DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

Nefilim Ransomware Attack Uses “Ghost” Credentials

Posted on January 28, 2021 by Dissent

Dan Kobialka reports: Sophos researchers have discovered a Nefilim ransomware attack in which an unmonitored account belonging to a deceased employee was used to infiltrate more than 100 systems. During the cyberattack, a Nefilim threat actor exploited vulnerable Citrix software, Sophos indicated. The actor gained access to the Citrix admin account and stole the credentials for a domain…

Read more

Chainalysis in Action: U.S. Authorities Disrupt NetWalker Ransomware

Posted on January 28, 2021 by Dissent

There are a number of entities who can take a bow for their part in yesterday’s news about NetWalker.  Read Chainanalysis’s post about their role: Today, the U.S. Department of Justice (DOJ) announced a coordinated international law enforcement action to disrupt the NetWalker ransomware, including the seizure of nearly half a million dollars in cryptocurrency, the disablement…

Read more

BR: Municipality of Balneário Camboriú hit by ransomware

Posted on January 27, 2021 by Dissent

The following is a Google translation: The Municipality of Balneário Camboriú is on Wednesday (27) without online services due to a cyber attack by Ransomware, which is a type of harmful software that restricts access to the infected system with a kind of block and charges a ransom for that access can be restored. The…

Read more

NetWalker ransomware leak site seized (UPDATE2)

Posted on January 27, 2021 by Dissent

At some point within the past 24 hours, the dedicated ransomware leak site operated by NetWalker ransomware threat actors was seized by law enforcement. The notice says that it was seized by the FBI in coordination with the U.S. Attorney’s Office for the Middle District of Florida, the Computer Crime and Intellectual Property Section of…

Read more

Emotet botnet goes offline as cops seize servers

Posted on January 27, 2021 by Dissent

Alex Scroxton reports: The Emotet botnet, one of the most widespread and dangerous cyber threats in operation today, has been forced offline in an international law enforcement operation by police on both sides of the Atlantic. The botnet’s infrastructure was taken down from the inside after being seized earlier this week in the Europol-coordinated operation….

Read more

Ukraine says exposes group of international banking hackers

Posted on January 27, 2021 by Dissent

Reuters reports: Ukrainian law enforcement bodies have exposed a group of hackers who interfered in the servers of European and the U.S. banks that caused a total loss of $2.5 billion, Ukrainian prosecutors said on Wednesday. It said hackers from Ukraine used a malicious software, designed to steal personal data like passwords, logins, payment data from servers of private and state banks in…

Read more
  • Previous
  • 1
  • …
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • …
  • 729
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Investigation of 2024 Helsinki data breach – Report
  • Major trial underway for data leak that left 72,000 victims in France
  • Anubis: A Closer Look at an Emerging Ransomware with Built-in Wiper
  • HealthEC Agrees to $5.48 Million Settlement to End Data Breach Lawsuit
  • US offering $10 million for info on Iranian hackers behind IOControl malware
  • Sompo Japan Insurance submits improvement plan after info leakage
  • Moreno Valley, Calif., Schools Report Data Breach
  • The Growing Cyber Risks from AI — and How Organizations Can Fight Back
  • UPDATING: Credit Control Corporation denies any current breach
  • Copilot AI Bug Could Leak Sensitive Data via Email Prompts

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Your household smart products must respect your privacy – including your air fryer
  • Vermont signs Kids Code into law, faces legal challenges
  • Data Categories and Surveillance Pricing: Ferguson’s Nuanced Approach to Privacy Innovation
  • Anne Wojcicki Wins Bidding for 23andMe
  • Would you — or wouldn’t you?
  • New York passes a bill to prevent AI-fueled disasters
  • Synthetic Data and the Illusion of Privacy: Legal Risks of Using De-Identified AI Training Sets

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.