Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 10 / 23
453 résultats taggé Ransomware  ✕
Ongoing Malvertising Campaign leads to Ransomware https://www.rapid7.com/blog/post/2024/05/13/ongoing-malvertising-campaign-leads-to-ransomware/
14/05/2024 10:18:38
QRCode
archive.org
thumbnail

Rapid7 has observed an ongoing campaign to distribute trojanized installers for WinSCP and PuTTY via malicious ads on commonly used search engines, where clicking on the ad leads to typo squatted domains.

rapid7 EN 2024 Malvertising Campaign Ransomware WinSCP PuTTY
Stolen children’s health records posted online in extortion bid https://therecord.media/scotland-nhs-children-records-posted-extortion-ransomware
13/05/2024 08:35:21
QRCode
archive.org
thumbnail

Cybercriminals have published another batch of data stolen from NHS Dumfries and Galloway in Scotland, this time including information about children.

therecord.media EN 2024 Scotland NHS health extortion ransomware childrens
Analysis of TargetCompany's Attacks Against MS-SQL Servers (Mallox, BlueSky Ransomware) https://asec.ahnlab.com/en/64921/
03/05/2024 08:42:00
QRCode
archive.org
thumbnail

While monitoring attacks targeting MS-SQL servers, AhnLab SEcurity intelligence Center (ASEC) recently identified cases of the TargetCompany ransomware group installing the Mallox ransomware. The TargetCompany ransomware group primarily targets improperly managed MS-SQL servers to install the Mallox ransomware. While these attacks have been ongoing for several years, here we will outline the correlation between the newly identified malware and previous attack cases involving the distribution of the Tor2Mine CoinMiner and BlueSky ransomware.

asec.ahnlab EN 2024 MS-SQL servers CoinMiner BlueSky ransomware analysis
French hospital CHC-SV refuses to pay LockBit extortion demand https://www.bleepingcomputer.com/news/security/french-hospital-chc-sv-refuses-to-pay-lockbit-extortion-demand/
02/05/2024 08:50:26
QRCode
archive.org
thumbnail

The Hôpital de Cannes - Simone Veil (CHC-SV) in France announced it received a ransom demand from the Lockbit 3.0 ransomware gang, saying they refuse to pay the ransom.

bleepingcomputer EN 2024 CHC-SV France Healthcare Hospital LockBit LockBit-3.0 Ransomware
LOCKBIT Black's Legacy: Unraveling The DragonForce Ransomware Connection - Cyble https://cyble.com/blog/lockbit-blacks-legacy-unraveling-the-dragonforce-ransomware-connection/
24/04/2024 14:34:19
QRCode
archive.org
thumbnail

CRIL investigates DragonForce Ransomware and its links to a leaked LOCKBIT Builder.

cyble EN 2024 DragonForce Ransomware LOCKBIT Builder
 The LockBit’s Attempt to Stay Relevant, Its Imposters and New Opportunistic Ransomware Groups https://www.trellix.com/en-ca/blogs/research/the-lockbit-name-is-back-along-with-its-imposters-and-new-opportunistic-ransomware-groups/
24/04/2024 12:32:13
QRCode
archive.org

The Trellix Advanced Research Center has recently observed an uptick of LockBit-related cyber activity surrounding vulnerabilities in ScreenConnect. This surge suggests that despite the Law Enforcement's (LE) "Operation Cronos" aimed at dismantling LockBit's infrastructure, the ransomware operators somehow managed to survive and stay a float. It appears that the cybercriminals group behind LockBit ransomware partially restored their infrastructure and created an impression that the LE actions did not affect their normal operation. Concurrently, alongside the resurgence of LockBit's exploitation of ScreenConnect vulnerabilities, we have seen other threat actors have either impersonated LockBit ransomware or incorporated LockBit into their own cyber attack campaigns.

Trellix EN 2024 LockBit-related LockBit campaigns ransomware LockBitSupp
L'hôpital de Cannes victime d'une cyberattaque, les opérations non urgentes reportées https://www.francetvinfo.fr/internet/securite-sur-internet/cyberattaques/l-hopital-de-cannes-victime-d-une-cyberattaque-les-operations-non-urgentes-reportees_6490730.html
21/04/2024 20:59:00
QRCode
archive.org
thumbnail

La cyberattaque a débuté mardi dans la matinée. La justice a été saisie pour enquêter et trouver d'où elle vient.

francetvinfo FR 2024 CHC-SV cyberattaque Cannes France ransomware
Ransomware payments drop to record low of 28% in Q1 2024 https://www.bleepingcomputer.com/news/security/ransomware-payments-drop-to-record-low-of-28-percent-in-q1-2024/
21/04/2024 20:42:03
QRCode
archive.org
thumbnail

Ransomware actors have had a rough start this year, as stats from cybersecurity firm Coveware show that the trend of victims declining to pay the cybercriminals continues and has now reached a new record low of 28%.

bleepingcomputer EN 2024 Cybercrime Extortion Law-Enforcement Ransom Ransomware stats
'Crude' ransomware tools proliferating on the dark web for cheap, researchers find https://therecord.media/cheap-ransomware-for-sale-dark-web
20/04/2024 09:38:42
QRCode
archive.org
thumbnail

Cheap ransomware is being sold for one-time use on dark web forums, allowing inexperienced freelancers to get into cybercrime without any interaction with affiliates.

Researchers at the intelligence unit at the cybersecurity firm Sophos found 19 ransomware varieties being offered for sale or advertised as under development on four forums from June 2023 to February 2024.

therecord EN 2024 Crude Sophos ransomware tools DarkWeb
Ransomware attack has cost UnitedHealth $872 million; total expected to surpass $1 billion https://therecord.media/ransomware-unitedhealth-costs-billions-still-climbing?_hsenc=p2ANqtz-_NXHMTMofLbyaVNJ3kRdE2p0pM0usepgEV5vo9-YtsvtStuDxwMKTaOTeKMbd68ggASIMwjDEVxSEsUTcKeFlD-lWmgw&_hsmi=303475837
20/04/2024 09:35:27
QRCode
archive.org
thumbnail

he ransomware attack on a company owned by healthcare giant UnitedHealth Group (UHG) has so far caused $872 million in losses, according to the corporation’s latest earnings report.

UnitedHealth owns Change Healthcare, a key cog in the U.S. healthcare industry that was crippled by a ransomware attack in February. Change Healthcare and UHG subsidiary Optum took hundreds of systems offline as a result of the incident and faced criticism from the White House and Congress over its handling of the ransomware attack.

therecord EN 2024 UnitedHealth cost ransomware change-healthcare
Leaked LockBit builder in a real-life incident response case | Securelist https://securelist.com/lockbit-3-0-based-custom-targeted-ransomware/112375/
16/04/2024 14:24:13
QRCode
archive.org
thumbnail

Kaspersky researchers revisit the leaked LockBit 3.0 builder and share insights into a real-life incident involving a custom targeted ransomware variant created with this builder.

securelist EN 2024 builder Data-Encryption Incident-response LockBit Malware Malware-Technologies Ransomware Targeted-attacks Trojan
Raspberry Robin Returns: New Malware Campaign Spreading Through WSF Files https://thehackernews.com/2024/04/raspberry-robin-returns-new-malware.html?m=1
14/04/2024 15:30:37
QRCode
archive.org

Researchers uncover a fresh wave of the Raspberry Robin campaign spreading malware through malicious Windows Script Files (WSFs) since March 2024.
#attacks #breach #computer #cyber #data #hack #hacker #hacking #how #information #malware #network #news #ransomware #security #software #the #to #today #updates #vulnerability

thehackernews 2024 EN Raspberry-Robin WSF return
Ransomware gang’s new extortion trick? Calling the front desk https://techcrunch.com/2024/04/09/ransomware-gang-fail-calling-front-desk-extortion/
14/04/2024 15:18:34
QRCode
archive.org
thumbnail

When a hacker called the company that his gang claimed to breach, he felt the same way that most of us feel when calling the front desk: frustrated.

The phone call between the hacker, who claims to represent the ransomware gang DragonForce, and the victim company employee was posted by the ransomware gang on its dark web site in an apparent attempt to put pressure on the company to pay a ransom demand. In reality, the call recording just shows a somewhat hilarious and failed attempt to extort and intimidate a company’s rank-and-file employees.

techcrunch EN 2024 ransomware target frontdesk
Researchers discover new ransomware gang ‘Muliaka’ attacking Russian businesses https://therecord.media/muliaka-ransomware-group-targeting-russian-businesses-conti?_hsenc=p2ANqtz-9_rrl-EsQRNWUkdDZu1p2oi9e3Mqew71pyTwU0pADQzCehJF9X5V-RjlZF5ymYmmVzPfkMwgQN-m7H6symSoAxW0gbow&_hsmi=302381143
13/04/2024 09:55:08
QRCode
archive.org
thumbnail

A previously unknown ransomware gang has been attacking Russian businesses with malware based on the leaked source code from the Conti hacking group.

The gang, which researchers at the Moscow-based cybersecurity company F.A.C.C.T. have dubbed “Muliaka," or Muddy Water in English, has left minimal traces from its attacks but has likely been active since at least December 2023.

therecord EN 2024 Muliaka ransomware gang Russia
Round 2: Change Healthcare Targeted in Second Ransomware Attack https://www.darkreading.com/cyberattacks-data-breaches/round-2-change-healthcare-targeted-second-ransomware-attack
10/04/2024 10:05:51
QRCode
archive.org
thumbnail

RansomHub, which is speculated to have some connection to ALPHV, has stolen 4TB of sensitive data from the beleaguered healthcare company.

darkreading 2024 Change-Healthcare ALPHV Ransomware Attack
Enregistré à son insu, son entretien RH finit sur le darknet https://www.20min.ch/fr/story/suisse-enregistre-a-son-insu-son-entretien-rh-finit-sur-le-darknet-103073627
03/04/2024 17:47:15
QRCode
archive.org
thumbnail

Les données d’une agence d’intérim bâloise ont été piratées. Le directeur s’exprime.

20min FR 2024 data-leak suisse ransomware DasTeam
Claro Company Hit by Trigona Ransomware https://gridinsoft.com/blogs/claro-company-hit-by-trigona-ransomware/?ref=news.risky.biz
01/04/2024 10:38:35
QRCode
archive.org
thumbnail

Claro Company, the largest telecom operator in Central and South America, disclosed being hit by ransomware. Representatives shared this information in response to the service disruptions in several regions. From the ransom note it becomes clear that the attackers are Trigona ransomware.

gridinsoft EN 2024 ransomware Trigona Claro telecom
From OneNote to RansomNote: An Ice Cold Intrusion - The DFIR Report https://thedfirreport.com/2024/04/01/from-onenote-to-ransomnote-an-ice-cold-intrusion/
01/04/2024 10:32:27
QRCode
archive.org
thumbnail
  • In late February 2023, threat actors rode a wave of initial access using Microsoft OneNote files. In this case, we observed a threat actor deliver IcedID using this method.
  • After loading IcedID and establishing persistence, there was no further actions, other than beaconing for over 30 days.
  • The threat actor used Cobalt Strike and AnyDesk to target a file server and a backup server.
  • The threat actor used FileZilla to exfiltrate data from the network before deploying Nokoyawa ransomware.
thedfirreport EN 2024 2023 incident incident-analysis IcedID OneNote FileZilla Nokoyawa ransomware
Ransomware gang leaks stolen Scottish healthcare patient data in extortion bid https://therecord.media/healthcare-ransomware-data-breach-nhs-scotland
29/03/2024 14:55:55
QRCode
archive.org
thumbnail

A cybercrime group has published information stolen from NHS Dumfries and Galloway.

therecord.media EN 2024 Scotland NHS helath Ransomware published data-breach
Lighter Ransomware Locks Users Out of System https://blog.sonicwall.com/en-us/2024/03/lighter-ransomware-locks-users-out-of-system/
28/03/2024 15:26:57
QRCode
archive.org
thumbnail

Overview This week, the Sonicwall Capture Labs threat research team analyzed a ransomware calling itself Lighter Ransomware. Upon execution, it opens up a window with a countdown timer instructing the victim to reach out immediately […]

SonicWall EN 2024 Ransomware Locks lighter-ransomware
page 10 / 23
4943 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn