threat

“Front Desk Alert: Ransomware Gang’s Latest Tactics for Extortion”

Phone Desk Office Ransomware
When a hacker called the company that his gang claimed to breach, he felt the same way that most of us feel when calling the front desk: frustrated. The recording also shows how ransomware gangs are always looking for different ways to intimidate the companies they hack. I’m just trying to help you,” the hacker responds, growing increasingly frustrated. “So is that Dragonforce.com?”The hacker then threatens Beth, saying they will start calling the company’s clients, employees and partners. “Excuse me?” the hacker responds.

Filigran, the creator of OpenCTI, secures $16 million in funding for cutting-edge cybersecurity threat management solution

Filigran
Paris-based cybersecurity startup Filigran is capitalizing on the success of OpenCTI to build a suite of open-source threat management products. The company has already found some early traction with OpenCTI, its open-source threat intelligence platform. It’s a threat intelligence platform that lets you gather threat data from multiple sources in a single interface. OpenBAS can be used as a standalone product, but it works better if you’re already using OpenCTI as it can use the threat intelligence data in OpenCTI. There will be another two products in Filigran’s eXtended Threat Management (XTM) product suite that focus on data-driven risk analysis and crisis management.

Experts Warn: ConnectWise Software Vulnerabilities Being Exploited in Large-Scale Cyber Attacks

Yellow Padlock Cyber Rating Getty
Security researchers say a pair of easy-to-exploit flaws in a popular remote access tool used by more than a million companies around the world are now being mass-exploited, with hackers abusing the vulnerabilities to deploy ransomware and steal sensitive data. ConnectWise first disclosed the flaws on February 19 and urged on-premise customers to install security patches immediately. Finnish cybersecurity firm WithSecure said in a blog post Monday that its researchers have also observed “en-mass exploitation” of the ScreenConnect flaws from multiple threat actors. It’s not yet known how many ConnectWise ScreenConnect customers or end users are affected by these vulnerabilities, and ConnectWise spokespeople did not respond to TechCrunch’s questions. The company’s website claims that the organization provides its remote access technology to more than a million small to medium-sized businesses that manage over 13 million devices.

Uncovering the Intriguing World of Chinese Government Hacking: Inside the Revolutionary Spyware Leak

Isoon Green China Ap Spyware 1
Over the weekend, someone posted a cache of files and documents apparently stolen from the Chinese government hacking contractor, I-Soon. This leak gives cybersecurity researchers and rival governments an unprecedented chance to look behind the curtain of Chinese government hacking operations facilitated by private contractors. Since then, observers of Chinese hacking operations have feverishly poured over the files. Also, an IP address found in the I-Soon leak hosted a phishing site that the digital rights organization Citizen Lab saw used against Tibetans in a hacking campaign in 2019. Cary highlighted the documents and chats that show how much — or how little — I-Soon employees are paid.

“Renowned AI Experts Unite to Advocate for Anti-Deepfake Laws”

Hiretual Techcrunch Article 2 Image 2
Hundreds in the artificial intelligence community have signed an open letter calling for strict regulation of AI-generated impersonations, or deepfakes. While this is unlikely to spur real legislation (despite the House’s new task force), it does act as a bellwether for how experts lean on this controversial issue. Criminal penalties are called for in any case where someone creates or spreads harmful deepfakes. As you can see, there is no shortage of reasons for those in the AI community to be out here waving their arms around and saying “maybe we should, you know, do something? !”Whether anyone will take notice of this letter is anyone’s guess — no one really paid attention to the infamous one calling for everyone to “pause” AI development, but of course this letter is a bit more practical.

“The Growing Menace of Extortion: How it’s Replacing Ransomware as the Top Cyber Threat”

Ransomware Bugs Black Samuil Levich Getty
Why extortion is the new ransomware threat Ransomware actors are increasingly rebuffing encryption-based attacks in favor of plain extortion. While novel, this isn’t the only aggressive tactic used by ransomware and extortion gangs. What’s the difference between ransomware and extortion? The Ransomware Task Force describes ransomware as an “evolving form of cybercrime, through which criminals remotely compromise computer systems and demand a ransom in return for restoring and/or not exposing data.”In reality, ransomware attacks can fall on a spectrum of impact. This was demonstrated in the recent ransomware attack against Caesars Entertainment, which paid off the hackers in a bid to prevent the disclosure of stolen data.