Remove data-corruption-a-potential-new-trend-in-ransomware-attacks
article thumbnail

Data Corruption, A Potential New Trend in Ransomware Attacks

Heimadal Security

Exmatter, a well-known data exfiltration malware used by the BlackMatter ransomware group, has been spotted operating a new tactic. The malware was upgraded with data corruption functionality which might show a switch in the field of ransomware attacks with hackers preferring deserting the encryption tactic.

article thumbnail

BlackCat ransomware

CyberSecurity Insiders

This blog was jointly written with Santiago Cortes. AT&T Alien Labs™ is writing this report about recently created ransomware malware dubbed BlackCat which was used in a January 2022 campaign against two international oil companies headquartered in Germany, Oiltanking and Mabanaft. Executive summary. Background.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IT threat evolution in Q2 2021. PC statistics

SecureList

These statistics are based on detection verdicts of Kaspersky products received from users who consented to providing statistical data. According to Kaspersky Security Network, in Q2 2021: Kaspersky solutions blocked 1,686,025,551 attacks from online resources across the globe. Geography of financial malware attacks. Tajikistan.

Adware 91
article thumbnail

IT threat evolution Q2 2022

SecureList

Targeted attacks. New technique for installing fileless malware. Earlier this year, we discovered a malicious campaign that employed a new technique for installing fileless malware on target machines by injecting a shellcode directly into Windows event logs. The attackers then intercept the request and respond to it.

Mobile 79
article thumbnail

IT threat evolution Q1 2022

SecureList

Targeted attacks. Further analysis revealed that the attackers had modified a single component in the firmware in a way that allowed them to intercept the original execution flow of the machine’s boot sequence and introduce a sophisticated infection chain. IT threat evolution in Q1 2022. IT threat evolution in Q1 2022.

Phishing 103
article thumbnail

APT trends report Q1 2022

SecureList

On January 14, 70 Ukrainian websites were defaced: the attackers posted the message “be afraid and expect the worst” The defacement message on the Ministry of Foreign Affairs website, written in Ukrainian, Russian and Polish, suggested that personal data uploaded to the site had been destroyed.

Malware 130
article thumbnail

Where Exactly Are Code Signing Machine Identities Used?

Security Boulevard

In addition, IT teams and other groups may rely on shell scripts to automate critical business functions such as onboarding new employees, backing up critical databases, or performing network security functions. Some savvy cybercriminals are now software developers and have gotten smarter with their attacks.