What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
RecordedFuture.webp 2024-03-18 12:53:43 La bibliothèque britannique saluée par la cyber-agence britannique pour sa réponse à l'attaque des ransomwares
British Library hailed by UK cyber agency for its response to ransomware attack
(lien direct)
Le chef intérim du National Cyber Security Center (NCSC) de Britain \\ a déclaré que la bibliothèque britannique "devrait être applaudie" pour avoir refusé de payer des frais d'extorsion aux criminels derrière une attaque de ransomware l'année dernière.La bibliothèque britannique - la Bibliothèque nationale du Royaume-Uni et une archive de millions de livres et de manuscrits -
The interim head of Britain\'s National Cyber Security Centre (NCSC) said the British Library “should be applauded” for refusing to pay an extortion fee to the criminals behind a ransomware attack last year. The British Library - the national library of the United Kingdom and an archive of millions of books and manuscripts -
Ransomware ★★
ProofPoint.webp 2024-03-18 12:03:01 Rapport IC3 de FBI \\: pertes de la cybercriminalité dépasse 12,5 milliards de dollars - un nouveau record
FBI\\'s IC3 Report: Losses from Cybercrime Surpass $12.5 Billion-a New Record
(lien direct)
The 2023 Internet Crime Report from the FBI\'s Internet Crime Complaint Center (IC3) is out. And for defenders, it\'s a troubling read. The FBI saw only a minor uptick in reported cybercrime complaints last year from the American public. On the surface, this seems like positive news. There were only 79,474 more complaints filed than in 2022. However, that total is much more significant when you consider the potential losses from cybercrime. Losses surpassed $12.5 billion last year, a 22% increase from 2022 and a new record high.  That staggering figure is part of a far more complex story about cybercrime in 2023. The report notes that:  Investment fraud losses surged, jumping from $3.31 billion in 2022 to $4.57 billion in 2023-a 38% increase  Business email compromise (BEC) cases were a top concern, with 21,489 complaints and adjusted losses exceeding $2.9 billion-up 7.4% from 2022  The allure of cryptocurrency played a pivotal role in both investment fraud and BEC incidents  Tech support scams were the third-costliest cybercrime category among the crime types that the IC3 tracks  In this post, we will examine these trends in more detail. And we will explain how Proofpoint can help businesses improve their defenses and meet these threats head-on.  Complaints and losses from cybercrime reported over the last five years. (Source: FBI\'s IC3 2023 Internet Crime Report.)  The rise of investment fraud  Investment scams have become the most reported and costliest type of crime that the IC3 tracks. In these scams, bad actors lure victims with promises of big returns on investments. Attackers have been targeting cryptocurrency investors, in particular.   The rise of this fraud highlights why due diligence and user self-awareness is so important. Users need to think twice and use caution when they are approached with investment opportunities, especially those that relate to cryptocurrencies.  Investment fraud losses reported over the last five years. (Source: FBI\'s IC3 2023 Internet Crime Report.)  An escalation in BEC threats  BEC is the second-most prevalent cyberthreat highlighted in the latest Internet Crime Report. The actors behind these scams aim to deceive users and businesses into making unauthorized fund transfers or divulging corporate information. These attacks involve sophisticated tactics like:  The compromise of legitimate business email accounts  Social engineering attacks  Impersonation scams  As more people use cryptocurrency exchanges and rely on third-party payment processors, it\'s increasingly important to stop BEC threats before they reach users. There is also a pressing need for automated remediation and heightened user vigilance to protect against these threats.  Vulnerable populations at risk for impersonation scams  The FBI\'s IC3 reports that impersonation scams led to over $1.3 billion in losses last year. To carry out these scams, bad actors use deceptive tactics, like directing victims to send cash through shipping companies or online wire services.  Adults over the age of 60 accounted for half of tech support scams last year. This amounted to $3.6 billion in losses. Individuals 30-39 years old were most likely to report these incidents to the FBI\'s IC3.  The prevalence of impersonation scams underscores the need to raise awareness among the vulnerable populations that are targeted by attackers. Understanding this risk will help them to be more wary and avoid becoming victims.  Ransomware attacks  Ransomware attacks encrypt data and cause service disruptions and financial losses. They are also a persistent threat. The FBI\'s IC3 received over 2,800 complaints about this attack type last year. Reported losses from these incidents exceeded $59.6 million-an 18% increase from 2022.   To understand just how costly these attacks can be, consider the plight of MGM Resorts. In September 2023, a targeted ransomware attack cost the entertainment giant over $100 million. MGM Resorts\' filing with the Securities and Exchange Commission notes that i Ransomware Threat Medical ★★
DarkReading.webp 2024-03-18 07:00:00 Les données de retraite du gouvernement sud-africain crainsent les craintes de l'étincelle
South African Government Pension Data Leak Fears Spark Probe
(lien direct)
Lockbit Ransomware Gang affirme que 668 Go de données qu'il a jetées en ligne ont été volées à l'agence de retraite de l'Afrique du Sud.
LockBit ransomware gang claims 668GB of data it dumped online was stolen from South Africa\'s pension agency.
Ransomware ★★
CS.webp 2024-03-15 21:41:32 Les groupes de soins de santé résistent aux règles de cybersécurité dans le sillage d'une violation historique
Health care groups resist cybersecurity rules in wake of landmark breach
(lien direct)
> Une attaque de ransomware contre un processeur de paiement a paralysé le système de soins de santé américain, créant une nouvelle dynamique pour les réglementations de cybersécurité.
>A ransomware attack on a payment processor has crippled the U.S. health care system, creating new momentum for cybersecurity regulations.
Ransomware ★★★
RecordedFuture.webp 2024-03-15 21:24:29 Le district scolaire de Scranton de Pennsylvania \\ traitant des attaques de ransomwares
Pennsylvania\\'s Scranton School District dealing with ransomware attack
(lien direct)
Les écoles de Scranton, en Pennsylvanie, ont affaire à une attaque de ransomware, a confirmé le district dans un message du vendredi aux étudiants.Sur Facebook, le district scolaire de Scranton a averti qu'il faisait face à des pannes technologiques généralisées à la suite de l'attaque. & NBSP;«L'attaque provoque une perturbation temporaire à certains de nos systèmes informatiques et
Schools in Scranton, Pennsylvania, are dealing with a ransomware attack, the district confirmed in a Friday message to students. On Facebook, the Scranton School District warned that it is dealing with widespread technology outages as a result of the attack.  “The attack is causing a temporary disruption to some of our computer systems and
Ransomware ★★
Fortinet.webp 2024-03-15 15:00:00 Ransomware Roundup & # 8211;Monde RA
Ransomware Roundup – RA World
(lien direct)
Le RA World Ransomware, qui a fait ses débuts à la fin de l'année dernière, prétend avoir plus de 20 organisations dans le monde en otage à des fins financières.Apprendre encore plus.
The RA World ransomware, which debuted late last year, claims to be holding more than 20 organizations worldwide hostage for financial gain. Learn more.
Ransomware ★★
RecordedFuture.webp 2024-03-15 13:45:16 Exclusif: après le démontage de Lockbit \\, son prétendu leader promet de pirater
Exclusive: After LockBit\\'s takedown, its purported leader vows to hack on
(lien direct)
Cette semaine, le podcast Click Here a décroché une entrevue rare avec le prétendu leader du groupe Ransomware Lockbit - il porte le nom LockbitsUpp.Il est sous pression parce que le mois dernier, une opération de police internationale a infiltré le groupe et a saisi non seulement leur plate-forme, mais aussi leurs outils de piratage, les comptes de crypto-monnaie et le code source
This week, the Click Here podcast landed a rare interview with the purported leader of the LockBit ransomware group - he goes by the name LockBitSupp. He\'s under pressure because last month an international police operation infiltrated the group and seized not just their platform, but their hacking tools, cryptocurrency accounts and source code
Ransomware Hack Tool Legislation ★★★
ESET.webp 2024-03-15 11:20:38 Les soins de santé sont toujours une cible principale pour les gangs de cybercriminalité & # 8211;Semaine en sécurité avec Tony Anscombe
Healthcare still a prime target for cybercrime gangs – Week in security with Tony Anscombe
(lien direct)
Les organisations de soins de santé restent fermement dans les attaquants \\ 'Crosshairs, ce qui représente 20% de toutes les victimes d'attaques de ransomwares entre les entités d'infrastructure critiques aux États-Unis en 2023
Healthcare organizations remain firmly in attackers\' crosshairs, representing 20 percent of all victims of ransomware attacks among critical infrastructure entities in the US in 2023
Ransomware Medical ★★
The_Hackers_News.webp 2024-03-14 19:17:00 Lockbit Ransomware Hacker a été condamné à 860 000 $ après un plaidoyer de culpabilité au Canada
LockBit Ransomware Hacker Ordered to Pay $860,000 After Guilty Plea in Canada
(lien direct)
Un ressortissant canadien russe de 34 ans a été condamné à près de quatre ans de prison au Canada pour sa participation à l'opération de ransomware mondial de Lockbit. Mikhail Vasiliev, un résident de l'Ontario, a été & nbsp; à l'origine arrêté & nbsp; en novembre 2022 et inculpé par le département américain de la Justice (DOJ) de "complot avec d'autres pour endommager intentionnellement les ordinateurs protégés et transmettre
A 34-year-old Russian-Canadian national has been sentenced to nearly four years in jail in Canada for his participation in the LockBit global ransomware operation. Mikhail Vasiliev, an Ontario resident, was originally arrested in November 2022 and charged by the U.S. Department of Justice (DoJ) with "conspiring with others to intentionally damage protected computers and to transmit
Ransomware ★★★
TroyHunt.webp 2024-03-14 18:35:36 Au milieu de l'attaque paralysante des ransomwares, sonde fédérale UnitedHealth \\'s Hipaa Compliance
Amid paralyzing ransomware attack, feds probe UnitedHealth\\'s HIPAA compliance
(lien direct)
UnitedHealth a déclaré qu'il coopérerait avec l'enquête pendant qu'il fonctionne pour restaurer les services.
UnitedHealth said it will cooperate with the probe as it works to restore services.
Ransomware ★★
InfoSecurityMag.webp 2024-03-14 14:45:00 Le gouvernement américain pour enquêter sur le changement d'attaque de ransomware de soins de santé
US Government to Investigate Change Healthcare Ransomware Attack
(lien direct)
Le gouvernement américain examinera si les informations protégées par les soins de santé ont été violées dans l'attaque des ransomwares du changement de santé et si l'entreprise a respecté les règles HIPAA
The US government will investigate whether protected healthcare information was breached in the Change Healthcare ransomware attack, and if the firm complied with HIPAA rules
Ransomware Medical ★★★
AlienVault.webp 2024-03-14 10:00:00 Spyware commercial: la menace furtive
Commercial spyware: The stealthy threat
(lien direct)
It can be difficult to over-estimate the benefits that we accrue from the use of technology in our day to day lives. But these benefits have come at a price which has redefined what we expect in terms of privacy. As a member of Generation X, which came of age at the dawn of the Internet era and witnessed the rise of an entire industry built on consumer information analytics, I have on occasion struck my own Faustian bargains, offering up my personal data in exchange for convenience. As have we all.  In doing so we are implicitly trusting the organization that runs the website or app in question to safeguard our information effectively.  Spyware, as the name suggests, is software designed to covertly gather data about a victim without their consent. Spyware can infect both computers and mobile devices, infiltrating them through malicious or hacked websites, phishing emails, and software downloads. Unlike other forms of malware that may seek to disrupt or damage systems, spyware operates discreetly, often evading detection while silently siphoning off sensitive information. When deployed against individuals this data can range from browsing habits and keystrokes to login credentials and financial information. Spyware can access microphones and cameras for purposes of gathering intelligence or evidence when deployed by government agencies, or capturing content for purposes of sale, blackmail, or other monetization schemes if deployed by threat actors. The effects of which can be devastating.  The proliferation of commercial spyware poses significant risks to companies as well. Commercial spyware is a niche industry which develops and markets software for the purpose of data collection. Their products use many of the same methods as other kinds of malware.  Often, commercial spyware leverages zero-day exploits that were either developed by the vendor in question or purchased from independent researchers. For example, in a recent report, Google researchers concluded that approximately half of the zero-day vulnerabilities targeting their products over the past decade were the work of “Commercial Surveillance Vendors” (https://www.scmagazine.com/news/spyware-behind-nearly-50-of-zeros-days-targeting-google-products).  Ransomware Malware Tool Vulnerability Threat Legislation Mobile Commercial ★★
SecurityWeek.webp 2024-03-14 09:40:12 La violation des données Nissan affecte 100 000 personnes
Nissan Data Breach Affects 100,000 Individuals
(lien direct)
> Nissan informe environ 100 000 personnes d'une violation de données résultant d'une attaque de ransomware menée par le groupe Akira Cybercrime.
>Nissan is notifying roughly 100,000 individuals of a data breach resulting from a ransomware attack conducted by the Akira cybercrime group.
Ransomware Data Breach
bleepingcomputer.webp 2024-03-14 09:04:25 Nissan confirme l'attaque de ransomware des données exposées de 100 000 personnes
Nissan confirms ransomware attack exposed data of 100,000 people
(lien direct)
Nissan Oceania avertit une violation de données ayant un impact sur 100 000 personnes après avoir subi une cyberattaque en décembre 2023 qui a été revendiquée par l'opération Akira Ransomware.[...]
Nissan Oceania is warning of a data breach impacting 100,000 people after suffering a cyberattack in December 2023 that was claimed by the Akira ransomware operation. [...]
Ransomware Data Breach ★★★
The_State_of_Security.webp 2024-03-14 08:51:10 Affilié de Lockbit emprisonné pendant près de quatre ans après un plaidoyer de culpabilité
LockBit affiliate jailed for almost four years after guilty plea
(lien direct)
Un affilié du gang de ransomware de Lockbit a été condamné à près de quatre ans de prison après avoir plaidé coupable à des accusations de cyberintimidation et d'armes.Mikhail Vasiliev, 34 ans, qui a une double nationalité russe et canadienne, a été arrêté en 2022 dans le cadre d'une enquête multinationale d'application de la loi sur Lockbit qui a commencé en mars 2020. Selon les reportages des médias, Vasiliev a admis des organisations, en cryptant leurs données,et exiger plus de 100 millions de dollars pour le gang Lockbit.La police canadienne a fait une descente dans la maison de Vasiliev \\ à Bradford, en Ontario, en août 2022 ...
An affiliate of the LockBit ransomware gang has been sentenced to almost four years in jail after earlier pleading guilty to charges of cyber extortion and weapons charges. 34-year-old Mikhail Vasiliev, who has dual Russian and Canadian nationality, was arrested in 2022 as part of a multinational law enforcement investigation into LockBit that started in March 2020. According to media reports , Vasiliev admitted targeting organisations, encrypting their data, and demanding over $100 million for the LockBit gang. Canadian police raided Vasiliev\'s home in Bradford, Ontario, in August 2022...
Ransomware Legislation ★★
News.webp 2024-03-14 01:19:01 Nissan pour laisser 100 000 Australiens et Kiwis savoir que leurs données ont été volées en cyberattaque
Nissan to let 100,000 Aussies and Kiwis know their data was stolen in cyberattack
(lien direct)
Akira Ransomware Crooks se vanter de glisser des milliers de documents d'identification lors de l'introduction par effraction Au cours des prochaines semaines, Nissan Océanie entrera en contact avec environ 100 000 personnes en Australie et en Nouvelle-Zélande dont les données ont été pilotées dans unAttaque de décembre 2023 contre ses systèmes & # 8211;Peut-être par le gang Akira Ransomware.…
Akira ransomware crooks brag of swiping thousands of ID documents during break-in Over the next few weeks, Nissan Oceania will make contact with around 100,000 people in Australia and New Zealand whose data was pilfered in a December 2023 attack on its systems – perhaps by the Akira ransomware gang.…
Ransomware ★★
RecordedFuture.webp 2024-03-13 20:10:21 HHS pour enquêter sur l'attaque de UnitedHealth et Ransomware contre le changement de santé
HHS to investigate UnitedHealth and ransomware attack on Change Healthcare
(lien direct)
Le département américain de la santé et des services sociaux (HHS) lance une enquête sur l'attaque des ransomwares contre les soins de santé du changement après des semaines de perturbation des opérations de santé et de facturation dans les hôpitaux, les cliniques et les pharmacies à travers le pays. & NBSP;Mercredi, le bureau des droits civils (OCR) a publié mercredi une lettre annonçant l'enquête, avec le directeur
The U.S. Department of Health and Human Services (HHS) is launching an investigation into the ransomware attack on Change Healthcare following weeks of disruption to healthcare and billing operations at hospitals, clinics and pharmacies across the country.  The department\'s Office for Civil Rights (OCR) published a letter on Wednesday announcing the investigation, with Director
Ransomware Medical ★★
DarkReading.webp 2024-03-13 19:24:53 Nissan Oceania violée;100 000 personnes touchées sous
Nissan Oceania Breached; 100K People Affected Down Under
(lien direct)
Une éventuelle attaque de ransomware a exposé les données gouvernementales et personnelles des Australiens et des Néo-Zélandais, englobant les clients, les concessionnaires et les employés du constructeur automobile.
A possible ransomware attack has exposed government and personal data of Australians and New Zealanders, encompassing the carmaker\'s customers, dealers, and employees.
Ransomware
RecordedFuture.webp 2024-03-13 17:51:41 L'administrateur de Lockbit condamné à près de quatre ans de prison après un plaidoyer de culpabilité
LockBit administrator sentenced to almost four years in prison after guilty plea
(lien direct)
Un administrateur du gang de ransomware de Lockbit a été condamné à quatre ans de prison après avoir plaidé coupable à huit chefs d'accusation devant un tribunal canadien le mois dernier.Mikhail Vasiliev, un double ressortissant canadien-russe de 34 ans, est en péril légal depuis son arrestation en octobre 2022 à son domicile de Bradford, en Ontario, comme
An administrator for the LockBit ransomware gang has been sentenced to four years in prison after pleading guilty to eight charges in a Canadian court last month. Mikhail Vasiliev, a 34-year-old Canadian-Russian dual national, has been in legal peril since he was first arrested in October 2022 at his home in Bradford, Ontario, as
Ransomware Legislation ★★
bleepingcomputer.webp 2024-03-13 16:16:32 US Govt sondes Si Ransomware Gang a volé des données de santé change
US govt probes if ransomware gang stole Change Healthcare data
(lien direct)
Le département américain de la santé et des services humains examine si des informations de santé protégées ont été volées dans une attaque de ransomware qui a frappé Optum, la filiale UnitedHealthCare Group (UHG), qui exploite la plate-forme de santé du changement, fin février.[...]
The U.S. Department of Health and Human Services is investigating whether protected health information was stolen in a ransomware attack that hit UnitedHealthcare Group (UHG) subsidiary Optum, which operates the Change Healthcare platform, in late February. [...]
Ransomware Medical ★★
ComputerWeekly.webp 2024-03-13 11:00:00 La bibliothèque britannique s'ouvre sur les attaques de ransomwares pour aider les autres
British Library opens up over ransomware attack to help others
(lien direct)
Le département américain de la santé et des services humains examine si des informations de santé protégées ont été volées dans une attaque de ransomware qui a frappé Optum, la filiale UnitedHealthCare Group (UHG), qui exploite la plate-forme de santé du changement, fin février.[...]
The U.S. Department of Health and Human Services is investigating whether protected health information was stolen in a ransomware attack that hit UnitedHealthcare Group (UHG) subsidiary Optum, which operates the Change Healthcare platform, in late February. [...]
Ransomware ★★
Blog.webp 2024-03-13 10:46:42 Équilibrer les données des employés violées après l'attaque de ransomware de janvier
EquiLend Employee Data Breached After January Ransomware Attack
(lien direct)
> Par waqas Certains rapports suggèrent que le gang de ransomware de verrouillage est de la violation des données d'équilibre. Ceci est un article de HackRead.com Lire le post d'origine: Équilibrer les données des employés violées après l'attaque de ransomware de janvier
>By Waqas Some reports suggest that LockBit ransomware gang is behing the EquiLend data breach. This is a post from HackRead.com Read the original post: EquiLend Employee Data Breached After January Ransomware Attack
Ransomware Data Breach ★★
AlienVault.webp 2024-03-13 10:00:00 25 conseils essentiels de cybersécurité et meilleures pratiques pour votre entreprise
25 Essential Cybersecurity tips and best practices for your business
(lien direct)
The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Cybercrime is quickly becoming one of the biggest threats worldwide, impacting businesses across all sectors. To avoid the risk of a damaging security breach, it\'s crucial to stay updated on the latest cybersecurity tips and practices.  Protecting yourself or your business from cyberattacks can be tough. But there are several cybersecurity tips that can help defend against attacks. We\'ve gathered a list of 25 most effective tips for you to adopt and share with others. Top 25 cybersecurity tips for your business 1.    Keep your software up to date To stay safe from cyber threats like ransomware, it\'s essential to regularly update your software, including your operating system and applications. Updates often contain crucial security patches that fix vulnerabilities exploited by hackers. Enable automatic updates for your device and web browser, and ensure plugins like Flash and Java are also kept up to date. Ransomware Malware Tool Vulnerability Mobile Cloud LastPass ★★
RecordedFuture.webp 2024-03-12 17:02:08 Lockbit prend crédit pour la fermeture de février de la retraite sud-africaine
LockBit takes credit for February shutdown of South African pension fund
(lien direct)
Le gang de ransomware de Lockbit a déclaré que c'était à l'origine d'une attaque contre le Fonds de retraite des travailleurs du gouvernement de l'Afrique du Sud le mois dernier, qui a entravé les opérations de l'organisation et a perturbé les paiements de retraite.L'Agence sud-africaine des Pensions Administration (GPAA) gère l'argent au sein du Fonds de retraite des employés du gouvernement (GEPF) - le plus grand fonds de retraite en Afrique -
The LockBit ransomware gang said it was behind an attack on South Africa\'s government workers pension fund last month, which has hampered the organization\'s operations and disrupted pension payments. The South African Government Pensions Administration Agency (GPAA) manages the money within the Government Employees Pension Fund (GEPF) - the largest pension fund in Africa -
Ransomware ★★
zataz.webp 2024-03-12 16:55:25 Une attaque de ransomware qui dure, dure, dure … (lien direct) La ville canadienne d'Hamilton déclare que le calendrier de récupération après la cyber attaque du ransomware Cloak est " inconnu ".... Ransomware ★★
bleepingcomputer.webp 2024-03-12 15:49:35 Stanford: Données de 27 000 personnes volées en septembre
Stanford: Data of 27,000 people stolen in September ransomware attack
(lien direct)
L'Université de Stanford affirme que les informations personnelles de 27 000 personnes ont été volées dans une attaque de ransomwares ayant un impact sur son réseau du Département de la sécurité publique (SUDPS).[...]
Stanford University says the personal information of 27,000 individuals was stolen in a ransomware attack impacting its Department of Public Safety (SUDPS) network. [...]
Ransomware ★★
DataSecurityBreach.webp 2024-03-12 15:35:29 Santé : impossible de distribuer des médicaments à la suite d\'une cyber attaque (lien direct) Les opérateurs du ransomware "Blackcat" ont été identifiés comme responsables de la récente panne chez Change Healthcare, une division technologique du groupe UnitedHealth spécialisée dans le traitement des réclamations d'assurance et des paiements dans le secteur de la santé aux États-Unis. Cette cyberattaque a entraîné une perturbation nationale, interrompant la distribution des médicaments sur ordonnance pendant une durée de six jours, selon des informations rapportées par Reuters. Ransomware Medical ★★
RecordedFuture.webp 2024-03-12 15:26:02 Stanford affirme que les données de 27 000 personnes ont divulgué en septembre
Stanford says data from 27,000 people leaked in September ransomware attack
(lien direct)
Un gang de ransomware a accédé aux informations personnelles de plus de 27 000 personnes sur les serveurs de l'Université de Stanford pendant une cyberattaque l'année dernière ,L'université a averti cette semaine.L'école basée en Californie a commencé à envoyer des lettres de notification de violation cette semaine, 10 mois après que le gang de ransomware Akira a d'abord compromis les systèmes de l'école.L'Université de Stanford a publié une déclaration sur
A ransomware gang accessed the personal information of more than 27,000 people on Stanford University servers during a cyberattack last year, the university warned this week. The California-based school began sending out breach notification letters this week, 10 months after the Akira ransomware gang first compromised the school\'s systems. Stanford University released a statement on
Ransomware ★★
DataSecurityBreach.webp 2024-03-12 15:06:30 Un petit vaccin pour le ransomware Rhysida (lien direct) Des chercheurs en Corée du Sud ont identifié une faille dans le ransomware Rhysida, permettant la création d'un outil de décryptage gratuit pour les fichiers Windows affectés. Toutefois, certains experts critiquent la divulgation de ce défaut. Ransomware ★★★
SecurityWeek.webp 2024-03-12 13:15:58 L'attaque des ransomwares d'équilibre entraîne une violation de données
EquiLend Ransomware Attack Leads to Data Breach
(lien direct)
> Equlend informe ses employés que leurs informations personnelles ont été compromises dans une attaque de ransomware de janvier.
>EquiLend is informing its employees that their personal information was compromised in a January ransomware attack.
Ransomware Data Breach ★★
InfoSecurityMag.webp 2024-03-12 10:15:00 Les législateurs SLAM Royaume-Uni «stratégie d'autruche» du gouvernement britannique pour la cybersécurité
Lawmakers Slam UK Government\\'s “Ostrich Strategy” for Cybersecurity
(lien direct)
Un comité parlementaire influent affirme que le gouvernement court-terme exposent le pays à la catastrophe des ransomwares
An influential parliamentary committee claims government short-termism is exposing the country to ransomware catastrophe
Ransomware ★★
News.webp 2024-03-12 00:02:09 La Maison Blanche et les législateurs augmentent la pression sur UnitedHealth pour faciliter la douleur des prestataires
White House and lawmakers increase pressure on UnitedHealth to ease providers\\' pain
(lien direct)
Le sénateur américain appelle Cyber Attack \\ 'inexcusable, \' appelle à des règles de sécurité obligatoires L'administration Biden et les législateurs américains expriment la pression sur UnitedHealth Group pour soulager les fournisseurs médicaux \\ 'PainAprès l'attaque du ransomware contre le changement de santé, en accélérant les paiements aux hôpitaux, aux médecins et aux pharmaciens & # 8211;entre autres tactiques.…
US senator calls cyber attack \'inexcusable,\' calls for mandatory security rules The Biden administration and US lawmakers are turning up the pressure on UnitedHealth group to ease medical providers\' pain after the ransomware attack on Change Healthcare, by expediting payments to hospitals, physicians and pharmacists – among other tactics.…
Ransomware Medical ★★
Chercheur.webp 2024-03-11 16:19:36 Incognito Darknet Market Mass Mass-EXTORS Acheteurs, vendeurs
Incognito Darknet Market Mass-Extorts Buyers, Sellers
(lien direct)
Empruntant au livre des fournisseurs de ransomwares, le marché incognito du bazar narcotique de Darknet a commencé à extorquer tous ses fournisseurs et acheteurs, menaçant de publier des transactions de crypto-monnaie et des enregistrements de chat des utilisateurs qui refusent de payer des frais allant de 100 $ à 20 000 $.La tentative d'extorsion de masse audacieuse intervient quelques jours seulement après que les administrateurs du marché incognito auraient retiré une "arnaque de sortie" qui a laissé les utilisateurs incapables de retirer des millions de dollars de fonds de la plate-forme.
Borrowing from the playbook of ransomware purveyors, the darknet narcotics bazaar Incognito Market has begun extorting all of its vendors and buyers, threatening to publish cryptocurrency transaction and chat records of users who refuse to pay a fee ranging from $100 to $20,000. The bold mass extortion attempt comes just days after Incognito Market administrators reportedly pulled an "exit scam" that left users unable to withdraw millions of dollars worth of funds from the platform.
Ransomware ★★
The_Hackers_News.webp 2024-03-11 15:23:00 Bianlian Threat Actors exploitant JetBrains Flaws TeamCity dans les attaques de ransomwares
BianLian Threat Actors Exploiting JetBrains TeamCity Flaws in Ransomware Attacks
(lien direct)
Les acteurs de la menace derrière le ransomware Bianlian ont été observés exploitant des défauts de sécurité dans le logiciel JetBrains TeamCity pour mener leurs attaques d'extorsion uniquement. Selon A & NBSP; nouveau rapport & NBSP; de GuidePoint Security, qui a répondu à une intrusion récente, l'incident "a commencé avec l'exploitation d'un serveur d'équipe qui a entraîné le déploiement d'une implémentation PowerShell de
The threat actors behind the BianLian ransomware have been observed exploiting security flaws in JetBrains TeamCity software to conduct their extortion-only attacks. According to a new report from GuidePoint Security, which responded to a recent intrusion, the incident "began with the exploitation of a TeamCity server which resulted in the deployment of a PowerShell implementation of
Ransomware Threat ★★
Checkpoint.webp 2024-03-11 15:11:26 Février 2024 \\'s Most Weted Malware: WordPress Sites Web ciblés par Fresh FakeUpdates Campaign
February 2024\\'s Most Wanted Malware: WordPress Websites Targeted by Fresh FakeUpdates Campaign
(lien direct)
> Les chercheurs ont découvert une nouvelle campagne avec FakeUpdates, également connue sous le nom de Socgolish, ciblant et compromettant les sites Web WordPress avec des comptes d'administration piratés.Pendant ce temps, Play est entré dans les trois premiers des groupes de ransomwares les plus recherchés et l'éducation est restée le secteur le plus attaqué dans le monde notre dernier indice de menace mondial pour février 2024, les chercheurs ont révélé une nouvelle campagne FakeUpdates compromettant les sites Web WordPress.Ces sites ont été infectés à l'aide de comptes d'administrateur WP-Admin piratés, les logiciels malveillants adaptant ses tactiques aux sites Web infiltrés en utilisant des éditions modifiées de plugins WordPress authentiques et en incitant les individus à télécharger un cheval de Troie à distance.Pendant ce temps, même après son retrait vers la fin [& # 8230;]
>Researchers uncovered a new campaign with FakeUpdates, also known as SocGolish, targeting and compromising WordPress websites with hacked admin accounts. Meanwhile, Play entered the top three of most wanted ransomware groups and education remained the most attacked sector worldwide Our latest Global Threat Index for February 2024 saw researchers uncover a fresh FakeUpdates campaign compromising WordPress websites. These sites were infected using hacked wp-admin administrator accounts, with the malware adapting its tactics to infiltrate websites by utilizing altered editions of authentic WordPress plugins, and tricking individuals into downloading a Remote Access Trojan. Meanwhile, even following its takedown towards the end […]
Ransomware Malware Threat ★★
RecordedFuture.webp 2024-03-11 14:22:26 Les autorités britanniques n'ont jamais détecté une violation des sanctions des ransomwares - mais est-ce une bonne ou une mauvaise nouvelle?
British authorities have never detected a breach of ransomware sanctions - but is that good or bad news?
(lien direct)
L'agence chargée de surveiller les sanctions financières en Grande-Bretagne n'a jamais détecté de paiement illicite à une entité embargo sous le régime de contre-ransomware du pays, selon les informations obtenues par Future News enregistré.Le régime des sanctions interdit explicitement que les victimes effectuent des paiements d'extorsion aux 29 personnes et 5 entités énumérées sous le Royaume-Uni \'s
The agency responsible for monitoring financial sanctions in Britain has never detected an illicit payment to an entity embargoed under the country\'s counter-ransomware regime, according to information obtained by Recorded Future News. The sanctions regime explicitly prohibits victims from making any extortion payments to the 29 individuals and 5 entities listed under the United Kingdom\'s
Ransomware ★★★
bleepingcomputer.webp 2024-03-11 14:00:02 Equilider avertit les employés que leurs données ont été volées par un gang de ransomware
Equilend warns employees their data was stolen by ransomware gang
(lien direct)
Les titres de prêt de titres basés à New York ont été confirmés dans les lettres de notification de violation de données envoyées aux employés que leurs données ont été volées dans une attaque de ransomware de janvier.[...]
New York-based securities lending platform EquiLend Holdings confirmed in data breach notification letters sent to employees that their data was stolen in a January ransomware attack. [...]
Ransomware Data Breach ★★
RiskIQ.webp 2024-03-11 13:43:18 Faits saillants hebdomadaires OSINT, 11 mars 2024
Weekly OSINT Highlights, 11 March 2024
(lien direct)
## Weekly OSINT Highlights, 11 March 2024         The OSINT reporting last week underscores several prevalent trends in cyber threats. Firstly, ransomware continues to be a significant threat, with groups like GhostSec conducting double extortion attacks and offering RaaS programs, while threat actors like SocGholish exploit vulnerabilities in web platforms like WordPress. Additionally, phishing remains a persistent tactic, exemplified by the discovery of the CryptoChameleon kit targeting cryptocurrency platforms and governmental agencies. Furthermore, attackers are targeting misconfigured servers and leveraging 1-day vulnerabilities to conduct various malicious activities, from cryptocurrency mining to unauthorized data collection. These trends emphasize the evolving tactics and motivations of cyber threat actors, highlighting the need for robust cybersecurity measures and vigilance across various sectors and platforms. 1. **[SocGholish Malware Targeting WordPress](https://security.microsoft.com/intel-explorer/articles/0218512b?)**: WordPress websites are targeted by SocGholish malware, initiating with a JavaScript malware framework and leading to potential ransomware infections, often through compromised administrator accounts. 2. **[GhostSec Ransomware Activities Surge](https://security.microsoft.com/intel-explorer/articles/ee5a4e56?)**: GhostSec, a financially motivated hacking group, collaborates with Stormous ransomware in double extortion attacks across various business verticals, offering a ransomware-as-a-service (RaaS) program, with a surge in activities observed recently. 3. **[CryptoChameleon Phishing Kit](https://security.microsoft.com/intel-explorer/articles/9227be0c?)**: Lookout uncovers the CryptoChameleon phishing kit, adept at stealing sensitive data from cryptocurrency platforms and the FCC, utilizing custom single sign-on (SSO) pages and SMS lures, primarily targeting victims in the United States. Notably, the kit includes an administrative console to monitor phishing attempts and offers customized redirections based on victims\' responses, with an emphasis on mimicking authentic MFA processes. 4. **[Malware Campaign Targeting Misconfigured Servers](https://security.microsoft.com/intel-explorer/articles/68797fe5?)**: Cado Security Labs discovers a malware campaign targeting misconfigured servers, leveraging unique payloads and exploiting n-day vulnerabilities for Remote Code Execution (RCE) attacks and cryptocurrency mining. 5. **[Earth Kapre Espionage Group](https://security.microsoft.com/intel-explorer/articles/d2d46a48?)**: Trend Micro exposes the Earth Kapre espionage group, conducting phishing campaigns across multiple countries, with malicious attachments leading to unauthorized data collection and transmission to command-and-control (C&C) servers. 6. **[Magnet Goblin Exploiting 1-Day Vulnerabilities](https://security.microsoft.com/intel-explorer/articles/11616c16?)**: Check Point identifies Magnet Goblin\'s financially motivated attacks, rapidly adopting 1-day vulnerabilities, particularly targeting Ivanti Connect Secure VPN, with a diverse arsenal including a Linux version of NerbianRAT and JavaScript credential stealers. ## Learn More For the latest security research from the Microsoft Threat Intelligence community, check out the Microsoft Threat Intelligence Blog: [https://aka.ms/threatintelblog](https://aka.ms/threatintelblog) and the following blog posts: - [Ransomware as a service: Understanding the cybercrime gig economy and how to protect yourself](https://www.microsoft.com/en-us/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself/?ocid=magicti_ta_blog#defending-against-ransomware) - [Cryptojacking: Understanding and defending against cloud compute resource abuse](https://www.microsoft.com/en-us/security/blog/2023/07/25/cryptojacking-understanding-and-defending-against-cloud-compute-resource-abuse/) Microsoft customers can use the following reports in Mi Ransomware Malware Tool Vulnerability Threat Prediction Cloud ★★★
News.webp 2024-03-11 13:30:06 La bibliothèque britannique pousse le bouton nuage
British Library pushes the cloud button, says legacy IT estate cause of hefty rebuild
(lien direct)
cinq mois après et la récupération de la gigantesque post-ransomware a à peine commencé La bibliothèque britannique dit que l'héritage est le facteur écrasant retardant les efforts pour se remettre de l'attaque du ransomware de Rhysida à la fin de 2023.…
Five months in and the mammoth post-ransomware recovery has barely begun The British Library says legacy IT is the overwhelming factor delaying efforts to recover from the Rhysida ransomware attack in late 2023.…
Ransomware Cloud ★★★
AlienVault.webp 2024-03-11 10:00:00 La préparation aux incidents est cruciale pour les gouvernements des États et locaux
Incident readiness is crucial for state and local governments
(lien direct)
The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.   The current cybersecurity landscape: Navigating threats and safeguarding local government operations Local governments in the United States faced a surge in cyber threats during the latter half of 2023, with over 160 cybersecurity incidents impacting the State, Local, and Education (SLED) sectors. Alarming statistics reveal that many of these incidents were ransomware attacks (45%) and data breaches (37%). As custodians of vast amounts of personal and private information, local governments are entrusted with safeguarding sensitive data against evolving cyber threats. The urgency of cybersecurity incident readiness becomes paramount in this landscape, where the consequences of breaches extend beyond operational disruptions. Protecting sensitive data is not just a matter of legal compliance; it is crucial for preserving privacy and upholding public trust. A breach can lead to severe legal consequences and reputational damage. Demonstrating a commitment to robust cybersecurity practices not only safeguards sensitive information but also enhances confidence in state and local government reassuring community stakeholders that their data is secure. Operational continuity is equally critical, as local governments play a vital role in delivering essential services to communities. Cybersecurity incidents have the potential to disrupt operations, causing service outages and delays. Therefore, the importance of effective incident readiness cannot be overstated, as it helps to maintain the uninterrupted delivery of crucial services and fortifies the resilience of local governments in the face of escalating cyber threats. Ransomware Threat ★★
ProofPoint.webp 2024-03-11 06:00:16 How Proofpoint aide les agences gouvernementales fédérales à se défendre contre les cybercriminels et les menaces d'initiés
How Proofpoint Helps Federal Government Agencies Defend Against Cybercriminals and Insider Threats
(lien direct)
Protecting people and defending data are ongoing priorities for federal agencies whose missions are constantly under attack. These entities struggle to keep pace with an array of potent threats, like insiders who steal secrets about missile technology and threat actors who use living off the land techniques (LOTL).  Proofpoint can provide agencies with a critical edge in their efforts to defend data from risky users and detect real-time identity threats. Products to help with these challenges include:  Proofpoint Insider Threat Management Proofpoint Identity Threat Defense This blog takes a closer look at these products and how they help our federal customers.   Understand the context behind user behavior with Proofpoint ITM   Across all levels of government, data loss is costly-these incidents have cost agencies $26 billion over the past eight years. A critical first step toward preventing data loss and risky behavior is to understand that data does not lose itself. People lose it.  Employees, third parties and contractors have access to more data than ever-on their laptops, in email and the cloud. But you can\'t reduce the risk of insider threats without first understanding the context behind user behavior. Context also helps you to choose the best response when an insider-led incident occurs, whether it\'s due to a malicious, compromised or careless user.  Proofpoint ITM can help you gain that vital context. It also helps you to move swiftly to address insider threats. Here\'s how:  Get a clear picture of threats. You can gain complete context into users and their data activity  on endpoints, and web and cloud applications. User attribution is easy thanks to a clear, visual timeline and flexible, real-time screenshots.  Identify risks proactively. Proofpoint includes preconfigured indicators of risk that can help you catch user activities in real time, like data exfiltration, privilege abuse, unauthorized access and security controls bypass. The out-of-the-box Insider Threat Library was built using feedback from our customers as well as guidelines from NIST, MITRE and the CERT Division of the Software Engineering Institute at Carnegie Mellon.   Investigate faster. You can investigate incidents with more efficiency when you can see user intent. With Proofpoint ITM, you can gather, package and export the evidence (who, what, where, when and user intent) and share it easily with groups outside of security such as HR, legal and privacy. This saves time and reduces the cost of investigations.  Get better time to value. Proofpoint ITM has a single, lightweight user-mode agent that is easy to install and invisible to your users. With a converged DLP and ITM solution, you can monitor everyday and risky users.   Gain efficiencies and manage risks   Here are more ways that Proofpoint ITM helps federal agencies:  Manage alert rules efficiently. Alert rules are grouped by categories and assigned to user lists, which streamlines management.  Comply with privacy laws. Agencies can protect privacy by anonymizing users in the dashboard, which helps eliminate bias in investigations.    Manage risks at a department level. Large agencies can manage employee risks based on their department or group by using Active Directory group-based permissions. Each group has a dedicated security team member or manager.  Meet zero trust and CMMC needs  Agencies can use ITM to meet their zero trust and Cybersecurity Maturity Model Certification (CMMC) needs as well. Proofpoint ITM capabilities support several pillars of Zero Trust and more than seven domains of CMMC. For Zero Trust, Proofpoint ITM helps agencies align to these pillars:   Department of Defense: Data and Visibility and Analytics Pillar   Cybersecurity and Infrastructure Security Agency: Data and Devices Pillars  Proofpoint Information Protection products help our customers with these CMMC domains:  Access Controls   Asset Management   Audit and Accountability  Configuration Management   Incident Response   Media Protect Ransomware Vulnerability Threat Cloud ★★★
RecordedFuture.webp 2024-03-11 00:01:00 Les défaillances des ransomwares du gouvernement britannique laissent le pays \\ 'exposé et non préparé \\'
UK government\\'s ransomware failings leave country \\'exposed and unprepared\\'
(lien direct)
Le gouvernement britannique a été accusé par un comité parlementaire de prendre la «stratégie d'autruche» en enfouissant sa tête dans le sable sur la cyber-menace nationale «grande et imminente» posée par le ransomware.La critique suit l'édition gouvernementale lundi sa réponse officielle à une Rapport du comité conjoint de la sécurité nationale
The British government has been accused by a parliamentary committee of taking the “ostrich strategy” by burying its head in the sand over the “large and imminent” national cyber threat posed by ransomware. The criticism follows the government publishing on Monday its formal response to a report from the Joint Committee on the National Security
Ransomware Threat ★★
News.webp 2024-03-08 14:33:09 Changer les registres des soins de santé Pulse après une attaque de ransomware paralysante
Change Healthcare registers pulse after crippling ransomware attack
(lien direct)
Les services restants devraient revenir dans les prochaines semaines après que 22 millions de dollars alphv rançonnent Change Healthcare a fait les premiers pas vers une récupération complète de l'attaque du ransomware en février en ramenant ses services de prescription électronique en ligne.… Ransomware Medical ★★★
SecurityWeek.webp 2024-03-08 13:35:11 Changer les soins de santé restaure les services de pharmacie perturbés par les ransomwares
Change Healthcare Restores Pharmacy Services Disrupted by Ransomware
(lien direct)
> Changer Healthcare dit qu'il a fait des progrès significatifs dans la restauration des systèmes touchés par une récente attaque de ransomware.
>Change Healthcare says it has made significant progress in restoring systems impacted by a recent ransomware attack.
Ransomware Medical ★★
bleepingcomputer.webp 2024-03-08 12:54:22 UnitedHealth ramène des services de pharmacie de santé en ligne
UnitedHealth brings some Change Healthcare pharmacy services back online
(lien direct)
Le changement de santé d'Optum \\ a commencé à ramener les systèmes en ligne après avoir subi une attaque par ransomware de Blackcat paralysant le mois dernier, ce qui a entraîné une perturbation généralisée du système de santé américain.[...]
Optum\'s Change Healthcare has started to bring systems back online after suffering a crippling BlackCat ransomware attack last month that led to widespread disruption to the US healthcare system. [...]
Ransomware Medical ★★★
BBC.webp 2024-03-08 12:42:54 Production de bière DUVEL frappée par la cyber-attaque
Production of Duvel beer hit by cyber-attack
(lien direct)
Une attaque suspectée de ransomware a laissé le brasseur belge incapable de faire de la bière sur quatre de ses sites.
A suspected ransomware attack has left the Belgian brewer unable to make beer at four of its sites.
Ransomware ★★
News.webp 2024-03-08 12:35:12 Sécurité du fromage suisse?Jouer au gang ransomware lait le gouvernement de 65 000 fichiers
Swiss cheese security? Play ransomware gang milks government of 65,000 files
(lien direct)
Docs classifiés, mots de passe lisibles et des milliers d'informations personnelles décontiquées dans une violation de Xplain Le gouvernement suisse avait environ 65 000 fichiers liés à celle volée par le gang de ransomware de jeu lors d'une attaque contre un fournisseur informatique, son fournisseurLe National Cyber Security Center (NCSC) dit.…
Classified docs, readable passwords, and thousands of personal information nabbed in Xplain breach The Swiss government had around 65,000 files related to it stolen by the Play ransomware gang during an attack on an IT supplier, its National Cyber Security Center (NCSC) says.…
Ransomware ★★★
RecordedFuture.webp 2024-03-07 22:25:49 Jouez des ransomwares divulgués 65 000 documents du gouvernement suisse, les résultats de l'enquête
Play ransomware leaked 65,000 Swiss government documents, investigation finds
(lien direct)
Les autorités suisses ont constaté que 65 000 documents gouvernementaux détenant des informations classifiés et des données personnelles sensibles avaient été divulguées à la suite de une attaque de ransomware L'année dernière sur l'un de ses fournisseurs informatiques.Le National Cyber Security Center (NCSC) de Suisse Publié Une brève analyse des données volées lors de l'attaque en mai dernier - lorsque des pirates se sont connectés à la pièce
Swiss authorities have found that 65,000 government documents holding classified information and sensitive personal data were leaked following a ransomware attack last year on one of its IT vendors. Switzerland\'s National Cyber Security Centre (NCSC) published a brief analysis of the data stolen during the attack last May - when hackers connected to the Play
Ransomware ★★
RecordedFuture.webp 2024-03-07 21:25:48 Stormous Ransomware Gang prend le crédit pour l'attaque contre le brasseur belge DUVEL
Stormous ransomware gang takes credit for attack on Belgian brewer Duvel
(lien direct)
Le gang de ransomware Stormous a pris le crédit d'une attaque contre un grand producteur de bière belge cette semaine.L'attaque des ransomwares contre la brasserie de Duvel Moortgat affecte les opérations pendant des jours. outouts locaux de presse locaux Et bleepingcomputer a rapporté mercredi que le service informatique de Duvel \\ a détecté l'attaque et fermé les lignes de production.La porte-parole Ellen Aerts a déclaré aux journalistes
The Stormous ransomware gang has taken credit for an attack on a major Belgian beer producer this week. The ransomware attack on Duvel Moortgat Brewery has affected operations for days. Local news outlets and BleepingComputer reported on Wednesday that Duvel\'s IT department detected the attack and shut down production lines. Spokesperson Ellen Aerts told reporters
Ransomware ★★
knowbe4.webp 2024-03-07 20:22:08 L'IA et les ransomwares en tête de liste des cyber-menaces informatiques du marché intermédiaire
AI and Ransomware Top the List of Mid-Market IT Cyber Threats
(lien direct)
Ai et Ransomware en tête de la liste des cyber-menaces informatiques du marché moyen Un rapport récent révèle un écart important dans les priorités des services informatiques de marché intermédiaire lorsqu'il s'agit de traiter les cybermenaces. Il est quelque peu ironique que les professionnels informatiques se retrouvent enchevêtrés dans un paradoxe logique lorsqu'ils répondent aux enquêtes, comme le démontre Node4 \\ 's & nbsp; Rapport de priorités informatiques du marché moyen 2024 .Ce rapport met en lumière le fait que deux des trois principales cyber-menaces concernant les services informatiques du marché intermédiaire sont des menaces et des ransomwares basés sur l'IA, les menaces d'initiés se classant comme la principale préoccupation cette année.
AI and Ransomware Top the List of Mid-Market IT Cyber Threats A recent report reveals a significant discrepancy in the priorities of mid-market IT departments when it comes to addressing cyber threats. It\'s somewhat ironic that IT professionals find themselves entangled in a logical paradox when responding to surveys, as demonstrated by Node4\'s Mid-Market IT Priorities Report 2024. This report sheds light on the fact that two of the top three cyber threats concerning mid-market IT departments are AI-based threats and ransomware, with insider threats ranking as the primary concern this year.
Ransomware ★★
Last update at: 2024-05-12 11:08:16
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter