All Articles (2242)

Sort by

9546806300?profile=RESIZE_400xValyria malware is a trojan distributed by phishing email attacks seemingly targeting business emails, commonly using the words “Invoice,” “Order,” or “Report” in the subject line. 

Among these emails, there is a strong resurgence of tactics, techniques, and procedures (TTP’s) previously known to be employed by the Gorgon Group with the MasterMana Botnet.

Link to full technical report: TIR-21-224-001_Val.pdf

9546325898?profile=RESIZE_400xSecurity professionals have long wrestled with properly identifying rogue employees bent on crippling a company.  This was once evident in identifying stolen proprietary or classified paper documents for personal or professional gains – or some were just plain focused on outright revenge and destruction.  Now ‘everything’ is cyber related, yes everything, and thus cyber security meets with physical security, human resources (HR) and company management teams.  This lateral cooperation is a must i

9542922678?profile=RESIZE_400xRansomware-as-a-Service Operations Seek Affiliates for Extorting New Victims.  After a number of high-profile hits during 2021, some of the largest and most notorious ransomware operations disappeared. Beginning in May 2021, ransomware attacks by Russian-language groups Conti against Ireland's health service, DarkSide against U.S.-based Colonial Pipeline, and REvil against meat processing giant JBS and remote management software firm Kaseya led the Biden administration to try to better disrupt t

9542652101?profile=RESIZE_400xLloyd’s of London, for centuries the world’s dominant marine insurer, continues to witness sharp decline in premium volumes as lines on graph now cross with Asian economic giant.[1]  China is now the world’s second-largest provider of hull insurance, after overtaking Lloyd’s on market share, the International Union of Marine Insurance (IUMI) has confirmed.

China, which has seen its slice of the pie grow slowly but steadily in recent years, recorded a 12.4% share of 2020 global aggregate hull pre

9531793500?profile=RESIZE_400xThe US Securities and Exchange Commission (SEC) sanctioned eight financial firms for alleged failures related to cybersecurity policies and procedures, each stemming from email account takeovers and related incident response, the regulator announced on 01 September 2021.[1]

The sanctioned firms did not admit or deny the commission's findings, but "agreed to cease and desist from future violations of the charged provisions, to be censured and to pay a penalty," according to the SEC. Cumulative fi

9527212664?profile=RESIZE_400xActivity Summary - Week Ending 3 September 2021:
✓ Red Sky Alliance identified 31,051 connections from new unique IP addresses
✓ 6 unique email accounts Compromised with Keyloggers were observed this Week
✓ Analysts identified 134 new IP addresses participating in various Botnets
✓ PrintNightmare & Magniber
✓ Vulnerable Microsoft Exchange Servers
✓ SparklingGoblin
✓ FIN8 / Sardonic and the Financial Sector
✓ Transportation / Bangkok Airways
✓ Biometric Data / Afghanistan
✓ US Labor Day Warning
✓ The Best C

9524704494?profile=RESIZE_400xThe current US administration unveiled a new package of supply chain and critical infrastructure security initiatives on 25 August 2021.  This following a meeting at the White House with about 25 tech, banking, insurance, and infrastructure executives.   Little did the group know that an inexpensive solution has been available for 3 years:  Wapack Labs LLC - Introduces RedXray: Wapack Labs

The initiatives feature a pledge by several companies, including tech giants Microsoft, Google and IBM and

9519214680?profile=RESIZE_400xNew vulnerabilities have been discovered in Fortress S03 Wi-Fi Home Security System that could be potentially abused by a malicious party to gain unauthorized access with an aim to alter system behavior, including disarming the devices without the victim's knowledge.  The two unpatched issues, tracked under the identifiers CVE-2021-39276 (CVSS score: 5.3) and CVE-2021-39277 (CVSS score: 5.7), were discovered and reported by cybersecurity firm Rapid7 in May 2021 with a 60-day deadline to fix the

9518436491?profile=RESIZE_400xUS Government Cyber Warning Summary:

Immediate Actions You Can Take Now to Protect Against Ransomware

  • Make an offline backup of your data.
  • Do not click on suspicious links.
  • If you use RDP, secure and monitor it.
  • Update your OS and software.
  • Use strong passwords.
  • Use multi-factor authentication.

The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have observed an increase in highly impactful ransomware attacks occurring on US holidays and we

9514832086?profile=RESIZE_400xRed Sky Alliance wanted to share this important article from Technology Review and MIT.  As the Taliban swept through Afghanistan in mid-August, declaring the end of two decades of war, reports quickly circulated that they had also captured US military biometric devices used to collect data such as iris scans, fingerprints, and facial images.  Some feared that the machines, known as HIIDE, could be used to help identify Afghans who had supported coalition forces.[1]  

According to experts speaki

9504536062?profile=RESIZE_400xA threat actor is selling what they claim to be 30 million T-Mobile customers’ Social Security and driver license numbers on an underground web forum.  The collection is a subset of the purported 100 million records contained in stolen databases.  The seller’s offer does not mention T-Mobile.  The seller told Motherboard and BleepingComputer publications that the source is in fact the T-Mobile servers.  Specifically, they claim to have penetrated T-Mobile’s production, staging, and development s

9492348460?profile=RESIZE_400xActivity Summary - Week Ending 27 August 2021:

  • Red Sky Alliance identified 34,340 connections from new unique IP addresses
  • Analysts have observed 22 unique email accounts compromised with Keyloggers
  • Researchers identified 1,744 new IP addresses participating in various Botnets
  • DigitalOcean has a compromised IP
  • Grief Ransomware
  • IISerpent Malware
  • “Tricky” TrickBot
  • T-Mobile’s 5 Million Customers
  • US State Department hit
  • The Electric Grid and Zero Trust
  • India’s Election Fraud
  • Indiana’s COVID Cyber I

9481423482?profile=RESIZE_400xRansomware actors have taken a page from the playbooks of tech support scammers of yore by guiding victims to download malware using persuasion over the phone. The technique was first spotted in February, according to Palo Alto Networks' Unit 41 research unit. But Microsoft is issuing a fresh warning about the campaigns, contending they're much more dangerous than it first realized. Microsoft calls the campaign "BazaCall."

See:  https://redskyalliance.org/xindustry/ransomware-demand-answer-line-

9481416299?profile=RESIZE_400xA new Raccoon Stealer campaign shows the evolution of this information-stealer, which has recently been distributed through a dropper campaign to steal cryptocurrencies, cookies, and other types of information on target machines.

See:  https://redskyalliance.org/xindustry/raccoon-attack-exposes-secret-key

Sophos researchers have been tracking a "particularly active" campaign by attackers using Raccoon Stealer, a widely used information stealer. While the campaign is no longer active, researchers

9481405469?profile=RESIZE_400xOn 31 May 2021, a spokesperson for AllWorldCards published their first post on the cybercrime forum XSS announcing that they are open for business. Similar to the shops that have preceded them, AllWorldCards advertised shop links on deep web and Tor domains, a presence on cybercrime forums, and an accessible customer support email. Further, they have taken a cue from the major ransomware collectives, Lockbit and REvil, and sponsored an article competition on XSS dubbed “XSS Hot Summer.” The comp

9472347259?profile=RESIZE_400xYears ago, baby monitors were able to listen in on remote telephones in people’s homes.  This may still be the case, only in reverse.  Current baby monitors include interactive devises that allow parent to both listen and watch their precious little one.  They can even talk to their babies remotely.  That is very cool, but it may come with vulnerabilities.

Many variants of smart devices have been identified as being at risk from cyber intrusion.  Devices of concern include security cameras, DVRs

9465793865?profile=RESIZE_400xA new twist on an old con; remember all the Nigerian Princes who wanted to share their fortune with you, if only you would only send them your bank account number?  Nigerian threat actor has been observed attempting to recruit employees by offering them to pay $1 million in bitcoins to deploy Black Kingdom ransomware on companies' networks as part of an insider threat scheme.

"The sender tells the employee that if they're able to deploy ransomware on a company computer or Windows server, then th

9450988701?profile=RESIZE_400xActivity Summary - Week Ending 20 August 2021:

  • Red Sky Alliance observed 21 unique email accounts compromised with Keyloggers
  • Beware of vadmin-vad05
  • Analysts have identified 24,404 connections from new unique IP addresses
  • 2,573 new IP addresses participating in various Botnets were seen this past week
  • APT31
  • APT Attack / Kimsuky
  • APT1 - Common Crew
  • Darkside and BlackMatter (a Hive connection?)
  • Defense Industrial Base (DIB) / Israel
  • Health Care / US, Ohio
  • Indra / Hackers Behind Recent Attacks on I

9446943067?profile=RESIZE_400xAn emerging information-stealing malware, sold and distributed on underground Russian underground forums has been written in Rust, is signaling a new trend where threat actors are increasingly adopting exotic programming languages to bypass security protections, evade analysis, and hamper reverse engineering efforts.  Rust is a multi-paradigm, high-level, general-purpose programming language designed for performance and safety, especially safe concurrency.  Rust is syntactically similar to C++ b

9443096891?profile=RESIZE_400xThe Empire PowerShell toolkit is an open-source exploitation toolkit/framework similar to Metasploit, differing in its use of PowerShell scripts. The project was released on 30 October 2015 and was discontinued on 31 July 31, 2019. According to their website and GitHub information, “The framework offers cryptographically secure communications and flexible architecture. On the PowerShell side, Empire implements the ability to run PowerShell agents without needing powershell.exe, rapidly deployabl