Search Results

malware
Ransomware Attacks Cyber threats UK United Kingdom Cybercrime Extortion Cyberattack

Ransomware attacks remained to pose threats against the UK

A UK security organisation expressed its thoughts about why ransomware attacks have been an increasing activity for threat groups, and it is because it has remained uncontested for many years. The analyst also added that ransomware attacks had doubled this year in the UK because the attacks have thrived and worked many times.    Cybercriminals are profiting a lot from ransomware attacks since victims continue to pay. This situation leads to...
Continue Reading
Japanese Telecom Fake Android Application phishing campaign malicious apps Japan

Credentials of Japanese Telecom users stolen by a faux Android application

Recently, researchers identified an Android application used for phishing campaigns targeting specific Japanese telecommunication services clients.  In an ever-growing interconnected environment of the internet, telecommunication is the primary tool to connect with anyone anywhere globally. We all rely on the telecommunication industry to make emails, messages, phone calls, and video calls. This is also shown in different businesses, infrastructure, and workplaces...
Continue Reading
BlackMatter Ransomware Flaw Threat Group Cybercrime DarkSide Colonial Pipeline

Security researchers outsmart BlackMatter ransomware by discovering a flaw within its payloads

A flaw in the BlackMatter ransomware threat actors’ code that had them lost millions in profit was discovered by cybersecurity researchers. The flaw enables the recovery of encrypted data without needing to pay ransom demands to the threat actors.  BlackMatter’s existence in the cybercrime ecosystem has been longer than its current re-emergence after temporarily leaving the scene. Analysts believed that the DarkSide ransomware is a rebranded version of BlackMatter. The DarkSide ransomware is also the threat...
Continue Reading
cyberattack after sales Acer India Tech company Taiwan hardware data breach

“Isolated Attack” on the after-sales service system in India, confirmed by Acer

Recently, data breached in the after-sales service system in India was confirmed by the Taiwan-tech company Acer.  An Acer Corporate spokesperson stated that they immediately initiated their security protocols and conducted a full scan of their system after the confirmed detection of the breaching. They also added that they are notifying all potentially affected individuals in the Indian-based Acer company. ...
Continue Reading
DeepBlueMagin Ransomware Chinese Hackers Malware Detection Israel China

Alleged Chinese Hackers attack hospitals in Israel

Israel’s National Cyber Directorate and Ministry of Health announced the increasing ransomware attack they are receiving lately. Just this past weekend, ten hospitals and health institutions all over Israel has experienced a cyberthreat in their systems. Fortunately, the two government sectors revealed that the threat attempts did not damage medical organizations. All cyberthreats were defended well thanks to...
Continue Reading
Yanluowang China Ransomware Malware Cybercrime Malware Solutions

Enterprises targeted by a new ransomware called Yanluowang

A researching team discovered a new and developing ransomware strain dedicated to attacking enterprises entities.  The malware, called Yanluowang ransomware, is based on the extension it adds to encrypted files on compromised systems. The name ‘Yanluowang’ is derived after the Chinese god Yanluo Wang, one of the ten kings of hell.  It was discovered that an investigation was conducted...
Continue Reading
Excel Documents Russian Cybercrime Group Macros MS Office malware Malicious File

Excel Documents became the latest weapon of a Russian Cybercrime Group

A Russian cybercrime group is using a modified Excel document for a ransomware campaign called MirrorBlast. MirrorBlast deploys a weaponized Excel document against several financial service organizations.  The most notable capability of MirrorBlast is the stealthy attribute that resulted in a low detection rate of the campaign’s malicious Excel documents.   The creators of these documents have...
Continue Reading
Free Decryptor BlackByte Ransomware cybersecurity anti malware anti phishing scams malware detection

Free Decryptor for BlackByte Ransomware was released

Previous cyberattack victims of known ransomware BlackByte can rejoice since a free decryptor has been released to the public. If the decryptor is executed, ransomware will generate an original encryption key per file or a key per machine called session keys utilized to encrypt a target’s device.  These keys are then encrypted with a public Rivest–Shamir–Adleman key and attached to the end...
Continue Reading
BillQuick zero day bug Cybercriminals billing software vulnerability cybersecurity

BillQuick billing system’s zero-day bug targeted by Cybercriminals

Recently, researchers discovered that a critical structured query language’s bug exists inside BillQuick Web Suite and is exploited by an unidentified malicious threat group. The billing system created by a particular billing software group has about 400,000 clients and users globally.  BillQuick is a unified project management software that targets different companies that need simple accounting, billing, and time-tracking...
Continue Reading
Thai hotel chain data breach Desorden Group Hackers

A Thai hotel chain suffered from a data breach claimed by Desorden Group

A Thai luxury hotel chain, Centara Hotels & Resort, has recently published a statement regarding a data breach suspected of being performed by a notorious group of threat actors behind a series of cyberattacks in the past weeks.  Through the security team’s investigation, it was verified that the system of the luxury hotel chain had suffered a data breach, and the threat actors were able to access some customers’...
Continue Reading
1 149 150 151 152 153 200