Victim: hugwi.ch Country : CH Actor: helldown Source: http://onyxcgfg4pjevvp5h34zvhaj45kbft3dg5r33j5vu3nyp7xic3vrzvad.onion/2a097057.html Discovered: 2024-08-14 02:07:19.358646 Published: 2024-08-14 02:07:18.837759 Description :

Ransomware Victims – ALL Other Victims by helldown

This bellow paragraph was generated by AI.

Victims of ransomware attacks often include businesses, healthcare institutions, educational organizations, and government entities.…

Read More

Short Summary:

The article discusses a significant ransomware attack on India’s banking ecosystem, primarily targeting Brontoo Technology Solutions, a collaborator with C-EDGE. The attack exploited a misconfigured Jenkins server, leading to the identification of the RansomEXX group as the responsible threat actor. The report outlines the attack chain, tactics used by the ransomware group, and recommendations for enhancing security measures in the BFSI sector.…

Read More

Victim: Forrec Country : IT Actor: blacksuit Source: http://weg7sdx54bevnvulapqu6bpzwztryeflq3s23tegbmnhkbpqz637f2yd.onion/?id=kak6a8J201AKL1tX Discovered: 2024-08-13 21:59:19.978546 Published: 2024-08-13 21:59:19.417292 Description : Forrec un’azienda italiana leader nella produzione di trituratori, macinatori e granulatori per il trattamento dei rifiuti.

Ransomware Victims – ALL Other Victims by blacksuit

This bellow paragraph was generated by AI.…

Read More

Victim: SCHLATTNER.de Country : DE Actor: helldown Source: http://onyxcgfg4pjevvp5h34zvhaj45kbft3dg5r33j5vu3nyp7xic3vrzvad.onion/10f2afcf.html Discovered: 2024-08-13 18:26:36.975174 Published: 2024-08-13 18:26:36.395136 Description :

Ransomware Victims – ALL Other Victims by helldown

This bellow paragraph was generated by AI.

Ransomware gangs have evolved into highly organized criminal enterprises, often operating with a clear division of roles among their members.…

Read More

Victim: Banner and Associates Country : US Actor: trinity Source: http://txtggyng5euqkyzl2knbejwpm4rlq575jn2egqldu27osbqytrj6ruyd.onion/articles/articles/5 Discovered: 2024-08-13 13:03:44.825907 Published: 2024-08-13 13:03:43.762772 Description : full data base(1,5 TB) – Revenue: $7.6 Million – Publication date: 2024-09-20

Ransomware Victims – ALL Other Victims by trinity

This bellow paragraph was generated by AI.…

Read More

Victim: glazkov.co.il Country : IL Actor: darkvault Source: http://mdhby62yvvg6sd5jmx5gsyucs7ynb5j45lvvdh4dsymg43puitu7tfid.onion//post/MGYzYjI1YjQyMjhhYjI3MmQ5MDU3MD Discovered: 2024-08-13 10:07:47.653966 Published: 2024-08-13 00:00:00.000000 Description : Since its establishment in 2012, our firm has been successfully providing accounting, payroll, and tax planning services to a loyal, regular clientele that grows consistently from year to year.…

Read More

Summary: The Top Threats to Cloud Computing 2024 report by the Cloud Security Alliance highlights the persistent critical vulnerabilities in cloud security, including misconfigurations and IAM weaknesses, while noting a shift in the significance of certain threats. Key trends such as increased attack sophistication and evolving regulatory landscapes are shaping the future of cloud security practices.…

Read More

Summary: The NIS2 Directive represents a significant shift in cybersecurity regulation across Europe, expanding its scope and imposing stricter compliance requirements on organizations. This regulation aims to enhance cyber resilience but raises concerns about its potential impact on innovation within the cybersecurity sector.

Threat Actor: N/A | N/A Victim: N/A | N/A

Key Point :

The NIS2 Directive broadens the scope of cybersecurity regulations, potentially increasing the number of entities affected from 3,000 to approximately 30,000.…
Read More

Short Summary:

In 2024, malware loaders have become a prevalent tool in cyberattacks, with loaders like SocGholish, GootLoader, and Raspberry Robin leading the charge. These loaders utilize sophisticated evasion techniques and are increasingly leveraging scripting languages like Python for persistence and stealth. The report highlights the evolution of these loaders, their impact on organizations, and provides mitigation strategies for cybersecurity professionals.…

Read More

Summary: This report analyzes the rising use of data-exfiltration tools, particularly Rclone, by threat actors in cyber incidents, highlighting their capabilities and the implications for organizations. It also provides recommendations for enhancing security measures to mitigate the risks associated with data exfiltration.

Threat Actor: Various threat groups | LockBit, Black Basta, Blacksuit Victim: Organizations across sectors | US manufacturing sector, UK professional services

Key Point :

Rclone has been identified as the most frequently used data-exfiltration tool, appearing in 57% of incidents investigated by ReliaQuest.…
Read More

Threat Actor: Fenice | Fenice Victim: Tencent | Tencent Price: Not disclosed Exfiltrated Data Type: Mobile numbers, email addresses, QQ IDs

Key Points :

1.4 billion records containing personal information were exposed from Tencent’s database. The leaked data includes sensitive information such as mobile numbers, email addresses, and QQ IDs, all stored in plaintext.…
Read More

Victim: Moser Wealth Advisors Country : US Actor: rhysida Source: Discovered: 2024-08-11 11:03:11.950062 Published: 2024-08-11 11:03:10.889160 Description : Moser Wealth Advisors Based in Bellevue, Washington, Moser Wealth Advisors is a regionally owned and operated wealth management firm that combines a Certified Public Accounting firm and Registered Investment Advisor to deliver comprehensive financial planning solutions that incorporate sophisticated tax and investment advice to high net worth individuals, families and business owners.…

Read More

Date Reported: 2024-08-08 Country: USA Victim: Ohio School Boards Association (OSBA) | Ohio School Boards Association | ohioschoolboards.org Additional Information :

The Ohio School Boards Association (OSBA) was targeted in a cyberattack on Thursday. This incident resulted in the disruption of their internet connection and limited their services.…
Read More

Threat Actor: Hikki-chan | Hikki-chan Victim: Florida Office of Financial Regulation | Florida Office of Financial Regulation Price: N/A Exfiltrated Data Type: Personal Identifiable Information (PII), professional licensing records, inspection and compliance reports, business addresses, professional affiliations, regulatory actions, survey data

Key Points :

Threat actor claims to have leaked a database containing 8.6 million records.…
Read More

Threat Actor: Unauthorized Actors | Unauthorized Actors Victim: ADT Inc. | ADT Inc. Price: Not disclosed Exfiltrated Data Type: Customer order information, including email addresses, phone numbers, and postal addresses

Key Points :

Unauthorized access to customer order information databases was detected by ADT. Limited customer information was obtained, with no evidence of compromised sensitive financial data.…
Read More

Victim: www.arkworkplacerisk.co.uk Country : GB Actor: alphalocker Source: http://mydatae2d63il5oaxxangwnid5loq2qmtsol2ozr6vtb7yfm5ypzo6id.onion/blog/blog_1-17 Discovered: 2024-08-09 21:58:22.255018 Published: 2024-08-09 21:58:21.401303 Description : 90GB DATA-Customer data -Financial data of the company -Employee information etc.

Ransomware Victims – ALL Other Victims by alphalocker…

Read More

Threat Actor: LeonelSecurityTeam | LeonelSecurityTeam Victim: JC Premiere Philippines | JC Premiere Philippines Price: Not disclosed Exfiltrated Data Type: Personal information (full names, home addresses, contact numbers, email addresses, identification numbers, card numbers)

Key Points :

Data breach affects approximately 300,000 users. Highly sensitive information, including identification cards, was compromised.…
Read More

In Q2 2024, the MS-ISAC reported a moderate shift in the Top 10 Malware, with SocGholish remaining the most prevalent. The report highlights various malware types, their infection vectors, and associated indicators of compromise (IoCs) to aid in cybersecurity defense. #CyberSecurity #Malware #ThreatIntelligence

Keypoints :

SocGholish is the leading malware, comprising 60% of the list.…
Read More