News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

LockBit ransomware group launches bug bounty program
B2B Cyber ​​Security ShortNews

Like a normal company, the LockBit ransomware group has started a bug bounty program in which other programmers are supposed to report bugs that reveal their IP and more. The reward pot is said to be worth over $XNUMX million. Normal software companies use the classic bug bounty programs to improve their software. The fact that a ransomware group is officially doing this, according to ComputerWeekly.com, is really new. However, the LockBit Group does not only expect or reward hints of errors in their ransomware. Worthwhile targets should also be reported, for example if a company's website is vulnerable to cross-scripting....

Read more

Cybercrime trainees preparing for an attack?
Cybercrime trainees preparing for an attack?

Effective division of labor or breeding of cybercrime trainees? After a rather bumbling network infiltration, the professionals finally take over with Lockbit Ransomware. An interesting cyber case has caught the attention of the Sophos researchers. Sophos has uncovered a particular cyber attack: Cyber ​​criminals broke into a regional government server in the United States and stayed there for five months. During this time, they used the server to search online for a mix of hacking and IT administration tools that could help them deploy an attack. The attackers also installed a cryptominer before exfiltrating data and deploying Lockbit ransomware. Attack…

Read more

LockBit ransomware focuses on SMEs
LockBit ransomware attack

SMEs in focus: Sophos presents its latest study on LockBit ransomware. Two techniques stand out: firstly, the use of automated tools to infect certain tax and accounting software in hacked networks with ransomware and secondly, the renaming of PowerShell files to disguise themselves. "LockBit attackers use automated attack tools to identify promising targets," summarizes Sean Gallagher, Senior Threat Researcher at Sophos. The analysis shows how the criminals use PowerShell tools to search for certain business applications in hacked networks, including tax and accounting software. If a fingerprint generated by this search matches the keyword criteria,...

Read more