Attacks on small to medium-sized medical entities continue, as this week’s breach posts unfortunately attest. Today, Vice Society added Atlanta Perinatal Associates in Georgia to its leak site. As they have done in the past, Vice Society did not just add the medical practice with a warning or threat. When Vice Society adds an entity,…
[FLASH] #Conti Officially DisCONTInued
As seen on Twitter: [FLASH] #Conti Officially DisCONTInued Today the official website of Conti #Ransomware was shut down, marking the end of this notorious crime group; it is truly a historic day in the #intelligence community! Look forward to today’s @AdvIntel with extended analysis!@VK_Intel pic.twitter.com/gMSXhlHVSb — Yelisey Boguslavskiy (@y_advintel) May 19, 2022 NOTE: Some…
Department of Justice Announces New Policy for Charging Cases under the Computer Fraud and Abuse Act
The Department of Justice today announced the revision of its policy regarding charging violations of the Computer Fraud and Abuse Act (CFAA). The policy for the first time directs that good-faith security research should not be charged. Good faith security research means accessing a computer solely for purposes of good-faith testing, investigation, and/or correction of a security…
Settlement in Solara Medical Supplies litigation gets preliminary approval
As reported by TopClassActions, Solara Medical Supplies has agreed to a $9.76 million class action settlement benefiting those whose personal information may have been compromised during a 2019 data breach that occurred between April 2 and June 20, 2019. That would include employees and patients whose protected health information was in employee email accounts compromised…
Wizard Spider Group In-Depth Analysis – Prodaft
Prodraft writes: This report provides unprecedented visibility into the structure, background, and motivations of Wizard Spider. We’ve obtained command statistics, target country statistics, command execution patterns, and other information on the group’s tactics, techniques, and procedures. These include novel post-exploitation cracking solutions and psychological tactics. Download their report at Prodaft.
Cyberattacks quietly launched by Russia before its invasion of Ukraine may have been more damaging than intended
Stavros Atlamazoglou reports: … Russian hackers went after a variety of Ukrainian targets in the private and public sectors, but one cyber weapon aimed at a specific military target spilled over and affected tens of thousands of devices outside Ukraine. A few hours before the Russian invasion began on February 24, Russian hackers launched a…