create account

Cybercriminals seeking more than just ransomware payment by yehey

View this thread on: hive.blogpeakd.comecency.com
· @yehey ·
$2.25
Cybercriminals seeking more than just ransomware payment
US and UK Expose New Malware Used by MuddyWater Hackers
This is expected as we continue to see the ongoing conflict between Russia and Ukraine.
 
“US and UK cybersecurity and law enforcement agencies today shared information on new malware deployed by the Iranian-backed MuddyWatter hacking group in attacks targeting critical infrastructure worldwide.

<a href="https://que.com"><img src="https://que.com/wp-content/uploads/2022/02/pexels-photo-5380678.jpeg"></a>
Source: https://QUE.com

This was revealed today in a joint advisory issued by CISA, the Federal Bureau of Investigation (FBI), the US Cyber Command’s Cyber National Mission Force (CNMF), UK’s National Cyber Security Centre (NCSC-UK), and the National Security Agency (NSA).”

continue to read: https://www.bleepingcomputer.com/news/security/us-and-uk-expose-new-malware-used-by-muddywater-hackers/

U.S. Banks Are Prepared for Russia Sanctions
U.S. financial institutions are largely prepared to handle a new round of Russia-related sanctions in the wake of the invasion of Ukraine, given the steady ratcheting up of pressure against Russia over the past eight years and recent warnings of such measures from the Biden administration, according to experts with knowledge of the U.S. banking sector.

The expanding conflict, however, will present some additional challenges for U.S. banks, from how they manage their correspondent banking relationships to possible retaliatory cyberattacks deriving from Russia.

continue reading: https://www.wsj.com/articles/u-s-banks-are-prepared-for-russia-sanctions-but-concerns-grow-about-potential-hacks-11645743246

Data wiper attacks on Ukraine were planned at least in November and used ransomware as decoy
Yesterday, researchers from cybersecurity firms ESET and Broadcom’s Symantec discovered a new data wiper malware that was employed in a recent wave of attacks that hit hundreds of machines in Ukraine.

A tweet from ESET revealed that the company’s telemetry shows the presence of the wiper, tracked as “HermeticWiper” (aka KillDisk.NCV), on hundreds of machines in the country. According to the security firm, the infections followed the DDoS attacks against several Ukrainian websites, including Ministry of Foreign Affairs, Cabinet of Ministers, and Rada.

continue reading: https://securityaffairs.co/wordpress/128361/malware/ukraine-ransomware-decoy-wiper.html

Strategies for complying with multiple data privacy regimes
Your company will be held to treating the personally identifiable information (PII) it collects with respect, storing it securely, and not using it for purposes other than what was disclosed.

These are common-sense data privacy protections that, coincidentally and conveniently, are also requirements of laws like the European Union’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA).

continue reading: https://www.complianceweek.com/data-privacy/strategies-for-complying-with-multiple-data-privacy-regimes/31367.article

Cybercriminals seeking more than just ransomware payment
Venafi announced the findings of a global survey of IT decision-makers looking into the use of double and triple extortion as part of ransomware attacks. The data reveals that 83% of successful ransomware attacks now include alternative extortion methods, such as using the stolen data to extort customers (38%), exposing data on the dark web (35%), and informing customers that their data has been stolen (32%). extortion ransomware attacks

Just 17% of successful attacks solely asked for a ransom in return for a decryption key, meaning that many new forms of extortion are now more common than traditional methods. As data is now being exfiltrated, having a back-up of data – while still essential for recovery from an attack – is no longer effective for containing a breach.

continue reading: https://www.helpnetsecurity.com/2022/02/25/extortion-ransomware-attacks/

IT leadership: Your first 90 Days as CIO
One of the most rewarding experiences you can have as a CIO is successfully transforming an IT organization to make a significant impact on an organization. This is one reason most CIOs accept a new opportunity: to embrace the challenge of taking a company to the next level.

Your first 90 days as a new CIO are extremely important. You’ll have the attention of executive leadership and an open runway to chart a new course for IT and the company. To do this, you need to define an IT strategy and execution plan.

continue reading: https://enterprisersproject.com/article/2022/2/it-leadership-your-first-90-days-cio

Putin Warns Russian Critical Infrastructure to Brace for Potential Cyber Attacks
The Russian government on Thursday warned of cyber attacks aimed at domestic critical infrastructure operators, as the country’s full-blown invasion of Ukraine enters the second day.

In addition to cautioning of the “threat of an increase in the intensity of computer attacks,” Russia’s National Computer Incident Response and Coordination Center said that the “attacks can be aimed at disrupting the functioning of important information resources and services, causing reputational damage, including for political purposes.”

continue reading: https://thehackernews.com/2022/02/putin-warns-russian-critical.html

Fears Rise of Potential Russian Cyberattacks on US, Allies Over Sanctions
Tension is mounting over the potential for Russia’s cyberattacks in Ukraine to spread to organizations in the US and other countries that have imposed economic and other sanctions on Russia over its invasion of Ukraine this week.

The fears are being fueled both by recent precedent and by the nature of the malicious activity directed at organizations in Ukraine over the past several weeks and months by cyber threat actors believed to be affiliated with the Russian government.

continue reading: https://www.darkreading.com/attacks-breaches/fears-rise-of-potential-russian-cyberattacks-on-us-allies-over-sanctions

UK urges businesses to bolster online defences
The threat of cyberattacks against Ukraine and countries opposed to Russia’s invasion of its neighbour prompted National Cyber Security Centre (NCSC) to issue a call Monday for UK businesses and other entities to strengthen their cyber resilience.

In a posting on its website, the NCSC said while it was not yet aware of any current specific threats to UK businesses and other entities stemming from the Ukraine conflict, organisations should be taking steps to lower their risk of falling victim to a cyberattack.

continue reading: https://www.fm-magazine.com/news/2022/feb/uk-urges-businesses-bolster-online-defences.html

Zenly Social-Media App Bugs Allow Account Takeover
A pair of bugs in the Snap-owned tracking app reveal phone numbers and allow account hijacking.

Zenly, a social app from Snap that allows users to see the locations of friends and family on a live map, contains a pair of vulnerabilities that could endanger those being tracked.

According to the Checkmarx Security Research Team, the bugs are a user-data exposure vulnerability and an account-takeover vulnerability. Both have been patched, and users should upgrade their apps to the latest version to avoid compromise.

continue reading: https://threatpost.com/zenly-bugs-account-takeover/178646/

More Cyber Security News at https://que.com/tag/cybersecurity

Thank you for reading. Stay safe and stay healthy.
@Yehey [ Witness ]



---

<center><sub>Posted via [Onlinebuzz.com](https://onlinebuzz.com/@yehey/cybercriminals-seeking-more-than-just-ransomware-payment)</sub></center>
👍  , , , , , , , , , , , , , , , , , , , , , , , , , ,
properties (23)
authoryehey
permlinkcybercriminals-seeking-more-than-just-ransomware-payment
categorycybersecurity
json_metadata{"tags":["cybersecurity","ransomware","malware","russia","ukraine","putin","invasion","yehey","hive","onlinebuzz"],"users":["yehey"],"image":["https://que.com/wp-content/uploads/2022/02/pexels-photo-5380678.jpeg"],"links":["https://que.com"],"app":"onlinebuzz/0.1","format":"markdown","canonical_url":"https://onlinebuzz.com/@yehey/cybercriminals-seeking-more-than-just-ransomware-payment"}
created2022-02-25 19:30:39
last_update2022-02-25 19:30:39
depth0
children3
last_payout2022-03-04 19:30:39
cashout_time1969-12-31 23:59:59
total_payout_value1.132 HBD
curator_payout_value1.118 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length7,593
author_reputation22,184,787,552,504
root_title"Cybercriminals seeking more than just ransomware payment"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id110,808,094
net_rshares1,825,931,669,756
author_curate_reward""
vote details (27)
@gangstalking ·
The people doing V2K want me to believe it is this lady @battleaxe Investigate what she has been up to for 5 years. Its the next step to stopping this. Make her prove where she has been for 5 years or where she is now. She is involved deeply with @fyrstikken and his group. Her discord is Battleaxe#1003. I cant say she is the one directly doing the v2k. Make her prove it. They have tried to kill me and are still trying to kill me. I bet nobody does anything at all. Make @battleaxe prove it. I bet she wont. They want me to believe the v2k in me is being broadcasted from her location. @battleaxe what is your location? https://ecency.com/fyrstikken/@fairandbalanced/i-am-the-only-motherfucker-on-the-internet-pointing-to-a-direct-source-for-voice-to-skull-electronic-terrorism
👎  
properties (23)
authorgangstalking
permlinkre-yehey-cybercriminals-seeking-more-than-just-ransomware-payment-20220225t193046682z
categorycybersecurity
json_metadata{"app":"hive-bot/0.6.3"}
created2022-02-25 19:30:48
last_update2022-02-25 19:30:48
depth1
children0
last_payout2022-03-04 19:30:48
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length780
author_reputation-67,597,107,868,724
root_title"Cybercriminals seeking more than just ransomware payment"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id110,808,100
net_rshares-2,763,978,126
author_curate_reward""
vote details (1)
@investinthefutur ·
@mima2606 denkt du hast ein Vote durch @investinthefutur verdient!<br>@mima2606 thinks you have earned a vote of @investinthefutur !<br>
👍  
properties (23)
authorinvestinthefutur
permlinkre-cybercriminals-seeking-more-than-just-ransomware-payment-20220226t030945z
categorycybersecurity
json_metadata"{"app": "beem/0.24.26"}"
created2022-02-26 03:09:45
last_update2022-02-26 03:09:45
depth1
children0
last_payout2022-03-05 03:09:45
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length136
author_reputation135,582,340,662,024
root_title"Cybercriminals seeking more than just ransomware payment"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id110,816,767
net_rshares259,442,674
author_curate_reward""
vote details (1)
@mima2606 ·
very interesting News and good links

Greetings Michael

!invest_vote
👍  
properties (23)
authormima2606
permlinkre-yehey-r7w61v
categorycybersecurity
json_metadata{"tags":["cybersecurity"],"app":"peakd/2022.02.6"}
created2022-02-26 03:08:18
last_update2022-02-26 03:08:18
depth1
children0
last_payout2022-03-05 03:08:18
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length69
author_reputation178,748,423,282,323
root_title"Cybercriminals seeking more than just ransomware payment"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id110,816,750
net_rshares259,459,010
author_curate_reward""
vote details (1)