Microsoft has recently identified a threat actor known as Storm-0501 targeting government, manufacturing, transportation, and law enforcement sectors in the United States (US) in a cloud ransomware attack campaign. In this article, we’ll dive into the details of the campaign and determine how such attacks are carried out. Let’s begin! Cloud Ransomware Attack Campaign Hacker...Read More
A critical vulnerability in Veeam Backup & Replication software, identified as CVE-2024-40711, is being exploited by hackers to deploy ransomware. The vulnerability, which allows for unauthenticated remote code execution (RCE), was reported by Florian Hauser with CODE WHITE Gmbh and has been tracked by Sophos X-Ops MDR and Incident Response.
Over the past month,...Read More
Axis Health System, a nonprofit healthcare organization based in Colorado, has reportedly fallen victim to a cyberattack by the notorious Rhysida ransomware group. Established in 1960, Axis Health System provides integrated healthcare services to residents of Southwest and Western Colorado, offering a range of medical, behavioral, and dental care services.
The Rhysida ransomware group...Read More
Published On : 2024-10-11 Ransomware of the Week CYFIRMA Research and Advisory Team would like to highlight ransomware trends and insights gathered while monitoring various forums. This includes multiple – industries, geography, and technology – which could be relevant to your organization. Type: RansomwareTarget Technologies: MS Windows IntroductionCYFIRMA Research and Advisory Team has found Moon...Read More
Executive Summary In July 2024, researchers from Palo Alto Networks discovered a successor to INC ransomware named Lynx. Since its emergence, the group behind this ransomware has actively targeted organizations in various sectors such as retail, real estate, architecture, and financial and environmental services in the U.S. and UK. Lynx ransomware shares a significant portion...Read More
– Advertisement – The rise in successful ransomware attacks is not necessarily the result of cybercriminals employing significantly more advanced techniques. Instead, many organisations worldwide fail to implement basic cybersecurity measures, leaving themselves vulnerable to greater risks — both in frequency and severity. Today’s increasingly complex business ecosystems introduce more vulnerabilities, making it easier for...Read More
(iStock.com/Tzido) A new report on Niles’ ongoing efforts to restore village computer systems calls the security breach that occurred in June a “ransomware attack.” The report sheds light into the ongoing response efforts from the attack on Niles’ government telephone and computer systems that occurred on Monday, June 10. The report, prepared by Niles IT...Read More
As cyber extortion continues to plague businesses of all sizes, advanced backup solutions for ransomware are more critical than ever. The shift from traditional backup methods to more secure, scalable systems is shaping the future of cybersecurity. Modern solutions now integrate zero-trust frameworks, automation and simplified architectures to protect sensitive information, ensuring businesses can recover from...Read More
A 65-year-old woman has recently fallen prey to an elaborate scam conducted through a dating app, in which she unfortunately lost ₹1.3 Cr. to the scammers over the span of a year. The scam started when the woman met a man named ‘Paul Rutherford’ on an online dating platform named ‘International Cupid’. The man told...Read More