article thumbnail

ALPHV/BlackCat ransomware affiliate targets Veritas Backup solution bugs

Security Affairs

An ALPHV/BlackCat ransomware affiliate was spotted exploiting vulnerabilities in the Veritas Backup solution. An affiliate of the ALPHV/BlackCat ransomware gang, tracked as UNC4466, was observed exploiting three vulnerabilities in the Veritas Backup solution to gain initial access to the target network. CVSS score: 8.1).

Backups 92
article thumbnail

Topic-specific policy 7/11: backup

Notice Bored

when I read the recommendation for a topic-specific policy on backup. If you already have a backup policy (or something with a vaguely similar title), I urge you to dig it out at this point and study it (again!) Is your backup policy exclusively about backing up computer data , most likely digital data from corporate IT systems?

Backups 56
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Over 39K unauthenticated Redis services on the internet targeted in cryptocurrency campaign

Security Affairs

Threat actors targeted tens thousands of unauthenticated Redis servers exposed on the internet as part of a cryptocurrency campaign. The tool is not designed to be exposed on the Internet, however, researchers spotted tens thousands Redis instance publicly accessible without authentication. ” warns Censys. bash_history).

article thumbnail

No, the AWS bomb plot likely wouldn’t have shut down large parts of the internet

SC Magazine

A potential plot to bomb a datacenter run by the world’s largest cloud infrastructure provider would likely not have resulted in a massive shutdown for large portions of the internet, despite claims to the contrary made by the would-be attacker, experts say. But it wouldn’t break the internet, or anything even close to it.

article thumbnail

Clorox counts the cost of cyberattack

Malwarebytes

Add to that the suspicion that the ransom was paid, and we can conclude that backups were perhaps insufficient or not readily deployable. Another indication that things may not have been up to par was the chief information security officer (CISO) leaving in November, while the company was still recovering from the cyberattack.

Backups 109
article thumbnail

Microsoft Patches Six Zero-Day Security Holes

Krebs on Security

“This can be hugely damaging in the event of ransomware attacks, where high privileges can enable the attackers to stop or destroy backups and other security tools,” Breen said. So do yourself a favor and backup before installing any patches.

Backups 309
article thumbnail

A ransomware attack took 100 Romanian hospitals down

Security Affairs

Identify affected systems and immediately isolate them from the rest of the network as well as from the Internet Keep a copy of the ransom message and any other communications from the attackers. This information is useful to the authorities or for further analysis of the attack Do not shut down the affected equipment.