All Articles (338)

8060148074?profile=RESIZE_400xRansomware attacks remain the top cyber-enabled threat seen by law enforcement agencies.  But phishing campaigns, business email compromises, and other types of fraud that are now using COVID-19 themes are increasing.  Red Sky Alliance has members, clients, and readers from around the world and this article has been written from the European Union viewpoint, which actually applies internationally to global defense against cyber-crimes.  Our source is the seventh annual Internet Organized Crime T

8060004884?profile=RESIZE_400xIn June 2015, the US Office of Personnel Management (OPM) announced that it had been the target of a data breach targeting the records of as many as four million people.  The final estimate of the number of people impacted is 22.1 million.  This includes records of people who had undergone background checks, as well as their friends and family, many of whom were not government employees.  It has been described by federal officials as among the largest breaches of government data in the history o


8051471253?profile=RESIZE_400xNYANxCAT is a prolific hacker who programs new pieces and versions of malware, shares it widely, and records blackhat hacker educational YouTube videos which has over 150,000 views.  He uses GitHub repository, sells his hacker tools and services using PayPal and Bitcoin.  In this report, we discuss some of the samples of NYANXCat malware, his business models, and possible Kuwaiti identity.

(Figure 1. NYANxCAT GitHub logo)


NYANxCAT Hacker Profile

Name:         possible name: Hmoud [Hu

8042433884?profile=RESIZE_400xSMB’s Need to Prepare for Today and Tomorrow’s Cyber Threats

The cybersecurity landscape presents new challenges at businesses - every day.  Please be aware of these 10 threats to help your business avoid a major attack or breach.  When it comes to securing your network, software, and data from potential attackers, Small to Midsize Businesses (SMBs) have numerous concerns.

Security for increasingly mobile and online-focused businesses is a multifaceted problem, especially for SMBs that lack the

8041670677?profile=RESIZE_400xActivity Summary - Week Ending 16 October 2020:

  • Red Sky Alliance identified 52,441 connections from new unique IP addresses
  • Analysts observed 159 unique email accounts compromised with Keyloggers
  • 2,640 new IP addresses were observed participating in various Botnets
  • SlothfulMedia
  • New Dridex Malware Campaign
  • Mobile Money being attacked in the retail world in Africa
  • Securing Your Cell Enterprise against Retail Attacks
  • Sam's West, Inc. Retail Giant - Analysis
  • No Justice, No Peace at Sam’s Club
  • Star

8041648453?profile=RESIZE_400xMicrosoft collaborated with cybersecurity companies and government agencies to take down the million-device Trickbot botnet to help protect the November 3rd US Presidential election and stop the global spread of ransomware and other malware. The botnet has been used to distribute a variety of malicious code, including the Ryuk ransomware variant, which the US government has cited as a potential threat vector against the election. 

Microsoft obtained a court order from the US District Court, East

8039528689?profile=RESIZE_400xResearchers recently discovered the ‘WarezTheRemote’ attack, which affects Comcast’s XR11 voice remote control.  This security flaw allows cyber attackers to remotely snoop in on victims’ private conversations was is found to stem from an unexpected device, their TV remotes.  Huh?

The flaw stems from Comcast’s XR11, a popular voice-activated remote control for cable TV, which has more than 18 million units deployed across the US.  The remote enables users to say the channel or content they want

8038692495?profile=RESIZE_400xA newly identified group of financially motivated hackers, likely based in a Russian-speaking country, has been running high-volume phishing, ransomware, and extortion campaigns in the United States, Germany, and many other countries for the last four years, using the Clop ransomware and various backdoors in their operations.

Researchers at Mandiant have been tracking the group since 2016 and have responded to a number of intrusions in which the group, known as FIN11, has used initial access to

8035933500?profile=RESIZE_400xA new ransomware has emerged online threatening Android security.  This new malware triggers on an infected phone as soon as the victim presses the Home key. Researchers at Microsoft are warning about a new strain of mobile ransomware that takes advantage of incoming call notifications and Android's Home button to lock the device behind a ransom note.

The findings concern a variant of a known Android ransomware family called, "MalLocker.B" which has resurfaced with new techniques.  This malware

8035786096?profile=RESIZE_400xA US digital marketing provider has exposed almost three million records containing personally identifiable information (PII) after another cloud configuration mistake.  The privacy snafu at Friendemic, whose main clients are reportedly US car dealerships, was discovered by Aaron Phillips at Comparitech.  As is usual in these cases, the unencrypted data was left exposed to the public Internet with no password or authentication required to access it.  Research earlier this year found that misconf

8032283654?profile=RESIZE_400xEven simple things in life, like using a Fitbit watch, can be turned into a hacking tool.   While you are losing pounds, you could also be losing your personal, private and financial information.  During these uncertain months of the pandemic, working out seemed like a harmless activity and a way to keep in shape.  Red Sky Alliance wants to thank Becky Bracken for her report as follows:

An Immersive Labs Researcher took advantage of lax Fitbit privacy controls to build a malicious spyware watch

8031757487?profile=RESIZE_400xPalmerworm, an advanced persistent threat (APT) group, has been active since 2013 and is engage in cyber espionage campaigns that target organizations in the US, East Asia, particularly Taiwan, and occasionally Japan and Hong Kong.  Palmerworm hackers are using new customized malware as well as ‘living off the land’ techniques manipulating tools and commands already built into an operating system for malicious purposes.

This APT group, also known as BlackTech, has conducted long-term espionage c

8018535676?profile=RESIZE_400xA US Treasury Department advisory was issued on 1 October 2020 and strongly warned that financial institutions, cyber insurance firms, and others that facilitate a ransom payment after a ransomware attack ‘could’ face federal penalties.[1]  But the warning is not a sure sign of a looming enforcement effort, some cybersecurity experts say.

Charles Carmakal, senior vice president and CTO with FireEye Mandiant, calls ransomware "the most significant and prevalent cybersecurity threat facing corpora

Comments: 0

8017517867?profile=RESIZE_400xThough very tempting to get out of the house and conduct “work to home” (WTH) in a nice and quiet hotel room, this practice is fraught with dangers that need discussing.  Red Sky Alliance can help with current and past cyber reporting, as we have been collecting, analyzing, and documenting cyber threats for 9 years and maintains a resource library of malware and cyber actor reports. 

The installation, updating and monitoring of firewalls, use of a virtual private network (VPN), and proper user t

8017493285?profile=RESIZE_400xActivity Summary - Week Ending 9 October 2020:

  • Red Sky Alliance analysts identified 2,258 new IP addresses participating in various Botnets
  • Analysts observed 28 unique email accounts compromised with keyloggers
  • Red Sky Alliance identified 45,867 connections from new unique IP addresses
  • Finspy Malware Part 2
  • MoDi RAT Leverages OneDrive Cloud Storage
  • Microsoft DDR
  • Nobel and Chevron
  • Denmark and Nord Stream 2
  • Russia ups oil Output
  • Armenia and Azerbaijan still at it, compromising oil pipelines
  • Norwa

8018557471?profile=RESIZE_400xA ransomware vaccine, called "Raccine," was released as an open source tool by Nextron Systems on 3 October 2020.  Raccine prevents ransomware from attacking vssadmin.exe, a Windows utility that manages shadow copies of a Windows system's data.  Threat actors can take advantage of vssadmin.exe to delete shadow volumes in Windows so that ransomware victims cannot restore their data from local backups.

"We see ransomware delete all shadow copies using vssadmin pretty often," post in the GitHub tex

Comments: 0

The US Federal Bureau of Investigation (FBI) is warning organizations in the financial sector about an increase in botnet-launched credential stuffing attacks.  Many of these attacks, which target APIs, are being fed by billions of stolen credentials leaked over the last several years. 


Credential stuffing is a type of cyberattack where stolen account credentials typically consisting of lists of usernames and/or email addresses and the corresponding passwords are used to gain unauthorized acces

8011615880?profile=RESIZE_400xOur friends from the US Department of Homeland Security have provided an open source Threat Assessment for October 2020 - which is Cyber Security Awareness Month.  The following is the Cyber Threat Assessment Section. 

Cyber threats to the Homeland from both nation-states and non-state actors will remain acute. U.S. critical infrastructure faces advanced threats of disruptive or destructive cyber-attacks. Federal, state, local, tribal and territorial governments, as well as the private sector, w

8011196853?profile=RESIZE_400xThroughout the USA, State and County election computer networks are still vulnerable to cyber-attacks and Election Day is only 29 days.  In a little-noticed episode in 2016, an unusual number of voters in Riverside, California, complained that they were turned away at the polls during the primary because their voter registration information had been changed.

The Riverside County district attorney, Mike Hestrin, investigated and determined that the voter records of dozens of people had been tampe