article thumbnail

Ransomware Gangs and the Name Game Distraction

Krebs on Security

It’s nice when ransomware gangs have their bitcoin stolen, malware servers shut down, or are otherwise forced to disband. Indeed, some of the most destructive and costly ransomware groups are now in their third incarnation. Indeed, some of the most destructive and costly ransomware groups are now in their third incarnation.

article thumbnail

How Did Authorities Identify the Alleged Lockbit Boss?

Krebs on Security

and Australia in sanctioning and charging a Russian man named Dmitry Yuryevich Khoroshev as the leader of the infamous LockBit ransomware group. 2011 said he was a system administrator and C++ coder. Last week, the United States joined the U.K. NeroWolfe’s introductory post to the forum Verified in Oct. “P.S. .

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

REvil Ransom Arrest, $6M Seizure, and $10M Reward

Krebs on Security

Department of Justice today announced the arrest of Ukrainian man accused of deploying ransomware on behalf of the REvil ransomware gang, a Russian-speaking cybercriminal collective that has extorted hundreds of millions from victim organizations. The DOJ also said it had seized $6.1 Vasinskyi was arrested Oct. 3 was Lublin, Poland.

article thumbnail

A Closer Look at the Snatch Data Ransom Group

Krebs on Security

Earlier this week, KrebsOnSecurity revealed that the darknet website for the Snatch ransomware group was leaking data about its users and the crime gang’s internal operations. It continues: “Prior to deploying the ransomware, Snatch threat actors were observed spending up to three months on a victim’s system.

article thumbnail

Microsoft Patch Tuesday, February 2022 Edition

Krebs on Security

Among those is CVE-2022-22005 , a weakness in Microsoft’s Sharepoint Server versions 2013-2019 that could be exploited by any authenticated user. This is a big deal because malicious macros hidden in Office documents have become a huge source of intrusions for organizations, and they are often the initial vector for ransomware attacks.

article thumbnail

Addressing Remote Desktop Attacks and Security

eSecurity Planet

With lateral movement across a victim’s IT infrastructure, threat actors can escalate privileges, spread malware , extract data , and disrupt IT services as with ransomware attacks. SamSam Ransomware: Malware Specializing in RDP. A few days later, IT systems started malfunctioning with ransom messages following.

VPN 117