Security News

3AM ransomware stole data of 464,000 Kootenai Health patients
2024-08-13 15:23

Kootenai Health has disclosed a data breach impacting over 464,000 patients after their personal information was stolen and leaked by the 3AM ransomware operation. [...]

Feds bust minor league Radar/Dispossessor ransomware gang
2024-08-13 15:23

The Dispossessor ransomware group is the latest to enter the cybercrime graveyard with the Feds proudly laying claim to the takedown. The FBI said it took down the "Radar/Dispossessor" group.

Ransom Cartel, Reveton ransomware owner arrested, charged in US
2024-08-13 13:33

Belarusian-Ukrainian national Maksim Silnikau was arrested in Spain and is now extradited to the USA to face charges for creating the Ransom Cartel ransomware operation in 2021 and running a...

Australian gold mining company hit with ransomware
2024-08-13 11:16

Australian gold mining firm Evolution Mining has announced on Monday that it became aware on 8 August 2024 of a ransomware attack impacting its IT systems, and has been working with its external cyber forensic experts to investigate the incident. "Based on work to date, the Company believes the incident is now contained," Evolution Mining said.

FBI Shuts Down Dispossessor Ransomware Group's Servers Across U.S., U.K., and Germany
2024-08-13 09:04

The U.S. Federal Bureau of Investigation on Monday announced the disruption of online infrastructure associated with a nascent ransomware group called Dispossessor. "Since its inception in August 2023, Radar/Dispossessor has quickly developed into an internationally impactful ransomware group, targeting and attacking small-to-mid-sized businesses and organizations from the production, development, education, healthcare, financial services, and transportation sectors," the FBI said in a statement.

International investigation shuts down Radar/Dispossessor ransomware group
2024-08-13 08:48

FBI Cleveland announced the disruption of "Radar/Dispossessor"-the criminal ransomware group led by the online moniker "Brain"-and the dismantling of three U.S. servers, three United Kingdom servers, 18 German servers, eight U.S.-based criminal domains, and one German-based criminal domain. Originally focused on entities in the United States, the investigation discovered 43 companies as victims of the attacks, from countries including Argentina, Australia, Belgium, Brazil, Honduras, India, Canada, Croatia, Peru, Poland, the United Kingdom, the United Arab Emirates, and Germany.

FBI disrupts the Dispossessor ransomware operation, seizes servers
2024-08-12 21:48

The FBI announced on Monday that it seized the servers and websites of the Radar/Dispossessor ransomware operation following a joint international investigation. [...]

Australian gold producer Evolution Mining hit by ransomware
2024-08-12 18:02

Evolution Mining has informed that it has been targeted by a ransomware attack on August 8, 2024, which impacted its IT systems. [...]

74% of ransomware victims were attacked multiple times in a year
2024-08-12 04:00

Survey of nearly 1,000 IT and security professionals shows 83% of organizations were targeted by ransomware attacks in the past year with a high degree of success, sounding alarming trends in attack frequency, severity, and consequences. Companies are suffering successful ransomware attacks multiple times within the same year - resulting in closures, layoffs, loss of revenue and customer trust, and cancelation of cyber insurance.

Malware-as-a-Service and Ransomware-as-a-Service lower barriers for cybercriminals
2024-08-09 04:30

The sophistication of cyber threats has escalated dramatically, with malicious actors' deploying advanced tactics, techniques, and procedures to exploit vulnerabilities and evade detection, according to Darktrace. "The threat landscape continues to evolve, but new threats often build upon old foundations rather than replacing them. While we have observed the emergence of new malware families, many attacks are carried out by the usual suspects that we have seen over the last few years, still utilizing familiar techniques and malware variants," comments Nathaniel Jones, Director of Strategic Threat and Engagement at Darktrace.