All Articles (2719)
“Oh Romeo, Romeo wherefore art thou Romeo?” The FBI is warning the public that a massive spike of online romance scams this year caused many Americans to lose more than $113 million since the start of 2021. The scammers behind this type of online fraud trend (also known as confidence fraud) which can lead to significant financial losses and devastating emotional scars use fake online identities to gain potential victims' trust on dating or social media platforms.
After the victims are lured in
What if three disgruntled employees left your organization and took top secret information to a competing company? What repercussions would follow and how would it impact your business? In many cases, there would be a lawsuit. In this case, there was federal prosecution and a cybersecurity threat.
The US Department of Justice (DOJ) released a shocking statement on 16 September 2021, which explains the scenario at the federal level. Three men, who formerly worked for the US intelligence communi
Activity Summary - Week Ending 17 September 2021:
- Red Sky Alliance identified 37,866 connections from new unique IP addresses
- Analysts identified 765 new IP addresses participating in various Botnets
- Compromised IP: 107.172.100.248
- Is it REvil or is it the Feds?
- BazarLoader
- QakBot
- BlackMatter and Cameras?
- Grayfly – an Arm of APT41
- EasyJet in the Crosshairs
- Just Who’s Winning the Cyber War?
- Tiananmen Square Memorials
Link to full report: IR-21-260-001_weekly_260.pdf
Working from home is a new work environment that will be with many employees and companies for years. Since 2020 when the COVID-19 lockdowns began, cybercrime has increased drastically, and remote working has presented huge challenges and higher risks for many organizations. The surge of COVID-19 cases driven by new variants has challenged many companies to quickly devise long-term hybrid work models that meet the needs of their businesses and employees. The term hybrid has been coined as ther
On 17 September 2021, while developing additional tools for our Red Pane Dark Web collections, we discovered a new ransomware attack posted by Conti against Amax. A company that makes and installs storage and server solutions for businesses.
As displayed by this table, our new tool allows faster discovery of ransomware infections, alerting us about the new post within 2 minutes of it being live.
This gives our Red Pane tool a near real-time detection rate of new ransomware infections. Red Pane
Our friends from Kelly Blue Book are explaining that “everything about the way you buy a car is changing.” The auto industry is changing so rapidly and so thoroughly that it may even alter the town where you live.
Car dealerships have begun consolidating under the control of nationwide companies, and their vision for what car shopping may look like in just a few years is radically different than the experience you’re used to.
How did we get here, and where are we going? And what vulnerabilitie
US Securities and Exchange Commission Chairman Gary Gensler testified before the Senate last week and again called for comprehensive cryptocurrency regulations, citing a need to reduce cybersecurity risks, other market risks, and criminal efforts to defraud investors, all while advancing the assets. Appearing before the Senate Banking Committee, Gensler defended the SEC's ability to enforce securities laws against cryptocurrency companies, although several Republican lawmakers cited a "lack of
Insider threats are of serious concern for all businesses. Former or recently terminated employees add a much higher level of risk for theft, destruction, or release of company data. A former credit union employee is now facing a ten (10) prison sentence after pleading guilty to destroying large amounts of corporate data in revenge for being fired.
This former employee who lives in Brooklyn NY, pleaded guilty in the US Eastern District Court recently, admitting to one count of computer intrus
Eventually, everyone need help with their heating and air conditioning (HVAC) units. Most technicians are trustworthy and do a great job. The bad news is that more than 9 out of 10 (91%) industrial organizations are vulnerable to cyber-attacks, according to a new report by Positive Technologies. The study found that external attackers can penetrate the corporate network in all these organizations, and once inside, can obtain user credentials and complete control over the infrastructure in 100
I found this in my Inbox this morning. I think the only truthful piece of information included - is that Mary Beth Leonard actually is the current US Ambassador to Nigeria.
See: Ambassador Mary Beth Leonard | U.S. Embassy & Consulate in Nigeria (usembassy.gov)
This one fact shows that the criminal involved has done some homework for his scam. I am always amused by the mis-use of words in the text of theses “kind offers,” such as using the word “missing” instead of “mincing.” There are too
In the Real Estate business, the most sought after properties have location, location and location as their attraction. Thinking as a criminal what is on their “Wish List?” How do they rate the ideal ransomware target? Cyber threat investigators calim the following attributes add up to the best targets: revenue, size, geography and level of access help determine sale price for access. The most sought-after type of victim for ransomware-wielding attackers is a large, U.S. based business with at l
Since early in 2020, when the COVID-19 lockdowns began, cybercrime has increased significantly and remote working has produced major cyber security challenges and higher risks for many businesses and organizations. The surge of CV-19 cases driven by new variants has challenged many companies to quickly devise long-term hybrid work models that meet the needs of their businesses and employees. The term hybrid has been coined as there are many degrees from total office attendance to total at home
Our friends at several cyber media outlets are reporting that the operators behind the REvil ransomware-as-a-service (RaaS) is back. In a surprise return, REvil reappeared after a two-month break following the widely publicized attack on technology services provider Kaseya on 4 July 2021. In fact, Red Sky Alliance analysts observed its return this past week.
Two of the dark web portals, including the gang's Happy Blog data leak site and its payment/negotiation site, have reappeared online, wit
Activity Summary - Week Ending 10 September 2021:
- Red Sky Alliance identified 47,398 connections from new unique IP addresses- Sinkholes
- Analysts identified 1,034 new IP addresses participating in various Botnets
- 4 unique email accounts compromised with Keyloggers were used to log into Personal Accounts
- Sality Malware Variant seen 42252 times this past week
- Hive Ransomware Alert
- STRRAT RAT
- FIN7 again
- Microsoft and $20 billion in Cyber Security
- South Korea and TrickBot Arrest
- To SOAR, or to SIEM
Did you ever wonder how a can of green beans gets to the shelf of your supermarket? Well, from planting the seeds, harvesting the crop, canning the beans, and pushing them to market – is all called the ‘Food Supply Chain.’ Now cyber-attackers are targeting our food supply chain and the Jolly Green Giant ain’t so happy.
The US Federal Bureau of Investigation (FBI) has issued a new alert on 06 September 2021 warning companies in the food and agricultural sector that they are increasingly at risk
A new twist on an old con; remember the Nigerian Princes who wanted to share their fortune with you - if only you would only send them your bank account number? A Nigerian threat actor has been observed attempting to recruit employees by offering them to pay $1 million in Bitcoins to deploy Black Kingdom ransomware on companies' networks as part of an insider threat scheme.
"The sender tells the employee that if they're able to deploy ransomware on a company computer or Windows server, then the
Valyria malware is a trojan distributed by phishing email attacks seemingly targeting business emails, commonly using the words “Invoice,” “Order,” or “Report” in the subject line.
Among these emails, there is a strong resurgence of tactics, techniques, and procedures (TTP’s) previously known to be employed by the Gorgon Group with the MasterMana Botnet.
Link to full technical report: TIR-21-224-001_Val.pdf
Security professionals have long wrestled with properly identifying rogue employees bent on crippling a company. This was once evident in identifying stolen proprietary or classified paper documents for personal or professional gains – or some were just plain focused on outright revenge and destruction. Now ‘everything’ is cyber related, yes everything, and thus cyber security meets with physical security, human resources (HR) and company management teams. This lateral cooperation is a must i
Ransomware-as-a-Service Operations Seek Affiliates for Extorting New Victims. After a number of high-profile hits during 2021, some of the largest and most notorious ransomware operations disappeared. Beginning in May 2021, ransomware attacks by Russian-language groups Conti against Ireland's health service, DarkSide against U.S.-based Colonial Pipeline, and REvil against meat processing giant JBS and remote management software firm Kaseya led the Biden administration to try to better disrupt t