article thumbnail

Blacktail: Unveiling the tactics of a notorious cybercrime group

CyberSecurity Insiders

In recent months, a cybercrime group known as Blacktail has begun to make headlines as they continue to target organizations around the globe. Two of the most popular tools that have been used by the cybercrime group are LockBit 3.0 The content of this post is solely the responsibility of the author. Both LockBit 3.0

article thumbnail

Malvertising Is a Cybercrime Heavyweight, Not an Underdog

SecureWorld News

Cybercriminals can then exploit the compromised device for various purposes, such as stealing personal information, conducting financial fraud, recruiting it into a botnet, or encrypting data and holding it for ransom. A stepping stone to impactful cybercrime This tactic has tangible real-world implications.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Rorschach ransomware has the fastest file-encrypting routine to date

Security Affairs

A new ransomware strain named Rorschach ransomware supports the fastest file-encrypting routine observed to date. The researchers conducted five separate encryption speed tests in a controlled environment (with 6 CPUs, 8192MB RAM, SSD, and 220000 files to be encrypted), limited to local drive encryption only.

article thumbnail

8Base ransomware operators use a new variant of the Phobos ransomware

Security Affairs

Phobos variants are usually distributed by the SmokeLoader , but in 8Base campaigns, it has the ransomware component embedded in its encrypted payloads. 8base” file extension for encrypted documents, a circumstance that suggested a possible link to the 8Base group or the use of the same code-base for their ransomware.

article thumbnail

How to Protect New Remote Workers Against Cybercrime

SecureWorld News

One of the major issues surrounds keeping remote workers protected against cybercrime. Within an office environment, workers have a number of protections, such as the company firewall and regularly updated infrastructure. Without these protections, remote staff can potentially be vulnerable. Test your own system.

article thumbnail

Usage of TLS in DDNS Services leads to Information Disclosure in Multiple Vendors

Security Affairs

509 [2] certificates) and encrypted, authenticated connections (TLS [3] and its precursor, SSL [4] ). For instance, suppose firewall manufacturer ACME Inc. For instance, suppose firewall manufacturer ACME Inc. Fortinet Fortinet has introduced the “FortiGuard DDNS” service in its FortiGate firewall products.

DNS 109
article thumbnail

Security Affairs newsletter Round 450 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

CISA and ENISA enhance their Cooperation CISA adds Qlik bugs to exploited vulnerabilities catalog Report: 2.6