Au coeur d’une attaque de la première brèche à la demande de rançon #ransomware

In Cyber-attaques / fraudes
Déroulez ici

Comprendre les techniques utilisées par les criminels est bien sûr essentiel pour savoir comment se protéger.

Des chercheurs de la société de SentinelOne ont examiné comment des hackers ont lancé une attaque de ransomware Ryuk via une petite faille de sécurité dans un réseau d’entreprise. A découvrir dans les articles ci-dessous.

Inside a ransomware attack: From the first breach to the ransom demand | ZDNet

Security researchers have revealed the anatomy of a ransomware attack, showing how cyber criminals gained access to a network and deployed ransomware — all in the space of just two weeks. Researchers from tech security company SentinelOne examined a server that was used by criminals in October last year to turn a small security breach in a corporate network into a damaging Ryuk ransomware attack.

Et juste pour se rappeler que la menace est bien réelle 😰

How hackers extorted $1.14m from a US university

A leading medical-research institution working on a cure for Covid-19 has admitted it paid hackers a $1.14m (£910,000) ransom after a covert negotiation witnessed by BBC News. The Netwalker criminal gang attacked University of California San Francisco (UCSF) on 1 June. IT staff unplugged computers in a race to stop the malware spreading.

University of California San Francisco pays ransomware gang $1.14m as BBC publishes ‘dark web negotiations’

A California university which is dedicated solely to public health research has paid a $1.14m ransom to a criminal gang in the hopes of regaining access to its data. The University of California San Francisco (UCSF) paid out in the apparently successful hope that the Netwalker group would send it a decryption utility for its illicitly encrypted files, which it referred to as “data …

Ransomware hackers reap $1 million from California university researching COVID-19

Written by Jeff Stone Jun 29, 2020 | CYBERSCOOP A university in California previously reported to be conducting COVID-19 research has paid $1.14 million to digital scammers who locked the schools’ systems and demanded an extortion fee.

La newsletter