The au Domain Administration, the organisation that administers the Australian domain namespace, says it has found no evidence of a breach that was notified to it on Friday afternoon.
“auDA was alerted to an alleged data breach this afternoon,” the organisation said in a statement.
“We are investigating the allegation. We have so far found no evidence of such a breach. We will provide an update as soon as we have more information.”
A Windows ransomware group going by the name NoEscape claimed on 11 August to have breached auDA’s site.
|
In a notice posted on its site on the dark web, the group claimed to have stolen more than 15 GB of data during the alleged intrusion.
These were claimed to include “powers of attorney and legal documents with seals, passports, personal data, medical reports, loan repayment, dismissal documents, declarations, death certificates, access to customer bank accounts (name pw bsb acc nmbr…), taxes, projects, and much more confidential information”.
None of this data has been posted on the site. The group has asked auDA to make contact and negotiate what is presumably a ransom.
NoEscape is a fairly recent arrival on the Windows ransomware scene, according to the security firm SentinelOne, which said it had been first noticed in May 2023.
The company said it operated on a ransomware-as-a-service model. “The developers of NoEscape claim to have built the malware and its supporting infrastructure from scratch; notably opting not to incorporate source code or leaks from other known ransomware families,” SentinelOne said.
“Currently, NoEscape RaaS operators provide affiliates with a platform to build and manage payloads for both Windows and Linux.”
NoEscape appears to have originated in one of the countries belonging to the former Soviet Union, given that operators appear to avoid targeting entities in the Commonwealth of Independent States, a “free association of sovereign states that was formed in 1991 by Russia and 11 other republics that were formerly part of the Soviet Union”, according to the Encyclopedia Brittanica.
GARTNER MARKET GUIDE FOR NDR 2022
You probably know that we are big believers in Network Detection and Response (NDR).
Did you realise that Gartner also recommends that security teams prioritise NDR solutions to enhance their detection and response?
Picking the right NDR for your team and process can sometimes be the biggest challenge.
If you want to try out a Network Detection and Response tool, why not start with the best?
Vectra Network Detection and Response is the industry’s most advanced AI-driven attack defence for identifying and stopping malicious tactics in your network without noise or the need for decryption.
Download the 2022 Gartner Market Guide for Network Detection and Response (NDR) for recommendations on how Network Detection and Response solutions can expand deeper into existing on-premises networks, and new cloud environments.
DOWNLOAD NOW!
PROMOTE YOUR WEBINAR ON ITWIRE
It’s all about Webinars.
Marketing budgets are now focused on Webinars combined with Lead Generation.
If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.
The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.
Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.
We look forward to discussing your campaign goals with you. Please click the button below.
MORE INFO HERE!