According to a researcher, a website dedicated to sharing an original created digital design called Thingiverse has leaked 36-gigabyte backup files containing 200,000 email addresses and other personal information. The data dump is currently being circulated on a known hacking forum. The Thingiverse purpose is to give free, open-source hardware designs that can be licensed under the Creative Commons licenses or General Public...Continue Reading
Recently, data breached in the after-sales service system in India was confirmed by the Taiwan-tech company Acer. An Acer Corporate spokesperson stated that they immediately initiated their security protocols and conducted a full scan of their system after the confirmed detection of the breaching. They also added that they are notifying all potentially affected individuals in the Indian-based Acer company. ...Continue Reading
A researching team discovered a new and developing ransomware strain dedicated to attacking enterprises entities. The malware, called Yanluowang ransomware, is based on the extension it adds to encrypted files on compromised systems. The name ‘Yanluowang’ is derived after the Chinese god Yanluo Wang, one of the ten kings of hell. It was discovered that an investigation was conducted...Continue Reading
A Russian cybercrime group is using a modified Excel document for a ransomware campaign called MirrorBlast. MirrorBlast deploys a weaponized Excel document against several financial service organizations. The most notable capability of MirrorBlast is the stealthy attribute that resulted in a low detection rate of the campaign’s malicious Excel documents. The creators of these documents have...Continue Reading
The ransomware actors behind the destructive malware called TrickBot have appeared again. It is now equipped with new strategies designed to increase its foundation by expanding its dispensation channels. The expansion is to deploy another ransomware called Conti. According to a report, the orchestrator of this expansion is the ransomware gang known as Wizard Spider or ITG23. They have been identified to...Continue Reading
A Thai luxury hotel chain, Centara Hotels & Resort, has recently published a statement regarding a data breach suspected of being performed by a notorious group of threat actors behind a series of cyberattacks in the past weeks. Through the security team’s investigation, it was verified that the system of the luxury hotel chain had suffered a data breach, and the threat actors were able to access some customers’...Continue Reading
IronHusky, a Chinese-affiliated threat group, has been abusing the zero-day flaw of windows using the MysterySnail Rat. The threat actors have uncovered a zero-day existing inside the Windows’ system, expanding the privileges for taking over servers and garnering ransom-worthy data. The espionage campaign majorly affects the Windows client and server version, from Windows 7, Windows version 2008 up to...Continue Reading
Porto Seguro, Brazil’s third-largest insurance firm, has reported a cyberattack on their systems that caused instability to their service channels. The cyberattack against the insurance firm was reported to the Securities and Exchange Commission (CVM). Upon learning about the incident, the insurance firm has immediately enabled their security protocols and slowly re-establishing their operating environment to normal as...Continue Reading
LockBit ransomware has successfully attacked another victim once again, following the confirmation of Accenture, a global consultancy and IT firm that the threat actors recently victimised. The data breach incident was revealed through the firm’s fourth-quarter financial report. The IT consulting firm and its clients have been experiencing cybersecurity attacks such as phishing, data breach, and malware attacks against...Continue Reading
Cybersecurity researchers have identified the cybercrime group that executed the RYUK ransomware to be FIN12. RYUK ransomware targets big organizations with average revenue of at least $6 billion. Compared to other ransomware gangs, FIN12 deploys its ransomware as fast as 2.5 days. Its main targets include healthcare organizations. FIN12 is a ransomware gang that focuses on gaining a significant...Continue Reading