As ransomware continues to disrupt British organizations, the U.K. for the first time has sanctioned alleged cybercriminals, including accused Conti and TrickBot operators. Ransomware victims must conduct due diligence before paying any ransom, as violating sanctions carries severe penalties.
Ahead of RSA Conference 2023, Greg Day, a program committee member focusing on "hackers and threats," previews top themes at this year's event. Day, a member of the RSA Conference program committee, says one common theme is "old vulnerabilities and threat techniques being used in new environments."
The BlackCat ransomware-as-a-service group dumped more than 6 gigabytes worth of information stolen from Ireland's Munster Technological University staff. The Sunday dump appears to include sensitive data including staff medical diagnoses and student bank account information.
A previously unknown, self-proclaimed politically-motivated hacking group disrupted Israel's Technion University following a Sunday ransomware attack. Attackers, going under the name "DarkBit," took credit for the attack in a Telegram post accusing Technion of serving "an apartheid regime."
The Play ransomware group listed networking hardware manufacturer A10 Networks on its leak site after briefly gaining access to the company's IT infrastructure, according to data breach notifications firm BetterCyber. The Play group says it has confidential data, technical documentation and more.
Regal Medical Group, one of the largest medical groups in Southern California, has reported that a December ransomware incident involving data exfiltration has potentially compromised the protected health information of more than 3.3 million individuals.
Multiple government agencies in the U.S. and South Korea issued a joint alert warning critical infrastructure sectors - and especially the healthcare sector - of ongoing ransomware threats involving North Korean state-sponsored cybercriminals.
Ireland's Munster Technological University confirmed that an ongoing system outage that forced it to shutter its Cork campuses is the result of a ransomware attack. Staff from the National Cyber Security Center are on-site to assist with the forensic examination and recovery.
Russian operators of the TrickBot banking Trojan that later evolved into a ransomware dropper felt trans-Atlantic pressure Thursday through sanctions imposed by the United States and the United Kingdom and an indictment against a senior figure unsealed by U.S. federal prosecutors in New Jersey.
Attackers targeting unpatched VMware ESXi hypervisors to hit virtual machines have reportedly modified their ESXiArgs ransomware to prevent victims from using decryption workarounds identified by researchers. The campaign has already amassed nearly 3,000 known victims and could have many more.
An Ontario hospital says it is operating under "Code Grey" as it deals with a cybersecurity incident that occurred over the weekend. Meanwhile, hospitals in Maryland and Florida say they are still recovering from cyberattacks that hit last week and continue to affect a variety of patient services.
A Massachusetts maker of semiconductor manufacturing equipment says it halted operations at some facilities following a ransomware attack. A market analysts tells Information Security Media Group a slowdown in semiconductor demand means the attacks' short-term effects will be limited.
As the massive ESXiArgs ransomware campaign continues to target unpatched VMware ESXi hypervisors, cybersecurity experts have released a script that can decrypt at least some affected virtual machines. Ransomware trackers count at least 2,803 victims, primarily in France, the U.S. and Germany.
Denis Mihaqlovic Dubnikov, 30, pleaded guilty in U.S. federal court to conspiracy to commit money laundering. Federal prosecutors say the Russian national laundered more than $400,000 for the Ryuk ransomware-as-a-service gang. He faces up to 20 years in prison and a potential fine of $500,000.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.