"Stealthy KV-Botnet Hijacks SOHO Routers and VPN Devices"

"Stealthy KV-Botnet Hijacks SOHO Routers and VPN Devices"

Volt Typhoon, also known as Bronze Silhouette, a Chinese state-sponsored Advanced Persistent Threat (APT) hacking group, has been linked to a botnet called KV-botnet, which it has been using since at least 2022 to attack Small Office Home Office (SOHO) routers in high-value targets. The APT mainly targets routers, firewalls, and Virtual Private Network (VPN) devices to proxy malicious traffic so that it blends in with legitimate traffic and thus goes undetected.

Submitted by Gregory Rigby on

"Approval Phishing Scams Drain $1bn of Cryptocurrency From Victims"

"Approval Phishing Scams Drain $1bn of Cryptocurrency From Victims"

According to security researchers at Chainalysis, approval phishing scams have been used to steal at least $1bn in cryptocurrency since May 2021.  The researchers estimate that this technique, which is frequently used by romance scammers, has led to crypto users losing at least $374m so far in 2023.  The researchers noted that approval phishing is a type of crypto scam in which attackers attempt to trick targets into signing a malicious blockchain transaction that gives their address approval to spend specific tokens inside the victim’s wallet.

Submitted by Adam Ekwall on

"Nearly a Million Non-profit Donors' Details Left Exposed in Unsecured Database"

"Nearly a Million Non-profit Donors' Details Left Exposed in Unsecured Database"

A database owned and operated by DonorView exposed nearly a million records containing Personally Identifiable Information (PII) of donors who sent money to non-profits. DonorView provides a cloud-based fundraising platform used by schools, charities, religious institutions, and other charitable or philanthropic organizations. Jeremiah Fowler, an information security researcher, discovered 948,029 records exposed online, including donor names, addresses, phone numbers, emails, payment methods, and more.

Submitted by Gregory Rigby on

"Share of LockBit 3.0 Ransomware Attacks Hardly Drops in Europe"

"Share of LockBit 3.0 Ransomware Attacks Hardly Drops in Europe"

According to a recent study by researchers from ZeroFox, the share of ransomware attacks by the infamous LockBit 3.0 hackers is slowly declining. In Europe, there is also a slow decline, but it is almost negligible. The number of ransomware attacks claimed by the notorious hacker gang LockBit 3.0 has decreased over the past year. This hacker gang accounted for about 15 percent of all ransomware attacks in the third quarter of 2023. This percentage was still around 29 percent of the total in the first quarter of this year.

Submitted by Gregory Rigby on

"LockBit Ransomware Now Poaching BlackCat, NoEscape Affiliates"

"LockBit Ransomware Now Poaching BlackCat, NoEscape Affiliates"

The LockBit ransomware operation is now starting to recruit affiliates and developers from the BlackCat/ALPHV and NoEscape ransomware gangs after recent disruptions and exit scams.  Last week, the NoEscape and the BlackCat/ALPHV ransomware operation's Tor websites suddenly became inaccessible without warning.  According to affiliates associated with NoEscape, the ransomware operators pulled an exit scam, stealing millions of dollars in ransom payments and shutting off the operation's web panels and data leak sites.

Submitted by Adam Ekwall on

Zero Trust World 2024

"Learn from experts, learn from peers, and expand your network in a fun environment with three days designed to improve your knowledge and skills as an IT professional.  Onsite you'll choose from a variety of sessions with topics to help you today and in the future. Cybersecurity sessions are CPE eligible. The daily schedule includes mornings in the Mainstage with keynotes and subject matter experts providing insight into threats and technology. Afternoon concurrent sessions allow you to choose from topics in ballrooms and in the Hacking Lab.

"UCalgary Legal Researchers Receive Grant to Expand Offerings in Cybersecurity"

"UCalgary Legal Researchers Receive Grant to Expand Offerings in Cybersecurity"

Beyond the technical core of cybersecurity, there are complex policy and regulatory aspects. Therefore, the National Cybersecurity Consortium (NCC) has provided funding to the University of Calgary's Faculty of Law to develop programming aimed at training future lawyers, legal academics, and policy experts, as well as to advise on law and policy issues concerning and shaped by cybersecurity.

Submitted by Gregory Rigby on

"Major Leak Exposes Users From Russian Crypto Exchanges"

"Major Leak Exposes Users From Russian Crypto Exchanges"

According to the Cybernews research team, customers at nine Russian cryptocurrency exchanges have been exposed, with private user data being revealed for over two months. The team independently verified the authenticity of the cryptocurrency exchange user data leaks. Although the exchanges are small, the estimated number of customers involved is over 500,000. Full names, credit card numbers, emails, IP addresses, amounts for payment or withdrawal requests, and more, are all part of the data collection. The leaked data included over 615,000 payment requests and 28,000 withdrawal requests.

Submitted by Gregory Rigby on

"French Police Arrests Russian Suspect Linked to Hive Ransomware"

"French Police Arrests Russian Suspect Linked to Hive Ransomware"

French authorities recently arrested a Russian national in Paris for allegedly helping the Hive ransomware gang with laundering their victims' ransom payments.  The suspect was apprehended after the French Anti-Cybercrime Office (OFAC) linked him to digital wallets that received millions of U.S. dollars from suspicious sources based on his activity on social networks.  French authorities also seized €570,000 worth of cryptocurrency assets when they detained the 40-year-old suspect and Cyprus resident on December 5.  

 

Submitted by Adam Ekwall on

"Using Personalized Warning Interfaces to Protect Against Phishing Website Attacks"

"Using Personalized Warning Interfaces to Protect Against Phishing Website Attacks"

Researchers at the University of Wisconsin-Milwaukee's Lubar College of Business have been exploring phishing website attacks and how to reduce them. According to the research team, while most browsers include phishing detection tools to warn users about phishing website attacks, many people are unaware of such tools. Many people do not trust a warning and become victims of their own security behaviors. However, the researchers say users cannot be blamed for such actions as they rarely interact and form a relationship with detection tools quietly running in the background.

Submitted by Gregory Rigby on
Subscribe to