—– A DataBreaches.net report by Dissent and Chum1ng0 —– In Part 1 of this series, DataBreaches.net described a number of attacks by Pysa (mespinoza) threat actors on medical entities in the U.S. In Part 2, we look at eight k-12 public school districts in the U.S. who either appear on the threat actors’ dedicated leak…
Search Results for: ransomware
Ransomware Shuts Down Online Services in Joplin, Mo.
Debby Woodin reports: A July 7 network security incident that caused the Joplin city government’s computer system to shut down is believed to be the result of ransomware, the city said Thursday in a statement amid an ongoing investigation. An insurer has paid an unknown person $320,000 to keep any sensitive information obtained as a…
Motherboard vendor GIGABYTE hit by RansomExx ransomware gang
Catalin Cimpanu reports: Taiwanese computer hardware vendor GIGABYTE has suffered a ransomware attack, and hackers are currently threatening to release more than 112 GB of business data on the dark web unless the company agrees to their ransom demands. The Taiwanese company, primarily known for its high-performance motherboards, confirmed the attack in a phone call…
Secrets and Lies: The Games Ransomware Attackers Play
Mathew J. Schwartz reports: If you’re a criminal, practicing good operational security would seem to preclude granting tell-all news media interviews. And yet we’ve seen a spate of attackers who wield ransomware – including MountLocker, LockBit, REvil and DarkMatter – sharing insights into their inclinations, motivations and tactics. One perhaps inadvertent takeaway from their interviews…
Australian Cyber Security Centre reports multiple victims of LockBit 2.0 ransomware
David Simmons reports: A ransomware attack called LockBit 2.0 has hit multiple organisations across various industry sectors according to the Australian Cyber Security Centre (ACSC), with the government body publishing a ‘medium’ alert for the cybercrime. […] Operators of the platform have appeared on Russian-language cybercrime forums since January 2020 according to ACSC, but the…
Disgruntled ransomware affiliate leaks the Conti gang’s technical manuals
Catalin Cimpanu reports: A disgruntled member of the Conti ransomware program has leaked today the manuals and technical guides used by the Conti gang to train affiliate members on how to access, move laterally, and escalate access inside a hacked company and then exfiltrate its data before encrypting files. Leaked on an underground cybercrime forum…