mastodon.ie is one of the many independent Mastodon servers you can use to participate in the fediverse.
Irish Mastodon - run from Ireland, we welcome all who respect the community rules and members.

Administered by:

Server stats:

1.7K
active users

#ransomwaretactics

0 posts0 participants0 posts today
Pyrzout :vm:<p>Medusa Ransomware Exploiting Fortinet Flaw For Sophisticated Ransomware Attacks <a href="https://gbhackers.com/medusa-fortinet-attack/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gbhackers.com/medusa-fortinet-</span><span class="invisible">attack/</span></a> <a href="https://social.skynetcloud.site/tags/OnlinePresenceofCyberThreats" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OnlinePresenceofCyberThreats</span></a> <a href="https://social.skynetcloud.site/tags/CybersecurityDefense" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CybersecurityDefense</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/RansomwareTactics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RansomwareTactics</span></a> <a href="https://social.skynetcloud.site/tags/CyberAttack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberAttack</span></a> <a href="https://social.skynetcloud.site/tags/Ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ransomware</span></a></p>
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p>"🚨 Akira Ransomware Strikes! Bucks County's Emergency Services Crippled 🚨"</p><p>Bucks County's emergency dispatch system faced a severe cyberattack, which is now traced back to the notorious Akira ransomware gang. This attack resulted in significant operational disruptions, forcing emergency services to revert to manual methods. As a sophisticated group known for targeting governments and businesses globally, Akira's modus operandi includes charging exorbitant ransoms for releasing hijacked data. The county, in collaboration with federal agencies, continues to investigate, maintaining operational 9-1-1 services despite the challenges.</p><p>Source: <a href="https://www.nbcphiladelphia.com/news/local/akira-ransomware-behind-bucks-co-security-attack-that-crippled-emergency-dispatch-system-officials-say/3759350/" rel="nofollow noopener noreferrer" target="_blank">Hayden Mitman via nbcphiladelphia.com</a></p><p>Tags: <a href="https://infosec.exchange/tags/CyberAttack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberAttack</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ransomware</span></a> <a href="https://infosec.exchange/tags/EmergencyServices" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EmergencyServices</span></a> <a href="https://infosec.exchange/tags/AkiraRansomware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AkiraRansomware</span></a> <a href="https://infosec.exchange/tags/BucksCounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BucksCounty</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> 🚒🔒💻</p><p>Additional insights from Sophos News highlight the Akira ransomware gang's techniques, including exploiting Remote Desktop Protocol (RDP) for lateral movement and utilizing tools like Advanced IP Scanner for network reconnaissance. They're known for persistence tactics, such as creating user accounts and modifying registry keys for sustained access. Defense evasion strategies include uninstalling security tools and manipulating Windows Defender settings. For command-and-control, AnyDesk and bespoke Trojans are employed for remote network access.</p><p>This deep dive into Akira's tactics emphasizes the need for robust cybersecurity measures in critical infrastructure sectors.</p><p>Source: <a href="https://news.sophos.com/en-us/2023/12/21/akira-again-the-ransomware-that-keeps-on-taking/" rel="nofollow noopener noreferrer" target="_blank">Sophos News</a></p><p>Tags: <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/APT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APT</span></a> <a href="https://infosec.exchange/tags/RansomwareTactics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RansomwareTactics</span></a> <a href="https://infosec.exchange/tags/Sophos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sophos</span></a> <a href="https://infosec.exchange/tags/InfoSecCommunity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSecCommunity</span></a> <a href="https://infosec.exchange/tags/NetworkSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NetworkSecurity</span></a> 🛡️💡💻</p>