Fri.May 14, 2021

article thumbnail

DarkSide Ransomware Gang Quits After Servers, Bitcoin Stash Seized

Krebs on Security

The DarkSide ransomware affiliate program responsible for the six-day outage at Colonial Pipeline this week that led to fuel shortages and price spikes across the country is running for the hills. The crime gang announced it was closing up shop after its servers were seized and someone drained the cryptocurrency from an account the group uses to pay affiliates. “Servers were seized (country not named), money of advertisers and founders was transferred to an unknown account,” reads a

article thumbnail

Ransomware Is Getting Ugly

Schneier on Security

Modern ransomware has two dimensions: pay to get your data back, and pay not to have your data dumped on the Internet. The DC police are the victims of this ransomware, and the criminals have just posted personnel records — “including the results of psychological assessments and polygraph tests; driver’s license images; fingerprints; social security numbers; dates of birth; and residential, financial, and marriage histories” — for two dozen police officers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Colonial Pipeline Paid Hackers $5 Million Ransom

Adam Levin

Colonial Pipeline paid roughly $5 million to the ransomware group responsible for hacking its systems, contradicting earlier claims. . Bloomberg News reported that the company paid the ransom in cryptocurrency hours after the May 7 cyberattack that shut down the country’s largest fuel pipeline. In exchange for the payment, the hackers responsible provided Colonial with a decryption tool that restored the company’s access to its data. .

Backups 260
article thumbnail

Upcoming Speaking Engagements

Schneier on Security

This is a current list of where and when I am scheduled to speak: I’m keynoting the (all-virtual) RSA Conference 2021 , May 17-20, 2021. I’m keynoting the 5th International Symposium on Cyber Security Cryptology and Machine Learning (via Zoom), July 8-9, 2021. I’ll be speaking at an Informa event on September 14, 2021. Details to come. The list is maintained on this page.

194
194
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Weekly Update 243

Troy Hunt

This one is a real short intro as right now, it hurts to type (copy and paste is earlier ??): I’m Back at a *REAL* Conference; Dealing with RSI; Shellies and MQTT; My IoT Aircon Hack; Drowning in Data Breaches. References I've been at a real conference this week, with people and all! (that's a tweet with pics of the environment) I've also been dealing with some pretty unpleasant RSI (link to the blog post on my ergonomic setup, do invest early in this folks) My automated IoT aircon integration i

IoT 181
article thumbnail

Expert: Intel sharing is key to preventing more infrastructure cyberattacks

Tech Republic Security

Old technology and fear of sharing proprietary information are keeping companies from helping each other thwart attacks.

More Trending

article thumbnail

Remote Work Lessons Learned

Security Boulevard

To say that the world was unprepared for what happened in March of 2020 would be a gross understatement. Nobody needs a reminder of the seismic changes that the coronavirus pandemic introduced. Large enterprises were caught off guard, to be sure. But many small and medium-sized enterprises (SMEs), which typically operate with lean and sometimes. The post Remote Work Lessons Learned appeared first on Security Boulevard.

article thumbnail

Gamers warned of downloading fake Afterburner overclocking tool to boost graphics card performance

Hot for Security

A leading manufacturer of gaming hardware has warned internet users to be wary of downloading fake versions of free software it distributes to overclock GPUs. According to a blog post by MSI , cybercriminals have created a fake version of the MSI website and are using it to distribute a malware-laced version of their free utility, Afterburner. MSI Afterburner is the most popular GPU overclocking software available, and highly regarded by gamers for its ability to squeeze out maximum performance,

article thumbnail

DarkSide ransomware servers reportedly seized, operation shuts down

Bleeping Computer

The DarkSide ransomware operation has allegedly shut down after the threat actors lost access to servers and their cryptocurrency was transferred to an unknown wallet. [.].

article thumbnail

RSAC insights: ‘SASE’ disrupts networking by meshing security, connectivity at the services edge

The Last Watchdog

It’s accurate to say that security has been bolted onto modern business networks. It also has become very clear that we won’t achieve the full potential of digital transformation without security somehow getting intricately woven into every layer of corporate IT systems. We’re still a long way from achieving that, but a promising roadmap has emerged.

Firewall 115
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

DarkSide ransomware servers reportedly seized, REvil restricts targets

Bleeping Computer

The DarkSide ransomware operation has allegedly shut down after the threat actors lost access to servers and their cryptocurrency was transferred to an unknown wallet. [.].

article thumbnail

WhatsApp calls and messages will break unless you share data with Facebook

Malwarebytes

WhatsApp told users last week that there was no need for alarm regarding an upcoming privacy policy deadline, as users who refuse to accept the privacy policy will not have their accounts deleted—they will just have their apps rendered useless, eventually incapable of receiving calls and messages. The planned removal of core features represents a stunning reversal for a company that long ago prioritized data privacy, transforming WhatsApp’s offering into an unworkable contradiction: Private mess

article thumbnail

Ransomware ads now also banned on Exploit cybercrime forum

Bleeping Computer

The team behind Exploit, a major cybercrime forum used by ransomware gangs to hire affiliates and advertise their Ransomware-as-a-Service (RaaS) services, has announced that ransomware ads are now banned and will be removed. [.].

article thumbnail

Hackers Using Microsoft Build Engine to Deliver Malware Filelessly

The Hacker News

Threat actors are abusing Microsoft Build Engine (MSBuild) to filelessly deliver remote access trojans and password-stealing malware on targeted Windows systems.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

QNAP warns of eCh0raix ransomware attacks, Roon Server zero-day

Bleeping Computer

QNAP warns customers of an actively exploited Roon Server zero-day bug and eCh0raix ransomware attacks targeting their Network Attached Storage (NAS) devices, just two weeks after alerting them of an ongoing AgeLocker ransomware outbreak. [.].

article thumbnail

Threat Actors Target Ledger Data Breach Victims in New Extortion Campaign

Hot for Security

Blackmailers are having a field day capitalizing on victims of the Ledger data leak from July 2020. Nearly a year after cybercriminals gained access to the e-commerce database of the France-based crypto wallet company, a new extortion campaign threatens users’ financial and emotional well-being. This novel attempt at extorting victims, spotted by Bitdefender Antispam Lab , differs sharply from the usual method of operation of the perps.

article thumbnail

Magecart Hackers Now hide PHP-Based Backdoor In Website Favicons

The Hacker News

Cybercrime groups are distributing malicious PHP web shells disguised as a favicon to maintain remote access to the compromised servers and inject JavaScript skimmers into online shopping platforms with an aim to steal financial information from their users.

article thumbnail

10 Important Facts About Social Engineering

Security Boulevard

These 10 facts about social engineering statistics illustrate how powerful it can be has grown and show you can protect your business. The post 10 Important Facts About Social Engineering appeared first on Security Boulevard.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Popular Russian hacking forum XSS bans all ransomware topics

Bleeping Computer

One of the most popular Russian-speaking hacker forums, XSS, has banned all topics promoting ransomware to prevent unwanted attention. [.].

article thumbnail

RevengeRAT and AysncRAT target aerospace and travel sectors

SC Magazine

American Airlines flight 718, a Boeing 737 Max, is seen parked at its gate at Miami International Airport as passengers board for a flight to New York on December 29, 2020 in Miami, Florida. A campaign of remote access trojans is targeting the aerospace and travel industries. (Photo by Joe Raedle/Getty Images). Microsoft Security Intelligence earlier this week tweeted out that it has been tracking a campaign of remote access trojans (RATs) targeting the aerospace and travel industries with spear

Phishing 126
article thumbnail

Irish healthcare shuts down IT systems after Conti ransomware attack

Bleeping Computer

Ireland's Health Service Executive(HSE), the country's publicly funded healthcare system, has shut down all IT systems after its network was breached in a ransomware attack. [.].

article thumbnail

Forrester Recognizes Cisco Secure Endpoint Advancements – Promotes to Strong Performer

Cisco Security

Secure Endpoint offers more as shown in new Forrester Wave report. At the publishing of the previous Q3 2019 Forrester Wave report for Endpoint Security Suites, Secure Endpoint was lauded as one of the least obtrusive security products to end-user productivity. Now, per Forrester’s Q2 2021 report , Cisco has increased its market presence to the next level and has moved upward from a Contender to a Strong Performer , well poised to break into the nearby Leader category for the next Wave report bu

Marketing 125
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Pacific Northwest Appsec Conference

Adam Shostack

“AppSec Pacific Northwest Conference is a free application security conference that will be held Saturday, June 19th. It is a virtual, online event sponsored by the OWASP chapters of Portland, Vancouver, and Victoria. We love to see brand new speakers, seasoned speakers and everyone in between. Their call for presentations is now open.

article thumbnail

Pakistan-Linked Hackers Added New Windows Malware to Its Arsenal

The Hacker News

Cybercriminals with suspected ties to Pakistan continue to rely on social engineering as a crucial component of its operations as part of an evolving espionage campaign against Indian targets, according to new research.

article thumbnail

What Is a Virtual Patch and Why You Need It

Heimadal Security

Software vulnerabilities are one of the biggest nuisances for cybersecurity because cybercriminals love to exploit them. Read on to find out how you can be one step ahead by applying the virtual patch approach! What Is a Virtual Patch: Some Definitions To understand the concept of the virtual patch, we first need to clarify the […]. The post What Is a Virtual Patch and Why You Need It appeared first on Heimdal Security Blog.

Software 113
article thumbnail

Cross-browser tracking vulnerability tracks you via installed apps

Bleeping Computer

Researchers have developed a way to track a user across different browsers on the same machine by querying the installed applications on the device. [.].

121
121
article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Did One Phish Take Down a Pipeline?

Security Boulevard

What the Colonial Pipeline Attack Reminds Us About Phishing and Ransomware As demonstrated with the Colonial Pipeline attack, Ransomware is the number one cybersecurity threat to organizations, but it’s also the number one security threat to humans. It impacts schools, medical centers, and communities. Phishing is the number one cause of Ransomware.

Phishing 112
article thumbnail

Rapid7 Source Code Breached in Codecov Supply-Chain Attack

The Hacker News

Cybersecurity company Rapid7 on Thursday revealed that unidentified actors improperly managed to get hold of a small portion of its source code repositories in the aftermath of the software supply chain compromise targeting Codecov earlier this year.

Software 111
article thumbnail

DarkSide Ransomware Suffers ‘Oh, Crap!’ Server Shutdowns

Threatpost

The RaaS that crippled Colonial Pipeline lost the servers it uses to pull off ransomware attacks, while REvil’s gonads shrank in response.

article thumbnail

Webinar: Future-Proofing Security Programs in 2021 and Beyond

Security Boulevard

2020 was a year of learning, with surges in ransomware, nation states infecting supply chains from Solar Winds to Microsoft, and radical new work models that might presage a “new normal.” . The post Webinar: Future-Proofing Security Programs in 2021 and Beyond appeared first on Security Boulevard.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.