fbpx
Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Penetration Testing

          Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

The Week In Ransomware – November 13th 2020 – Extortion Gone Wild

The Week In Ransomware – November 13th 2020 – Extortion Gone Wild

There were not many known large ransomware attacks this week, but we have seen ransomware operations evolving their tactics to extort their victims further.

The largest attack this week was against Tawainese laptop maker Compal, who was hit by DoppelPaymer. The threat actors are demanding $17 million to receive a decryptor and not to leak stolen files.

Ransomware operations have also begun new tactics this week to pressure their victims into paying a ransom.

After their attack on Campari, Ragnar Locker hacked a Facebook advertiser’s account to run Facebook ads promoting their attack and threatening to release more data. Their strategy is to apply as much pressure as they can on the victim through public awareness in the hopes it will force them to pay the ransom.

Another new tactic announced by DarkSide is their plans to create a fault-tolerant distributed storage service based out of Iran or other “unrecognized republics.” Their goal is to use this storage as a platform to leak victim’s data for six months, and due to its distributed nature, if one server is shut down by law enforcement, the other servers will still be able to leak the data.

Otherwise, this week has been mostly new variants of existing ransomware families.

Contributors and those who provided new ransomware information and stories this week include: @serghei@malwrhunterteam@jorntvdw@PolarToffee@VK_Intel@Ionut_Ilascu@demonslay335@LawrenceAbrams@struppigel@FourOctets@malwareforme@Seifreed@DanielGallagher@fwosar@BleepinComputer@LukasZobal@siri_urz@JAMESWT_MHT@Unit42_Intel@briankrebs@Kangxiaopao@MsftSecIntel@campuscodi@Intel_by_KELA@briankrebs, and @IntelAdvanced.

Also Read: 15 Best Tools For Your Windows 10 Privacy Settings Setup

November 7th 2020

How Ryuk Ransomware operators made $34 million from one victim

One hacker group that is targeting high-revenue companies with Ryuk ransomware received $34 million from one victim in exchange for the decryption key that unlocked their computers.

When Threat Actors Fly Under the Radar: Vatet, PyXie and Defray777

While researching these malware families, we found that there were several consistencies between Vatet, PyXie and Defray777 that strongly suggest that all three malware families were created, and are currently maintained by, the same financially motivated threat group.

November 8th 2020

November 9th 2020

Fake Microsoft Teams updates lead to Cobalt Strike deployment

Ransomware operators are using malicious fake ads for Microsoft Teams updates to infect systems with backdoors that deployed Cobalt Strike to compromise the rest of the network.

New STOP ransomware variant

Michael Gillespie found a new STOP ransomware variant that appends the .agho extension to encrypted files.

New Dusk 2 ransomware variant

Lukáš Zobal found the new Dusk 2 ransomware variant that appends the .DUSK extension to encrypted files and drops a ransom note named README.txt.

Laptop maker Compal hit by ransomware, $17 million demanded

Taiwanese laptop maker Compal Electronics suffered a DoppelPaymer ransomware attack over the weekend, with the attackers demanding an almost $17 million ransom.

Compal ransom note

November 10th 2020

New HowAreYou Ransomware

S!ri found a new ransomware that appends the .howareyou extension to encrypted files.

Also Read: How Formidable is Singapore Cybersecurity Masterplan 2020?

HowAreYou

New AgeLocker ransomware variant

JAMESWT found a new AgeLocker ELF ransomware (targets QNAP devices) that adds the .kmd suffix to encrypted files.

November 11th 2020

Recent ransomware wave targeting Israel linked to Iranian threat actors

Two recent ransomware waves that targeted Israeli companies have been traced back to Iranian threat actors.

New Devos Ransomware

xiaopao found a new ransomware that appends the .devos extension. This is different than Phobos, which also utilized this extension.

Ransomware gang hacks Facebook account to run extortion ads

​A ransomware group has now started to run Facebook advertisements to pressure victims to pay a ransom.

November 12th 2020

Steelcase furniture giant down for 2 weeks after ransomware attack

Office furniture giant Steelcase says that no information was stolen during a Ryuk ransomware attack that forced them to shut down global operations for roughly two weeks.

November 13th 2020

DarkSide ransomware is creating a secure data leak service in Iran

The DarkSide Ransomware operation claims they are creating a distributed storage system in Iran to store and leak data stolen from victims. To show they mean business, the ransomware gang has deposited $320 thousand on a hacker forum.

CRAT wants to plunder your endpoints

Cisco Talos has recently discovered a new version of the CRAT malware family. This version consists of multiple RAT capabilities, additional plugins and a variety of detection-evasion techniques. In the past, CRAT has been attributed to the Lazarus Group, the malicious threat actors behind multiple cyber campaigns, including attacks against the entertainment sector.

New STOP ransomware variant

Michael Gillespie found a new STOP ransomware variant that appends the .vvoa extension to encrypted files.

LV Ransomware group appears to be using Revil software

Michael Gillespie found a ransomware group known as “LV” utilizing REvil software. 

That’s it for this week! Hope everyone has a nice weekend!

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us