From Politie, this press release: Driebergen – The Public Prosecution Service (OM), the police, the National Cyber Security Center (NCSC), Cyberveilig Nederland and various private parties* from the cybersecurity sector today signed the ‘Melissa’ covenant. Melissa is a partnership between these public and private parties to combat ransomware attacks. The shared goal is to make the Netherlands…
Pathology Lab Has Most of Patient’s Data Breach Claims Dismissed
Bernie Pazanowski reports: A patient at a pathology laboratory who suffered a data breach can pursue his negligence claim against Molecular Pathology Laboratory Network, Inc., but all of his other claims were dismissed. Tri Thai said that the company was subject to a “massive and preventable cyberattack” that it discovered on Dec. 17, 2021. He…
Flagler School District Loses ‘Significant Amount of Money’ in Apparent Phishing Scheme Involving Vendor
FlagerLive reports: The Flagler County school district was the target of electronic fraud involving what Flagler County Sheriff Rick Staly described as a “pretty significant amount of money,” in a scheme having all the makings of phishing–a common method by fraudsters of impersonating familiar contacts either to induce a swindle or to make the recipient…
Rock County Health Department in Wisconsin victim of cyberattack
Officials in Rock County, Wisconsin have confirmed to Recorded Future News that they experienced a cyberattack on September 29: “Since some systems are not yet fully operational, this may temporarily impact certain County operations. However, the public should experience minimal service disruption at this time. We are investigating the full nature and scope of this…
FBI most-wanted Russian hacker reveals why he burned his passport
Lorenzo Franceschi-Bicchierai reports: Russian hacker Mikhail Matveev, also known on the internet as “Wazawaka” and “Boriselcin,” is wanted by the FBI, which is offering a $10 million reward for information that could lead to his arrest, and has been put on a U.S. sanctions list. But, according to Matveev, his life hasn’t changed much since he…
HC3: Analyst Note: LokiBot Malware
Report: 202309291200 Executive Summary Active since 2015 and among the most prevalent and persistent strains of malware families since 2018, LokiBot has matured over time to target multi-sector industries. Despite its apolitical targeting of critical infrastructure, the malware’s adverse effect on the Healthcare and Public Health (HPH) sector shows its reach. In March 2020, a…