An FBI Public Service Announcement June 28, 2022 Alert Number I-062822-PSA The FBI Internet Crime Complaint Center (IC3) warns of an increase in complaints reporting the use of deepfakes and stolen Personally Identifiable Information (PII) to apply for a variety of remote work and work-at-home positions. Deepfakes include a video, an image, or recording convincingly…
Category: Commentaries and Analyses
“You really don’t understand the situation…. Google about our team,” Hive tells victim
SuperAlloy Industrial Company Ltd. (SAI) is an international company specializing in engineering and manufacturing lightweight metal products predominantly for the automotive industry. You may not recognize their name but might be driving around on their wheels, as SAI has produced lightweight forged aluminum wheels for McLaren, Ferrari, AMG, BMW, Jaguar, Daimler, and other manufacturers. SAI…
Cyberattacks: Karakurt makes a comeback with a bang
The following is a machine translation of an article by Valéry Rieß-Marchive: “A lot of May leaks are coming”. This is the message displayed in large print on the front page of Karakurt’s new showcase site. And he is not alone. It is accompanied by the announcement of future disclosures of data concerning 10 hitherto unknown victims. All are scheduled for…
Son of Conti: Ransomware tries its hand at politics
Dina Temple-Raston and Sean Powers report: It has been a busy spring for the Russian-speaking ransomware group Conti. After an unprecedented leak of its internal chat logs earlier in the year that had experts predicting the group’s demise, Conti, or at least some subset of it, came back with a vengeance. In April it attacked Costa Rica, hacking…
Dangerous Ruling Says If Someone Goes Onto Your Openly Shared Google Drive, You Can Sue Them For Unauthorized Access
Mike Masnick writes: If you accidentally leave your Google Drive accessible to anyone with the URL, and someone goes there and deletes stuff, is that “unauthorized access” and a violation of the CFAA? To me, the answer should be absolutely not. But in this recent ruling the judge went the other direction (first noted by Evan Brown). So,…
LockBit 3.0 introduces the first ransomware bug bounty program
Lawrence Abrams reports: The LockBit ransomware operation has released ‘LockBit 3.0,’ introducing the first ransomware bug bounty program and leaking new extortion tactics and Zcash cryptocurrency payment options. […] LeMagIT’s Valery Marchive discovered that the LockBit 3.0 operation is utilizing a new extortion model, allowing threat actors to buy data stolen during attacks. One of the…