article thumbnail

Ransomware Taxonomy: Four Scenarios Companies Should Safeguard Against

Cisco Security

While October is designated as Cybersecurity Awareness Month, focusing on keeping your company and customers safe should be a constant priority, especially with the growing number and sophistication of ransomware attacks worldwide. This is the classic attack scenario that comes to mind for most folks when you hear the word “ransomware.”

article thumbnail

Bad Luck: BlackCat Ransomware Bulletin

Security Boulevard

Blackcat Ransomware. On April 19th of 2022, the FBI Cyber Division released a flash bulletin regarding the Blackcat ransomware-for-hire. This was met with mixed reactions - some found the ransomware to be of little concern , others made a case for tracking its progress. Malware Traits of Blackcat Ransomware.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BlackCat ransomware

CyberSecurity Insiders

AT&T Alien Labs™ is writing this report about recently created ransomware malware dubbed BlackCat which was used in a January 2022 campaign against two international oil companies headquartered in Germany, Oiltanking and Mabanaft. Key takeaways: The ransomware BlackCat is coded in Rust and was created in November 2021.

article thumbnail

Ransomware and wiper signed with stolen certificates

SecureList

Around the same time, we identified ransomware and wiper malware samples resembling those used in the first wave, though with a few interesting modifications that likely allowed evasion of security controls and better attack speeds. Wiper and ransomware, comparing wave 1 and wave 2. So, what’s new in this blogpost?

article thumbnail

GUEST ESSAY: The case for leveraging hardware to shore up security — via a co-processor

The Last Watchdog

A sobering analysis by Cybersecurity Ventures forecasts that the global cost of ransomware attacks will reach $265 billion in 2031. • Seeing the flaws continue year after year, the industry began linking authentication of valid software components to the underlying hardware, or the “root of trust”. million to $4.24

article thumbnail

Group-IB detects a series of ransomware attacks by OldGremlin

Security Affairs

Researchers from threat hunting and intelligence firm Group-IB have detected a successful attack by a ransomware gang tracked as OldGremlin. Group-IB , a global threat hunting and intelligence company headquartered in Singapore, has detected a successful attack by a ransomware gang, codenamed OldGremlin.

article thumbnail

Russia-linked hackers target Ukrainian military with Infamous Chisel Android malware

Security Affairs

The report is available on the website of the NCSC and the US Cybersecurity and Infrastructure Security Agency (CISA) , the agencies also released indicators of compromise (IoCs) and the Yara rule for threat detection. The group is also the author of the NotPetya ransomware that hit hundreds of companies worldwide in June 2017.

Malware 108