News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

LockBit 3.0 publishes data from medical technology companies
B2B Cyber ​​Security ShortNews

LockBit had already attacked the medium-sized medical technology company Richard Wolf at the beginning of November, partially encrypting the systems and looting data. Since the company refused to pay, the stolen data is now on the dark web. The globally active, medium-sized medical technology company Richard Wolf fell victim to a successful LockBit 3 attack on November 3.0rd. This was followed in a classic process by encrypting some systems and extracting some data. No ransom paid to LockBit However, the company did not agree to the blackmail and did not pay any ransom. Meanwhile, LockBit has the…

Read more

Ransomware: Manufacturing and production pays the highest ransom
Ransomware: Manufacturing and production pays the highest ransom

The Sophos State of Ransomware study shows that manufacturing and manufacturing companies worldwide paid rare ransoms, averaging over $2 million, but at the same time more than twice as much as companies in other industries. A frightening development. Sophos released this year's industry study, The State of Ransomware in Manufacturing and Production, which specifically looked at the manufacturing and production space. The study shows that this sector has the highest average ransom payments of any industry studied. Affected companies raised $2.036.189 for the extortionist's demands, while companies in other industries...

Read more

Cyber ​​attack on wholesaler METRO
B2B Cyber ​​Security ShortNews

The management of METRO AG is currently confirming a partial failure of its IT infrastructure and thus also an already suspected cyber attack on the wholesaler. There are said to be offline systems for payment processing in the stores, since the cash register systems are also affected by the attack. There have been rumors for days that the immense IT disruptions at the wholesaler METRO were triggered by a cyber attack and are not a normal IT problem. METRO has now confirmed this general assumption with a statement on its website. Accordingly, all core systems are affected, which apparently affects all other systems,...

Read more

Ransomware victim Caritas does not want to pay
Ransomware victim Caritas does not want to pay

Caritas welcomes its visitors with the headline “Caritas is the victim of a cyber attack”. A few days ago, large parts of the IT systems were encrypted by ransomware, data was stolen and a ransom was demanded. However, Caritas does not want to pay, but is pursuing other plans. Caritas has published a corresponding statement on its website, since it cannot be reached by email either: “The Caritas Association of the Archdiocese of Munich and Freising eV has been experiencing a major disruption in central IT systems since last weekend and, according to the current state of knowledge, is the victim of a far-reaching cyber attack become. The operation of the approx.

Read more

HavanaCrypt ransomware disguises itself as a fake Google update
B2B Cyber ​​Security ShortNews

HavanaCrypt is a new ransomware. It is difficult to detect, disguises itself as a fake Google update and uses Microsoft functions in the attacks. Apparently they want to use Tot as communication, since such a directory is explicitly not encrypted. Attackers often abuse the trust of users in their attacks in order to bypass the protective measures of companies. So, using trusted address spaces and hosts that most companies consider legitimate, safe, and whitelisted is not new. For example, cybercriminals use AWS hosting or hijack other “clean” hosts…

Read more

Energy supplier Entega hacked – data is on the dark web
B2B Cyber ​​Security ShortNews

ENTEGA IT subsidiary COUNT+CARE GmbH & Co. KG was attacked back in June, the system data was encrypted with ransomware and a lot of customer data was stolen. According to Entega, a ransom in the high tens of millions was demanded, which was not paid. Well, in July 2022, much of the customer data can be found on the dark web, as threatened. According to experts, the APT group "Black Cat" is at work here. Cyber ​​criminals who attacked the ENTEGA IT subsidiary COUNT+CARE GmbH & Co. KG on the second weekend in June transferred personal data from ENTEGA customers, employees and business partners to the so-called…

Read more

Ransom payments climb to almost $1 million on average
B2B Cyber ​​Security ShortNews

Palo Alto Networks Reports Average Ransomware Ransom Payments Up 71% This Year, Nearing $1 Million. Palo Alto Networks has observed and currently evaluated the current development of real paid ransom demands after ransomware attacks. As thousands of cybersecurity professionals gather in San Francisco for the annual RSA conference, it's a good time to take a quick look at the ransomware activity Palo Alto Networks has observed so far in 2022. On average, companies pay $925.162 The numbers are staggering: The average ransomware payment in cases managed by Unit…

Read more

Germany 2021 in top 3 with most ransomware attacks
Germany 2021 in top 3 with most ransomware attacks

The willingness of affected companies to pay ransom demands is making the ransomware industry grow into a multi-billion dollar industry. Germany is among the top 3 countries that suffered from the most ransomware attacks in 2021. Cybereason, the XDR company, today published a new whitepaper entitled “RansomOps: Inside Complex Ransomware Operations and the Ransomware Economy”. It examines how ransomware attacks have evolved from niche to multi-billion dollar mega-industry over the past decade. As RansomOps attacks continue to evolve, ransomware syndicates are enjoying record profits, attacking public and private sector organizations of every…

Read more

Ransomware attack: pay or not pay?

The worst-case scenario: A ransomware can successfully spread in a company and encrypt data on PCs and drives. After that, a ransom demand is displayed on the screen. How should a company make decisions after a ransomware attack? Security experts give advice. Comments from Kaspersky, G Data, Sophos, Trend Micro, Bitdefender, AV-TEST, Bitglass, Digital Guardian, Fore Nova, Radar Cyber ​​Security, Barracuda Networks. It usually takes only seconds: a file is opened, sometimes a script is executed, the ransomware executes and immediately starts spreading in the corporate network. In many companys there are for this…

Read more

New ransomware group ALPHV – BlackCat
New ransomware group ALPHV - BlackCat Oiltanking

Gasoline supplier Oiltanking is a prominent victim of the new ransomware group ALPHV – BlackCat. Varonis Threat Labs: Targeted recruitment of partners through financially attractive offers with payouts of up to 90 percent of profits. Since the end of 2021, Varonis Threat Labs have observed increased activity by the ransomware group ALPHV (also known as BlackCat), which is actively recruiting new partners as a ransomware-as-a-service (RaaS) provider, including (former) members of other gangs such as REvil, Black Matter and Dark Side. The attack on the gas station supplier Oiltanking, which affected Shell among others, goes back to BlackCat. Other destinations include larger…

Read more