Fri.May 14, 2021

article thumbnail

DarkSide Ransomware Gang Quits After Servers, Bitcoin Stash Seized

Krebs on Security

The DarkSide ransomware affiliate program responsible for the six-day outage at Colonial Pipeline this week that led to fuel shortages and price spikes across the country is running for the hills. The crime gang announced it was closing up shop after its servers were seized and someone drained the cryptocurrency from an account the group uses to pay affiliates. “Servers were seized (country not named), money of advertisers and founders was transferred to an unknown account,” reads a

article thumbnail

DarkSide Ransomware Gang Says It Has Shut Down

Data Breach Today

Colonial Pipeline Attack Used DarkSide Malware The gang behind DarkSide ransomware, which U.S. authorities say was used in the attack against Colonial Pipeline Co., says it's closed its ransomware-as-a-service operation after losing access to part of its infrastructure.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RSAC insights: ‘SASE’ disrupts networking by meshing security, connectivity at the services edge

The Last Watchdog

It’s accurate to say that security has been bolted onto modern business networks. It also has become very clear that we won’t achieve the full potential of digital transformation without security somehow getting intricately woven into every layer of corporate IT systems. We’re still a long way from achieving that, but a promising roadmap has emerged.

Security 115
article thumbnail

Paying a Ransom: Does It Really Encourage More Attacks?

Data Breach Today

The Debate Over Impact of Colonial Pipeline's Apparent Ransom Payment Some cybersecurity experts question the contentions of Speaker of the House Nancy Pelosi and another member of Congress, who say a $5 million ransom reportedly paid by Colonial Pipeline Co. after being hit by DarkSide ransomware would serve as a catalyst for attacks on other critical infrastructure providers.

IT 283
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Ransomware Is Getting Ugly

Schneier on Security

Modern ransomware has two dimensions: pay to get your data back, and pay not to have your data dumped on the Internet. The DC police are the victims of this ransomware, and the criminals have just posted personnel records — “including the results of psychological assessments and polygraph tests; driver’s license images; fingerprints; social security numbers; dates of birth; and residential, financial, and marriage histories” — for two dozen police officers.

More Trending

article thumbnail

Ireland’s Health Service Executive hit by ransomware attack

Security Affairs

Ireland’s Health Service Executive service shut down its IT systems after they were hit with a “significant ransomware attack.”. Another major ransomware attack made the headlines, this time the victim is Ireland’s Health Service Executive that was forced to shut down its IT systems on Friday. After being targeted with a significant ransomware attack the Health Service Executive opted to shut down its infrastructure as a precaution to avoid the threat from spreading.

article thumbnail

Ransomware Attack Leads to IT Shutdown for Irish Hospitals

Data Breach Today

Conti Ransomware Blamed; No Ransom Paid After Health Service Executive, Ireland’s state health services provider, shut down all its IT systems serving hospitals in the wake of a ransomware attack early Friday, some security experts praised its decisive action and refusal to pay a ransom.

article thumbnail

DarkSide Ransomware Suffers ‘Oh, Crap!’ Server Shutdowns

Threatpost

The RaaS that crippled Colonial Pipeline lost the servers it uses to pull off ransomware attacks, while REvil’s gonads shrank in response.

article thumbnail

How to 'Demystify' Cybersecurity

Data Breach Today

Ciaran Martin, Former UK Cybersecurity Chief, on Managing Cyber Risks To defend against cyberattacks, it's important to "demystify" cybersecurity and break it into risks that can be managed by any organization, says Ciaran Martin, the former director of the U.K. National Cyber Security Center.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

FIN7 Backdoor Masquerades as Ethical Hacking Tool

Threatpost

The financially motivated cybercrime gang behind the Carbanak RAT is back with the Lizar malware, which can harvest all kinds of info from Windows machines.

Security 113
article thumbnail

Analysis: Colonial Pipeline Attack

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of the Colonial Pipeline ransomware attack, the response and reactions from security leaders about the significance and potential ramifications of the incident.

article thumbnail

Colonial Pipeline Paid Hackers $5 Million Ransom

Adam Levin

Colonial Pipeline paid roughly $5 million to the ransomware group responsible for hacking its systems, contradicting earlier claims. . Bloomberg News reported that the company paid the ransom in cryptocurrency hours after the May 7 cyberattack that shut down the country’s largest fuel pipeline. In exchange for the payment, the hackers responsible provided Colonial with a decryption tool that restored the company’s access to its data. .

article thumbnail

Teardown: Inside the Colonial Pipeline Ransomware Attack

Data Breach Today

Diving into the Colonial Pipeline ransomware attack - culprits, impact, recovery, and the increasing political firestorm it’s triggered - is the focus of the latest edition of the ISMG Security Report. Security leaders weigh in on the attack's significance and potential long-term ramifications.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Magecart gang hides PHP-based web shells in favicons

Security Affairs

Magecart cybercrime gang is using favicon to hide malicious PHP web shells used to maintain remote access to inject JavaScript skimmers into online stores. Magecart hackers are distributing malicious PHP web shells hidden in website favicon to inject JavaScript e-skimmers into online stores and steal payment information. Researchers from Malwarebytes observed threat actors, likely Magecart Group 12, using this technique in attacks aimed at online stores running on Magento 1 websites.

article thumbnail

Spear-Phishing Campaign Targets Aviation Sector

Data Breach Today

Microsoft: Attackers Are Spreading Remote Access Trojans A spear-phishing campaign is targeting aviation companies, using malicious documents that deliver information-stealing malware, according to alerts from Microsoft Security Intelligence.

Phishing 233
article thumbnail

Rapid7 Source Code Accessed in Supply Chain Attack

Dark Reading

An investigation of the Codecov attack revealed intruders accessed Rapid7 source code repositories containing internal credentials and alert-related data.

Access 107
article thumbnail

Patched Wi-Fi Vulnerabilities Posed Risks to All Users

Data Breach Today

Researcher: If Exploited, an Attacker at Close Range Could Inject Malicious Code A Belgian security researcher says he uncovered vulnerabilities that affect all modern Wi-Fi security protocols and impact most wirelessly connected devices, including smartphones, routers and IoT devices. The flaws have been fixed by many tech companies to avoid leaks of user data.

Risk 199
article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

How Faster COVID-19 Research Is Being Made Possible by Secure Silicon

Dark Reading

When Intel and Leidos set up a "trusted execution environment" to enable a widespread group of researchers to securely share and confidentially compute real-world data, it was no small achievement.

article thumbnail

Using Attack Simulations to Improve Visibility with Endpoint Security

Data Breach Today

ATT&CK Evaluations Show How Secure Endpoints Protect Against Advanced Threats

Security 219
article thumbnail

‘Scheme Flooding’ Allows Websites to Track Users Across Browsers

Threatpost

A flaw that allows browsers to enumerate applications on a machine threatens cross-browser anonymity in Chrome, Firefox, Microsoft Edge, Safari and even Tor.

Privacy 99
article thumbnail

Chart: Cybersecurity Now a Top Corporate Priority

Dark Reading

Majority of global IT decision makers say cybersecurity is extremely or more important now than it was pre-pandemic, according to Cisco.

article thumbnail

How to Migrate From DataStax Enterprise to Instaclustr Managed Apache Cassandra

If you’re considering migrating from DataStax Enterprise (DSE) to open source Apache Cassandra®, our comprehensive guide is tailored for architects, engineers, and IT directors. Whether you’re motivated by cost savings, avoiding vendor lock-in, or embracing the vibrant open-source community, Apache Cassandra offers robust value. Transition seamlessly to Instaclustr Managed Cassandra with our expert insights, ensuring zero downtime during migration.

article thumbnail

Colonial Pipeline likely paid a $5M ransom to DarkSide

Security Affairs

DarkSide demanded a $5 million ransom to Colonial Pipeline, which has quickly recovered operations, did it pay? The Colonial Pipeline facility in Pelham, Alabama, was hit by a cybersecurity attack on Friday and its operators were forced to shut down its systems. The pipeline allows carrying 2.5 million barrels of refined gasoline and jet fuel each day up the East Coast from Texas to New York, it covers 45 percent of the East Coast’s fuel supplies.

article thumbnail

Irish health service shut down amid ransomware attack

IT Governance

Ireland’s health service has temporarily shut down its IT system after experiencing a “significant ransomware attack”. The incident has affected services across a range of hospitals. Dublin’s Rotunda Hospital has cancelled outpatient visits for everyone except those with scheduled paediatric outpatient appointments and women who are 36 weeks pregnant or later.

article thumbnail

Scheme flooding fingerprint technique may deanonymize Tor users

Security Affairs

FingerprintJS experts devised a fingerprinting technique, named scheme flooding, that could allow identifying users across different desktop browsers, including the Tor Browser. FingerprintJS experts devised a new fingerprinting technique, named scheme flooding, that could allow identifying users while browsing websites using different desktop browsers, including the Tor Browser.

Privacy 81
article thumbnail

SOC Teams Burdened by Alert Fatigue Explore XDR

Dark Reading

ESG research finds a complex attack surface and threat landscape make alerts too overwhelming to monitor accurately

102
102
article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

Rapid7 says source code, credentials accessed as a result of Codecov supply-chain attack

Security Affairs

Rapid7 disclosed that unauthorized third-party had access to source code and customer data as result of Codecov supply chain attack. Cyber security vendor Rapid7 reveals it was impacted by the Codecov software supply chain attack , attackers had access to data for part of its customers and a small subset of its source code repositories for internal tools.

Access 81
article thumbnail

Integrating SQL and NoSQL into Data Modeling for Greater Business Value: The Latest Release of erwin Data Modeler

erwin

Due to the prevalence of internal and external market disruptors, many organizations are aligning their digital transformation and cloud migration efforts with other strategic requirements (e.g., compliance with the General Data Protection Regulation). Accelerating the retrieval and analysis of data —so much of it unstructured—is vital to becoming a data-driven business that can effectively respond in real time to customers, partners, suppliers and other parties, and profit from these efforts.

article thumbnail

Upcoming Speaking Engagements

Schneier on Security

This is a current list of where and when I am scheduled to speak: I’m keynoting the (all-virtual) RSA Conference 2021 , May 17-20, 2021. I’m keynoting the 5th International Symposium on Cyber Security Cryptology and Machine Learning (via Zoom), July 8-9, 2021. I’ll be speaking at an Informa event on September 14, 2021. Details to come. The list is maintained on this page.