"Ransomware Eruption: Novel Locker Malware Flows From 'Volcano Demon'"

"Ransomware Eruption: Novel Locker Malware Flows From 'Volcano Demon'"

According to Halcyon researchers, "Volcano Demon" is a double-extortion ransomware player that uses "LukaLocker," a new locker malware, to encrypt victim files with the .nba extension. The attacker installs limited victim logging and monitoring solutions before exploitation. They also make threatening phone calls from "No Caller ID" numbers to extort or negotiate a ransom. This article continues to discuss findings regarding Volcano Demon's attacks.

Submitted by Gregory Rigby on

"FakeBat Loader Malware Spreads Widely Through Drive-by Download Attacks"

"FakeBat Loader Malware Spreads Widely Through Drive-by Download Attacks"

Researchers at Sekoia found that "FakeBat," a Loader-as-a-Service (LaaS), has become one of the most widely spread loader malware families distributed using the drive-by download technique. According to the company, FakeBat downloads and executes next-stage payloads like "IcedID," "Lumma," "RedLine," "SmokeLoader," "SectopRAT," and "Ursnif." This article continues to discuss the distribution of FakeBat loader malware through drive-by download attacks.

Submitted by Gregory Rigby on

"New RUSI Report Exposes Psychological Toll of Ransomware, Urges Action"

"New RUSI Report Exposes Psychological Toll of Ransomware, Urges Action"

A Royal United Services Institute (RUSI) research paper titled "Your Data is Stolen and Encrypted: The Ransomware Victim Experience" brings attention to ransomware victims' mental health. The paper calls on all incident response stakeholders to address ransomware attacks' psychological and physiological effects. It provides insights into ransomware victims' psychological experiences, including what factors make them better or worse and what policy measures can reduce harm to their well-being.

Submitted by Gregory Rigby on

"Europol Takes Down 593 Cobalt Strike Servers Used by Cybercriminals"

"Europol Takes Down 593 Cobalt Strike Servers Used by Cybercriminals"

Europol coordinated a joint law enforcement effort called "Operation Morpheus," which took down nearly 600 Cobalt Strike servers used by cybercriminals to infiltrate victims' networks. Fortra released Cobalt Strike over a decade ago as a legitimate commercial penetration testing tool for red teams to scan network infrastructure for security vulnerabilities. However, threat actors have used cracked copies of the software, making it a popular data theft and ransomware attack tool. This article continues to discuss to discuss the takedown of Cobalt Strike servers used by cybercriminals.

Submitted by Gregory Rigby on

"Stolen Credentials Could Unmask Thousands of Darknet Child Abuse Website Users"

"Stolen Credentials Could Unmask Thousands of Darknet Child Abuse Website Users"

Thousands of people with accounts on darknet websites used to share Child Sexual Abuse Material (CSAM) could be exposed using information stolen by cybercriminals. Recorded Future researchers were able to identify these individuals using credentials harvested by infostealer malware. This type of malware is typically used to steal log-in credentials for banking services. This article continues to discuss the unmasking of darknet child abuse website users through infostealer malware.

Submitted by Gregory Rigby on

"Ransomware Attack Demands Reach a Staggering $5.2m in 2024"

"Ransomware Attack Demands Reach a Staggering $5.2m in 2024"

Security researchers at Comparitech have discovered that the average extortion demand per ransomware attack was over $5.2m in the first half of 2024.  The most significant ransom demand during the first half of 2024 was a $100m ransom following an attack on India’s Regional Cancer Center (RCC) in April 2024.  The second highest confirmed ransom demand was issued to UK pathology provider Synnovis, with attackers demanding $50m.

Submitted by Adam Ekwall on

"Latest Intel CPUs Impacted by New Indirector Side-Channel Attack"

"Latest Intel CPUs Impacted by New Indirector Side-Channel Attack"

Researchers at the University of California, San Diego found that modern Intel processors, including chips from the Raptor Lake and Alder Lake generations, are vulnerable to a new high-precision Branch Target Injection (BTI) attack called "Indirector." The attack could be used to steal information from CPUs. Vulnerabilities in the Indirect Branch Predictor (IBP) and Branch Target Buffer (BTB), two hardware components in modern Intel CPUs, could be exploited by the Indirector attack to manipulate speculative execution for data extraction.

Submitted by Gregory Rigby on

"Critical CocoaPods Flaws Exposed Many iOS, macOS Apps to Supply Chain Attacks"

"Critical CocoaPods Flaws Exposed Many iOS, macOS Apps to Supply Chain Attacks"

EVA Information Security, a red teaming company, has disclosed details about three vulnerabilities in the CocoaPods dependency manager that affect millions of macOS and iOS applications. CocoaPods is an open source dependency manager for Swift and Objective-C Cocoa projects that has over 100,000 libraries and is used by about three million applications across the Apple ecosystem.

Submitted by Gregory Rigby on

"Ticketmaster Confirms Data Breach, Won't Say How Many North American Customers Compromised"

"Ticketmaster Confirms Data Breach, Won't Say How Many North American Customers Compromised"

Ticketmaster recently confirmed that hackers accessed customers' personal information.  Ticketmaster started sending notices to customers last week.  Ticketmaster says an unauthorized third party obtained information from a cloud database hosted by a third-party data services provider between April 2 and May 18.  A hacking group called ShinyHunters claimed to have stolen 1.3TB of data from Ticketmaster.    The breach involved customers who purchased tickets with the company in North America.

Submitted by Adam Ekwall on

"Evolve Bank Shares Data Breach Details as Fintech Firms Report Being Hit"

"Evolve Bank Shares Data Breach Details as Fintech Firms Report Being Hit"

Fintech companies Wise and Affirm recently revealed that the recent data breach suffered by Evolve Bank impacted some of their customers.  The LockBit ransomware group recently threatened to leak data allegedly stolen from the US Federal Reserve.  The cybercriminals did leak data on June 26, but it turned out that the files actually originated from an Arkansas-based financial organization, Evolve Bank & Trust.

Submitted by Adam Ekwall on
Subscribe to