fbpx
Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Penetration Testing

          Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Brazil’s Court System Under Massive RansomExx Ransomware Attack

Brazil’s Court System Under Massive RansomExx Ransomware Attack

Brazil’s Superior Court of Justice was hit by a ransomware attack on Tuesday during judgment sessions that were taking place over video conference.

“The Superior Court of Justice (STJ) announces that the court’s information technology network suffered a hacker attack on Tuesday (3), during the afternoon, when the six group classes’ judgment sessions took place,” STJ President Humberto Martins said in an official statement on the Supreme Federal Court’s website.

“The Secretariat for Information and Communication Technology (STI) is working on systems recovery to restore all court services as quickly as possible.”

Brazilian journalist Mateus Nunes has told BleepingComputer that the websites of multiple other Brazilian federal government agencies are also currently offline.

However, it is not yet known if they were attacked by the same threat actors or if they are hosted on the same site as the courts.

Also Read: Advisory Guidelines on Key Concepts in the PDPA: 23 Chapters

Systems offline two days later

The systems of the Superior Tribunal de Justiça (aka STJ) were shut down to stop the spread throughout the court’s network but not before all case files and backups were encrypted according to STJ IT specialists.

Two days after the ransomware attack took place, the Superior Court of Justice website and systems are still offline until all systems will be fully restored.

“A Domain Admin account was exploited which allowed the hacker to have access to our servers, to enter into administration groups of the virtual environment and, finally, encrypt a good part of our virtual machines,” as one of the IT technicians told O Bastidor.

STJ “will operate on duty until next Monday,” November 9, and all judgment sessions, virtual and / or by video conference will be either suspended or canceled until the court network’s security will be restored.

The court’s IT department also advised all users including judges, interns, and outsourced workers not to use any computers (personal ones included) if they were or are still connected to the court’s network.

“According to the resolution, administrative, civil and criminal procedural deadlines are suspended from the 3rd to the 9th of November (inclusive), returning to flow on the 10th,” a statement on the court’s website said.

“For the purpose of counting the term in criminal proceedings, the suspension period will be considered a reason of force majeure, according to the provision of paragraph 4 of article 798 of the Code of Criminal Procedure (CPP). Also according to the resolution, the measures can be reviewed at any time, depending on the result of efforts to normalize the systems.”

RansomExx behind the attack

While the official STJ statements do not mention the ransomware gang responsible for this attack, a ransom note recovered from one of the encrypted computers shows that the RansomExx gang was behind it.

RansomExx sent BleepingComputer the following message when contacted for more details regarding the attack:

Hello,
Ignore this message if you aren't officially represent whole affected company.
Send us any encrypted file (not greater than 1MB) for test decryption.
Then we will send you detailed instructions.
This step is necessary because we don't share such information for anyone except authorized persons.
Speak english.

According to an anonymous source, Pernambuco State Court of Justice (Tribunal de Justiça do Estado de Pernambuco — TJPE) systems were also hit by RansomExx on October 27, with their files being encrypted using the .tjpe911 extension.

RansomExx is a rebranded Defray777 ransomware version that became a lot more active during June 2020 and known for attacking high-profile organizations.

Also Read: Letter of Consent MOM: Getting the Details Right

STJ ransom note
STJ ransom note

The Texas Department of Transportation (TxDOT), Konica MinoltaIPG Photonics, and Tyler Technologies are among the gang’s previous victims.

During their attacks, RansomExx’s operators compromise the victims’ networks and steal unencrypted sensitive documents while spreading laterally to other systems.

Once the RansomExx operators successfully compromise the victims’ Windows domain controller, they deploy the ransomware payloads on all available network devices.

This is a developing story …

H/T Altieres

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us