Nearly a year after Russia's invasion began, Ukraine's top cybersecurity response center says the number of registered cyber incidents has increased threefold and malware attacks have been the predominant force in the increase. Overall, Ukraine identified 181 million "suspicious" events in 2022.
European cyber agencies warned of cyberespionage threats tied to Chinese state hacking groups actively probing networks. The report comes about 18 months after the European Union denounced a flurry of Chinese hacking. China’s top diplomat is currently on a multiday trip through Europe.
In the latest weekly update, ISMG editors discuss the ESXiArgs ransomware campaign that has snared 2,800 victims, the data breach reported in an SEC filing by a multistate hospital chain, and Check Point's building of SD-WAN capabilities that are integrated with the company's network security stack.
A joint law enforcement operation led to the dismantling of what authorities describe as a Franco-Israeli "large-scale CEO fraud" criminal network that stole millions from French victims and laundered the proceeds via banks in China and Israel. The group's single biggest attack netted $40 million.
Accenture has bought Morphus to get more intelligence around fraud and other cybercrimes Brazilian criminals are perpetuating in the digital world. The Morphus acquisition will help Accenture customers take on financially motivated cyber fraud and insider threats that are pervasive in Brazil.
Threats from API and application vulnerabilities increased in 2022, but ransomware, human error and hygiene continue to pose the greatest threats to organizations, according to findings from CyberTheory's 2022 Performance Study. CyberTheory's Steve King shares how education can make a difference.
Attackers are continuing to target unpatched VMware hosts to infect them with ESXiArgs and RansomExx2 crypto-locking malware and hold them to ransom. VMware urges immediate updating, saying that the attacks don't appear to be targeting zero-day vulnerabilities but rather long-patched flaws.
Russian military intelligence agency hackers walloped Ukraine with waves of data wipers and phishing attacks, but the torrent of destructive cyberattacks doesn't appear to have been as effective as previous Russian cyberattacks, report researchers from the Google Threat Analysis Group and Mandiant.
A ransomware incident last fall that disrupted some of hospital chain CommonSpirit's operations for at least a month has cost the organization $150 million in lost revenue, remediation and other expenses so far. CommonSpirit also likely faces additional legal expenses.
Negotiations between the LockBit ransomware-as-a-service gang and Royal Mail appear to have broken down shortly after a postal representative called the criminal group's $80 million extortion demand "absurd." A LockBit ransomware attack incapacitated Royal Mail's international shipping operation.
The California city of Oakland is in a state of emergency as its response to a ransomware attack enters its second week. The attack did not affect emergency systems, including 911 dispatch and fire services, or the city's financial systems, the city says.
Vladislav Klyushin, who ran a Moscow-based IT services firm associated with the Russian government, has been found guilty of running a criminal hacking scheme that earned $90 million via insider trading. He faces up to 50 years in prison. His four alleged co-conspirators remain at large.
As ransomware continues to disrupt British organizations, the U.K. for the first time has sanctioned alleged cybercriminals, including accused Conti and TrickBot operators. Ransomware victims must conduct due diligence before paying any ransom, as violating sanctions carries severe penalties.
Police busted nine members of a cyber fraud gang that targeted mainly Americans. Spanish police arrested eight members, and U.S. authorities arrested one. In less than a year, the ring pocketed 5 million euros in scammed funds, say the Spanish National Police.
Group-IB says a July 2022 spear-phishing attempt on its own employees came from the Chinese threat actor known variously as Tonto Team and CactusPete. Tonto Team may be a unit of China's People's Liberation Army. Malwarebytes says the group has ramped up spying against Russian government agencies.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.eu, you agree to our use of cookies.