DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

Nefilim Ransomware Attack Uses “Ghost” Credentials

Posted on January 28, 2021 by Dissent

Dan Kobialka reports: Sophos researchers have discovered a Nefilim ransomware attack in which an unmonitored account belonging to a deceased employee was used to infiltrate more than 100 systems. During the cyberattack, a Nefilim threat actor exploited vulnerable Citrix software, Sophos indicated. The actor gained access to the Citrix admin account and stole the credentials for a domain…

Read more

Chainalysis in Action: U.S. Authorities Disrupt NetWalker Ransomware

Posted on January 28, 2021 by Dissent

There are a number of entities who can take a bow for their part in yesterday’s news about NetWalker.  Read Chainanalysis’s post about their role: Today, the U.S. Department of Justice (DOJ) announced a coordinated international law enforcement action to disrupt the NetWalker ransomware, including the seizure of nearly half a million dollars in cryptocurrency, the disablement…

Read more

BR: Municipality of Balneário Camboriú hit by ransomware

Posted on January 27, 2021 by Dissent

The following is a Google translation: The Municipality of Balneário Camboriú is on Wednesday (27) without online services due to a cyber attack by Ransomware, which is a type of harmful software that restricts access to the infected system with a kind of block and charges a ransom for that access can be restored. The…

Read more

NetWalker ransomware leak site seized (UPDATE2)

Posted on January 27, 2021 by Dissent

At some point within the past 24 hours, the dedicated ransomware leak site operated by NetWalker ransomware threat actors was seized by law enforcement. The notice says that it was seized by the FBI in coordination with the U.S. Attorney’s Office for the Middle District of Florida, the Computer Crime and Intellectual Property Section of…

Read more

Emotet botnet goes offline as cops seize servers

Posted on January 27, 2021 by Dissent

Alex Scroxton reports: The Emotet botnet, one of the most widespread and dangerous cyber threats in operation today, has been forced offline in an international law enforcement operation by police on both sides of the Atlantic. The botnet’s infrastructure was taken down from the inside after being seized earlier this week in the Europol-coordinated operation….

Read more

Ukraine says exposes group of international banking hackers

Posted on January 27, 2021 by Dissent

Reuters reports: Ukrainian law enforcement bodies have exposed a group of hackers who interfered in the servers of European and the U.S. banks that caused a total loss of $2.5 billion, Ukrainian prosecutors said on Wednesday. It said hackers from Ukraine used a malicious software, designed to steal personal data like passwords, logins, payment data from servers of private and state banks in…

Read more
  • Previous
  • 1
  • …
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • …
  • 744
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.