mastodon.ie is one of the many independent Mastodon servers you can use to participate in the fediverse.
Irish Mastodon - run from Ireland, we welcome all who respect the community rules and members.

Administered by:

Server stats:

1.5K
active users

#RansomwareGroup

0 posts0 participants0 posts today

#Akira ransomware gang was spotted using an unsecured webcam to launch encryption attacks on a victim's network, effectively circumventing Endpoint Detection and Response (EDR), which was blocking the encryptor in Windows. #ransomwaregroup #CyberSecurity bleepingcomputer.com/news/secu

BleepingComputer · Ransomware gang encrypted network from a webcam to bypass EDRBy Bill Toulas

New research has uncovered further links between the #BlackBasta and #Cactus ransomware gangs, with members of both groups utilizing the same social engineering attacks and the #BackConnect proxy malware for post-exploitation access to corporate networks. #ransomwaregroup bleepingcomputer.com/news/secu

BleepingComputer · Microsoft Teams tactics, malware connect Black Basta, Cactus ransomwareBy Lawrence Abrams

The United States, Australia, and the United Kingdom have sanctioned Zservers, a Russia-based bulletproof hosting (BPH) services provider, for supplying essential attack infrastructure for the LockBit ransomware gang. #LockBit #ransomwaregroup bleepingcomputer.com/news/secu

BleepingComputer · US sanctions LockBit ransomware’s bulletproof hosting providerBy Sergiu Gatlan

A global law enforcement operation targeting the Phobos ransomware gang has led to the arrest of four suspected hackers in Phuket, Thailand, and the seizure of 8Base’s dark web sites. The suspects are accused of conducting cyberattacks on over 1,000 victims worldwide. #ransomwaregroup bleepingcomputer.com/news/lega

BleepingComputer · Police arrests 4 Phobos ransomware suspects, seizes 8Base sitesBy Bill Toulas

Analysing the cultural dimensions of cybercriminal groups -- A case study on the Conti ransomware group

#ransom #culture #cybercrime #research #conti #ransomware #RansomwareGroup

🔗 arxiv.org/abs/2411.02548

arXiv.orgAnalysing the cultural dimensions of cybercriminal groups -- A case study on the Conti ransomware groupCybercriminal profiling and cyber-attack attribution have been elusive goals world-wide, due to their effects on societal and geopolitical balance and stability. Attributing actions to a group or state is a complex endeavour, with traditional established approaches including cyber threat intelligence and analysis of technical means such as malware analysis, network forensics and geopolitical intelligence. However, we propose an additional component for profiling threat actor groups through analysing cultural aspects of human behaviours and interactions. We utilise a set of variables which determine characteristics of national and organisational culture to create a cultural "footprint" of cybercriminal groups. As a case study, we conduct thematic analysis across the six dimensions of the Hofstede national culture classification and the eight dimensions of the Meyer classification on leaked internal communications of the ransomware group Conti. We propose that a systematic analysis of similar communications can serve as a practical tool for a) understanding the modus operandi of cybercrime and cyberwarfare-related groups, and b) profiling cybercriminal groups and/or nation-state actors. Insights from such applications can, first, assist in combating cybercrime and, second, if combined with additional cyber threat intelligence, can provide a level of confidence in nuanced cyber-attack attribution processes.

According to a recent report, the AzzaSec Ransomware, developed by the #AzzaSec Hacktivist Group, is a grave cybersecurity threat, featuring sophisticated and undetected capabilities. It's disseminated through phishing attacks and can evade security measu… #RansomwareGroup
threatmon.io/blog/darkwebs-new

ThreatMon Blog · Darkweb’s New Favorite: AzzaSec RansomwareAzzaSec Ransomware, developed by the AzzaSec Hacktivist Group, represents a significant cybersecurity threat due to its sophisticated features and destructive