DHNet reports (translation): Last weekend, the city of Seraing reported that its services were temporarily inaccessible to the public and for a reason beyond its control. Indeed, since the computer network of the city of Seraing was the victim of a malicious attack! A complaint has been filed. As specified to the city of Seraing,…
Category: Malware
Free decrypter released for Avaddon ransomware victims… aaand, it’s gone!
Catalin Cimpanu reports: A Spanish student released a free decryption utility that can help victims of the Avaddon ransomware recover their files for free. Published on GitHub by Javier Yuste, a student at the Rey Juan Carlos University in Madrid, the AvaddonDecrypter works only in cases where victims have not powered off their computers. Unfortunately, the threat…
ECU Worldwide chief confirms IT systems are down after ‘cyber incident’
Alex Lennane reports: The chief executive of ECU Worldwide has confirmed the company’s systems have been affected by a “cyber incident”. In a note to customers, Tim Tudor wrote: “Our online systems have been temporarily unavailable due to a cyber incident. “As a precautionary measure we have taken our systems offline. This includes emails. “Our…
British Columbia real estate agency sustains unusual ransomware attack
Lyle Adriano reports: A British Columbia-based real estate agency is the latest victim of a ransomware cyberattack – but the circumstances of the attack raise more questions than answers. Last week, the Conti ransomware group listed the ReMax Kelowna as one of its victims on its website. To prove it had instigated the attack, the…
Is it time to ban ransomware insurance payments?
Alex Scroxton reports: … According to [the founding head of the National Cyber Security Centre (NCSC)], the ransomware problem is now being exacerbated by victims paying ransoms to their extortionists and then claiming back this sum on their insurance. He described this as an “incentive” that encourages victims to pay to solve their problem quickly. He…
TX: Threat actors dump patient files from Nocona General Hospital
On February 3, Conti threat actors added Nocona General Hospital in Texas to their leak site, posting 20 files as proof that they had accessed the hospital’s files. Many of the files contained patient records from 2018, and appeared to be pdf scans or doc files. They did not appear to be records from any…