Cybersecurity News


Conti Ransomware Group Diaries, Part II: The Office

Earlier this week, a Ukrainian security researcher leaked almost two years’ worth of internal chat logs from Conti, one of the more rapacious and ruthless ransomware gangs in operation today. Tuesday’s story examined how Conti dealt with its own internal breaches and attacks from private security firms and governments. In Part II of this series we’ll explore what it’s like to work for Conti, as described by the Conti employees themselves.
02 March 2022

Ukraine government calls on Oracle, SAP for support

Mykhailo Fedorov has requested the severance of business relationships with Russia.
02 March 2022

Innovation and the Roots of Progress

If you look back at the long arc of history, it’s clear that one of the most crucial drivers of real progress in society is innovation

The post Innovation and the Roots of Progress appeared first on WeLiveSecurity

02 March 2022

TeaBot Android Banking Trojan continues its global conquest with new upgrades

The RAT has is now targeting over 400 applications.
02 March 2022

RCE Bugs in Hugely Popular VoIP Apps: Patch Now!

RCE Bugs in Hugely Popular VoIP Apps: Patch Now! The flaws are in the ubiquitous open-source PJSIP multimedia communication library, used by the Asterisk PBX toolkit that's found in a massive number of VoIP implementations.
01 March 2022

RCE Bugs in WhatsApp, Other Hugely Popular VoIP Apps: Patch Now!

RCE Bugs in WhatsApp, Other Hugely Popular VoIP Apps: Patch Now! The flaws are in the ubiquitous open-source PJSIP multimedia communication library, used by the Asterisk PBX toolkit that's found in a massive number of VoIP implementations.
01 March 2022

Conti Ransomware Group Diaries, Part I: Evasion

A Ukrainian security researcher this week leaked several years of internal chat logs and other sensitive data tied to Conti, an aggressive and ruthless Russian cybercrime group that focuses on deploying its ransomware to companies with more than $100 million in annual revenue. The chat logs offer a fascinating glimpse into the challenges of running a sprawling criminal enterprise with more than 100 salaried employees. The records also provide insight into how Conti has dealt with its own internal breaches and attacks from private security firms and foreign governments.
01 March 2022

Daxin Espionage Backdoor Ups the Ante on Chinese Malware

Daxin Espionage Backdoor Ups the Ante on Chinese Malware Via node-hopping, the espionage tool can reach computers that aren't even connected to the internet.
01 March 2022

Ukraine Hit with Novel ‘FoxBlade’ Trojan Hours Before Invasion

Ukraine Hit with Novel ‘FoxBlade’ Trojan Hours Before Invasion Microsoft detected cyberattacks launched against Ukraine hours before Russia’s tanks and missiles began to pummel the country last week.
01 March 2022

IsaacWiper and HermeticWizard: New wiper and worm targeting Ukraine

ESET researchers uncover a new wiper that attacks Ukrainian organizations and a worm component that spreads HermeticWiper in local networks

The post IsaacWiper and HermeticWizard: New wiper and worm targeting Ukraine appeared first on WeLiveSecurity

01 March 2022

Ukraine asks cryptocurrency firms to block Russian users

The request comes at a time when economic sanctions are sending shockwaves through the Russian banking system.
01 March 2022

Microsoft Accounts Targeted by Russian-Themed Credential Harvesting

Microsoft Accounts Targeted by Russian-Themed Credential Harvesting Malicious emails warning Microsoft users of "unusual sign-on activity" from Russia are looking to capitalizing on the Ukrainian crisis.
01 March 2022

Google TAG removes fraudulent 'influence' operations linked to Belarus, Moldova, Ukraine

The tech giant has also tackled thousands of YouTube channels connected to China.
01 March 2022

Ukraine-Russia Cyber Warzone Splits Cyber Underground

Ukraine-Russia Cyber Warzone Splits Cyber Underground A pro-Ukraine Conti member spilled 13 months of the ransomware group's chats, while cyber actors are rushing to align with both sides.
28 February 2022

Toyota to Close Japan Plants After Suspected Cyberattack

Toyota to Close Japan Plants After Suspected Cyberattack The plants will shut down on Tuesday, halting about a third of the company’s global production. Toyota doesn’t know how long the 14 plants will be unplugged.
28 February 2022

#ShieldsUp – Now is the time to double‑check cybersecurity processes and operations

As the conflict in Ukraine heightens the risk of cyberattacks globally, what can organizations do to improve their resiliency?

The post #ShieldsUp – Now is the time to double‑check cybersecurity processes and operations appeared first on WeLiveSecurity

28 February 2022

Ukraine security agencies warn of Ghostwriter threat activity, phishing campaigns

CERT-UA warns of misinformation, phishing, and active assaults against Ukrainian organizations.
28 February 2022

Beware of charity scams exploiting war in Ukraine

Looking to help people in Ukraine? Donate wisely – do your research first so you give without getting scammed

The post Beware of charity scams exploiting war in Ukraine appeared first on WeLiveSecurity

27 February 2022

TrickBot Takes a Break, Leaving Researchers Scratching Their Heads

TrickBot Takes a Break, Leaving Researchers Scratching Their Heads The infamous trojan is likely making some major operational changes, researchers believe.
25 February 2022

Microsoft Exchange Bugs Exploited by ‘Cuba’ Ransomware Gang

Microsoft Exchange Bugs Exploited by ‘Cuba’ Ransomware Gang The ransomware gang known as Cuba is increasingly shifting to exploiting Exchange bugs – including crooks' favorites, ProxyShell and ProxyLogon – as initial infection vectors.
25 February 2022