article thumbnail

A member of the FIN7 group was sentenced to 10 years in prison

Security Affairs

The Ukrainian national Fedir Hladyr (35), aka “das” or “AronaXus,” was sentenced to 10 years in prison for having served as a manager and systems administrator for the financially motivated group FIN7 , aka Carbanak. Hladyr also controlled the organization’s encrypted channels of communication.”

article thumbnail

A Closer Look at the Snatch Data Ransom Group

Krebs on Security

The government says Snatch used a customized ransomware variant notable for rebooting Microsoft Windows devices into Safe Mode — enabling the ransomware to circumvent detection by antivirus or endpoint protection — and then encrypting files when few services are running. Details after contacting on jabber: truniger@xmpp[.]jp.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FIN7 sysadmin behind “billions in damage” gets 10 years

Malwarebytes

Hladyr is the systems administrator for the FIN7 hacking group, and is considered the mastermind behind the Carbanak campaign , a series of cyberattacks said to stolen as much as $900 million from banks in early part of the last decade. Hladyr also controlled the organization’s encrypted channels of communication. The malware.

article thumbnail

Detecting browser data theft using Windows Event Logs

Google Security

Where it is not possible to prevent the theft of credentials and cookies by malware, the next best thing is making the attack more observable by antivirus, endpoint detection agents, or enterprise administrators with basic log analysis tools.

article thumbnail

How Did Authorities Identify the Alleged Lockbit Boss?

Krebs on Security

Pin was active on Opensc around March 2012, and authored 13 posts that mostly concerned data encryption issues, or how to fix bugs in code. 2011 said he was a system administrator and C++ coder. ” In an October 2013 discussion on the cybercrime forum Exploit , NeroWolfe weighed in on the karmic ramifications of ransomware.

article thumbnail

Addressing Remote Desktop Attacks and Security

eSecurity Planet

By exploiting weak server vulnerabilities, the Iran-based hackers were able to gain access, move laterally, encrypt IT systems, and demand ransom payment. A few days later, IT systems started malfunctioning with ransom messages following. clinical labs company September U.S. Remote Desktop Software Features.

VPN 120
article thumbnail

Happy 10th anniversary & Kali's story.so far

Kali Linux

Wednesday 13th, March 2013, 10 years ago, Kali Linux v1.0 A fresh start in March 2013. BackTrack Linux became Kali Linux in March 2013. Moto) first saw the light of day at Black Hat Europe 2013 and was based on Debian 7. Being a system administrator, a patch could contain a security update to stop a vulnerability.

InfoSec 52