Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 108

Nov 18, 2020

Majority of APAC firms pay up in ransomware attacks

Posted by in category: cybercrime/malcode

Despite expert advice against paying up, most victims of ransomware attacks in the region, including 88% in Australia and 78% in Singapore, have paid the ransom in full or in part, and the number of such attacks is only going to keep climbing amidst accelerated digital transformation efforts and remote work.

Nov 17, 2020

CubeSats: Tiny Platforms for Orbiting Optics

Posted by in categories: cybercrime/malcode, satellites

Small, boxy satellites are ridesharing their way into outer space—and may lead to important advances in laser communications and cybersecurity.

Nov 15, 2020

New method ensures complex programs are bug-free without testing

Posted by in category: cybercrime/malcode

A team of researchers have devised a way to verify that a class of complex programs is bug-free without the need for traditional software testing. Called Armada, the system makes use of a technique called formal verification to prove whether a piece of software will output what it’s supposed to. It targets software that runs using concurrent execution, a widespread method for boosting performance, which has long been a particularly challenging feature to apply this technique to.

The between the University of Michigan, Microsoft Research, and Carnegie Mellon was recognized at ACM’s Programming Language Design and Implementation (PDLI 2020) with a Distinguished Paper Award.

Concurrent programs are known for their complexity, but have been a vital tool for increasing performance after the raw speed of processors began to plateau. Through a variety of different methods, the technique boils down to running multiple instructions in a simultaneously. A common example of this is making use of multiple cores of a CPU at once.

Nov 14, 2020

Ransomware Gang Devises Innovative Extortion Tactic

Posted by in categories: cybercrime/malcode, innovation

The gang behind the Ragnar Locker ransomware posted an ad on Facebook in an attempt to publicly shame a victim so it would pay a ransom. Security experts say the innovative tactic is indicative of things to come.

See Also: Palo Alto Networks Ignite 20: Discover the Future of Cybersecurity, Today

Earlier this week, the cyber gang hacked into a random company’s Facebook advertising account and then used it to buy an ad containing a press release stating Ragnar Locker had breached the Italian liquor company Campari and demanded it pay the ransom or see its data released. The security firm Emsisoft provided an image of the ad to Information Security Media Group.

Nov 10, 2020

RansomEXX trojan variant is being deployed against Linux systems, warns Kaspersky

Posted by in category: cybercrime/malcode

Inoculation is simple: MFA, regular timely patching.

Nov 9, 2020

FBI: Hackers stole source code from US government agencies and private companies

Posted by in categories: cybercrime/malcode, government

FBI blames intrusions on improperly configured SonarQube source code management tools.

Nov 8, 2020

Gitpaste-12 Worm Targets Linux Servers, IoT Devices

Posted by in category: cybercrime/malcode

The newly discovered malware uses GitHub and Pastebin to house component code, and harbors 12 different initial attack vectors.

Nov 7, 2020

Capcom hit by ransomware attack, is reportedly being extorted for $11 million

Posted by in category: cybercrime/malcode

Ryu kidding?


Earlier this week it emerged that third-party giant Capcom’s internal systems had been hacked, though the company claimed that no customer data was affected. It has now emerged that the publisher was targeted by the Ragnar Locker ransomware, software designed to exfiltrate information from internal networks before encrypting the lot: at which point the victim is locked-out, contacted, and extorted.

Bleeping Computer broke the story, and managed to access the Ragnar Locker sample (a ‘proof’ provided to the victim by the hackers), which contains the ransom note allegedly delivered to Capcom. It reads as follows.

Continue reading “Capcom hit by ransomware attack, is reportedly being extorted for $11 million” »

Nov 7, 2020

Hacker group uses Solaris zero-day to breach corporate networks

Posted by in category: cybercrime/malcode

The zero-day appears to have been bought off a black-market website for $3,000.

Nov 6, 2020

Linux version of RansomEXX ransomware discovered

Posted by in category: cybercrime/malcode

This marks the first time a major Windows ransomware strain has been ported to Linux to aid hackers in their targeted intrusions.