Ransomware
Yakult Australia confirms ‘cyber incident’ after 95 GB data leak
Yakult Australia, manufacturer of a probiotic milk drink, has confirmed experiencing a “cyber incident” in a statement to BleepingComputer. Both the company’s Australian and New Zealand IT systems have been affected. Cybercrime actor DragonForce which claimed responsibility for the attack has also leaked 95 GB of data. […]
Read MorePlay Ransomware Detection: Ongoing Ransomware Attacks Against Businesses and Critical Infrastructure in the U.S., South America, and Europe
At the end of November 2023, leading U.S. cybersecurity agencies, in collaboration with international partners, issued an alert covering LockBit 3.0 ransomware attacks as part of their #StopRansomware effort aimed at boosting cybersecurity awareness. Recently, another joint Cybersecurity Advisory came out aimed at notifying defenders of the ongoing attacks by the Play ransomware group. In […]
The post Play Ransomware Detection: Ongoing Ransomware Attacks Against Businesses and Critical Infrastructure in the U.S., South America, and Europe appeared first on SOC Prime.
Double-Extortion Play Ransomware Strikes 300 Organizations Worldwide
The threat actors behind the Play ransomware are estimated to have impacted approximately 300 entities as of October 2023, according to a new joint cybersecurity advisory from Australia and the U.S.
“Play ransomware actors employ a double-extortion model, encrypting systems after exfiltrating data and have impacted a wide range of businesses and critical infrastructure organizations in North
Vans and North Face owner VF Corp hit by ransomware attack
American global apparel and footwear giant VF Corporation, the owner of brands like Supreme, Vans, Timberland, and The North Face, has disclosed a security incident that caused operational disruptions. […]
Read MoreALPHV/BlackCat Takedown Appears to Be Law Enforcement Related
Threat intel sources confirm the ransomware group’s site has been shuttered by law enforcement.
Read MoreOkta Discloses Broader Impact Linked to October 2023 Support System Breach
Identity services provider Okta has disclosed that it detected “additional threat actor activity” in connection with the October 2023 breach of its support case management system.
“The threat actor downloaded the names and email addresses of all Okta customer support system users,” the company said in a statement shared with The Hacker News.
“All Okta Workforce Identity Cloud (WIC) and Customer
Police dismantle ransomware group behind attacks in 71 countries
In cooperation with Europol and Eurojust, law enforcement agencies from seven nations have arrested in Ukraine the core members of a ransomware group linked to attacks against organizations in 71 countries. […]
Read MoreRansomware attack on indie game maker wiped all player accounts
A ransomware attack on the “Ethyrial: Echoes of Yore” MMORPG last Friday destroyed 17,000 player accounts, deleting their in-game items and progress in the game. […]
Read MoreBeware of new Ransomware Tactic
2 days ago ALPHV/BlackCat in a bid to apply further pressure to get their latest victim MeridanLink to pay, filed a compliant against them with the U.S. Securities and Exchange Commission (SEC) for failing to report a breach! This is an interesting tactic and will apply even more pressure on organisations, CISOs’ and Boards to…
Read MoreCyber Resilience – Are you prepared?
In this 4 min video clip, I share my top 5 practical strategies that you should be adopting as an organisation to remain cyber resilient. Whilst there is no silver bullet these should reduce risk and keep you safe from cyber crime attacks such as ransomware.
Read More