News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Hope for companies: FBI has 7.000 LockBit ransomware keys
B2B Cyber ​​Security ShortNews

The FBI, Europol and many other authorities launched operations against the ransomware extortionists LockBit back in February and May. LockBit's servers, domains and code were confiscated and the first people behind it were arrested. The FBI has now announced that it has 7.000 decryption keys and wants to use them to help affected companies. Operation Cronos took place in February: The target was the LockBit group and its infrastructure with servers, domains and assets. Now the FBI has drawn the first conclusion in a statement. According to the FBI, a total of 26 indictments have been filed against LockBit gang head Dmitry…

Read more

FBI: Head of REVIL ransomware gang convicted
B2B Cyber ​​Security ShortNews

The REVIL gang carried out spectacular ransomware attacks and stole $700 million through extortion. The mastermind was caught in 2021, transferred to the USA and sentenced to almost 14 years in prison. Only a little more than $8 million of the loot was recovered. For a long time he felt safe and untouchable, like many members of ransonware groups. As early as 2021, the Ukrainian Yaroslav Vasinskyi, also known in the scene as Rabotnik, told investigators online. However, it was not until 2022 that REVIL's infrastructure could be broken up and the code and...

Read more

FBI: Internet Crime Report counts $12,5 billion in damage 
B2B Cyber ​​Security ShortNews

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 crimes with potential losses of over $12,5 billion in the U.S. only. The FBI evaluation also provides a perspective on the global threat in cybersecurity. The leading points in terms of damage caused or ransoms are investment fraud and BEC – Business Email Compromise and not, as suspected, ransomware. IC2000, founded in 3, records all data, such as online fraud, hacker attacks, industrial espionage, online blackmail, international money laundering, identity theft and a growing...

Read more

Russian botnet shut down
B2B Cyber ​​Security ShortNews

A botnet made up of routers from the manufacturer Ubiquiti was taken over and shut down in an FBI operation. Russian secret services are said to be behind this. Malware from the APT 28 group found its way onto numerous routers in offices and private households. According to the FBI, this botnet was used as a cyber espionage platform. The devices run Linux firmware. According to the US authorities, the MooBot malware was used. The target was the routers from the manufacturer Ubiquiti with the Edge OS operating system, which operate with standard passwords. According to the FBI, the targets of the espionage activities were governments, military, security agencies and corporations in...

Read more

FBI, Europol, NCA: APT group LockBit smashed!

According to the authorities, Europol, the FBI and the British NCA have dismantled the APT group LockBit. At least it has all darknet leak sites under control and is probably already distributing decryption tools. The authorities even used the system of leak sites to distribute information and tools. It sounds too good to be true: A global network of authorities such as the FBI, Eruopol, NCA and many more have succeeded in striking a significant blow against the APT group LockBit. Officially, the group's network has been dismantled, the servers taken over, source codes and documents confiscated and...

Read more

Up to $15 million bounty for ALPHV-Blackcat information
B2B Cyber ​​Security ShortNews

The US State Department is serious: There are rewards totaling $15 million for good information that leads to the capture of key people in the Blackcat group and its RaaS ALPHV. This tactic already helped in the capture of the Conti gang. The US State Department is offering a reward of up to $10 million for information leading to the identification or location of individuals who hold key positions in the Transnational Organized Crime group behind the ALPHV/Blackcat ransomware variant. Additionally, a reward offer of up to $5 million is being offered for information…

Read more

Chinese botnet Volt Typhoon smashed
B2B Cyber ​​Security ShortNews

The US government announced that it had disrupted the threat actor Volt Typhoon's botnet, which it used to attack critical infrastructure in the United States and other countries. An operation authorized by the American judiciary in December 2023 destroyed a botnet of hundreds of US-based small office/home office (SOHO) routers hijacked by state-sponsored hackers from the People's Republic of China (PRC). Volt Typhoon attacked critical infrastructure The hackers, known in the private sector as “Volt Typhoon,” used private SOHO routers infected with the “KV Botnet” malware...

Read more

Open battle between FBI and ALPHV – BlackCat
B2B Cyber ​​Security ShortNews

The FBI continues to take action against the APT group ALPHV alias BlackCat. The FBI briefly blocked the group's leak page on the dark web. Now it's open again and ALPHV announces in Russian that 3.000 companies will never receive the keys to their ransomware. There has never been a more open exchange of blows between the FBI and an APT group. The FBI published a statement saying that it had taken over various ALPHV servers and was now making a decryption tool available to 500 victims. “In dismantling the BlackCat ransomware group, the Department of Justice has...

Read more

Raid on ALPHV or BlackCat group?
B2B Cyber ​​Security ShortNews

The ALPHV and BlackCat leak sites have been disrupted for days. Some of them cannot be accessed or do not show any content. In darknet forums, admins from other APT groups claim that the servers have been taken over by ALPHV. The Advanced Persistent Threat (APT) group ALPHV, also known as BlackCat, is a ransomware group that first emerged in November 2021. The group is known for carrying out sophisticated ransomware attacks on companies and organizations around the world. But for a few days now, the ransomware group's leak pages have either not been accessible or show no content. Darknet admins talk about…

Read more

Access: Former HIVE members arrested
Access: Former HIVE members arrested

The cyber attackers in Ukraine thought they were safe for a long time: but on November 21st it was over! A team of global investigators was able to arrest the head of the cyber attack group along with four of the most active helpers. The former HIVE members are said to have encrypted 250 servers of large corporations in recent years, causing damage amounting to several hundred million euros. The cooperation of Europol and many investigators from Norway, France, Germany and the United States was worthwhile. After the APT group HIVE was dismantled in 2021, investigators did not let up...

Read more