![]() ![]() Jack Cable, the student, believes that this approach will increase transparency on the effects of ransomware. This tool can monitor payments made to bitcoin addresses linked to well-known gangs that carry out massive assaults. In light of these factors, a Stanford University student and security researcher built a comprehensive anti-ransomware tool. This typically makes it more difficult for law enforcement organizations to stop assaults and understand how to do so. The majority of cyberattack victims don’t report more serious attacks. Victims are not required by law to reveal the amount they pay hackers to unlock their network. Furthermore, ransomware is to blame for security lapses in major IT firms.įew individuals, nevertheless, are capable of analyzing the effects of a ransomware attack. And everyone is serious about the negative implications of ransomware now that Colonial Pipeline, a petroleum supplier, has been the target of several cyberattacks. "It's creating apex predators.Cable Stamos Group Ransomwhere 32M PageTechCrunch – There is no denying that ransomware poses a serious threat to many nations’ national security. "Because companies continue to pay millions of dollars in ransoms, so we have cybercriminals who are more determined and better resourced than ever before," he said. It shows that cybercriminals are able to acquire and use zero-day vulnerabilities and use them to cause disruption on an absolutely massive scale," he said. "The Kaseya incident really is a landmark event. ![]() While there's no strong evidence for how the gang was able to acquire it - whether the gang discovered it, stole it from researchers or purchased it from a broker - it shows that the gang has the capability and intent to acquire and deploy elite tools to orchestrate enormous hacking campaigns. It's also extremely worrying that REvil was able to deploy a zero-day vulnerability to hack Kaseya, said Brett Callow, an analyst at the cybersecurity company Emsisoft. "Ransomware groups don't abide by the same rules, and in some ways we could see it have a larger impact." They're criminals, so in many ways they have fewer boundaries," he said. "The difference here is REvil is financially motivated. Like a number of other Russian-speaking ransomware gangs, REvil has made a fortune in recent years by hacking individual organizations, locking their computers, stealing their files and demanding a payment to fix things and not leak what they stole. REvil, likely best known for hacking JBS, one of the world's largest international meat suppliers, has been active since at least early 2019. "What we're seeing here is the tactics of more sophisticated adversaries, like nation-states, trickling down toward these less sophisticated, more financially motivated criminal ransomware groups," said Jack Cable, a researcher at the Krebs Stamos Group, a cybersecurity consultancy. This gave them access to potentially tens or hundreds of thousands of victims. Most concerning is that they even deployed a zero-day, a cybersecurity term for a vulnerability in a program that software developers aren't aware of and thus haven't had time to fix.Īnd they didn't target a single victim, but rather a company with a small but key role in the internet ecosystem. The hackers behind the spree, the Russian-speaking ransomware gang REvil, adopted two new tactics previously not used by the ransomware gangs that continually hack targets around the world, but particularly in the U.S.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |