Browsed by
Author: Greg Swiecicki

New Exaggerated Lion Threat Group Leverages G Suite To Launch BEC Scams

New Exaggerated Lion Threat Group Leverages G Suite To Launch BEC Scams

The gang uses Google’s unique G Suite phishing technique to perform checks to collect fake payments. The new cybercriminal group uses domains that appear to be secure, with the words “secure”, “ssl”, “office”, “email”, and “management.” The type of fraud is huge these days. The unique and extremely creative activities surprise everyone, and above all the way and strong hits on companies, contributing to huge losses.

https://cyware.com/news/new-exaggerated-lion-threat-group-leverages-g-suite-to-launch-bec-scams-5d46cec5

The Veeam

The Veeam

The Veeam Availability Suite has advanced data protection features designed for NAS storage networks. The extended protection is to support against harmful ransomware and the Multi-VM Instant Recovery solution for automating disaster recovery. The V10 package has 150 new features and extensions available. It turns out that 73% of companies do not meet the users’ needs regarding access to applications and their data. Many companies want to use cloud data management tools. Considering all the needs of companies, Veeam decided to expand and deepen its solutions providing more extensive platform support and better control over data. Veeam Availability Suite v10 is designed to provide adequate protection against ransomware attacks. A more comprehensive set of functions for creating immutable backups has introduced to ensure greater security. The manufacturer assures that these functions will minimize costs, save time, and exceed planned data recovery goals.

PayPal Users Hit With Fraudulent ‘Target’ Charges via Google Pay

PayPal Users Hit With Fraudulent ‘Target’ Charges via Google Pay

Hackers charge their PayPal accounts using unknown methods via GooglePay. The scam started with minimal amounts, completely invisible, after a successful test, the attacks widened through numerous store fees such as Target stores in the US. The problem started when users had difficulty getting a refund. It is hard to say what causes the problem; there are speculations that this might be an exploit; however, the fact that virtual cards in Germany were hit with fees from US purposes.

https://www.bleepingcomputer.com/news/security/paypal-users-hit-with-fraudulent-target-charges-via-google-pay/

DoppelPaymer Ransomware Launches Site to Post Victim’s Data

DoppelPaymer Ransomware Launches Site to Post Victim’s Data

DoppelPaymer Ransomware operators launched the “Dopple Leaks” website based on Maze, through which files will leak and embarrass non-paying random victims. Unfortunately, Sodinokibi, Nemty, and DoppelPaymer are to start the same practice. These new tactics intended to intimidate and enforce the ransom; ransomware operators will release files to the public site along with a message that may expose them to a government fine or lawsuit. Unfortunately, concealing attacks can lead to long-term risk, loss of many data, and identities.

https://www.bleepingcomputer.com/news/security/doppelpaymer-ransomware-launches-site-to-post-victims-data/?&web_view=true

Cyberattack fears are delaying business innovation

Cyberattack fears are delaying business innovation

The concerns that are associated with cybersecurity, companies are delaying business innovation. According to CISO and CTO surveys, it appears that a large proportion of companies have slowed down IT projects, dealing with all security issues. A slow-motion may help to notice software vulnerabilities. As I once mentioned in one of my posts, we should slow down and overcome a critical situation, which is cyberattacks.

https://www.itproportal.com/news/cyberattack-fears-are-delaying-business-innovation/

Linux and malware: Should you worry?

Linux and malware: Should you worry?

Nowadays, systems that seemed to be least vulnerable to date are the real target of hackers. I’m talking about Linux. Over a year ago, ESET researchers found a plethora of OpenSSH backdoors, a weapon preferred by attackers that want to take control of servers. Researchers have found 21 families of malicious Linx-based software, including several undocumented. Operation Windigo brought together 25,000 servers, most of which based on Linux. The compromised machines were used to steal credentials, spam campaigns, redirect Internet traffic to malicious content, and other malicious activities.

https://www.welivesecurity.com/2020/02/20/linux-malware-should-you-worry/

Threat spotlight: RobbinHood ransomware takes the driver’s seat

Threat spotlight: RobbinHood ransomware takes the driver’s seat

The ransomware, which has been named very sarcastically, Robin Hood wreaks havoc not only with files, but also in city budgets. Cities that have been attacked and have paid a hefty ransom amount were Baltimore, Maryland and Greenville, North Carolina. The ransom notes make it very clear that other methods of data recovery besides paying the ransom make no sense. Do you have a similar opinion? I instead think that there is always a way out, rather than paying taxpayers’ money to fraudsters.

How it works :

 “Once the attacker gets sufficient access to the system, researchers have found that in some cases they are introducing the vulnerable Gigabyte kernel driver. This driver is signed by the motherboard manufacturer and will be accepted by Windows due to the digital signature. But the driver has a long-term vulnerability on CVE-2018-19320, which allows a local attacker to take full control of the affected system. “

https://blog.malwarebytes.com/threat-spotlight/2020/02/threat-spotlight-robbinhood-ransomware-takes-the-drivers-seat/?web_view=true

Some Android Malware Can Break Your Phone When You Delete It

Some Android Malware Can Break Your Phone When You Delete It

Android is a substantial operating system in the world, used in watches, TVs, and cars, which means that 1/4 of the population uses Android devices. Unfortunately, the emergence of new encrypted malicious software can harm the reputation of services. Malicious software automatically installs applications then prevents the user from using the phone when uninstalling it.

https://noproblem.buzz/wp-admin/post-new.php

https://www.cybersecurity-insiders.com/what-is-a-gen-6-cyber-attack/

https://www.cybersecurity-insiders.com/what-is-a-gen-6-cyber-attack/

Businesses and individuals are vulnerable to cyber-attacks. Recent research by Check Point analysts shows that most companies do not have a basic cyber defense, and those they have can fight at 3 generation attack( GEN ) when today we have 6 generation cyber-attacks ( GEN ).

https://www.cybersecurity-insiders.com/what-is-a-gen-6-cyber-attack/