MaryClaire Dale of AP reports: Trial lawyer Robert Fisher is handling one of America’s most prominent counterintelligence cases, defending an MIT scientist charged with secretly helping China. But how he’ll handle the logistics of the case could feel old school: Under new court rules, he’ll have to print out any highly sensitive documents and hand-deliver…
Category: Commentaries and Analyses
Court Holds Data Breach Notice Disclosing Potential Cyberattack Did Not Establish Plaintiffs’ Standing in Privacy Litigation
Christina Lamoureux of Squire Patton Boggs writes: While many federal courts have weighed in on the issue of what suffices for Article III standing in the context of a data breach litigation, not all state courts have. Last week, the Superior Court of Delaware found that a group of plaintiffs who received a notice that their personal…
Fonix ransomware shuts down and releases master decryption key
Lawrence Abrams reports: The Fonix Ransomware operators have shut down their operation and released the master decryption allowing victims to recover their files for free. Fonix Ransomware, also known as Xinof and FonixCrypter, began operating in June 2020 and has been steadily encrypting victims since. Read more on BleepingComputer.
Suspected Russian Hackers Gained Edge Through Tech Firm Attacks
Kartikay Mehrotra and Alyza Sebenius report: Whether it was opportunity, strategy or sheer chutzpah, the suspected Russian hackers behind a massive cyber-attack revealed last month focused particular attention on technology companies, including cybersecurity firms entrusted to find malicious activity in their clients’ networks. Four cybersecurity companies announced this week that they had been targeted as…
Data Breach Defense
David Oberly of Blank Rome writes: Today, data breaches continue to proliferate at a rapid pace, often spurring consumer class action litigation in their wake. Oftentimes, a successful data breach suit can empty a corporate defendant’s coffers. For example, Equifax was recently forced to shell out $575 million to settle a major data breach class…
Nefilim Ransomware Attack Uses “Ghost” Credentials
Dan Kobialka reports: Sophos researchers have discovered a Nefilim ransomware attack in which an unmonitored account belonging to a deceased employee was used to infiltrate more than 100 systems. During the cyberattack, a Nefilim threat actor exploited vulnerable Citrix software, Sophos indicated. The actor gained access to the Citrix admin account and stole the credentials for a domain…