Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 21 / 23
455 résultats taggé ransomware  ✕
TommyLeaks and SchoolBoys: Two sides of the same ransomware gang https://www.bleepingcomputer.com/news/security/tommyleaks-and-schoolboys-two-sides-of-the-same-ransomware-gang/
24/10/2022 07:02:48
QRCode
archive.org
thumbnail

Two new extortion gangs named 'TommyLeaks' and 'SchoolBoys' are targeting companies worldwide. However, there is a catch — they are both the same ransomware gang.

bleepingcomputer EN 2022 TommyLeaks SchoolBoys ransomware extortion gang
Mairies : les pirates du groupe CUBA vident deux mairies françaises de leurs contenus https://www.zataz.com/mairies-les-pirates-du-groupe-cuba-vident-deux-mairies-francaises-de-leurs-contenus/
23/10/2022 11:42:32
QRCode
archive.org
thumbnail

Les pirates informatiques du groupe CUBA, spécialisés dans le rançonnage d’entreprise, viennent de diffuser les informations volées à deux mairies françaises.

zataz FR 2022 CUBA ransomware communes mairies rançonnage France
Exploited Windows zero-day lets JavaScript files bypass security warnings https://www.bleepingcomputer.com/news/security/exploited-windows-zero-day-lets-javascript-files-bypass-security-warnings/
22/10/2022 18:46:55
QRCode
archive.org
thumbnail

A new Windows zero-day allows threat actors to use malicious JavaScript files to bypass Mark-of-the-Web security warnings. Threat actors are already seen using the zero-day bug in ransomware attacks.

bleepingcomputer EN 2022 JavaScript Mark-of-the-Web Microsoft Ransomware Windows-10 Windows-11
Cyberattaque : comment Caen a évité le pire grâce à l’EDR d’HarfangLab https://www.lemagit.fr/actualites/252526055/Cyberattaque-comment-Caen-a-evite-le-pire-grace-a-lEDR-dHarfangLab
19/10/2022 09:08:10
QRCode
archive.org
thumbnail

Caen a profité des suites d’un démonstrateur de l'EDR d'HarfangLab en attente de contractualisation pour détecter les prémices du possible déploiement d’un rançongiciel. L’intrusion est avérée, un nettoyage en cours, mais le chiffrement a été évité. Et très probablement le vol de données aussi.

lemagit FR 2022 Caen EDR HarfangLab ransomware
Technical Analysis of BlueSky Ransomware https://cloudsek.com/technical-analysis-of-bluesky-ransomware/
18/10/2022 10:30:48
QRCode
archive.org

BlueSky Ransomware is a modern malware using advanced techniques to evade security defences. It predominantly targets Windows hosts and utilizes the Windows multithreading model for fast encryption.

cloudsek EN 2022 ransomware IoCs Analysis BlueSky
BianLian Ransomware Encrypts Files in the Blink of an Eye https://blogs.blackberry.com/en/2022/10/bianlian-ransomware-encrypts-files-in-the-blink-of-an-eye
18/10/2022 10:25:08
QRCode
archive.org
thumbnail

BianLian is a financially motivated threat actor that targets a wide range of industries. It uses the exotic programming language “Go” to encrypt files with unusual speed.

blackberry Research 2022 Ransomware BianLian GO Golang
New “Prestige” ransomware impacts organizations in Ukraine and Poland https://www.microsoft.com/security/blog/2022/10/14/new-prestige-ransomware-impacts-organizations-in-ukraine-and-poland/
14/10/2022 21:21:48
QRCode
archive.org
thumbnail

The Microsoft Threat Intelligence Center (MSTIC) has identified evidence of a novel ransomware campaign targeting organizations in the logistics and transportation industry in Ukraine and Poland utilizing a previously unidentified ransomware payload.

microsoft EN 2022 MSTIC Ukraine Poland ransomware payload Prestige
Ransomware : qui paie et pourquoi ? https://www.lemagit.fr/actualites/252524893/Indemnisation-des-rancons-le-silence-assourdissant-de-ceux-qui-en-ont-profite
12/10/2022 13:15:15
QRCode
archive.org
thumbnail

Assurément passionné, le débat sur l’indemnisation des rançons par les assurances cyber souffre d’absents majeurs : les victimes de cyberattaque avec ransomware ayant cédé au chantage. Mais qui sont-elles ?

lemagit FR 2022 ransomware cyberattaque PME payer
Fake Ransomware Infection Under widespread https://blog.cyble.com/2022/10/06/fake-ransomware-infection-under-widespread/
10/10/2022 12:25:54
QRCode
archive.org
thumbnail

Cyble Research and Intelligence Labs analyzes Fake ransomware, a destructive malware capable of wiping out system drives.

cyble EN 2022 Fake Ransomware dell.exe Analysis
Remove All The Callbacks – BlackByte Ransomware Disables EDR Via RTCore64.sys Abuse https://news.sophos.com/en-us/2022/10/04/blackbyte-ransomware-returns/
05/10/2022 23:14:04
QRCode
archive.org
thumbnail

A fresh exploration of the malware uncovers a new tactic for bypassing security products by abusing a known driver vulnerability

sophos EN 2022 BlackByte Ransomware Disables EDR RTCore64.sys
BumbleBee: Round Two https://thedfirreport.com/2022/09/26/bumblebee-round-two/
28/09/2022 15:29:52
QRCode
archive.org
thumbnail

In this intrusion from May 2022, the threat actors used BumbleBee as the initial access vector. BumbleBee has been identified as an initial access vector utilized by several ransomware affiliates. …

thedfirreport EN 2022 BumbleBee ransomware RDP IoCs
Noberus Ransomware: Darkside and BlackMatter Successor Continues to Evolve its Tactics https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/noberus-blackcat-ransomware-ttps
24/09/2022 10:56:44
QRCode
archive.org
thumbnail

New version of Exmatter, and Eamfo malware, used by attackers deploying the Rust-based ransomware.

symantec-enterprise-blogs EN 2022 Noberus Ransomware BlackMatter rust Darkside Exmatter Eamfo ransomware-as-a-service
Los Angeles School District Hit by Ransomware Attack https://www.databreachtoday.com/los-angeles-school-district-hit-by-ransomware-attack-a-19999
22/09/2022 12:27:49
QRCode
archive.org
thumbnail

California's largest public school district and the second-largest in the U.S. is undergoing a ransomware attack. The attack has disrupted the district's email

databreachtoday EN 2022 ransomware Los-Angeles PYSA Ryuk School K-12
Online Attack Disrupts Michigan School District for 2nd Day https://www.databreachtoday.eu/cyberattack-disrupts-michigan-school-district-for-2nd-day-a-20119
22/09/2022 12:27:02
QRCode
archive.org
thumbnail

School is out for more than 3,000 students of a suburban Detroit district undergoing its second day of forensics analysis following an online attack. Students have

databreachtoday EN 2022 Cyberattack Ransomware school k-12 South-Redford-School-District Chromebook Brett-Callow
LockBit ransomware builder leaked online by “angry developer” https://www.bleepingcomputer.com/news/security/lockbit-ransomware-builder-leaked-online-by-angry-developer-/
22/09/2022 12:25:20
QRCode
archive.org
thumbnail

The LockBit ransomware operation has suffered a breach, with an allegedly disgruntled developer leaking the builder for the gang's newest encryptor.

bleepingcomputer EN 2022 Breach Developer Encryptor LockBit Ransomware Ransomware-Builder Leak
The Curious Case of “Monti” Ransomware: A Real-World Doppelganger https://blogs.blackberry.com/en/2022/09/the-curious-case-of-monti-ransomware-a-real-world-doppelganger
11/09/2022 23:26:57
QRCode
archive.org
thumbnail

While working a recent ransomware incident, BlackBerry identified a group whose name and TTPs mimicked the long-standing, popular ransomware crew Conti. Furthermore, the encryptor payload used in the attack was taken from the original group and modified for use with this new group. Who was this doppelganger?

blackberry EN 2022 Monti Conti ransomware
Likely Iranian Threat Actor Conducts Politically Motivated Disruptive Activity Against Albanian Government Organizations https://www.mandiant.com/resources/blog/likely-iranian-threat-actor-conducts-politically-motivated-disruptive-activity-against
11/09/2022 10:49:17
QRCode
archive.org
thumbnail

Mandiant attributes the ransomware attack against the Albanian government network in July of 2022 to an Iranian threat actor.

Mandiant EN 2022 report Albania Iran ransomware ROADSWEEP CHIMNEYSWEEP Attribution
Crimeware Trends | Ransomware Developers Turn to Intermittent Encryption to Evade Detection https://www.sentinelone.com/labs/crimeware-trends-ransomware-developers-turn-to-intermittent-encryption-to-evade-detection/
09/09/2022 15:45:06
QRCode
archive.org
thumbnail

Partially encrypting victims' files improves ransomware speed and aids evasion. First seen in LockFile, the technique is now being widely adopted.

SentinelOne EN 2022 LockFile ransomware technique speed Partially evasion
Conti vs. Monti: A Reinvention or Just a Simple Rebranding? https://intel471.com/blog/conti-vs-monti-a-reinvention-or-just-a-simple-rebranding
09/09/2022 15:36:11
QRCode
archive.org
thumbnail

Whether Conti has rebranded as Monti in a bid to mock the former strain or it is just another new ransomware variant on the block.

intel471 EN 2022 Conti Monti rebranding ransomware variant
Centre hospitalier Sud-Francilien : ce que dit l’autopsie de la cyberattaque https://www.lemagit.fr/actualites/252524725/Centre-hospitalier-Sud-Francilien-ce-que-dit-lautopsie-de-la-cyberattaque
09/09/2022 15:34:34
QRCode
archive.org
thumbnail

Selon les premiers éléments de l’enquête technique conduite par l’Anssi, l’assaillant accédait déjà au système d’information du CHSF de Corbeil-Essonnes, via l’accès VPN, 10 jours avant de déclencher le ransomware.

lemagit FR 2022 ransomware hôpital santé CHSF Corbeil-Essonnes LockBit LockBit-3.0 postmortem
page 21 / 23
4966 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn