Martin University in Indianapolis disclosed that they were hit by a ransomware attack on January 3, 2022, and have been investigating the incident since then. As is often the case with these attacks, the university was unable to determine whether there had been actual access to files with personal information. As a result, they are…
Category: Malware
North Orange County Community College District was hit by ransomware in January
In March, DataBreaches reported that North Orange County Community College District in California had been notifying more than 19,000 people about a data security incident. This week, NOCCCD submitted a notification to the California Attorney Genera’s Office, but it does not appear to be an update as much as a delayed notification to the state….
Cyberattack against Regina Public Schools likely ransomware
Alexander Quon reports: New information has emerged about the recent cyberattack that targeted Regina Public Schools, forcing it to shut down all internet-based systems such as email and other education tools. CBC News has reviewed a copy of a note that has appeared on computers that were part of the school district’s network. The note says it…
IL: Cyberattack costs City of Quincy $650,000
J. Robert Gough reports: Quincy Mayor Mike Troup said the city has spent about $150,000 on outside consultants and $500,000 for an encryption key to regain access to the city’s information services systems. In other words, $500,000 in ransomware. In a news conference Tuesday morning, Troup gave a timeline of events that have taken place…
Food For Files: GoodWill Ransomware demands food for the poor to decrypt locked files
Waqas reports: GoodWill ransomware attackers share a three-page ransom note asking the victim to perform three tasks to get the decryption key- they want them to donate to the homeless, feed poor kids, and provide financial assistance to a patient in need. CloudSEK Threat Intelligence Research team has warned about new ransomware dubbed GoodWill Ransomware that can…
Fake Windows exploits target infosec community with Cobalt Strike
Lawrence Abrams reports: A threat actor targeted security researchers with fake Windows proof-of-concept exploits that infected devices with the Cobalt Strike backdoor. Whoever is behind these attacks took advantage of recently patched Windows remote code execution vulnerabilities tracked as CVE-2022-24500 and CVE-2022-26809. Read more at BleepingComputer.