US government launches plans to cut cybercriminals off from cryptocurrency

The White House on Thursday announced a flurry of actions launched by a new interagency task force to combat ransomware. The updates on the White House’s plan to tackle ransomware comes on the heels of the third major ransomware attack to pose a serious threat to the U.S. national security in as many months. The Russia-tied group REvil hit Florida-based IT firm Kaseya earlier this month, potentially affecting more than 1,500 companies. The group’s websites recently went dark for reasons that are still unclear. The senior administration declined to comment on whether the United States has or will take action against the group. Chief among the White House task force’s new efforts is to cut groups like REvil off from virtual currencies, which they use to collect ransom from victims and sell services to affiliates. The Treasury Department will support the implementation of money laundering requirements for virtual currency exchanges […]

The post US government launches plans to cut cybercriminals off from cryptocurrency appeared first on CyberScoop.

Continue reading US government launches plans to cut cybercriminals off from cryptocurrency

Cybereason vs. Prometheus Ransomware

Prometheus is a relatively new variant of the Thanos ransomware that is operated independently by the Prometheus group, and was first observed in February of 2021. In just a short period of time, Prometheus caused a lot of damage, and breached over 40 … Continue reading Cybereason vs. Prometheus Ransomware

What’s next for the National Cyber Director?

By Jean Schaffer, Federal CTO, Corelight As the first National Cyber Director begins to settle into office, private industry is very hopeful that this will be one of the turning points to solidify a true private/public partnership for raising the cyber… Continue reading What’s next for the National Cyber Director?

REvil ransomware group vanishes after mounting US pressure

By Sudais Asif
Currently, Hackread.com can confirm that the official website of the REvil group along with its chat and payment gateways are offline.
This is a post from HackRead.com Read the original post: REvil ransomware group vanishes after mountin… Continue reading REvil ransomware group vanishes after mounting US pressure

REvil ransomware gang sites go dark, for reasons that remain unclear

The ransomware gang behind a string of recent attacks that netted tens of millions of dollars may have been too successful for its own good. REvil, the Russian-speaking hacking crew that claimed responsibility for a hack at the IT firm Kaseya that yielded perhaps thousands of victims, largely went dark Tuesday morning, according to multiple security researchers. The dark web site where REvil typically posts victim data and a payment site suddenly went down, while one site apparently ceased responding to Domain Name System requests. The cause of the outages was not immediately clear. Ransomware gangs frequently shutter their operations, update their tradecraft or evolve into different extortion techniques after profitable periods. The White House recently said it reserves the right to “take any necessary action to defend its people and its critical infrastructure” in the face of costly digital extortion attacks. REvil, widely suspected to be based in Russia, […]

The post REvil ransomware gang sites go dark, for reasons that remain unclear appeared first on CyberScoop.

Continue reading REvil ransomware gang sites go dark, for reasons that remain unclear

CISO Roundtable: Ransomware Attacks and the True Cost to Business

A recent global research report conducted by Cybereason, titled Ransomware: The True Cost to Business, revealed that the vast majority of organizations that have suffered a ransomware attack have experienced significant impact to the business, inc… Continue reading CISO Roundtable: Ransomware Attacks and the True Cost to Business

Kaseya issues patches for vulnerabilities exploited in ransomware attack

By Deeba Ahmed
Kaseya VSA has released patches for 3 critical vulnerabilities exploited by the REvil ransomware gang in ransomware attack earlier this month.
This is a post from HackRead.com Read the original post: Kaseya issues patches for vulnerabili… Continue reading Kaseya issues patches for vulnerabilities exploited in ransomware attack

Biden again urges Putin to disrupt ransomware gangs operating inside Russia

President Joe Biden pushed Russian President Vladimir Putin to disrupt ransomware groups operating within Russian borders in a phone call Friday, according to a White House statement. “I made it very clear to him that the United States expects [that] when a ransomware operation is coming from his soil even though it’s not sponsored by the state, we expect [Russia] to act if we give them enough information to act on who that is,” Biden told reporters after the call. The call came on the heels of the latest major cyberattack against a U.S. company. REvil, a ransomware group believed to be in Russia, hit Florida-based IT software company Kaseya last week. Researchers have suggested that the hack affected between 1,500 to 2000 of the firm’s clients as well as likely thousands of more customers of those clients. The Kremlin says it has not received any official requests from U.S. […]

The post Biden again urges Putin to disrupt ransomware gangs operating inside Russia appeared first on CyberScoop.

Continue reading Biden again urges Putin to disrupt ransomware gangs operating inside Russia

Email claiming Kaseya patch drops Cobalt Strike malware

By Sudais Asif
The malicious email campaign is claiming to contain a patch for the Kaseya vulnerability but in fact, it is the infamous Cobalt Strike malware.
This is a post from HackRead.com Read the original post: Email claiming Kaseya patch drops Co… Continue reading Email claiming Kaseya patch drops Cobalt Strike malware

Kaseya Left Customer Portal Vulnerable to 2015 Flaw in its Own Software

Last week cybercriminals deployed ransomware to 1,500 organizations that provide IT security and technical support to many other companies. The attackers exploited a vulnerability in software from Kaseya, a Miami-based company whose products help system administrators manage large networks remotely. Now it appears Kaseya’s customer service portal was left vulnerable until last week to a data-leaking security flaw that was first identified in the same software six years ago. Continue reading Kaseya Left Customer Portal Vulnerable to 2015 Flaw in its Own Software