Teenage members of Lapsus$ ransomware gang convicted

Categories: Business

Tags: business

Tags: hack

Tags: hacked

Tags: compromise

Tags: lapsus$

Tags: convicted

Tags: crime

Tags: ransomware

Tags: leak

Tags: breach

A wave of video game developer compromises has come to a court-based conclusion.

(Read more…)

The post Teenage members of Lapsus$ ransomware gang convicted appeared first on Malwarebytes Labs.

Read more

Uber data stolen via third-party vendor

Categories: News

Tags: Uber

Tags: data breach

Tags: Teqtivity

Tags: BreachForums

Tags: Uber Eats

Tags: mobile device management

Tags: MDM

Tags: Lapsus$

Tags: Lior Yaari

Tags: Grip Security

Uber is dealing with another cybersecurity incident after an attack on Teqtivity.

(Read more…)

The post Uber data stolen via third-party vendor appeared first on Malwarebytes Labs.

Read more

A week in security (October 17 – 23)

Categories: News

Tags: week in security

Tags: awis

Tags: typosquatting

Tags: cyberstalking

Tags: Snapchat

Tags: student loan relief scam

Tags: Gas

Tags: LAPSUS$

Tags: Microsoft

Tags: Ducktail

Tags: Venus

Tags: ransomware

Tags: BYOD

Tags: SMB security tips

Tags: Log4Text

Tags: DeadBolt

Tags: spot a scam

Tags: FaceStealer

Tags: fake tractor fraud

Tags: ThermoSecure

The most important and interesting computer security stories from the last week.

(Read more…)

The post A week in security (October 17 – 23) appeared first on Malwarebytes Labs.

Read more

Suspected LAPSUS$ group member arrested in Brazil

Categories: Cybercrime

Categories: News

Tags: Brasil

Tags: Lapsus$

Tags: Telegram

Tags: Dark Web

Tags: data exfiltration

Tags: SIM jacking

Tags: arrests

A person suspected of being a member of hacking group Lapsus$ has been arrested by Brazilian police

(Read more…)

The post Suspected LAPSUS$ group member arrested in Brazil appeared first on Malwarebytes Labs.

Read more

Uber, Rockstar fall to social engineering attacks; and you?

Credit to Author: Chester Wisniewski| Date: Thu, 22 Sep 2022 18:31:26 +0000

Events like this month’s breaches have happened before and will happen again. The task for defenders not directly affected by the Uber and Rockstar attacks, writes Chester Wisniewski, is to learn by putting your own team into those companies’ shoes.

Read more

Uber, Rockstar fall to social-engineering attacks; and you?

Credit to Author: Chester Wisniewski| Date: Thu, 22 Sep 2022 18:31:26 +0000

Security pros often talk of security being a process and a system, not a destination, and the recent news from Uber and Rockstar Games is just another example. Details are still emerging, but we can still analyze these breaches at a high level and apply these lessons to our own information security programs. Similar to […]

Read more

DEA Investigating Breach of Law Enforcement Data Portal

Credit to Author: BrianKrebs| Date: Thu, 12 May 2022 11:00:30 +0000

The U.S. Drug Enforcement Administration (DEA) says it is investigating reports that hackers gained unauthorized access to an agency portal that taps into 16 different federal law enforcement databases. KrebsOnSecurity has learned the alleged compromise is tied to a cybercrime and online harassment community that routinely impersonates police and government officials to harvest personal information on their targets.

Read more

Leaked Chats Show LAPSUS$ Stole T-Mobile Source Code

Credit to Author: BrianKrebs| Date: Fri, 22 Apr 2022 13:09:39 +0000

KrebsOnSecurity recently reviewed a copy of the private chat messages between members of the LAPSUS$ cybercrime group in the week leading up to the arrest of its most active members last month. The logs show LAPSUS$ breached T-Mobile multiple times in March, stealing source code for a range of company projects. T-Mobile says no customer or government information was stolen in the intrusion. LAPSUS$ is known for stealing data and then demanding a ransom not to publish or sell it. But the leaked chats indicate this mercenary activity was of little interest to the tyrannical teenage leader of LAPSUS$, whose obsession with stealing and leaking proprietary computer source code from the world’s largest tech companies ultimately led to the group’s undoing.

Read more