As you have read ransomware has been in the news for because one of the major ransomware gangs, BlackCat/ALPHV updated and expanded its capability to carry out the double extortion tactic and because another major ransomware player LockBit suffered an insider attack of its own: The threat actors are also …
The ups and downs of ransomware software development
Threat actors are always changing their malware and tactics to evade the technical solutions the anti-virus and other security solution vendors distribute. So it is no surprise that malware gets patches and updates as well: Colonial Pipeline hackers add startling new capabilities to ransomware operation – The Record by Recorded …
Continue reading “The ups and downs of ransomware software development”
Ransomware highlights from Bleeping Computers
There are a rush of ransomware stories on Bleeping computers, mainly high profile organisations being hit, not only with crypto-malware but being blackmailed over data exfiltrated by the threat actors. Automotive supplier breached by 3 ransomware gangs in 2 weeks (bleepingcomputer.com) Hacker uses new RAT malware in Cuba Ransomware attacks …
Continue reading “Ransomware highlights from Bleeping Computers”
Ransomware, the how and where and what your first step is in defending against it…
Here are a couple of stories showing that ransomware hits large and small organisations: Luxembourg energy companies struggling with alleged ransomware attack, data breach – The Record by Recorded Future At least 34 healthcare orgs affected by alleged ransomware attack on OneTouchPoint – The Record by Recorded Future The Bromford …
Ransomware victims in a searchable database for threat actors to access!
It gives the threat actors a chance to check on victim’s exploited vulnerabilities, see who pays when infected by ransomware and other useful bits of information if you plan to maximise your cyber criminal profits. Experts concerned about ransomware groups creating searchable databases of victim data – The Record by …
Continue reading “Ransomware victims in a searchable database for threat actors to access!”