New hacker group uses LockBit ransomware variant to target Russian companies
https://therecord.media/new-hacker-group-lockbit-target-russia
#Infosec #Security #Cybersecurity #CeptBiro #HackerGroup #LockBit #RansomwareVariant #RussianCompanies
New hacker group uses LockBit ransomware variant to target Russian companies
https://therecord.media/new-hacker-group-lockbit-target-russia
#Infosec #Security #Cybersecurity #CeptBiro #HackerGroup #LockBit #RansomwareVariant #RussianCompanies
CrazyHunter Hacker Group Exploits Open-Source GitHub Tools to Target Organizations
https://gbhackers.com/crazyhunter-hacker-group-exploits-open-source-github-tools/
#Infosec #Security #Cybersecurity #CeptBiro #CrazyHunter #HackerGroup #Exploits #OpenSource #GitHubTools
XE Hacker Group Exploits VeraCore Zero-Day to Deploy Persistent Web Shells
https://thehackernews.com/2025/02/xe-hacker-group-exploits-veracore-zero.html
#Infosec #Security #Cybersecurity #CeptBiro #XE #HackerGroup #Exploits #VeraCore #ZeroDay #PersistentWebShells
APT32 Hacker Group Attacking Cybersecurity Professionals Poisoning GitHub
https://gbhackers.com/apt32-hacker-group-poisoning-github/
#Infosec #Security #Cybersecurity #CeptBiro #APT32 #HackerGroup #GitHub
Every IT manager's nightmare 😱
---
#Indonesia’s #NationalDataCenter has been compromised by a #HackerGroup asking for a $8 million ransom that the government says it won’t pay.
The #cyberattack has disrupted services of more than 200 #GovernmentAgencies at both the national and regional levels since last Thursday
Indonesia won’t pay an $8 million dollar ransom after a cyberattack compromised its national data center
https://apnews.com/article/indonesia-ransomware-attack-national-data-center-213c14c6cc69d7b66815e58478f64cee
Microsoft Faces Cybersecurity Breach as Russian-Sponsored Hacker Group Targets Executives' Email Accounts: https://www.reviewspace.info/microsoft-faces-cybersecurity-breach-as-russian-sponsored-hacker-group-targets-executives-email-accounts
#Microsoft #Cybersecurity #HackerGroup #Nobelium #MidnightBlizzard #EmailSecurity #DataBreach #TechnologyNews #SecurityNews #ReviewSpace
To mitigate the risks associated with such attacks, organizations are advised to enforce strong password policies, implement two-factor authentication (2FA), limit login attempts, monitor SSH traffic, and maintain up-to-date systems and software.
#Cybersecurity #Cyberattack #Cyberespionage #Netherlands #HackerGroup #SeaTurtle
The attackers utilized a combination of tools during the campaign, including an executable wiper (NACL.exe) requiring administrator privileges to erase data by removing the boot signature from the Master Boot Record (MBR).
#Cybersecurity #Cyberattack #Albania #NoJustice #Malware #HackerGroup
Kimsuky executes espionage campaigns through spear-phishing attacks, using malicious lure documents that, when opened, lead to the deployment of various malware families.
While Cloud Atlas focuses on espionage and stealing confidential information, the identity of the group’s sponsoring country remains unclear.
#Cybersecurity #Cyberattacks #HackerGroup #Ukraine #CloudAtlas #Russia
A report by the U.S. Department of Homeland Security’s Cyber Safety Review Board (CSRB) highlighted LAPSUS$’s use of SIM-swapping attacks to compromise victim accounts and infiltrate target networks.
The IT Army of Ukraine informed that it executed a distributed denial-of-service (DDoS) attack on Bitrix24’s systems, targeting the infrastructure supporting the company’s operations, including data centers and internal services.
#Cybersecurity #Cyberattack #Ukraine #Russia #HackerGroup #Bitrix24
One notable method involves exploiting vulnerabilities in outdated software applications, such as XML External Entity (XXE) flaws.
#Cybersecurity #Cyberthreat #HackerGroup #Malware
https://cybersec84.wordpress.com/2023/12/17/imperva-uncovers-8220-gangs-stealthy-tactics/
The threat involves leaking 533.1GB of data allegedly stolen from the center’s networks, with only thumbnails of select documents published so far.
#Cybersecurity #FredHutch #HackerGroup #CyberAttack #USA #HuntersInternational #Ransomware
Storm-0539 also gathers emails, contact lists, and network configurations, preparing for subsequent attacks against the same organizations.
#Cybersecurity #HackerGroup #Microsoft #Phishing #Scams #Storm0539
Exploitation of TeamCity typically results in code execution with high privileges, providing the SVR a strategic foothold in the network environment.
#Cybersecurity #APT29 #Cyberattacks #Russia #HackerGroup #TeamCity #Exploits
SiegedSec hacktivists, who previously claimed responsibility for breaches involving NATO and Atlassian, leaked the stolen human resources data on a hacking forum.
#Cybersecurity #USA #INL #DataBreach #Idaho #SiegedSec #HackerGroup
According to Microsoft, various threat actors, including Octo Tempest (also known as Scattered Spider), leveraged accounts provided by Storm-1152 to execute ransomware attacks, data theft, and extortion schemes.
#Cybersecurity #Microsoft #HackerGroup #Cybercrime #Storm1152
GambleForce distinguishes itself through its exclusive reliance on open-source tools like dirsearch, sqlmap, tinyproxy, and redis-rogue-getshell throughout different stages of its attacks.
#Cybersecurity #APAC #Cyberattacks #HackerGroup #SQLInjection #GambleForce
Moreover, the attackers have disclosed passport scans of Insomniac Games employees, including a former staff member who departed for Disney following termination two months ago.
#Cybersecurity #Cyberattack #Rhysida #HackerGroup #InsomniacGames
https://cybersec84.wordpress.com/2023/12/14/rhysida-group-claims-to-have-hacked-insomniac-games/