JNS reports: A pro-Iran hacking group named Altahrea Team targeted the website of the Israel Airports Authority, Israeli media reported on Wednesday. The group said its actions were “revenge” for the assassination by the United States on Jan. 3 of Iranian Quds Force commander Qassem Soleimani and Abu Mahdi Al-Muhandes, the commander of the pro-Iranian…
REvil ransomware group’s infrastructure comes back online hinting at fresh campaign
Connor Jones reports: ….. Some researchers noted the return of REvil’s ‘happy blog’ – the place where it announced its hacks – on 19 April, returning an Nginx 404 error. Others said the signs of a return started as far back as December, one month after law enforcement made the original arrests of the gang members. Using the…
Unified Government of Wyandotte County and Kansas City Hit by Cybersecurity Attack Over Holiday Weekend
Seen at http://wycokck.org/: Published on April 19, 2022 UPDATE ON SERVICE IMPACTS: WEDNESDAY, APRIL 20, 2022 The Unified Government has been working through a comprehensive assessment of the impact of the recent cybersecurity attack on our systems and services. Work to restore services is underway. As of this afternoon, the following services are impacted: Appraiser’s…
Has a security researcher been scared away?
The Twitter account of a researcher known on Twitter as @ido_cohen2 is gone and their DarkFeed.io site has an “under maintenance” notice for the past day. According to a source, they have been scared away for good. Have they been? Over the past months, DataBreaches.net has occasionally been contacted by someone who appears to be…
Sunwing president apologizes to stranded passengers, says outage result of cyberattack
Joshua Freeman reports that a Canadian airline’s flights were disrupted after an attack on the firm that provides its check-in system: “Obviously, this is a terrible situation and one that we didn’t expect,” Sunning CEO Mark Williams told CP24 in an interview. “Certainly apologize to everyone for the inconvenience this has caused. By Tuesday, it…
Russian state hackers hit Ukraine with new malware variants
Bill Toulas reports: Threat analysts report that the Russian state-sponsored threat group known as Gamaredon (a.k.a. Armageddon/Shuckworm) is launching attacks against targets in Ukraine using new variants of the custom Pteredo backdoor. Gamaredon has been launching cyber-espionage campaigns targeting the Ukrainian government and other critical entities since at least 2014. Read more at BleepingComputer.