News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Dangerous: Tor2Mine Cryptominer with new variants
SophosNews

Sophos describes new variants of the Tor2Mine Cryptominer with new variants that are characterized by improved bypass, persistence and dissemination capabilities. If he is found in the network, he is usually not traveling alone. The Sophos analysis "Two flavors of Tor2Mine miners dig deep into networks with PowerShell, VBScript" shows how the miner evades detection, spreads automatically in a target network and is increasingly difficult to remove from an infected system. Tor2Mine is a Monero miner that has been active for at least two years. Monero miner Tor2Mine spreads automatically In the investigation, Sophos describes ...

Read more

Threat Report 2022: In the wake of ransomware
Threat Report 2022: In the wake of ransomware

SophosLabs identify new trends in ransomware, standard malware, attack tools, cryptominers and more. Ransomware is co-opting other cyber threats to create massive, networked delivery infrastructure for its extortion activities. Advancing deepfake video and speech synthesis technologies are opening up new opportunities for cyber criminals. These are some of the points from the Sophos Threat Report 2022. Today Sophos published its annual IT security threat report. The Sophos 2022 Threat Report collects research and threat data from Sophos Labs, the experts from the Managed Threat Response and Rapid Response departments, and the Sophos AI team, and offers a multidimensional perspective on security threats that companies ...

Read more

Cyber ​​attack: good preparation is half the defense 
Cyber ​​attack: good preparation is half the defense

Companies that prepare intensively for a cyber attack have significantly less to contend with the consequences of the attacks. Much is already gained in having an incident response (IR) plan. Cybersecurity is mainly focused on prevention. And the best way to do that is through learning from incidents. Nevertheless, it happens time and again that companies are attacked. In such a case, the point is to minimize the damage and learn as much as possible from known experiences. So what is the "best practice"? With a…

Read more

Manufacturing and manufacturing operations are the least likely to pay ransomware ransom
SophosNews

19 percent: Only so few manufacturing and production companies pay ransom after a ransomware attack in order to free their encrypted data. Far less than the cross-industry average of 32 percent. The State of Ransomware in Manufacturing and Production 2021 research report by Sophos reveals that at just 19 percent, manufacturing and manufacturing operations are the least likely to give in to a ransomware ransom note in order to decipher their encrypted data. At the same time, at 68 percent, these companies are most likely to be able to restore their data from backups. Nevertheless, this sector is one of the ...

Read more

iPhone crypto fraud is now escalating in Europe too
SophosNews

Cyber ​​gunners are increasingly targeting European and American users of apps like Tinder and Bumble in order to hijack their iPhones for their machinations. 1,2 million euro loot discovered in just one wallet. Sophos gives the threat the code name CryptoRom. Findings from Sophos indicate that international cyber fraud involving cryptocurrency is escalating. Cyber ​​criminals use popular dating apps like Tinder and Bumble to misuse the iPhones of unsuspecting users for their fraudulent activities. While the attackers had mainly targeted Asian regions in the past, the attacks are now also shifting to Europe ...

Read more

Sophos discovers new Python ransomware

Ultra high-speed attacks on ESXi servers and VMware virtual machines. Sophos researchers discover new Python ransomware. The report entitled “Python Ransomware Script Targets ESXi Server for Encryption” provides a deeper insight. Sophos has released details of a new Python-based ransomware cybercriminals are using to attack and encrypt virtual machines running on ESXi hypervisors. In the report entitled “Python Ransomware Script Targets ESXi Server for Encryption”, the experts at Sophos Labs describe a high-speed attack that took less than three hours from intrusion to encryption. ESXi Platforms Targeted by VMware “This is one of the fastest ransomware attacks…

Read more

Ransomware scans for old software for attack 
SophosNews

Forgotten, unpatched and outdated software is an ideal gateway for cyber criminals. This is also the case in the current case of a ransomware attack that an 11-year-old Adobe ColdFusion software used on a server for itself. Sophos has uncovered a particularly clever attack called "Cring Ransomware Exploits Ancient ColdFusion Server". Cring ransomware operators attacked their victim after hacking a server running an unpatched, 11-year-old version of Adobe ColdFusion software. The victim used the server to collect worksheets and accounting data for the payroll and a number of ...

Read more

How Cyber ​​Scammers Use Google Forms
How Cyber ​​Scammers Use Google Forms

SophosLabs Reveals: How Cyber ​​Scammers Use Google Forms. Phishing and malware often pave the way for ransomware or data theft. The latest analysis by SophosLabs shows how the fraudsters use Google Forms for their own purposes. Sophos has published a new analysis report entitled “Phishing and Malware Actors Abuse Google Forms for Credentials, Data Exfiltration” that deals with the misuse of Google Forms by cyber criminals. Google Forms makes it easy for cybercriminals “The extent to which attackers are using Google Forms for themselves came to light when we examined how malware abuses the encryption, ...

Read more

The ransomware crisis needs a global solution
The ransomware crisis needs a global solution

Ransomware has now become a global problem. Cybercriminal groups operate from countries that offer them safe haven and allow them to launch even the most sophisticated attacks. A common global strategy is needed to prevent an escalation. An assessment by Michael Veit, security expert at Sophos. We are in the middle of a ransomware crisis. A plethora of increasingly extreme ransomware attacks have been observed over the past few months, such as the temporary shutdown of a major U.S. fuel pipeline. The rise in ransomware attacks is not a new phenomenon, but in this ...

Read more

Can you steal money from your iPhone with Apple Pay?
Can you steal money from your iPhone with Apple Pay?

According to an English researcher, there is an obvious vulnerability that can be used to steal money from a locked iPhone if a Visa card is set up with Apple Pay Express Transit. A comment from Sophos. In IT, comfort and security are often similar in their relationship to one another as freedom and security. One is only at the expense of the other. A current example is the Apple Pay “Express Transit” functionality: small amounts can be paid easily, despite the blocking code. However, according to the latest reports, this can be fatally exploited. Paul Ducklin, Sophos Security Expert, ...

Read more