The Microsoft Security Threat Intelligence team, which is tracking the threat cluster under the moniker DEV-0832, said the group avoids deploying ransomware in some cases and rather likely carries out extortion using exfiltrated stolen data.
"Shifting ransomware payloads over time from BlackCat , Quantum Locker , and Zeppelin , DEV-0832's latest payload is a Zeppelin variant that includes Vice Society-specific file extensions, such as .v-s0ciety, .v-society, and, most recently, .locked," the tech giant's cybersecurity division ...
Hackers Actively Exploiting Cisco AnyConnect and GIGABYTE Drivers Vulnerabilities
Cisco has warned of active exploitation attempts targeting a pair of two-year-old security flaws in the Cisco AnyConnect Secure Mobility Client for Windows.
Tracked as CVE-2020-3153 (CVSS score: 6.5) and CVE-2020-3433 (CVSS score: 7.8), the vulnerabilities could enable local authenticated attackers to perform DLL hijacking and copy arbitrary files to system directories with elevated privileges.
Hive Ransomware Hackers Begin Leaking Data Stolen from Tata Power Energy Company
The Hive ransomware-as-a-service (RaaS) group has claimed responsibility for a cyber attack against Tata Power that was disclosed by the company less than two weeks ago.
The incident is said to have occurred on October 3, 2022. The threat actor has also been observed leaking stolen data exfiltrated prior to encrypting the network as part of its double extortion scheme.
Medibank now says hackers accessed all its customers' personal data
Australian insurance firm Medibank has confirmed that hackers accessed all of its customers' personal data and a large amount of health claims data during a recent ransomware attack.
In an announcement published today, the companies warned that an internal investigation into the attack has shown that the threat actors had far greater access to customer data than initially thought.
Chinese Hackers Exploit Gaps in US Data Sharing, Senator Says (1)
Chinese hackers are more easily able to steal personal data because of a lack of intelligence sharing between US spy agencies and the Federal Trade Commission, a member of the Senate Select Committee on Intelligence has warned.
How the Software Supply Chain Security is Threatened by Hackers
In many ways, the software supply chain is similar to that of manufactured goods, which we all know has been largely impacted by a global pandemic and shortages of raw materials.
When we talk about an attack on the software supply chain, we are actually referring to two successive attacks: one that targets a supplier, and one that targets one or more downstream users in the chain, using the first as a vehicle.
Hackers Are Taking Advantage of Typing Mistakes to Steal Cryptocurrency – Security Bitcoin ...
Hackers have set up a net of malware-infected domains that take advantage of the typing inaccuracies of users when getting to a determined website.
The banking trojan was first discovered in 2021 and it is now targeting more than 460 applications, allowing attackers to rent its services for $5,000 a month.
Microsoft has detected ransomware and extortion campaigns impacting the education sector, particularly in the US, b… https://t.co/8rMU4hwePg MsftSecIntel (from Redmond, WA) Tue Oct 25 16:20:00 +0000 2022
#Cybercrime group Vice Society has been linked to several #ransomware and extortion campaigns targeting the educati… https://t.co/R5jxGsSfJN TheHackersNews (from The Internet) Wed Oct 26 08:13:55 +0000 2022
System Unknown NFT Collection
#NFT #ETH #nftgiveaways #nftcommunity #Giveaways #NFTPromotion #ART
https://opensea.io/collection/systemunknown
Check out the System Unknown artwork. Click here.
No comments:
Post a Comment