Ransomware News 2021 June -  Úvod  2020  2019  2018  0  1  2  3 


2021 - January  February  March  April  May  June  July  August  September  October  November  December 2021 - January February March April May June July August September October November December


6.2021New Spyro RansomwareVýsledek obrázku pro ransomwareAmigo-A found the new Spyro Ransomware that appends the .Spyro extension and drops the Decrypt-info.txt ransom note.
6.2021New STOP Ransomware variantVýsledek obrázku pro ransomwarePCrisk found a new STOP ransomware variant that appends the .ddsg extension.
6.2021What We Can Learn From Ransomware Actor "Security Reports"Výsledek obrázku pro ransomwareLuckily, some threat actors are more forthcoming. What follows are several case studies from real ransomware negotiations wherein the threat actor provided granular details on the full attack lifecycle, including usernames and passwords of compromised accounts and specific CVE’s leveraged to gain entry. Please note that these reports have not been edited or spell checked and that we redacted identifying information. Additionally, the tactics described by the threat actors herein were validated following thorough forensic investigation.
6.2021Binance exchange helped track down Clop ransomware money launderersVýsledek obrázku pro ransomwareCryptocurrency exchange service Binance played an important part in the recent arrests of Clop ransomware group members, helping law enforcement in their effort to identify, and ultimately detain the suspects.
6.2021Ransomware: Growing Number of Attackers Using Virtual MachinesVýsledek obrázku pro ransomwareSymantec has found evidence that an increasing number of ransomware attackers are using virtual machines (VMs) in order to run their ransomware payloads on compromised computers. The motivation behind the tactic is stealth. In order to avoid raising suspicions or triggering antivirus software, the ransomware payload will “hide” within a VM while encrypting files on the host computer.
6.2021New Dharma Ransomware variantVýsledek obrázku pro ransomwareJakub Kroustek found new Dharma Ransomware variants that append the .nmc or .ZEUS extension to encrypted files.
6.2021PYSA ransomware backdoors education orgs using ChaChi malwareVýsledek obrázku pro ransomwareThe PYSA ransomware gang has been using a remote access Trojan (RAT) dubbed ChaChi to backdoor the systems of healthcare and education organizations and steal data that later gets leveraged in double extortion ransom schemes.
6.2021Tulsa warns of data breach after Conti ransomware leaks police citationVýsledek obrázku pro ransomwareThe City of Tulsa, Oklahoma, is warning residents that their personal data may have been exposed after a ransomware gang published police citations online.
6.2021Clop ransomware is back in business after recent arrestsVýsledek obrázku pro ransomwareThe Clop ransomware operation is back in business after recent arrests and has begun listing new victims on their data leak site again.
6.2021New Rapid Ransomware variantVýsledek obrázku pro ransomwarednwls0719 found a new variant of the Rapid ransomware that appends the .snoopdog extension.
6.2021Healthcare giant Grupo Fleury hit by REvil ransomware attackVýsledek obrázku pro ransomwareBrazilian medical diagnostic company Grupo Fleury has suffered a ransomware attack that has disrupted business operations after the company took its systems offline.
6.2021Mysterious ransomware payment traced to a sensual massage siteVýsledek obrázku pro ransomware​A ransomware targeting an Israeli company has led researchers to track a portion of a ransom payment to a website promoting sensual massages.
6.2021ADATA suffers 700 GB data leak in Ragnar Locker ransomware attackVýsledek obrázku pro ransomwareThe Ragnar Locker ransomware gang have published download links for more than 700GB of archived data stolen from Taiwanese memory and storage chip maker ADATA.
6.2021Data leak marketplace pressures victims by emailing competitorsVýsledek obrázku pro ransomwareThe Marketo data theft marketplace is applying maximum pressure on victims by emailing their competitors and offering sample packs of the stolen data.
6.2021New ransomware targeting WD NAS devicesVýsledek obrázku pro ransomwareAmigo-A found a new ransomware called 0XXX that is encrypted Western Digital NAS devices and appending the .0xxx extension and dropping a ransom note named !0XXX_DECRYPTION_README.TXT.
6.2021New APIS WiperAPISGrujaRS found a wiper that pretends to be the APIS ransomware.
6.2021New STOP Ransomware variantVýsledek obrázku pro ransomwareLittleRedBean found a new STOP ransomware variant that appends the .sspq extension to encrypted files.
6.2021New STOP Ransomware variantVýsledek obrázku pro ransomwareGrujaRS found a new STOP ransomware variant that appends the .iqll extension to encrypted files.
6.2021LockBit RaaS In-Depth AnalysisVýsledek obrázku pro ransomwareThe PRODAFT Threat Intelligence (PTI) Team has published this report to provide in-depth knowledge about the threat actors who operate LockBit ransomware. The PTI Team has managed to extract decryption tools for most of the victims who were affected by the LockBit. All affiliates of the ransomware group, including the developer, were also identified during the investigation of the PTI Team. This report answers questions such as : How do they select their targets ? How many targets did they breach ? How does the network operate ? Who are the affiliates ?
6.2021Fake DarkSide gang targets energy, food industry in extortion emailsVýsledek obrázku pro ransomwareThreat actors impersonate the now-defunct DarkSide Ransomware operation in fake extortion emails sent to companies in the energy and food sectors.
6.2021Carnival Cruise hit by data breach, warns of data misuse riskVýsledek obrázku pro ransomwareIn December 2020, Carnival was hit by a second (previously undisclosed) ransomware attack with "investigation and remediation phases" still ongoing, according to a 10-Q form filed with the SEC in April 2021.
6.2021SCOOP: UnitingCare paid hundreds of thousands of dollars to REvil for decryption key and deletion of filesVýsledek obrázku pro ransomwareOn April 25, UnitingCare Queensland (UCQ) was the victim of a ransomware attack that impacted multiple Queensland hospitals and aged care centres. The next day, they posted a notice on their web site informing people as to what was happening and its impact. And on May 5, they posted a second update where they revealed that it was REvil (Sodinokibi) threat actors who had attacked them. That update described steps they had taken since the incident to safely recover and restore services.
6.2021MA: UMass Lowell closed due to cybersecurity incidentVýsledek obrázku pro ransomwareThe University of Massachusetts Lowell (UMass Lowell) has suffered a cybersecurity breach that has caused school closures for the past two days. The incident was first announced on June 15 as an “IT outage:”
6.2021South Korean police arrest computer repairmen who made and distributed ransomwareVýsledek obrázku pro ransomwareSouth Korean authorities have filed charges today against nine employees of a local computer repair company for creating and installing ransomware on their customers’ computers.
6.2021Ukraine arrests Clop ransomware gang members, seizes serversVýsledek obrázku pro ransomwareUkrainian law enforcement arrested cybercriminals associated with the Clop ransomware gang and shut down infrastructure used in attacks targeting victims worldwide since at least 2019.
6.2021Hades Ransomware Operators Use Distinctive Tactics and InfrastructureVýsledek obrázku pro ransomwareHades ransomware has been on the scene since December 2020, but there has been limited public reporting on the threat group that operates it. Secureworks® incident response (IR) engagements in the first quarter of 2021 provided Secureworks Counter Threat Unit™ (CTU) researchers with unique insight into the group’s use of distinctive tactics, techniques, and procedures (TTPs).
6.2021Updated Avaddon decryptor releasedVýsledek obrázku pro ransomwareEmsisoft released an updated Avaddon decryptor to support more victims.
6.2021Paradise Ransomware source code released on a hacking forumVýsledek obrázku pro ransomwareThe complete source code for the Paradise Ransomware has been released on a hacking forum allowing any would-be cyber criminal to develop their own customized ransomware operation.
6.2021Avaddon ransomware's exit sheds light on victim landscapeVýsledek obrázku pro ransomwareA new report analyzes the recently released Avaddon ransomware decryption keys to shed light on the types of victims targeted by the threat actors and potential revenue they generated throughout their operation.
6.2021Theoretically untouchable, but still struck down with AvaddonVýsledek obrázku pro ransomwareThe reasons for Avaddon's disappearance are not known at this point. Perhaps the international pressure had become too strong for the operators. Unless some errors have started to show a little too much.
6.2021Fujifilm resumes normal operations after ransomware attackVýsledek obrázku pro ransomwareJapanese multinational conglomerate Fujifilm says that it has resumed normal business and customer operations following a ransomware attack that forced it to shut the entire network on June 4.
6.2021G7 leaders ask Russia to hunt down ransomware gangs within its bordersVýsledek obrázku pro ransomwareG7 (Group of 7) leaders have asked Russia to urgently disrupt ransomware gangs believed to be operating within its borders, following a stream of attacks targeting organizations from critical sectors worldwide.
6.2021REvil ransomware hits US nuclear weapons contractorVýsledek obrázku pro ransomwareUS nuclear weapons contractor Sol Oriens has suffered a cyberattack allegedly at the hands of the REvil ransomware gang, which claims to be auctioning data stolen during the attack.
6.2021Negotiating Ransoms: When to Play and When to FoldVýsledek obrázku pro ransomwareAn interview with the CEO of Coveware, which negotiates payments on behalf of ransomware victims.
6.2021Ransomware attack hit Teamsters in 2019 — but they refused to payVýsledek obrázku pro ransomwareWhen the Teamsters were hit by a ransomware attack over Labor Day weekend in 2019, the hackers asked for a seven-figure payment.
6.2021Relentless REvil, revealed: RaaS as variable as the criminals who use iVýsledek obrázku pro ransomwareOne of the ransomware-as-a-service (RaaS) we encounter most frequently, known alternately as Sodinokibi or REvil, is as conventional a ransomware as we’ve seen: Its routines, configuration, and behavior what we’ve come to expect from a mature family that’s, obviously, well used in the criminal underground.
6.2021Avaddon ransomware shuts down and releases decryption keysVýsledek obrázku pro ransomwareThe Avaddon ransomware gang has shut down operation and released the decryption keys for their victims to BleepingComputer.com.
6.2021New Anubis ransomware variantVýsledek obrázku pro ransomwarexiaopao found a new Anubis ransomware variant that appends the .ChupaCabra extension.
6.2021New Vice Society ransomwareVýsledek obrázku pro ransomwareMichael Gillespie found a new Vice Society ransomware that appends the .v-society extension when encrypting Linux machines. Appears to be a spin-off of HelloKitty.
6.2021Foodservice supplier Edward Don hit by a ransomware attackVýsledek obrázku pro ransomwareFoodservice supplier Edward Don has suffered a ransomware attack that has caused the company to shut down portions of the network to prevent the attack's spread.
6.2021CD Projekt: Data stolen in ransomware attack now circulating onlineVýsledek obrázku pro ransomwareCD Projekt is warning today that internal data stolen during their February ransomware attack is circulating on the Internet.
6.2021JBS paid $11 million to REvil ransomware, $22.5M first demandedVýsledek obrázku pro ransomwareJBS, the world's largest beef producer, has confirmed that they paid an $11 million ransom after the REvil ransomware operation initially demanded $22.5 million.
6.2021New Ryuk impersonatorRyuk ransomware builderSecurity Joes found a .NET Ryuk impersonator that can be customized with a ransomware builder.
6.2021New HimalayA Ransomware-as-a-ServiceHimalayA RaaSRAKESH KRISHNAN found a new RaaS named HimalayA advertised on the darkweb.
6.2021Computer memory maker ADATA hit by Ragnar Locker ransomwareVýsledek obrázku pro ransomwareTaiwan-based leading memory and storage manufacturer ADATA says that a ransomware attack forced it to take systems offline after hitting its network in late May.
6.2021Fujifilm refuses to pay ransomware demand, restores network from backupsVýsledek obrázku pro ransomwareJapanese multinational conglomerate Fujifilm said it has refused to pay a ransom demand to the cyber gang that attacked its network in Japan last week and is instead relying on backups to restore operations.
6.2021US recovers most of Colonial Pipeline's $4.4M ransomware paymentVýsledek obrázku pro ransomwareThe US Department of Justice has recovered the majority of the $4.4 million ransom payment paid by Colonial Pipeline to the DarkSide ransomware operation.
6.2021New ransomware huntVýsledek obrázku pro ransomwareMichael Gillespie is looking for a ransomware that appends the .ramsome.encrypt(rsw).nat extension and drops a note named readme-instructions.txt. The ransomware turns files into password-protected RAR archives.
6.2021New Findnotefile ransomwareVýsledek obrázku pro ransomwareJirehlov Solace found a new Findnotefile ransomware variant that appends the .reddot extension.
6.2021New Evil Corp ransomware mimics PayloadBin gang to evade US sanctionsVýsledek obrázku pro ransomwareThe new PayloadBIN ransomware has been attributed to the Evil Corp cybercrime gang, rebranding to evade sanctions imposed by the US Treasury Department's Office of Foreign Assets Control (OFAC).
6.2021New variant of the BigLock ransomwareBigLock ransomwarednwls0719 found a new variant of the BigLock ransomware that appends the .nermer extension and drops a ransom note named PROTECT_INFO.TXT.