News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Security Report: Double Extortion Ransomware Attacks
Security Report: Double Extortion Ransomware Attacks - Image by Cliff Hang on Pixabay

Double-extortion is increasingly the keyword in cases of ransomware attacks. The attackers put the victim under double pressure: either they pay to have their data decrypted or the attackers publish the data. This and more in the WatchGuard Threat Lab Internet Security Report Q2/2023. WatchGuard Technologies' Second Quarter 2023 Internet Security Report highlights top malware trends and threats to network and endpoint security. The analysis by researchers at the WatchGuard Threat Lab revealed, among other things, that 95 percent of malware is transmitted via encrypted connections…

Read more

Hacker attack: Karlsruhe University of Applied Sciences completely paralyzed
B2B Cyber ​​Security ShortNews

The next university was the victim of a hacker attack: this time Karlsruhe University is the victim and is completely paralyzed. Furtwangen University (HFU) has already been affected in the last few months. The Kaiserslautern University of Applied Sciences was hacked back in July and, according to the attacker, over 240 GB of data was stolen. The Baden-Württemberg Cooperative State University also fell victim to an attack at the end of September. According to Karlsruhe University of Applied Sciences, an anomaly in the IT infrastructure was discovered on October 02nd. As a result, a crisis team was immediately activated. Knowing that cyber attacks are already occurring across the country...

Read more

APT Akira: Extremely active ransomware demands a large ransom 
B2B Cyber ​​Security ShortNews

The Akira ransomware group quickly gained notoriety. The group emerged in March 2023 and was already the fourth most active group in August, demanding millions of dollars in ransom from its victims. Logpoint analyzed the tactics, techniques and processes. Akira primarily focuses on companies across a range of industries in the UK and US, including education, finance, real estate, manufacturing and consulting. “Akira has proven to be extremely active and has amassed an extensive list of victims in a short period of time. With each attack, the group evolves with additional capabilities,” says Swachchhanda Shrawan Poudel, Logpoint Security…

Read more

Email blackmail on the rise

In extortion emails, cybercriminals threaten to publish compromising information about their victims, such as an embarrassing photo, and demand payment in cryptocurrency. Attackers often purchase victims' login credentials or obtain them through data breaches to "prove" that their threat is legitimate. To gain a better understanding of the financial infrastructure attackers use in extortion emails, Barracuda partnered with researchers at Columbia University to analyze over 300.000 emails captured by Barracuda Networks' AI-based detectors over a period of one year year when extortion attacks were detected. Below are the…

Read more

New malware WikiLoader targets businesses
B2B Cyber ​​Security ShortNews

Experts have uncovered a new piece of malware, which they dubbed “WikiLoader”. Experts first observed the new malware when it was distributed by TA544 (Threat Actor 544), a group of cybercriminals that typically use Ursnif malware in their attacks to target companies primarily in Italy. As a result, Proofpoint was able to observe further cyber campaigns. WikiLoader is a sophisticated downloader designed to install another malware payload. The newly discovered malware includes remarkable obfuscation techniques and custom code implementations designed to make detection and analysis by cyber forensic scientists more difficult. The developers rent…

Read more

New ransomware and self-replicating worm discovered
B2B Cyber ​​Security ShortNews

Unit 42, the research team at Palo Alto Networks, has published a research report on a new peer-to-peer (P2P) worm targeting the cloud, dubbed P2PInfect. This worm targets vulnerable Redis systems with container-effective exploits. At the same time, Unit 42 also published a report on Mallox ransomware. Researchers observed an almost 50 percent increase in activity, with MS-SQL servers being exploited to spread the ransomware. On July 11, 2023, Unit 42 cloud researchers discovered a new peer-to-peer (P2P) worm they dubbed P2PInfect. This – in the…

Read more

MOVEit and APT CLOP: Further company data leaked
B2B Cyber ​​Security ShortNews

The MOVEit vulnerabilities may have been patched by now, but the APT group CLOP is just getting started with its blackmail. A total of 52 names of companies that CLOP claims to have attacked via the MOVEit vulnerability have been published - for some even the first data packages or the entire data booty. Somehow the CLOP group doesn't quite believe its Robin Hood demeanor: the APT group only claims to take money from big companies. The captured data from public and government agencies had already been deleted because the group was not interested in politics. However, some experts are of the opinion that…

Read more

Lockbit steals 700 GB of data from MCNA with 9 million customers
B2B Cyber ​​Security ShortNews

MCNA Dental, North America's largest dental insurer, had to notify all of its nearly 9 million customers that 700GB of data was lost. LockBit probably captured a lot of personal customer data. As an apology, MCNA Dental offers all customers a 12-month Identity Theft Protection and Credit Monitoring Service through IDX at no charge. According to company information, LockBit hacked into MCNA Dental's systems on February 26th. It was probably not until March 06th that the hackers were found in the network and countermeasures were initiated. By then, the APT group LockBit had already found everything and transported the data away….

Read more

Ransomware: Each payment funds 9 new attacks
Ransomware: Each payment funds 9 new attacks

New research from Trend Micro reveals how the ransomware industry is staying alive. A new study shows how cybercriminals operate and finance their activities. In it, the threat experts found that only ten percent of the companies affected by ransomware actually pay their extortionists. However, these payments subsidize numerous other attacks. The study contains strategic, tactical, operational and technical information on threats. Data science methods were used to compile various information about threat actors. These data and metrics help to compare groups of ransomware, assess risk and model the behavior of threat actors. A paying…

Read more

Cyber ​​attacks on North German shipyards
B2B Cyber ​​Security ShortNews

A few days ago, the Lürssen shipyard was paralyzed by a ransomware attack. Shortly before that, the Flensburger Schiffbau Gesellschaft mbH & Co. and Nobiskrug Yachts GmbH was the victim of an attack by the BianLian APT group and 3 terabytes of data are said to have been stolen. Actually, the German shipyards have many other concerns. Now, however, serious IT concerns have arisen. A ransomware attack is said to have paralyzed the Lürssen shipyard over the Easter holidays. According to some media in the far north, nothing is supposed to work in the shipyard anymore in terms of IT and processes. The background is said to have been a phishing attack that…

Read more