Tags: social engineering
Tags: patch management
The important security news of this week
Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Wed, 16 Mar 2022 15:00:00 +0000
The Microsoft Defender for IoT research team has recently discovered the exact method through which MikroTik devices are used in Trickbot’s C2 infrastructure. In this blog, we share the analysis of this method and provide insights on how attackers gain access and how they use compromised IoT devices in Trickbot attacks.
The post Uncovering Trickbot’s use of IoT devices in command-and-control infrastructure appeared first on Microsoft Security Blog.Read more
Credit to Author: BrianKrebs| Date: Wed, 02 Mar 2022 17:49:52 +0000
Earlier this week, a Ukrainian security researcher leaked almost two years’ worth of internal chat logs from Conti, one of the more rapacious and ruthless ransomware gangs in operation today. Tuesday’s story examined how Conti dealt with its own internal breaches and attacks from private security firms and governments. In Part II of this series we’ll explore what it’s like to work for Conti, as described by the Conti employees themselves.Read more
Credit to Author: BrianKrebs| Date: Tue, 01 Mar 2022 20:50:30 +0000
A Ukrainian security researcher this week leaked several years of internal chat logs and other sensitive data tied to Conti, an aggressive and ruthless Russian cybercrime group that focuses on deploying its ransomware to companies with more than $100 million in annual revenue. The chat logs offer a fascinating glimpse into the challenges of running a sprawling criminal enterprise with more than 100 salaried employees. The records also provide insight into how Conti has dealt with its own internal breaches and attacks from private security firms and foreign governments.Read more
Credit to Author: Pieter Arntz| Date: Mon, 28 Feb 2022 12:15:31 +0000
After months of spam silence, TrickBot has pulled the plug on its server infrastructure. Is this the end of an era?
The post TrickBot takes down server infrastructure after months of inactivity appeared first on Malwarebytes Labs.Read more