gtbarry, to Black_cats
@gtbarry@mastodon.social avatar

US offers $10 million bounty for info on 'Blackcat' hackers who hit UnitedHealth

The U.S. State Department on Wednesday offered up to $10 million for information on the "Blackcat" ransomware gang who hit the UnitedHealth Group's tech unit and snarled insurance payments across America.

#AlphV #blackcat #RaaS #UnitedHealth #UHG #ChangeHealthcare #Optum #ransomware #malware #security #cybersecurity #Hacking #Hacked

https://www.reuters.com/technology/cybersecurity/us-offers-10-million-bounty-info-blackcat-hackers-who-hit-unitedhealth-2024-03-27/

itnewsbot, to security

US prescription market hamstrung for 9 days (so far) by ransomware attack - Enlarge (credit: Getty Images)

Nine days after a Russian-speak... - https://arstechnica.com/?p=2007373 #criticalinfrastructure #healthcare #ransomware #security #biz#alphv

AAKL, to Cybersecurity
simontsui, to macos

BitDefender identified a MacOS backdoor written in Rust that has possible link to ALPHV/BlackCat ransomware group. "Specifically, three out of the four command and control servers have been previously associated with ransomware campaigns targeting Windows clients. ALPHV/BlackCat is a ransomware family (also written in Rust), that first made its appearance in November 2021, and that has pioneered the public leaks business model." IOC provided.
🔗 https://www.bitdefender.com/blog/labs/new-macos-backdoor-written-in-rust-shows-possible-link-with-windows-ransomware-group/

YourAnonRiots, to Black_cats Japanese

Ransomware gang #ALPHV/#BlackCat said it was expanding the range of victims its network of affiliates could target to now include nuclear power plants, hospitals and critical infrastructure. #cybersecurity #infosec #ITsecurity #ransomware https://www.scmagazine.com/news/alphv-blackcat-dangles-threat-to-critical-infrastructure-after-allegedly-unseizing-site-from-fbi

itnewsbot, to security

AlphV ransomware site is “seized” by the FBI. Then it’s “unseized.” And so on. - Enlarge / Shortly after the FBI posted a notice saying it had seized th... - https://arstechnica.com/?p=1992382 #ransomware #security #biz#alphv #fbi #tor

PogoWasRight, to Black_cats

Has DOJ given up on trying to display its seizure banner on the original AlphV onion site, or are they just taking a break from the back-and-forth? As of my checks this morning, AlphV's "unseized" splash page is what visitors to the old site see.

#ransomware #seizure #enforcement #DOJ #BlackCat #AlphV

thenewoil, to Black_cats
PogoWasRight, to random

Here's DOJ's press release on the alphv variant takedown:

Justice Department Disrupts Prolific ALPHV/Blackcat Ransomware Variant:

https://www.justice.gov/opa/pr/justice-department-disrupts-prolific-alphvblackcat-ransomware-variant

#ransomware #alphv #enforcement

brett, to Black_cats

Hit by #Alphv? Need a free decryptor to get your data back? The FBI has gift for you! #Ransomware #BlackCat

https://www.justice.gov/opa/pr/justice-department-disrupts-prolific-alphvblackcat-ransomware-variant

brett, to Black_cats
GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

Apparently law enforcement have seized AlphV ransomware's portal (it had reappeared in the past week and started listing victims again). http://alphvmmm27o3abo3r2mlmjrpdmzle3rykajqc5xsj7j7ejksbpsa36ad.onion/

#threatintel

GossiTheDog,
@GossiTheDog@cyberplace.social avatar

Looks like the #AlphV ransomware takedown by law enforcement has gone wrong. #threatintel HT @brett

0x58, to Cybersecurity

📨 Latest issue of my curated and list of resources for week /2023 is out! It includes the following and much more:

➝ 🔓 🇺🇸 U.S. nuclear research lab impacts 45,000 people
➝ 🇩🇪 Germany Says Customer Data Stolen in Attack
➝ 🔓 🏧 ATM company Coin Cloud got hacked. Even its new owners don’t know how
➝ 🔓 🇺🇸 Norton discloses data breach after May ransomware attack
➝ 🇷🇺 Russian SVR-Linked Targets TeamCity Servers in Ongoing Attacks
➝ 👥 ransomware now poaching , NoEscape affiliates
➝ 🇻🇳 💻 seizes domains used to sell fraudulent accounts
➝ 🇫🇷 💸 French police arrests Russian suspect linked to ransomware
➝ 🇨🇳 Chinese APT Volt Typhoon Linked to Unkillable SOHO Router
➝ 🇺🇦 🇷🇺 Ukrainian military says it hacked 's federal tax agency
➝ 🇨🇳 🚪 Researchers Unmask Sandman APT's Hidden Link to China-Based Backdoor
➝ 🇺🇦 📡 ’s largest mobile communications provider down after apparent
➝ 🇪🇸 Kelvin Security hacking group leader arrested in
➝ 🔻 👮🏻‍♂️ ransomware site outage rumored to be caused by law enforcement
➝ 📹 🕵🏻‍♂️ devices broadcasted private video to other users’ accounts
➝ 🇷🇺 🇪🇺 Russian Diplomat Expelled Amid EU Spy Purge Is Now An OSCE Election Observer In Serbia
➝ 🇺🇸 Harry Coker confirmed to be the next National Cyber Director
➝ 🇪🇸 🇺🇸 Spain expels two US spies for infiltrating secret service
➝ 📝 Unveils EMB3D Threat Model for Embedded Devices Used in Critical Infrastructure
➝ 🩹 Patch Tuesday: Electromagnetic Fault Injection, Critical Redis Vulnerability
➝ 🦠 🇵🇸 New Pierogi++ by Cyber Gang Targeting Palestinian Entities
➝ 🦠 🇮🇷 Iranian State-Sponsored Group Deploys 3 New Malware Downloaders
➝ 🦠 🇩🇪 New MrAnon Stealer Malware Targeting German Users via Booking-Themed
➝ 🍪 's New Tracking Protection in Chrome Blocks Third-Party
➝ 🐛 👨🏻‍💻 Unveils Open Source Vulnerability Impact Scoring System
➝ 🩹 🧱 backports RCE fix after attacks on unsupported
➝ 🔓 🧱 Over 1,450 servers exposed to RCE attacks via bug chain
➝ 🩹 🍏 Ships iOS 17.2 With Urgent Security
➝ 🐛 Over 30% of apps use a vulnerable version of the library

📚 This week's recommended reading is: "Black Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters (2nd Edition)" by Justin Seitz and Tim Arnold

Subscribe to the newsletter to have it piping hot in your inbox every week-end ⬇️

https://infosec-mashup.santolaria.net/p/infosec-mashup-week-502023

adamshostack, to random

New blog, "Think like #ALPHV " extends my series on thinking like an attacker.

https://shostack.org/blog/think-like-alphav/

brett, to random

#Alphv has listed a new victim. #Ransomware

PogoWasRight, to Black_cats

Checking AlphV's site today, they appear to be back online, but other than the API, there is no content .Their qTox status has been changed to "Everything is working."

DataBreaches contacted the admin on qTox to ask whether the site was really working and about the previous content -- whether it would be restored or was all gone. Admin ALPHV answered:

фдд цщкл
all work
files remove
all

I followed up: "So all of the old posts and data are gone? You are starting over? "

Admin ALPHV replied:
"All new only"

So it looks like they probably did lose everything they had, which may well result in affiliates who didn't get paid jumping ship and going to other groups.

And so far, there is still no statement from DOJ (I've just sent another request).

It's seems highly likely that this was law enforcement-related, but belief is not proof.

In other ransomware drama, some folks on a Russian forum have accused NoEscape of pulling an exit scam and cheating them of money. One noted they had also removed their forum deposit. NoEscape's status on the forum has been changed by the moderator.

#AlphV #BlackCat #NoEscape #Disruption #ExitScam

@campuscodi @BleepingComputer @amvinfe @briankrebs

PogoWasRight, to Black_cats

For anyone who hasn't heard the news yet: RedSense announced on Twitter that they can confirm that the AlphV site going offline yesterday was a law enforcement takedown.

#AlphV #BlackCat #ransomware

PogoWasRight,

Updating: The AlphV tox account has changed its message from "REPAIR" to "Everything will work soon."

So was RedSense wrong, or did LE just temporarily disrupt AlphV and they are recovering, or is LE now in control of the AlphV tox account? Or none of the above?

Still no announcement from DOJ that might confirm or clarify the situation.

#AlphV #BlackCat

@campuscodi @BleepingComputer

PogoWasRight, to infosec

So AlphV (aka BlackCat) is trying something different again. This time, it seems they are claiming a victim before they have even attempted to contact the victim or extort them. They post no proof of claims. They state that they are taking this approach because the victim's cyberinsurance policy does not cover extortion, and their research into the victim (Tipalti) and one of the victim's clients (Roblox) suggests that their usual approach will not work. They intend to try to extort those firms and Twitch, all individually.

They even cite an academic reference on the potential benefit of paying ransom.

This listing is not the nasty approach that we've seen in some other listings on that leak site. But we'll see what happens if or when the victims don't respond.

I've sent an inquiry to Tipalti who is probably already swamped and running around trying to figure out what happened. AlphV claims to have been in multiple systems of theirs since September 8. Whether that's true or not remains to be seen.

#databreach #infosec #cybersecurity #ransom
#extortion #AlphV #BlackCat

@brett @briankrebs @campuscodi @GossiTheDog @BleepingComputer

heiseonline, to security German

#Verpasstodon

l+f: Ransomwarebande verpetzt Opfer bei US-Behörde

Wie dreist kann man sein? Die Cyberkriminellen von ALPHV/BlackCat heben Online-Erpressung aufs nächste Level.

https://www.heise.de/news/l-f-Ransomwarebande-meldet-Opfer-bei-US-Behoerde-9530215.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege

#ALPHV #MGMHack #Security #SocialEngineering #l+f #lost+found

LeeArchinal, to Black_cats

Happy Friday everyone!

The NCC Group has created a series that I look forward to finishing, titled "Unveiling the Dark Side: A Deep Dive into Active Ransomware Families". The first installment covers the #BlackCat #ransomware (a.k.a. #ALPHV) and an incident that they observed that it was involved in that included new service and new accounts being created, and data being staged and believed to be exfiltrated. If you like technical reports like I do, this is one you don't want to miss! Enjoy and Happy Hunting!

Unveiling the Dark Side: A Deep Dive into Active Ransomware Families
https://research.nccgroup.com/2023/10/31/unveiling-the-dark-side-a-deep-dive-into-active-ransomware-families/

#CyberSecurity #ITSecurity #InfoSec #BlueTeam #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting #readoftheday

brett, to random
jgreig, to Michigan
@jgreig@ioc.exchange avatar

One of Michigan's largest hospital networks was hit with ransomware. The attack was claimed by AlphV, which is threatening to leak data and alleged videos.

The Detroit Free Press reported that McLaren had to shut down computer networks at 14 different facilities

#McLaren #Michigan #Alphv #BlackCat

https://therecord.media/mclaren-healthcare-ransomware-attack-michigan

cR0w, to random

#ALPHV with a big unnamed target claimed here. @PogoWasRight

#healthcare #ransomware

"One of Michigan's largest healthcare companies was attacked by our group. More than 6 Terabytes of data were stolen from the company's servers, not least due to negligence in network security and data storage. We give a good chance to negotiate and come to a reasonable solution and maintain the reputation and money and calm of your patients,who entrusted you with their health and safety.
If our proposal is ignored, we will publish all stolen data in a few days. The medical and personal data of SEVERAL MILLION US citizens are at stake. As well as various video materials regarding the work of this company.
It will be one of the biggest leaks of all time."

heiseonline, to security German

#Verpasstodon

l+f: Zehnminuten-Telefonat ermöglicht MGM-Hack

Social Engineering at its finest: So einfach haben die Angreifer offensichtlich die Casino-Kette MGM Ressort attackiert.

https://www.heise.de/news/l-f-Zehnminuten-Telefonat-ermoeglicht-MGM-Hack-9305196.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege

#ALPHV #MGMHack #Security #SocialEngineering #l+f #lost+found

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • thenastyranch
  • rosin
  • GTA5RPClips
  • osvaldo12
  • love
  • Youngstown
  • slotface
  • khanakhh
  • everett
  • kavyap
  • mdbf
  • DreamBathrooms
  • ngwrru68w68
  • anitta
  • magazineikmin
  • InstantRegret
  • tester
  • tacticalgear
  • ethstaker
  • normalnudes
  • cisconetworking
  • cubers
  • Durango
  • Leos
  • provamag3
  • modclub
  • JUstTest
  • All magazines