News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Study: Two out of three companies have already been victims of ransomware

The new Sophos study "State of Ransomware 2022" shows: 67 percent of German companies have already been affected by ransomware. In 2020 it was still 46 percent. The average ransom paid in Germany almost doubled to over 250.000 euros. Sophos released its annual State of Ransomware 2022 study, which provides an overview of ransomware development in practice. The report shows that 67% of companies surveyed in Germany (66% globally) were affected by ransomware in 2021, up from 46% in 2020. The average ransom paid by German companies…

Read more

Cybercrime trainees preparing for an attack?
Cybercrime trainees preparing for an attack?

Effective division of labor or breeding of cybercrime trainees? After a rather bumbling network infiltration, the professionals finally take over with Lockbit Ransomware. An interesting cyber case has caught the attention of the Sophos researchers. Sophos has uncovered a particular cyber attack: Cyber ​​criminals broke into a regional government server in the United States and stayed there for five months. During this time, they used the server to search online for a mix of hacking and IT administration tools that could help them deploy an attack. The attackers also installed a cryptominer before exfiltrating data and deploying Lockbit ransomware. Attack…

Read more

Log4j-Log4Shell: Attackers use vulnerability for permanent server access
Log4j Log4shell

SophosLabs researchers discovered three backdoors and four cryptominers targeting unpatched VMware Horizon servers to gain persistent access. Sophos is today releasing its latest research on the Log4j Log4Shell vulnerability. Attackers use these to embed backdoors and script unpatched VMware Horizon Servers. This gives them persistent access to VMware Horizon Server for future ransomware attacks. In the detailed report Horde of Miner Bots and Backdoors Leveraged Log4J to Attack VMware Horizon Servers, Sophos researchers describe the tools and techniques used to compromise servers, as well as three different backdoors and…

Read more

Better access protection through Zero Trust Network Access
Better access protection through Zero Trust Network Access

Zero Trust is the answer to modern cybercrime, and Sophos is putting that belief into action by integrating its Zero Trust Network Access (ZTNA) solution with its Intercept X endpoint solution. This further simplifies and improves protection against ransomware and future threats on the cyber floor. An interview with Michael Veit, security expert at Sophos. In their history, cybersecurity products have primarily focused on preventing malicious code from entering and executing computers. However, a trend can currently be observed that requires a rethink: the growing certainty that…

Read more

iOS and Android: CryptoRom scammers are ruining unsuspecting users

A million-dollar game: CryptoRom fraudsters ruin unsuspecting users with sophisticated social engineering. The misuse of iOS TestFlight and WebClips in combination with social engineering and fake websites drives many of the victims to ruin. Sophos has a new report “CryptoRom Swindlers Continue to Target Vulnerable iPhone/Android Users” about the internationally widespread cryptocurrency scam CryptoRom. This scam targets iPhone and Android users using popular dating apps like Bumble and Tinder. As the report shows, victims' accounts were frozen as soon as they attempted to withdraw their investments from the fake platform. In addition, some of them…

Read more

Qakbot botnet follows in Emotet's footsteps

Qakbot runs detailed profile scans of infected computers, downloads additional modules and offers sophisticated encryption. Starting point for the attacks: The cybercriminals skilfully latch onto real e-mail communication lines. The Qakbot botnet follows in Emotet's footsteps. Sophos has published a technical analysis of Qakbot showing that the botnet is becoming increasingly sophisticated and dangerous for businesses. In the article “Qakbot Injects Itself into the Middle of Your Conversations”, SophosLabs describes a recent Qakbot campaign that shows how the botnet spreads through email thread hijacking and a variety of profile information from…

Read more

More online crime as a result of war?
SophosNews

As a result of the war between Russia and Ukraine: will we see more or less online crime? Digital isolation and economic sanctions could reduce or increase Russia's contribution to global cybercrime. An assessment by Chester Wisniewski , Principal Research Scientist, Sophos. There is growing speculation in the cybersecurity community about how Russia's military offensive against Ukraine could impact online crime. Russia is becoming increasingly isolated, both by Russia itself and by foreign companies going out of business with the federation. The isolation is not only economic, but also digital in nature. Two major internet backbone operators have…

Read more

Report: When ransomware groups fight each other.

A ransomware attack is enough for most companies as a limit. But two at once is an apocalypse scenario, albeit quite exciting for security professionals. Sophos took a closer look at the rare case, which is also a clash of modern and traditional ransomware tactics. Sophos releases its research into a dual ransomware attack in which a ransom note from Karma ransomware operators was encrypted 24 hours later by the Conti Group. Conti, another ransomware community, was operating on the infected network at the same time. Karma group meets Conti group in the same network The Sophos analysts draw the dual attack in detail in…

Read more

Anonymous attacks Russian government websites
SophosNews

Hackers are also involved in the Ukraine crisis, and according to the latest reports, the Anonymous collective is targeting the Russian government websites, among others. Chester Wisniewski, Principal Security Scientist at Sophos, comments on recent actions and plans. “Anonymous is less a group than an idea. Historically, it inspired people to exercise vigilance on behalf of the wronged and oppressed. Therefore, whenever there is any sign of success against the “dark side”, followers are ready to give credit for such actions, be it a DDoS attack (Distributed Denial of…

Read more

Cyber ​​threats before the start of war: what can be learned from them?
Cyber ​​threats before the start of war: what can be learned from them?

Prior to the Russian attack on Ukraine, there were a number of cyber threats: Distributed Denial of Service (DDoS) attacks that sporadically disrupted Ukrainian government websites and financial services providers. What can we learn from history to be prepared? A timeline from 2007 to 2022. A commentary by Chester Wisniewski, Principal Research Scientist at Sophos. “All companies should always be prepared for attacks from all directions. But it can be helpful to know what to look for when the risk of an attack increases. I decided to tell the story of the well-known…

Read more