Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 7 / 22
427 résultats taggé Ransomware  ✕
Black Basta ransomware switches to more evasive custom malware https://www.bleepingcomputer.com/news/security/black-basta-ransomware-switches-to-more-evasive-custom-malware/
03/08/2024 21:04:49
QRCode
archive.org
thumbnail

The Black Basta ransomware gang has shown resilience and an ability to adapt to a constantly shifting space, using new custom tools and tactics to evade detection and spread throughout a network.

bleepingcomputer EN 2024 BlackBasta Initial-Access Malware Ransomware mandiant UNC4393
'Fortune 50' Company Made Record-Breaking $75M Ransomware Payment https://www.pcmag.com/news/fortune-50-company-made-record-breaking-75m-ransomware-payment
01/08/2024 23:07:59
QRCode
archive.org

A major company made a staggering $75 million ransomware payment to hackers earlier this year, according to cybersecurity vendor Zscaler.

Zscaler made the claim in a Tuesday report examining the latest trends in ransomware attacks, which continue to ensnare companies, hospitals, and schools across the country.

pcmag EN 2024 Zscaler report Fortune50 record ransomware payment DarkAngels
Cyberattack hits blood-donation nonprofit OneBlood https://edition.cnn.com/2024/07/31/politics/cyberattack-oneblood-blood-donation/
01/08/2024 06:57:34
QRCode
archive.org
thumbnail

A cyberattack has hit a blood-donation nonprofit that serves hundreds of hospitals in the southeastern US.

The hack, which was first reported by CNN, has raised concerns about potential impacts on OneBlood’s service to some hospitals, multiple sources familiar with the matter said, and the incident is being investigated as a potential ransomware attack.

cnn EN 2024 cyberattack US OneBlood Healthcare ransomware incident
Ransomware operators exploit ESXi hypervisor vulnerability for mass encryption | Microsoft Security Blog https://www.microsoft.com/en-us/security/blog/2024/07/29/ransomware-operators-exploit-esxi-hypervisor-vulnerability-for-mass-encryption/
29/07/2024 18:47:07
QRCode
archive.org
thumbnail

Microsoft researchers have uncovered a vulnerability in ESXi hypervisors being exploited by several ransomware operators to obtain full administrative permissions on domain-joined ESXi hypervisors. ESXi is a bare-metal hypervisor that is installed directly onto a physical server and provides direct access and control of underlying resources. ESXi hypervisors host virtual machines that may include critical servers in a network. In a ransomware attack, having full administrative permission on an ESXi hypervisor can mean that the threat actor can encrypt the file system, which may affect the ability of the hosted servers to run and function. It also allows the threat actor to access hosted VMs and possibly to exfiltrate data or move laterally within the network.

microsoft EN 2024 ESXi hypervisors Ransomware encrypt CVE-2024-37085 Storm-0506 Storm-1175 OctoTempest
Arctic Wolf Labs has observed Fog ransomware being deployed against US organizations in the education and recreation sectors. https://arcticwolf.com/resources/blog/lost-in-the-fog-a-new-ransomware-threat/
22/07/2024 22:49:16
QRCode
archive.org
thumbnail

On May 2, 2024, Arctic Wolf Labs began monitoring deployment of a new ransomware variant referred to as Fog. The ransomware activity was observed in several Arctic Wolf Incident Response cases, each exhibiting similar elements. All victim organizations were located in the United States, 80% of which were in the education sector and 20% in the recreation sector.

We are sharing details of this emerging variant to help organizations defend against this threat. Please note that we may add further detail to this article as we uncover additional information in our ongoing investigation.

arcticwolf EN 2024 Fog ransomware USA ransomware analysis
New Play Ransomware Linux Variant Targets ESXi Shows Ties With Prolific Puma | Trend Micro (US) https://www.trendmicro.com/en_us/research/24/g/new-play-ransomware-linux-variant-targets-esxi-shows-ties-with-p.html?ref=news.risky.biz
22/07/2024 15:12:35
QRCode
archive.org
thumbnail

Trend Micro threat hunters discovered that the Play ransomware group has been deploying a new Linux variant that targets ESXi environments.

trendmicro research EN 2024 IoCs Play ransomware group ESXi
Patch or Peril: A Veeam vulnerability incident https://www.group-ib.com/blog/estate-ransomware/
12/07/2024 22:21:57
QRCode
archive.org

Delaying security updates and neglecting regular reviews created vulnerabilities that were exploited by attackers, resulting in severe ransomware consequences.

  • Initial access via FortiGate Firewall SSL VPN using a dormant account
  • Deployed persistent backdoor (“svchost.exe”) on the failover server, and conducted lateral movement via RDP.
  • Exploitation attempts of CVE-2023-27532 was followed by activation of xp_cmdshell and rogue user account creation.
  • Threat actors made use of NetScan, AdFind, and various tools provided by NirSoft to conduct network discovery, enumeration, and credential harvesting.
  • Windows Defender was permanently disabled using DC.exe, followed by ransomware deployment and execution with PsExec.exe.
group-ib EN 2024 Veeam vulnerability incident ransomware FortiGate NirSoft
BlackSuit Ransomware: Insights and Defense Strategies https://areteir.com/article/understanding-blacksuit-ransomware/
08/07/2024 23:04:16
QRCode
archive.org

Learn about BlackSuit ransomware, its impact across sectors, and how to defend against its attacks.

areteir EN 2024 BlackSuit Ransomware Insights
Decrypted: DoNex Ransomware and its Predecessors https://decoded.avast.io/threatresearch/decrypted-donex-ransomware-and-its-predecessors/
08/07/2024 22:12:39
QRCode
archive.org
thumbnail

Researchers from Avast have discovered a flaw in the cryptographic schema of the DoNex ransomware and its predecessors. In cooperation with law enforcement organizations, we have been silently providing the decryptor to DoNex ransomware victims since March 2024. The  cryptographic weakness was made public at Recon 2024 and therefore we have no reason to keep […]

avast EN 2024 Decrypted DoNex Ransomware Muse Darkrace
Eldorado Ransomware: The New Golden Empire of Cybercrime? https://www.group-ib.com/blog/eldorado-ransomware/
08/07/2024 19:09:56
QRCode
archive.org

All about Eldorado Ransomware and how its affiliates make their own samples for distribution.

group-ib EN 2024 Eldorado Ransomware Cybercrime
South African pathology labs down after ransomware attack https://www.capeindependent.com/article/south-african-pathology-labs-down-after-ransomware-attack?ref=news.risky.biz
08/07/2024 06:49:45
QRCode
archive.org
thumbnail

The National Health Laboratory Service is the primary diagnostic service for 80% of the population, and no timeline for its restoration has been determined

capeindependent EN 2024 South-Africa ransomware attack pathology health
Halcyon Identifies New Ransomware Operator Volcano Demon Serving Up LukaLocker https://www.halcyon.ai/blog/halcyon-identifies-new-ransomware-operator-volcano-demon-serving-up-lukalocker
02/07/2024 14:37:25
QRCode
archive.org
thumbnail

Halcyon Identifies New Ransomware Operator Volcano Demon Serving Up LukaLocker
#Demon #Halcyon #Identifies #LukaLocker #New #Operator #Ransomware #Volcano

Halcyon Demon Volcano Ransomware New LukaLocker Identifies Operator
Meet Brain Cipher — The new ransomware behind Indonesia's data center attack https://www.bleepingcomputer.com/news/security/meet-brain-cipher-the-new-ransomware-behind-indonesia-data-center-attack/
30/06/2024 15:13:03
QRCode
archive.org
thumbnail

The new Brain Cipher ransomware operation has begun targeting organizations worldwide, gaining media attention for a recent attack on Indonesia's temporary National Data Center.

bleepingcomputer EN 2024 Brain-Cipher Data-Theft Double-Extortion LockBit Ransomware Indonesia
Indonesia president orders audit of data centres after cyberattack https://www.reuters.com/technology/cybersecurity/bulk-indonesia-data-hit-by-cyberattack-not-backed-up-officials-say-2024-06-28/#:~:text=JAKARTA%2C%20June%2028%20(Reuters),country's%20vulnerability%20to%20such%20attacks
28/06/2024 13:53:44
QRCode
archive.org

Indonesian President Joko Widodo ordered on Friday an audit of government data centres after officials said the bulk of data affected by a recent ransomware cyberattack was not backed up, exposing the country's vulnerability to such attacks.
Last week's cyberattack, the worst in Indonesia in recent years, has disrupted multiple government services including immigration and operations at major airports.

reuters EN 2024 Indonesia ransomware audit government airports data-centers
From Dormant to Dangerous: P2Pinfect Evolves to Deploy New Ransomware and Cryptominer https://www.cadosecurity.com/blog/from-dormant-to-dangerous-p2pinfect-evolves-to-deploy-new-ransomware-and-cryptominer
27/06/2024 08:47:39
QRCode
archive.org
thumbnail

P2Pinfect is a rust-based malware covered extensively by Cado Security in the past. Cado Security researchers first discovered it during triage of honeypot telemetry in July of 2023.

cadosecurity EN 2024 P2Pinfect Ransomware analysis
New P2Pinfect version delivers miners and ransomware on Redis servers https://securityaffairs.com/164968/malware/p2pinfect-delivers-miners-ransomware-on-redis.html
27/06/2024 08:45:03
QRCode
archive.org
thumbnail

Researchers warn that the P2Pinfect worm is targeting Redis servers with ransomware and cryptocurrency mining payloads.

securityaffairs EN 2024 Redis P2Pinfect ransomware mining payloads CVE-2022-0543
Chinese Cyberspies Employ Ransomware in Attacks for Diversion https://www.bleepingcomputer.com/news/security/chinese-cyberspies-employ-ransomware-in-attacks-for-diversion/
27/06/2024 08:26:45
QRCode
archive.org
thumbnail

Cyberespionage groups have been using ransomware as a tactic to make attack attribution more challenging, distract defenders, or for a financial reward as a secondary goal to data theft.

bleepingcomputer EN 2024 APT BitLocker CatB ChamelGang Cyber-espionage Ransomware
ChamelGang & Friends | Cyberespionage Groups Attacking Critical Infrastructure with Ransomware https://www.sentinelone.com/labs/chamelgang-attacking-critical-infrastructure-with-ransomware/
27/06/2024 08:26:03
QRCode
archive.org
thumbnail

Threat actors in the cyberespionage ecosystem are using ransomware for financial gain, disruption, distraction, misattribution, and the removal of evidence.

sentinelone EN 2024 ChamelGang Cyberespionage Critical-infrastructure Ransomware
CDK Begins Restoring Systems Amid Ransomware Payment Reports https://www.databreachtoday.eu/cdk-begins-restoring-systems-amid-ransomware-payment-reports-a-25605
26/06/2024 11:01:08
QRCode
archive.org
thumbnail

CDK Global, the auto dealership software solutions firm that supplies services to an estimated 15,000 dealerships in the U.S. and Canada, said it has begun the

databreachtoday EN 2024 CDK-Global CDK car-dealership cyberattack auto-dealerships ransomware
South Africa’s national health lab hit with ransomware attack amid mpox outbreak https://therecord.media/south-africa-lab-ransomware-mpox-outbreak
26/06/2024 08:39:34
QRCode
archive.org
thumbnail

South Africa’s National Health Laboratory Service (NHLS) was hit by hackers on Saturday, with the dissemination of lab results severely impacted.

therecord.media EN 2024 South-Africa Healthcare NHLS ransomware impact
page 7 / 22
4503 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio