article thumbnail

Russia-linked Sandworm APT compromised 11 Ukrainian telecommunications providers

Security Affairs

The Sandworm group (aka BlackEnergy , UAC-0082 , Iron Viking , Voodoo Bear , and TeleBots ) has been active since 2000, it operates under the control of Unit 74455 of the Russian GRU’s Main Center for Special Technologies (GTsST). ” reads the advisory published by the CERT-UA. “Note (!)

article thumbnail

Russia-linked Sandworm APT uses WinRAR in destructive attacks on Ukraine’s public sector

Security Affairs

The Sandworm group (aka BlackEnergy , UAC-0082 , Iron Viking , Voodoo Bear , and TeleBots ) has been active since 2000, it operates under the control of Unit 74455 of the Russian GRU’s Main Center for Special Technologies (GTsST). The attackers used a BAT script dubbed RoarBat that recursively searches for files with specific extensions (.doc,docx,rtf,txt,xls,xlsx,ppt,pptx,vsd,vsdx,pdf,png,jpeg,jpg,zip,rar,7z,mp4,sql

VPN 85
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SonicWall warns of ‘imminent ransomware’ attacks on its EOL products

Security Affairs

SonicWall also provides recommendations to customers that can’t update their installs, the vendor suggests disconnecting devices immediately and reset their access passwords, and enable account multi-factor authentication, if supported. The affected end-of-life devices with 8.x x firmware are past temporary mitigations. 34 or 9.0.0.10

Firmware 111
article thumbnail

SonicWall warns users of “imminent ransomware campaign”

Malwarebytes

SSL-VPN 200/2000/400 (EOL 2013/2014) disconnect immediately and reset passwords. It describes continuing to use its end-of-life products or 8.x Mitigation. The notice mentions the following products along with recommended actions: SRA 4600/1600 (EOL 2019) disconnect immediately and reset passwords. Security devices as a way in.

article thumbnail

Your Guide to Hacker Summer Camp 2021

ForAllSecure

Back in 2000, it was just Black Hat USA followed by DEF CON, and only a handful of people knew about it. Two Factor Authentication is a must. VPN : I do recommend a VPN, especially if you’re using a hotel Wi-Fi system. This will be my 21st year attending Hacker Summer Camp. It’s an extra layer of security.

VPN 52
article thumbnail

Your Guide to Hacker Summer Camp 2021

ForAllSecure

Back in 2000, it was just Black Hat USA followed by DEF CON, and only a handful of people knew about it. Two Factor Authentication is a must. VPN : I do recommend a VPN, especially if you’re using a hotel Wi-Fi system. This will be my 21st year attending Hacker Summer Camp. It’s an extra layer of security.

VPN 52
article thumbnail

WizCase Report: Vulnerabilities found in WD My Book, NetGear Stora, SeaGate Home, Medion LifeCloud NAS

Security Affairs

Meaning, authentication bypasses weren’t enough. After decoding the files , most of the API endpoints and the web interface were not accessible without authentication. The daemon takes XML data, parses the request and carries out the action without any authentication, except making sure the request came from 127.0.0.1.