Security News
Law enforcement agencies from the United States, Germany, the Netherlands, and Romania seized servers used to host Slilpp's marketplace infrastructure and its domain names. Slilpp has been active since 2012 and was used by cybercriminals to sell and buy stolen login credentials for bank, online payment, mobile phone, retailer, and other online accounts.
Exterro announced they have teamed up with Microsoft to deliver a cloud-based digital forensics platform for law enforcement agencies worldwide. Designed to counter rising data volumes, data complexity and resource constraints, the combination of Exterro's Forensic Toolkit Lab on Microsoft Azure delivers exponentially improved forensic readiness, collaboration, and processing of data at scale designed to provide faster time to justice.
The increasingly defiant attacks on law enforcement agencies underscore how little ransomware gangs fear repercussions. Ransomware gangs have been leaking sensitive data from victims for well over a year, but experts said they've not seen such aggressive new tactics used before against police departments.
Microsoft has had a busy six months if its latest biannual digital trust report is anything to go by as law enforcement agencies crept closer to making 25,000 legal requests. Requests for consumer data reached 24,798 during the second half of 2020, up from 24,093 during the previous six-month period, and quite a jump from the 21,781 for the same period in 2019.
A report released Wednesday by security firm Digital Shadows looks at how such an effort was orchestrated to put a seeming end to the infamous Emotet malware. On Jan. 27, the European Union Agency for Law Enforcement Cooperation revealed that a global coalition of law enforcement and judicial authorities across several countries had disrupted Emotet through an endeavor known as "Operation Ladybird."
New research released today provides greater insight into the Emotet module created by law enforcement that will uninstall the malware from infected devices in April. On January 27th, Europol announced that a joint operation between law enforcement agencies from Netherlands, Germany, the United States, the United Kingdom, France, Lithuania, Canada, and Ukraine took control of the Emotet botnet's servers and disrupted the malware's operation.
New research released today provides greater insight into the Emotet module created by law enforcement that will uninstall the malware from infected devices in April. On January 27th, Europol announced that a joint operation between law enforcement agencies from Netherlands, Germany, the United States, the United Kingdom, France, Lithuania, Canada, and Ukraine took control of the Emotet botnet's servers and disrupted the malware's operation.
Following a takedown operation earlier this month, authorities are taking steps towards cleaning up systems infected with the Emotet malware. Serving as a malware loader, Emotet has been associated with the distribution of well-known malware families, including TrickBot and Ryuk ransomware, among others.
Law enforcement authorities in the U.S. and Europe have seized the dark web sites associated with the NetWalker ransomware operations and also charged a Canadian national in relation to the malware. In July, the FBI warned of NetWalker attacks targeting government organizations.
On Tuesday, the European Union Agency for Law Enforcement Cooperation announced that the Emotet botnet has been disrupted as a result of efforts from law enforcement and judicial authorities across several countries. By disrupting Emotet's infrastructure from the inside, the participating bodies were able to redirect the computers of people victimized by Emotet to an infrastructure controlled by law enforcement.