Russia began its war on Ukraine with a series of wiper malware attacks. Wiper attacks simply want to make a device inoperable by destroying its boot sector. It’s basically an offensive cyber weapon which can access points into the company network. All of these network endpoints could be exploited to do serious damage, which is why high quality endpoint protection is so important. To say the very least, this doesn’t look good and could give a signal to any malicious entity that Viasat is easy to hack.
February 24, 2022
“IN ACCORDANCE WITH THE DECISION OF THE EMERGENCY MEETING OF THE SECURITY COUNCIL OF UKRAINE DATED 24.02.2022” - The headline of a spear phishing campaign. The emails had a malicious attachment, “list of persons.xlsx”. This seemed to hint at names on a ‘kill list’ that was reportedly issued by the Russian government. It appears the sender accounts were legitimate but compromised. Here is the notice about this from the Ukrainian government.
December 6, 2021
These attacks use a company’s own contact form, available on their company website, to generate fake emails with malicious links and is being used by ransomware gangs to tunnel into a corporate network and encrypt company data until they pay a ransom. The IBM cybersecurity team (IBM X-Force) has associated the latest contact form attacks with the notorious Trickbot gang and Conti/Ryuk ransomware.
August 9, 2021
It appears that members of either DarkSide, REvil, or both have emerged as a new ransomware group calling itself, BlackMatter. They will not attack infrastructure or any components of the oil and gas industry.
So, if your company is a private company, you have just had a target put on your back, the door is open and more companies are now in jeopardy.
June 1, 2020
If you are a vice president or managing director and are working in either banking or IT, be very wary of any emails with any attachments, especially those that lead to a site with a reCAPTHA. If you finally make it to a login page, look closely at the URL, especially, the extension. This is a well-designed attack that is destined to produce a lot of victims. Try not to be one of them.
COVID-19 + Excel Attachment = Lost Data
June 1, 2020
Be aware of any email that evades your spam filter and seems to come from Johns Hopkins or W.H.O. (World Health Organization) with a tie to COVID-19 in the subject line. . . it's a phishing attack using an Excel attachment.
Russian Gang Making Millions Hacking Cities and Counties across America
May 6 2019
Once upon a time, North Korea only cared about cyber espionage. Most of the time, they wanted to spy on South Korea or disrupt South Korean operations. Then, a terrible thing happened.
April 8, 2019
Bad apps keep getting through; according to Google, less than 1%. Nonetheless, 1% of 1 billion is still 10 million… just saying. Notice that apps containing Trojans lead the way, and that’s not good. These apps release malware that can quickly gain control of your device. These are often RATs (Remote Access Trojans) which enable hackers to control your device remotely.
Hackers Find a New Way to Get Control of Your Bank Account
March 11, 2019
Nothing can make a hacker happier than gaining control of a bank account, and they will do whatever they can to do so. .
When Algorithms Go Bad
March 11, 2019
Algorithms could be manipulated to have weapons misfire or fire on the wrong target . . . A database, itself, could be infected to make algorithms reach dangerous conclusions
It’s Hacking Season in Tibet
February 25, 2019
The scenario outlined above highlights the sensitivity of algorithms to manipulation by nefarious agents. Algorithms could be manipulated to have weapons misfire or fire on the wrong target,
5 Surprising and mostly Unknown Cyber Security Facts
February 18, 2019
At the time of this writing, SpeakUp is being used to install cryptomining software, however, few researchers believe this is its ultimate goal, as it has the sophisticated architecture to launch a far more devastating worldwide attack.
February 11, 2019
Clicking on one of the options shown above will take you to these fake survey sites or to sites offering free gift cards to well known stores. All you have to do is give them some personal information.
“Love You” Phishing Emails Arrive in Time for Valentine’s Day
February 4, 2019
The point is to get you interested in the subject line, abandon normal caution, and open the inviting attachment. Sadly, you will find no love there.
The Business Process Compromise: The Cyber Attack You Don’t See Coming
January 28, 2019
Most companies and organizations simply can’t compete with the hackers behind these attacks. If a breach actually occurs, the F.B.I. suggests you work with them.
Cyber Insurance Firms Fund Malware Development
January 21, 2019
Billions are being made by these extortionists because ransomware is the easiest way for hackers to get a quick payoff. If cyber insurance companies guarantee ransom payments, they, in effect, guarantee an income for novice hackers around the globe.