News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Mandiant classifies ransomware group as FIN12
B2B Cyber ​​Security ShortNews

Last year, the UNC1878 hacking group made headlines after it deliberately and aggressively attacked healthcare facilities with ransomware. Mandiant has upgraded UNC1878 from an "unclassified group" to the category of FIN hackers. A report. Mandiant UNC1878 upgraded from an "unclassified group" to the category of FIN hackers (financially motivated groups) and assigned the designation FIN12. FIN12 was responsible for nearly 20 percent of all ransomware attacks Mandiant responded to last year. The average time to ransom demand is around 2,5 days. This makes FIN12 about twice as fast as ...

Read more

Comment: REvil makes the highest ransom demand in history
Fireeye News

On July 2, 2021, a REvil / Sodinokibi user exploited several vulnerabilities in the Kaseya VSA product to distribute a ransomware encryptor to connected endpoints. It is the highest ransom demand in history. A comment from Charles Carmakal, SVP and CTO, Mandiant. Kaseya VSA is a remote monitoring and management solution used by managed service providers (MSPs) and enterprises to remotely manage computer systems. The number of organizations affected by the REvil ransomware outage is currently unknown, but Kaseya estimates the number of cases is below 1.500. Many of the affected ...

Read more

Increasing number of attacks on OT systems
Increasing number of attacks on OT systems

New opportunities for hackers: Increasing number of less sophisticated attacks on OT systems. Mandiant has been monitoring groups of hackers who claim to broker or sell access to Internet-enabled OT systems since at least 2012, but the incidence and relative severity of the incidents have increased significantly in recent years. An analysis. Attacks on control processes in operational technology (OT) are considered to be very complex, because the targeted disruption or modification of a control process for a specific purpose is usually not only very complicated, but also time-consuming and resource-consuming. More attacks - but ...

Read more

Client Advantage Threat Intelligence
Fireeye News

FireEye launches “Mandiant Advantage: Threat Intelligence” – quick access to relevant insights and expertise from Mandiant. With the new SaaS-based platform, new standards apply for easily accessible knowledge about current threats. FireEye, the intelligence-based security company, launches Mandiant Advantage: Threat Intelligence. It is Mandiant Solutions' first Software-as-a-Service (SaaS)-based offering that combines threat intelligence with data from all relevant incident response operations and delivers it through a user-friendly platform. High-quality reports on the threat situation "Mandiant Threat Intelligence is due to its high-quality reports, which present the threat situation in detail and with which...

Read more