Fri.May 14, 2021

DarkSide Ransomware Gang Quits After Servers, Bitcoin Stash Seized

Krebs on Security

The DarkSide ransomware affiliate program responsible for the six-day outage at Colonial Pipeline this week that led to fuel shortages and price spikes across the country is running for the hills.

DarkSide Ransomware Gang Says It Has Shut Down

Data Breach Today

Colonial Pipeline Attack Used DarkSide Malware The gang behind DarkSide ransomware, which U.S. authorities say was used in the attack against Colonial Pipeline Co., says it's closed its ransomware-as-a-service operation after losing access to part of its infrastructure

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

RSAC insights: ‘SASE’ disrupts networking by meshing security, connectivity at the services edge

The Last Watchdog

It’s accurate to say that security has been bolted onto modern business networks. It also has become very clear that we won’t achieve the full potential of digital transformation without security somehow getting intricately woven into every layer of corporate IT systems. We’re still a long way from achieving that, but a promising roadmap has emerged.

Paying a Ransom: Does It Really Encourage More Attacks?

Data Breach Today

The Debate Over Impact of Colonial Pipeline's Apparent Ransom Payment Some cybersecurity experts question the contentions of Speaker of the House Nancy Pelosi and another member of Congress, who say a $5 million ransom reportedly paid by Colonial Pipeline Co.

Cloud-Scale Monitoring With AWS and Datadog

In this eBook, find out the benefits and complexities of migrating workloads to AWS, and services that AWS offers for containers and serverless computing.

Ransomware Is Getting Ugly

Schneier on Security

Modern ransomware has two dimensions: pay to get your data back, and pay not to have your data dumped on the Internet.

More Trending

Chart: Cybersecurity Now a Top Corporate Priority

Dark Reading

Majority of global IT decision makers say cybersecurity is extremely or more important now than it was pre-pandemic, according to Cisco

Ransomware Attack Leads to IT Shutdown for Irish Hospitals

Data Breach Today

Conti Ransomware Blamed; No Ransom Paid After Health Service Executive, Ireland’s state health services provider, shut down all its IT systems serving hospitals in the wake of a ransomware attack early Friday, some security experts praised its decisive action and refusal to pay a ransom

Rapid7 Source Code Accessed in Supply Chain Attack

Dark Reading

An investigation of the Codecov attack revealed intruders accessed Rapid7 source code repositories containing internal credentials and alert-related data

Access 110

ISMG Editors’ Panel: Analysis of Colonial Pipeline Attack

Data Breach Today

Insights on DarkSide Ransomware Gang, Securing Critical Infrastructure Four editors at Information Security Media Group discuss the Colonial Pipeline attack, providing insights on the DarkSide ransomware gang and securing critical infrastructure

Digital Trends Report 2020

As part of our goal to continue helping our community during these times, we wanted to share with you this critical data on the state of digital products across industries and provide context on how businesses are responding to the changing winds.

Darkside gang lost control of their servers and funds

Security Affairs

The operators of the Darkside ransomware announced that they have lost control of their infrastructure and part of the funds the gang obtained from the victims.

How to 'Demystify' Cybersecurity

Data Breach Today

Ciaran Martin, Former UK Cybersecurity Chief, on Managing Cyber Risks To defend against cyberattacks, it's important to "demystify" cybersecurity and break it into risks that can be managed by any organization, says Ciaran Martin, the former director of the U.K. National Cyber Security Center

SOC Teams Burdened by Alert Fatigue Explore XDR

Dark Reading

ESG research finds a complex attack surface and threat landscape make alerts too overwhelming to monitor accurately

106
106

Analysis: Colonial Pipeline Attack

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of the Colonial Pipeline ransomware attack, the response and reactions from security leaders about the significance and potential ramifications of the incident

The Best Sales Forecasting Models for Weathering Your Goals

Every sales forecasting model has a different strength and predictability method. It’s recommended to test out which one is best for your team. This way, you’ll be able to further enhance – and optimize – your newly-developed pipeline. Your future sales forecast? Sunny skies (and success) are just ahead!

Magecart gang hides PHP-based web shells in favicons

Security Affairs

Magecart cybercrime gang is using favicon to hide malicious PHP web shells used to maintain remote access to inject JavaScript skimmers into online stores.

Teardown: Inside the Colonial Pipeline Ransomware Attack

Data Breach Today

Diving into the Colonial Pipeline ransomware attack - culprits, impact, recovery, and the increasing political firestorm it’s triggered - is the focus of the latest edition of the ISMG Security Report. Security leaders weigh in on the attack's significance and potential long-term ramifications

How Faster COVID-19 Research Is Being Made Possible by Secure Silicon

Dark Reading

When Intel and Leidos set up a "trusted execution environment" to enable a widespread group of researchers to securely share and confidentially compute real-world data, it was no small achievement

IT 98

Patched Wi-Fi Vulnerabilities Posed Risks to All Users

Data Breach Today

Researcher: If Exploited, an Attacker at Close Range Could Inject Malicious Code A Belgian security researcher says he uncovered vulnerabilities that affect all modern Wi-Fi security protocols and impact most wirelessly connected devices, including smartphones, routers and IoT devices.

Risk 168

What E-Commerce Performance Metrics Are CTOs Monitoring?

In this eBook, Danny Miles, CTO of Dollar Shave Club, reveals an efficient framework for thinking about and prioritizing the performance metrics that matter most to him, providing a blueprint for fellow e-commerce CTOs to follow as they evaluate their own business.

Ireland’s Health Service Executive hit by ransomware attack

Security Affairs

Ireland’s Health Service Executive service shut down its IT systems after they were hit with a “significant ransomware attack.”. Another major ransomware attack made the headlines, this time the victim is Ireland’s Health Service Executive that was forced to shut down its IT systems on Friday.

Using Attack Simulations to Improve Visibility with Endpoint Security

Data Breach Today

ATT&CK Evaluations Show How Secure Endpoints Protect Against Advanced Threats

Cisco Confirms Plans to Acquire Kenna Security

Dark Reading

Cisco plans to integrate Kenna's vulnerability management technology into its SecureX platform

IT 93

Colonial Pipeline likely paid a $5M ransom to DarkSide

Security Affairs

DarkSide demanded a $5 million ransom to Colonial Pipeline, which has quickly recovered operations, did it pay? The Colonial Pipeline facility in Pelham, Alabama, was hit by a cybersecurity attack on Friday and its operators were forced to shut down its systems. The pipeline allows carrying 2.5

Product Analytics Playbook: Mastering Retention

Why do your users churn? In this guide you'll learn common product pitfalls and how to fix them.

The Real Cost of Colonial Pipeline's $5 Million Ransom

WIRED Threat Level

Stopping payments would go a long way to stopping ransomware. But the choice is never quite so easy. Security Security / Cyberattacks and Hacks

Wi-Fi Design, Implementation Flaws Allow a Range of Frag Attacks

Dark Reading

Every Wi-Fi product is affected by at least one fragmentation and aggregation vulnerability, which could lead to a machine-in-the-middle attack, researcher says

89

Colonial Pipeline Paid Hackers $5 Million Ransom

Adam Levin

Colonial Pipeline paid roughly $5 million to the ransomware group responsible for hacking its systems, contradicting earlier claims. . Bloomberg News reported that the company paid the ransom in cryptocurrency hours after the May 7 cyberattack that shut down the country’s largest fuel pipeline.

Risk 87

Scheme flooding fingerprint technique may deanonymize Tor users

Security Affairs

FingerprintJS experts devised a fingerprinting technique, named scheme flooding, that could allow identifying users across different desktop browsers, including the Tor Browser.

B2B Pocket Playbook: End-to-End Guide to Sales Enablement

Sales enablement is the strategic process of providing sales teams with the content, guidance, and mentorship needed to engage targeted buyers. It’s all about equipping sales professionals with the tools they need to put their best-selling foot forward. And if sales teams want to continuously sell better -- and faster -- their sales enablement process must have a game-winning strategy. It's time for you to start selling smarter - and hitting your sales number - with the best B2B database in the market. Get started today.

Ransomware’s New Swindle: Triple Extortion

Threatpost

Ransomware attackers are now demanding cash from the customers of victims too. . Malware

Weekly Update 243

Troy Hunt

This one is a real short intro as right now, it hurts to type (copy and paste is earlier ??): I’m Back at a *REAL* Conference; Dealing with RSI; Shellies and MQTT; My IoT Aircon Hack; Drowning in Data Breaches. References I've been at a real conference this week, with people and all!

IoT 79

‘Scheme Flooding’ Allows Websites to Track Users Across Browsers

Threatpost

A flaw that allows browsers to enumerate applications on a machine threatens cross-browser anonymity in Chrome, Firefox, Microsoft Edge, Safari and even Tor. Privacy Vulnerabilities Web Security