Greg Linares tweeted a thought-provoking thread that is reminder that what we speculated about in one year comes to pass in another year. His thread begins: This will be a thread discussing a real world breach involving a drone delivered exploit system that occurred this summer Some details I am not able to discuss, however…
Category: Commentaries and Analyses
How Ransomware Is Causing Chaos in American Schools
Lorenzo Franceschi-Bicchierai reports: May 19, 2021 was supposed to be just another day at the end of the school year at Sierra College, a community college in Rocklin, California. Instead, hackers hit the school with ransomware, throwing it into chaos. “We are experiencing a major cybersecurity event this morning that is impacting the majority of services…
34 Deputies call on France’s Minister of Justice to Request Extradition of Sebastien Raoult to France
Although it has been out of the news cycle in the U.S., counsel for suspected ShinyHunters member Sebastien Raoult continues to urge France to seek his client’s extradition to France from Morocco. Raoult has been sitting in a Moroccan jail since May 31 when he was picked up on a red notice from Interpol at…
Covering Up Cyber Breaches
I was researching something and stumbled across a post in r/sysadmin on Reddit that begins: I wanted to make this post for a few months now because I know we all have horror stories on this topic. It seems the only way to stop this is to make sure more IT admins are aware of…
CSI Laboratories reports a second big breach this year
Georgia-based Cytometry Specialists d/b/a CSI Laboratories (“CSI”) has reported a second big breach this year. In a press release issued this week, CSI reports that they discovered on July 8 that they had been the victim of a phishing attack that compromised an employee’s email account. The incident was reported to HHS on September 26…
HC3: Abuse of Legitimate Security Tools and Health Sector Cybersecurity
HC3 has published another guidance (TLP:WHITE) for the healthcare sector. In this one, they discuss how the same tools used to operate, maintain and secure healthcare systems and networks can also be turned against their own infrastructure. The paper includes: Cobalt Strike PowerShell Mimikatz Sysinternals Anydesk Brute Ratel Access the paper on HHS.