach Forums Return to Clearnet and Dark Web Despite FBI Seizure
(lien direct)
> Par waqas Une histoire de cybercriminalité émergente et d'embarras pour la première agence d'application de la loi du monde. . Ceci est un article de HackRead.com Lire le post original: Les forums de violation reviennent à ClearNet et Dark Web malgré la crise du FBI
>By Waqas A tale of emerging cybercrime and embarrassment for the world\'s premier law enforcement agency. This is a post from HackRead.com Read the original post: Breach Forums Return to Clearnet and Dark Web Despite FBI Seizure
Legislation ★★★
silicon.fr.webp 2024-05-28 11:03:36 Net-Zero Industry Act : l\'UE adopte la loi pour stimuler la fabrication de technologies vertes (lien direct) L'UE adopte le Net-Zero Industry Act qui vise à stimuler la fabrication de technologies vertes de l'UE face à ses rivaux chinois et américains. Legislation ★★★
Korben.webp 2024-05-28 07:39:28 Reconnaissance faciale en France – Une menace pour nos libertés (lien direct) La reconnaissance faciale pourrait bientôt devenir une réalité en France, menaçant nos libertés fondamentales. Amnesty International appelle à une loi interdisant cette technologie de surveillance de masse, qui porte atteinte à la vie privée, limite la liberté d'expression et risque d'aggraver les discriminations. Legislation ★★★
Checkpoint.webp 2024-05-27 12:23:17 27 mai & # 8211;Rapport de renseignement sur les menaces
27th May – Threat Intelligence Report
(lien direct)
> Pour les dernières découvertes de cyber-recherche pour la semaine du 20 mai, veuillez télécharger notre bulletin menace_intelligence.Les principales attaques et violations d'une violation de données ont exposé 500 Go de données biométriques indiennes, affectant la police indienne, le personnel militaire et d'autres travailleurs publics lors des élections en Inde.La fuite provenait de bases de données non garanties gérées par ThoughtGreen Technologies [& # 8230;]
>For the latest discoveries in cyber research for the week of 20th May, please download our Threat_Intelligence Bulletin. TOP ATTACKS AND BREACHES A data breach has exposed 500GB of Indian biometric data, affecting Indian police, military personnel, and other public workers during elections in India. The leak stemmed from unsecured databases managed by ThoughtGreen Technologies […]
Data Breach Threat Legislation ★★
zataz.webp 2024-05-27 08:37:36 Des employés du blackmarket Rutor risquent la peine de mort en Indonésie (lien direct) Des frères jumeaux ukrainiens et un Russe ont été arrêtés par la police indonésienne à Jakarta. Il s'agirait d'employés du blackmarket RuTor.... Legislation ★★★
DarkReading.webp 2024-05-27 06:00:00 6 faits sur la façon dont Interpol combat la cybercriminalité
6 Facts About How Interpol Fights Cybercrime
(lien direct)
Alors vous pensez que vous connaissez Interpol?Voici quelques détails clés sur la façon dont cette entité internationale d'application de la loi perturbe la cybercriminalité dans le monde.
So you think you know Interpol? Here are some key details of how this international law enforcement entity disrupts cybercrime worldwide.
Legislation ★★★
Blog.webp 2024-05-25 13:31:29 La fuite de données expose 500 Go de police indienne, des données biométriques militaires
Data Leak Exposes 500GB of Indian Police, Military Biometric Data
(lien direct)
> Par waqas Les enregistrements appartenaient à deux entreprises distinctes basées en Inde, à ThoughtGreen Technologies et des technologies de synchronisation.Les deux fournissent un développement d'applications, une technologie RFID et des services de vérification biométrique. Ceci est un article de HackRead.com Lire le post original: La fuite de données expose 500 Go de police indienne, des données biométriques militaires
>By Waqas The records belonged to two separate India-based firms, ThoughtGreen Technologies and Timing Technologies. Both provide application development, RFID technology, and biometric verification services. This is a post from HackRead.com Read the original post: Data Leak Exposes 500GB of Indian Police, Military Biometric Data
Legislation ★★
CS.webp 2024-05-24 20:57:32 Ring de la cybercriminalité des jeunes puissants composé de 1 000 personnes, dit le responsable du FBI
Potent youth cybercrime ring made up of 1,000 people, FBI official says
(lien direct)
> Le groupe connu sous le nom d'araignée dispersée est l'un des groupes de cybercriminalité les plus percutants qui travaillent aujourd'hui et s'est avéré insaisissable aux forces de l'ordre jusqu'à présent.  
>The group known as Scattered Spider is one of the most impactful cybercrime groups working today and has proven elusive to law enforcement so far.  
Legislation ★★
CS.webp 2024-05-23 18:30:42 Le projet de loi sur la confidentialité remanié navigue dans le sous-comité de la maison
Revamped privacy bill sails through House subcommittee
(lien direct)
> Même si la législation a progressé par le biais d'un sous-comité clé, les membres des deux parties ont soulevé des préoccupations concernant la mesure, indiquant qu'il fait face à une route incertaine vers le passage et peut encore être considérablement modifié. 
>Even as the legislation advanced through a key subcommittee, members from both parties raised concerns with the measure, indicating that it faces an uncertain road toward passage and may still be significantly altered. 
Legislation ★★
WiredThreatLevel.webp 2024-05-23 16:00:00 Une fuite de données sur la police biométrique est un signe de choses à venir
A Leak of Biometric Police Data Is a Sign of Things to Come
(lien direct)
Des milliers d'empreintes digitales et d'images faciales liées à la police en Inde ont été exposées en ligne.Les chercheurs disent que c'est un avertissement de ce qui se passera à mesure que la collecte de données biométriques augmente.
Thousands of fingerprints and facial images linked to police in India have been exposed online. Researchers say it\'s a warning of what will happen as the collection of biometric data increases.
Legislation ★★
silicon.fr.webp 2024-05-23 12:51:03 Loi SREN : le sort en est jeté pour les fournisseurs cloud (lien direct) La loi SREN (sécuriser et réguler l'espace numérique) est promulguée. Sur le volet cloud, de multiples dispositions restent à préciser par décret. Legislation Cloud ★★
News.webp 2024-05-23 08:30:13 UK Data Watchdog veut six chiffres de N Ireland Cops après la fuite de données de 2023
UK data watchdog wants six figures from N Ireland cops after 2023 data leak
(lien direct)
Discount massif appliqué pour sauver le budget de l'hélicoptère de Save Cop Shop \\ à la suite d'une fuite de données qui a apporté "la peur tangible de la menace à la vie", le chien de garde de la protection des données du Royaume-Uni dit qu'il a l'intentePour amender le service de police d'Irlande du Nord (PSNI) & Pound; 750 000 (955 798 $).…
Massive discount applied to save cop shop\'s helicopter budget Following a data leak that brought "tangible fear of threat to life", the UK\'s data protection watchdog says it intends to fine the Police Service of Northern Ireland (PSNI) £750,000 ($955,798).…
Threat Legislation ★★★
InfoSecurityMag.webp 2024-05-23 08:30:00 PSNI Faces & Pound; 750 000 violation de données amende après une fuite de feuille de calcul
PSNI Faces £750,000 Data Breach Fine After Spreadsheet Leak
(lien direct)
Le service de police d'Irlande du Nord a été condamné à une amende et à 750k à la suite d'une grave violation de données l'année dernière
The Police Service of Northern Ireland has been fined £750K following a serious data breach last year
Data Breach Legislation ★★★
Last update at: 2024-06-07 02:08:12
See our sources.
My email:

To see everything: RSS Twitter