When the media reports about a company being attacked by ransomware, many folks imagine that cunning hackers first wrote dangerous malware, then searched long and hard for a way to hack the company, and finally encrypted its confidential data. Because of this, some business owners are still convinced that their show more ...
company is not interesting enough for attackers to spend so much resources on hacking it. In reality, things couldnt be more different. A modern attacker in fact doesnt write the malware himself, but rents it, and he doesnt spend resources on hacking — he simply goes to the shadow market of initial access brokers. Experts in our Digital Footprint Intelligence service decided to find out how much money changes hands when cybercriminals buy and sell access to company infrastructure. How much for access? So how much do attackers spend when buying access to your infrastructure? This depends on many factors, but the most significant one is your companys revenue. After analyzing about two hundred adverts on the darknet, our experts came to the following conclusions: most ads offer access to small companies; almost half the ads offer access for less than $1000; cases where access is sold for more than $5000 are quite rare; the average cost of access to large companies ranges between $2000 to $4000. For sure, those are hardly enormous sums of money. But ransomware operators expect to reap in much greater sums from their blackmailing endeavors, so they are at least willing to spend this much on initial access. It seems to be the market price thats been settled on through organic supply-and-demand and widely-known purchasing power. Whats for sale? Attackers offer different types of access. Sometimes its information about a vulnerability that can be exploited for access. Other times its credentials for accessing Citrix or the sites hosting panel. But in the vast majority of cases (in more than 75% of ads) they offer a variant of access via RDP (sometimes in conjunction with a VPN). Accordingly this option of remote access to the companys infrastructure should be treated with increased attention. Where do the bad guys get hold of access? There are many options for obtaining initial access. Sometimes cybercriminals use the simplest way: password mining. But most often they send phishing emails to employees, or emails with malicious attachments (spyware, or, for example, stealers, which automatically collect credentials, authorization tokens, cookies, and so on from infected devices). Sometimes attackers also exploit known vulnerabilities in software before administrators patch it. Detailed results of the study, with examples of real initial access ads, can be found in the report on the Securelist website. How to stay safe? Since most often the subject of sale is remote access to a companys infrastructure via RDP, it is this that should be protected first of all. Our experts give the following recommendations: organize RDP access only through VPN; use strong passwords; use Network Level Authentication (if possible); use two-factor authentication for all critical services. In order to make passwords less likely to be leaked through phishing, its also recommended to use reliable security solutions with an anti-phishing engine both on employee devices and at the mail gateway level. And to be on the safe side, periodically raise your personnel's cybersecurity awareness. In addition, its quite useful to find out if someone is already discussing ways of accessing your companys infrastructure on the darknet, so monitoring such activity is advised. It is such monitoring that our Digital Footprint Intelligence service carries out.
A report has uncovered that threat actors could reach users’ crypto-keys by launching a side-channel attack named Hertzbleed. Independent advisories have been issued by the firms. Intel and AMD have no plans to release microcode patches to address this new family of side-channel attacks. Processors from ARM using the frequency scaling feature might as well affected by Hertzbleed.
The House Homeland Security appropriations subcommittee on Thursday approved a budget of $2.9 billion for the CISA, $417 million higher than the White House’s original budget request for the agency and $334 million above its fiscal 2022 allotment.
According to research by Cymulate, 39% of companies were hit by cybercrime over the past 12 months – and of those, two-thirds were hit more than once. Of those hit more than once, one in 10 fell victim to further cyberattacks 10 or more times.
The nature of the ransomware attack, “as well as information from law enforcement and independent cybersecurity experts, lead us to believe that this attack has been carried out by highly sophisticated bad actors”, said Montrose.
It has long been considered that files stored and edited in the cloud are resilient to encryption extortion – the autosave and versioning features should provide sufficient backup capability.
Approximately 1.29 million patients of Texas Tech University Health Sciences Center have been added to the ongoing fallout from the Eye Care Leaders ransomware attack and data theft from December 2021.
The National Centers of Academic Excellence in Cybersecurity (NCAE-C) program is an initiative that recognizes US-based academic programs within colleges and universities that offer degrees and research in cybersecurity.
The first portion of our credit card skimmer was located in the script.js file, a custom file added to the popular Storefront WooCommerce theme and included in the checkout page.
Big-game malware hunters at Volexity are shining the spotlight on a sophisticated Chinese APT caught recently exploiting a Sophos firewall zero-day to plant backdoors and launch man-in-the-middle attacks.
The situation in many of these countries is such that ransomware attacks on local, provincial, or federal government entities “could constitute a credible national and geopolitical security risk,” the researchers conclude.
WordPress sites using Ninja Forms, a forms builder plugin with more than 1 million installations, have been force-updated en masse this week to a new build that addresses a critical security vulnerability likely exploited in the wild.
Rep. Adam Smith, the chairman of the House Armed Services Committee, said Tuesday that the United States needs to invest far more in protecting national security communications and software.
Dubbed “NakedPages,” the toolkit, which was developed using NodeJS Framework and runs JavaScript code, is fully automated and comes preloaded with more than 50 phishing templates and site projects.
U.S. agencies are instructed on how to apply network and multi-boundary security within Infrastructure-, Platform-, Software- and Email-as-a-Service cloud environments in the guidance.
BlackCat, or ALPHV, a Ransomware as a Service (RaaS) group, has claimed responsibility for the cyberattack and issued a ransom note, stating that the University has until June 16th to pay the ransom.
The RSOCKS botnet initially targeted Internet of Things (IoT) devices. Later, the RSOCKS botnet also expanded into compromising Android devices and conventional computers.
This warning follows multiple three other alerts the company has issued since the beginning of 2022, all advising users to keep their devices up to date and not expose them to Internet access.
The medium severity security bug disabled the option to turn on certain settings, meaning that any user who has opted to restrict adult content could instead be directed towards it by malicious hackers.
Researchers at Cisco Talos have discovered that Homebase 2 is plagued by three potentially dangerous vulnerabilities that could result in privacy intrusion, service disruption, and code execution.
Microsoft has dismissed media reports about June 14 being the last Patch Tuesday, as the upcoming rollout of the Windows Autopatch service seems to be causing some confusion.
The scammers have borrowed the DHL company brand — even going so far as to mimic its colors, logo, and web design. Netizens have also reported receiving phishing emails from scammers posing as USPS.
Conti leaked financial information in its first dump of data in 81% of attacks, according to a Rapid7 report, whereas Cl0p only leaked it in 30%. Cl0p leaked employee personal information in 70% of its first leaks, while Conti only leaked it in 27%.
Menlo Labs analysts were able to confirm that a campaign with the unique string of “DH4 VIP3R L337” had leveraged 147 unique lures to steal the credentials of 164 users spanning various companies, from financial services to cybersecurity firms.
Recently, San Diego Family Care (SDFC) settled a class action related to a 2020 data breach for $1 million. The class includes all SDFC patients (or their parents/guardians) who received a breach notification in May 2021.
The new degree program will start in Fall 2023 to meet the growing demand for computer science professionals. The number of jobs in the cybersecurity industry is expected to grow by more than 30 percent in the next decade.
Cybercriminals are using monkeypox outbreaks to fool victims into disclosing their personal information. Monkeypox is high on the news agenda and has people’s attention. The email claims that their organization has been monitoring the spread of the disease in the local area, and the updates provided by the local health officials, the CDC, and WHO.
In a new initiative, the BlackCat group has begun publishing details of victims on websites open to the public Internet, with the data available in a searchable form. It has already listed 112GB of stolen data, including Social Security numbers, from 1,500 employees of a hotel and spa in Oregon.
Information provided by the company to the Maine Attorney General shows that threat actors targeted Robert Half between April 26 and May 16. The incident, discovered on May 31, impacts 1,058 individuals.
F5 Labs discovered new Android-based information-stealing malware, dubbed MaliBot. It was spotted targeting online banking and cryptocurrency wallet users in Italy and Spain. Some of the banks targeted by MaliBot using this approach include UniCredit, Santander, CaixaBank, and CartaBCC. Due to the malware's show more ...
adaptability and the power it offers attackers over the device, it could theoretically be used for more than just stealing credentials and bitcoin.
A sophisticated Chinese advanced persistent threat (APT) actor exploited a critical security vulnerability in Sophos' firewall product that came to light earlier this year to infiltrate an unnamed South Asian target as part of a highly-targeted attack. "The attacker implement[ed] an interesting web shell backdoor, create[d] a secondary form of persistence, and ultimately launch[ed] attacks
WordPress websites using a widely used plugin named Ninja Forms have been updated automatically to remediate a critical security vulnerability that's suspected of having been actively exploited in the wild. The issue, which relates to a case of code injection, is rated 9.8 out of 10 for severity and affects multiple versions starting from 3.0. It has been fixed in 3.0.34.2, 3.1.10, 3.2.28,
An enterprise-grade surveillanceware dubbed Hermit has been put to use by entities operating from within Kazakhstan, Syria, and Italy over the years since 2019, new research has revealed. Lookout attributed the spy software, which is equipped to target both Android and iOS, to an Italian company named RCS Lab S.p.A and Tykelab Srl, a telecom services provider which it suspects to be a front
It was first the pandemic that changed the usual state of work - before, it was commuting, working in the office & coming home for most corporate employees. Then, when we had to adapt to the self-isolation rules, the work moved to home offices, which completely changed the workflow for many businesses.As the pandemic went down, we realized success never relied on where the work was done. Whether
With Father's Day falling this weekend in the United States and UK, more people might be more willing than normal to believe the latest scam to be spreading via WhatsApp is true. But I'm afraid it isn't. Sorry dads, Heineken isn't giving away free coolers of beer. Read more in my article on the Hot for Security blog.
Owners of NAS drives manufactured by QNAP have been advised that the company is "thoroughly investigating" reports that a new variant of the DeadBolt ransomware is targeting devices, locking up data and demanding victims pay a fee to extortionists. Read more in my article on the Hot for Security blog.
A critical vulnerability in a WordPress plugin used on over one million websites has been patched, after evidence emerged that malicious hackers were actively exploited in the wild.