SolarWinds: What Hit Us Could Hit Others

Credit to Author: BrianKrebs| Date: Tue, 12 Jan 2021 20:50:50 +0000

New research into the malware that set the stage for the megabreach at IT vendor SolarWinds shows the perpetrators spent months inside the company’s software development labs honing their attack before inserting malicious code into updates that SolarWinds then shipped to thousands of customers. More worrisome, the research suggests the insidious methods used by the intruders to subvert the company’s software development pipeline could be repurposed against many other major software providers.

Read more

A week in security (December 21- December 27)

Credit to Author: Malwarebytes Labs| Date: Mon, 28 Dec 2020 17:04:21 +0000

A roundup of cybersecurity news from December 21 – 27, including SolarWinds, international cybersecurity, Emotet, and free online games.

Categories: A week in security

Tags:

(Read more…)

The post A week in security (December 21- December 27) appeared first on Malwarebytes Labs.

Read more

Lock and Code S1Ep18: Finding consumer value in Cybersecurity Awareness Month with Jamie Court

Credit to Author: Malwarebytes Labs| Date: Mon, 26 Oct 2020 15:30:00 +0000

This week on Lock and Code, we talk to Jamie Court, president of Consumer Watchdog, about the consumer value in Cybersecurity Awareness Month.

Categories:

Tags:

(Read more…)

The post Lock and Code S1Ep18: Finding consumer value in Cybersecurity Awareness Month with Jamie Court appeared first on Malwarebytes Labs.

Read more

Florence, Ala. Hit By Ransomware 12 Days After Being Alerted by KrebsOnSecurity

Credit to Author: BrianKrebs| Date: Tue, 09 Jun 2020 17:05:20 +0000

In late May, KrebsOnSecurity alerted numerous officials in Florence, Ala. that their information technology systems had been infiltrated by hackers who specialize in deploying ransomware. Nevertheless, on Friday, June 5, the intruders sprang their attack, deploying ransomware and demanding nearly $300,000 worth of bitcoin. City officials now say they plan to pay the ransom demand, in hopes of keeping the personal data of their citizens off of the Internet.

Read more

Tampa Bay Times hit with Ryuk ransomware attack

Credit to Author: David Ruiz| Date: Fri, 24 Jan 2020 20:11:10 +0000

Florida newspaper The Tampa Bay Times suffered a Ryuk ransomware attack Thursday, making it the latest major victim of the notorious ransomware family that continues to rise in popularity.

Categories:

Tags:

(Read more…)

The post Tampa Bay Times hit with Ryuk ransomware attack appeared first on Malwarebytes Labs.

Read more

iNSYNQ Ransom Attack Began With Phishing Email

Credit to Author: BrianKrebs| Date: Fri, 09 Aug 2019 18:18:55 +0000

A ransomware outbreak that hit QuickBooks cloud hosting firm iNSYNQ in mid-July appears to have started with an email phishing attack that snared an employee working in sales for the company, KrebsOnSecurity has learned. It also looks like the intruders spent roughly ten days rooting around iNSYNQ’s internal network to properly stage things before unleashing the ransomware. iNSYNQ ultimately declined to pay the ransom demand, and it is still working to completely restore customer access to files.

Read more

A Deep Dive on the Recent Widespread DNS Hijacking Attacks

Credit to Author: BrianKrebs| Date: Mon, 18 Feb 2019 13:51:01 +0000

The U.S. government — along with a number of leading security companies — recently warned about a series of highly complex and widespread attacks that allowed suspected Iranian hackers to siphon huge volumes of email passwords and other sensitive data from multiple governments and private companies. But to date, the specifics of exactly how that attack went down and who was hit have remained shrouded in secrecy. This post seeks to document the extent of those attacks, and traces the origins of this overwhelmingly successful cyber espionage campaign back to a cascading series of breaches at key Internet infrastructure providers.

Read more

Blowing the Whistle on Bad Attribution

Credit to Author: BrianKrebs| Date: Fri, 18 Aug 2017 04:29:51 +0000

The New York Times this week published a fascinating story about a young programmer in Ukraine who’d turned himself in to the local police. The Times says the man did so after one of his software tools was identified by the U.S. government as part of the arsenal used by Russian hackers suspected of hacking into the Democratic National Committee (DNC) last year. It’s a good read, as long as you can ignore that the premise of the piece is completely wrong.

Read more