Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 8 / 24
462 résultats taggé Ransomware  ✕
Cicada 3301 - Ransomware-as-a-Service - Technical Analysis https://www.truesec.com/hub/blog/dissecting-the-cicada
02/09/2024 11:35:55
QRCode
archive.org
thumbnail

Discover the latest insights on the emerging ransomware group Cicada3301, first detected in June 2024. Truesec's investigation reveals key findings about this group, named after a famous cryptography game, now targeting multiple victims.

truesec EN 2024 Cicada3301 ransomware emerging cryptography Analysis
Cybercriminals operating ransomware as a service from overseas continue to be responsible for most high-profile cybercrime attacks against the UK https://www.nationalcrimeagency.gov.uk/threats/nsa-cyber-2024
30/08/2024 11:23:23
QRCode
archive.org

The deployment of ransomware remains the greatest serious and organised cybercrime threat, the largest cybersecurity threat, and also poses a risk to the UK’s national security. Ransomware attacks can have a significant impact on victims due to financial, data, and service losses, which can lead to business closure, inaccessible public services, and compromised customer data. Threat actors are typically based in overseas jurisdictions where limited cooperation makes it challenging for UK law enforcement to disrupt their activities.

nationalcrimeagency.gov.uk EN 2024 ransomware report assassment cybercrime UK
BlackSuit Ransomware https://thedfirreport.com/2024/08/26/blacksuit-ransomware/
26/08/2024 07:15:37
QRCode
archive.org
thumbnail
  • In December 2023, we observed an intrusion that started with the execution of a Cobalt Strike beacon and ended in the deployment of BlackSuit ransomware.
  • The threat actor leveraged various tools, including Sharphound, Rubeus, SystemBC, Get-DataInfo.ps1, Cobalt Strike, and ADFind, along with built-in system tools.
  • Command and control traffic was proxied through CloudFlare to conceal their Cobalt Strike server.
  • Fifteen days after initial access, BlackSuit ransomware was deployed by copying files over SMB to admin shares and executing them through RDP sessions.
  • Three rules were added to our private ruleset related to this case.
thedfirreport EN 2024 BlackSuit Ransomware
Qilin ransomware caught stealing credentials stored in Google Chrome https://news.sophos.com/en-us/2024/08/22/qilin-ransomware-caught-stealing-credentials-stored-in-google-chrome/
23/08/2024 10:31:13
QRCode
archive.org
thumbnail

Familiar ransomware develops an appetite for passwords to third-party sites

sophos EN 2024 ransomware Qilin Chrome passwords
Touché par un ransomware, Schlatter Industries a relancé ses systèmes (update) | ICTjournal https://www.ictjournal.ch/news/2024-08-21/touche-par-un-ransomware-schlatter-industries-a-relance-ses-systemes-update
23/08/2024 10:27:32
QRCode
archive.org
thumbnail

Le réseau informatique de l'entreprise suisse de fabrication de machines Schlatter a été attaqué via un logici

ictjournal FR CH 2024 Suisse Schlatter ransomware
Ransomware attackers introduce new EDR killer to their arsenal https://news.sophos.com/en-us/2024/08/14/edr-kill-shifter/
16/08/2024 09:50:38
QRCode
archive.org
thumbnail

Sophos discovers the threat actors behind RansomHub ransomware using EDRKillShifter in attacks

sophos EN 2024 Ransomware attackers EDRKillShifter RansomHub
CVE-2024-23897 Enabled Ransomware Attack on Indian Banks https://blogs.juniper.net/en-us/threat-research/cve-2024-23897-enabled-ransomware-attack-on-indian-banks
13/08/2024 20:41:37
QRCode
archive.org
thumbnail

CVE-2024-23897 is an unauthenticated arbitary file read vulnerability in Jenkins CLI used by RansomEXX to target small Indian banks.

juniper EN 2024 CVE-2024-23897 Ransomware Jenkins RansomEXX ransom-note
Don’t get Mad, get wise https://news.sophos.com/en-us/2024/08/13/dont-get-mad-get-wise/
13/08/2024 15:30:10
QRCode
archive.org
thumbnail

The “Mad Liberator” ransomware group leverages social-engineering moves to watch out for

sophos EN 2024 MadLiberator ransomware group social-engineering
Security bugs in ransomware leak sites helped save six companies from paying hefty ransoms https://techcrunch.com/2024/08/08/security-bugs-in-ransomware-leak-sites-helped-save-six-companies-from-paying-hefty-ransoms/?ref=news.risky.biz
12/08/2024 11:19:46
QRCode
archive.org
thumbnail

The vulnerabilities allowed one security researcher to peek inside the leak sites without having to log in.

techcrunch EN 2024 Atropos.ai web bug leak-site ransomware
How a cybersecurity researcher befriended, then doxed, the leader of LockBit https://techcrunch.com/2024/08/09/how-a-cybersecurity-researcher-befriended-then-doxed-the-leader-of-lockbit-ransomware-gang/
12/08/2024 06:42:03
QRCode
archive.org
thumbnail

Jon DiMaggio used sockpuppet accounts, then his own identity, to infiltrate LockBit and gain the trust of its alleged admin, Dmitry Khoroshev.

techcrunch en 2024 LockBit JonDiMaggio doxing ransomware gang infiltration
Major Payment Disruption: Ransomware Strikes Indian Banking Infrastructure https://www.cloudsek.com/blog/major-payment-disruption-ransomware-strikes-indian-banking-infrastructure
07/08/2024 10:56:43
QRCode
archive.org
thumbnail

CloudSEK's threat research team has uncovered a ransomware attack disrupting India's banking system, targeting banks and payment providers. Initiated through a misconfigured Jenkins server at Brontoo Technology Solutions, the attack is linked to the RansomEXX group.

cloudsek EN ransomware analysis Jenkins India RansomEXX CVE-2024-23897
Cybersécurité : le Grand Palais et plusieurs musées dont le Louvre victimes d’une attaque par rançongiciel https://www.leparisien.fr/high-tech/cybersecurite-le-grand-palais-et-plusieurs-musees-dont-le-louvre-victimes-dune-attaque-par-rancongiciel-05-08-2024-LYA4YVRAW5CQHPVRHSC3LAGPHM.php
06/08/2024 12:22:00
QRCode
archive.org
thumbnail

Les attaquants ont chiffré une partie des données financières et menacent de les diffuser s’ils ne reçoivent pas une rançon. Une enquête a été ouverte.

leparisien FR 2024 France Ransomware Louvre musées
Ransomware gang targets IT workers with new SharpRhino malware https://www.bleepingcomputer.com/news/security/hunters-international-ransomware-gang-targets-it-workers-with-new-sharprhino-malware/
06/08/2024 09:55:35
QRCode
archive.org
thumbnail

The Hunters International ransomware group is targeting IT workers with a new C# remote access trojan (RAT) called SharpRhino to breach corporate networks.

bleepingcomputer EN 2024 Hunters-International Malware Ransomware SharpRhino Typo-Squatting
New Hunters International RAT identified by Quorum Cyber https://www.quorumcyber.com/insights/sharprhino-new-hunters-international-rat-identified-by-quorum-cyber/
06/08/2024 09:54:02
QRCode
archive.org

During a recent ransomware incident investigated by the Quorum Cyber Incident Response team, novel malware was identified previously unknown.

quorumcyber EN 2024 RAT ransomware Rust ipscan-3.9.1-setup.exe Hunters-International
Surge in Magniber ransomware attacks impact home users worldwide https://www.bleepingcomputer.com/news/security/surge-in-magniber-ransomware-attacks-impact-home-users-worldwide/
05/08/2024 13:34:44
QRCode
archive.org
thumbnail

A massive Magniber ransomware campaign is underway, encrypting home users' devices worldwide and demanding thousand-dollar ransoms to receive a decryptor.

Magniber launched in 2017 as a successor to the Cerber ransomware operation when it was spotted being distributed by the Magnitude exploit kit.

Since then, the ransomware operation has seen bursts of activity over the years, with the threat actors utilizing various methods to distribute Magniber and encrypt devices. These tactics include using Windows zero-days, fake Windows and browser updates, and trojanized software cracks and key generators.

bleepingcomputer EN 2024 Cracks Encryptor Magniber Ransomware Warez
Black Basta ransomware switches to more evasive custom malware https://www.bleepingcomputer.com/news/security/black-basta-ransomware-switches-to-more-evasive-custom-malware/
03/08/2024 21:04:49
QRCode
archive.org
thumbnail

The Black Basta ransomware gang has shown resilience and an ability to adapt to a constantly shifting space, using new custom tools and tactics to evade detection and spread throughout a network.

bleepingcomputer EN 2024 BlackBasta Initial-Access Malware Ransomware mandiant UNC4393
'Fortune 50' Company Made Record-Breaking $75M Ransomware Payment https://www.pcmag.com/news/fortune-50-company-made-record-breaking-75m-ransomware-payment
01/08/2024 23:07:59
QRCode
archive.org

A major company made a staggering $75 million ransomware payment to hackers earlier this year, according to cybersecurity vendor Zscaler.

Zscaler made the claim in a Tuesday report examining the latest trends in ransomware attacks, which continue to ensnare companies, hospitals, and schools across the country.

pcmag EN 2024 Zscaler report Fortune50 record ransomware payment DarkAngels
Cyberattack hits blood-donation nonprofit OneBlood https://edition.cnn.com/2024/07/31/politics/cyberattack-oneblood-blood-donation/
01/08/2024 06:57:34
QRCode
archive.org
thumbnail

A cyberattack has hit a blood-donation nonprofit that serves hundreds of hospitals in the southeastern US.

The hack, which was first reported by CNN, has raised concerns about potential impacts on OneBlood’s service to some hospitals, multiple sources familiar with the matter said, and the incident is being investigated as a potential ransomware attack.

cnn EN 2024 cyberattack US OneBlood Healthcare ransomware incident
Ransomware operators exploit ESXi hypervisor vulnerability for mass encryption | Microsoft Security Blog https://www.microsoft.com/en-us/security/blog/2024/07/29/ransomware-operators-exploit-esxi-hypervisor-vulnerability-for-mass-encryption/
29/07/2024 18:47:07
QRCode
archive.org
thumbnail

Microsoft researchers have uncovered a vulnerability in ESXi hypervisors being exploited by several ransomware operators to obtain full administrative permissions on domain-joined ESXi hypervisors. ESXi is a bare-metal hypervisor that is installed directly onto a physical server and provides direct access and control of underlying resources. ESXi hypervisors host virtual machines that may include critical servers in a network. In a ransomware attack, having full administrative permission on an ESXi hypervisor can mean that the threat actor can encrypt the file system, which may affect the ability of the hosted servers to run and function. It also allows the threat actor to access hosted VMs and possibly to exfiltrate data or move laterally within the network.

microsoft EN 2024 ESXi hypervisors Ransomware encrypt CVE-2024-37085 Storm-0506 Storm-1175 OctoTempest
Arctic Wolf Labs has observed Fog ransomware being deployed against US organizations in the education and recreation sectors. https://arcticwolf.com/resources/blog/lost-in-the-fog-a-new-ransomware-threat/
22/07/2024 22:49:16
QRCode
archive.org
thumbnail

On May 2, 2024, Arctic Wolf Labs began monitoring deployment of a new ransomware variant referred to as Fog. The ransomware activity was observed in several Arctic Wolf Incident Response cases, each exhibiting similar elements. All victim organizations were located in the United States, 80% of which were in the education sector and 20% in the recreation sector.

We are sharing details of this emerging variant to help organizations defend against this threat. Please note that we may add further detail to this article as we uncover additional information in our ongoing investigation.

arcticwolf EN 2024 Fog ransomware USA ransomware analysis
page 8 / 24
5001 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn