The threat actors do not have it all their own way – law enforcement does fight back. IN this case the FBI infiltrated the Dark Web assets of the BlackCat/AlphV ransomware gang getting an insight into how they work. Domians were seized and closed down disrupting the gangs operations and …
Let’s start the week with Ransomware
We finished last week with a ransomware story. let’s start this week with another: BlackCat ransomware hits Azure Storage with Sphynx encryptor (bleepingcomputer.com) This ransomware story has a twist, the prolific BlackCat ransomware gang are ow using stolen Microsoft credentials in custom software to execute their attacks. Your takeaway You …
NHS Data Breach – Trust or trust?
Barts Health NHS Trust is one of the largest in the country – and it’s cyber security has been breached by the BlackCat ransomware gang. Some of the data has already been leaked as a “proof of breach” to the Trust and to the members of staff whose data, held …
My favourite SSH client is compromised…
…well not the actual one on my laptop. The SSH client I use is WinSCP and the actual version I use is the one available via PortableApps.com. It is not malware. But the BlackCat ransomware group, also known as ALPHV, have spoofed the official WinSCP website and are distributing a …
Ransomware the background story
Your awareness of how ransomware evolves and works and the tactics being used by the ransomware gangs that deploy the malware, will help improve your cyber security. Here is one of those inside stories researched by the Threat Hunter Team at Symantec. Noberus Ransomware: Darkside and BlackMatter Successor Continues to …
Ransomware the threat and the attacks – you need to make sure your cyber security game is up to the job of protecting your organisation.
As you have read ransomware has been in the news for because one of the major ransomware gangs, BlackCat/ALPHV updated and expanded its capability to carry out the double extortion tactic and because another major ransomware player LockBit suffered an insider attack of its own: The threat actors are also …
The ups and downs of ransomware software development
Threat actors are always changing their malware and tactics to evade the technical solutions the anti-virus and other security solution vendors distribute. So it is no surprise that malware gets patches and updates as well: Colonial Pipeline hackers add startling new capabilities to ransomware operation – The Record by Recorded …
Continue reading “The ups and downs of ransomware software development”