Articles tagged "Ransomware"

Found 125 articles

Actively Exploited

Fieldtex Products recently experienced a significant data breach attributed to the Akira ransomware group, which claims to have stolen approximately 14 gigabytes of data. This incident has affected around 238,000 individuals, raising concerns about the security of personal information. The breach underscores the ongoing threat posed by ransomware attacks, which can have far-reaching implications for both companies and their customers. Users may face risks related to identity theft and privacy violations as a result of this data leak. Companies in similar sectors should take this incident as a warning to bolster their cybersecurity measures to prevent similar breaches in the future.

Impact: Fieldtex Products, 238,000 individuals affected
Remediation: Companies should enhance their cybersecurity protocols and consider incident response plans to mitigate future risks.
Read Original
New ‘DroidLock’ Android Malware Locks Users Out, Spies via Front Camera

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

Researchers at Zimperium zLabs have discovered a new Android malware called DroidLock, which behaves like ransomware. This malicious software can lock users out of their devices and steal sensitive information by tricking them into providing their credentials through phishing tactics. Additionally, DroidLock has the capability to stream users' screens and activate their front cameras through VNC, raising serious privacy concerns. This malware primarily targets Android users, making it essential for them to remain vigilant about their device security and be cautious of suspicious links or applications. The emergence of DroidLock emphasizes the ongoing risks associated with mobile malware and the need for users to adopt strong security practices.

Impact: Android devices
Remediation: Users should avoid clicking on unknown links, regularly update their devices, and consider using security applications that can detect and mitigate malware.
Read Original

CyberVolk has reemerged with its new VolkLocker ransomware-as-a-service, which comes with some notable features but also a significant design flaw. Researchers have identified a major vulnerability that could allow security teams to mitigate attacks more effectively. This flaw raises concerns for businesses and organizations that could be targeted by this ransomware, as it may lead to increased incidents of data theft and disruption. Cyber defenders need to be vigilant and prepare for potential attacks stemming from this new variant. Understanding the weaknesses in VolkLocker could help in developing strategies to counteract its effects and protect sensitive information.

Impact: VolkLocker ransomware
Remediation: Implement security measures to detect and block ransomware attacks, regularly back up data, and educate staff on phishing and social engineering tactics.
Read Original

Japanese companies, including manufacturers and retailers, have fallen victim to a series of ransomware attacks that have severely disrupted their operations. These incidents have affected not only private businesses but also government entities, leading to prolonged recovery times that can stretch over several months. The attackers are leveraging vulnerabilities in systems to encrypt critical data, causing significant financial and operational losses. As organizations struggle to restore services and secure their networks, the situation raises concerns about the overall cybersecurity posture in Japan. This trend highlights the need for improved defenses against ransomware, especially for sectors that are vital to the economy.

Impact: Manufacturers, retailers, Japanese government systems
Remediation: Organizations should enhance their cybersecurity measures, conduct regular backups, and implement robust incident response plans.
Read Original

Shanya, a new packing malware, has emerged as a tool for ransomware groups. It specializes in obfuscating malicious payloads, making it harder for security software to detect attacks. This malware not only hides ransomware but also disables endpoint detection and response (EDR) systems, leaving networks vulnerable to exploitation. The rise of such tools poses a significant risk to organizations, as they can facilitate successful ransomware attacks by evading traditional security measures. Companies should be vigilant and enhance their security protocols to combat this evolving threat.

Impact: Ransomware, EDR systems
Remediation: Organizations should enhance security protocols and consider implementing advanced detection systems to identify obfuscated threats.
Read Original

Recent reports indicate that various ransomware groups are utilizing a tool called Shanya, a packer-as-a-service platform, to enhance their ability to evade detection by endpoint security solutions. This tool assists attackers in bypassing endpoint detection and response (EDR) systems, making it easier for them to execute their malicious activities without being flagged. The use of Shanya shows a trend where ransomware operations are becoming more sophisticated, posing a significant risk to organizations that rely on EDR products for cybersecurity. Companies could be at greater risk of data breaches and financial losses if they do not update their security measures to counter these evolving tactics. As ransomware attacks continue to rise, understanding and mitigating these new methods is crucial for protecting sensitive information.

Impact: EDR systems and endpoint security products
Remediation: Organizations should enhance their endpoint detection capabilities and consider updating their security measures to recognize and block the use of packers like Shanya.
Read Original

The US Treasury's Financial Crimes Enforcement Network has reported that ransomware payments have reached $4.5 billion since 2013, highlighting the increasing severity and prevalence of ransomware attacks. This data underscores the urgent need for enhanced cybersecurity measures and awareness as these attacks continue to evolve and impact various sectors.

Impact: N/A
Remediation: N/A
Read Original

Recent data from the U.S. Treasury shows that while the total amount paid in ransomware attacks dropped significantly by one-third to $734 million, the number of victims remains largely unchanged, falling only 2% last year. This suggests that although fewer payments are being made, the ransomware problem is still widespread and persistent. Many organizations continue to face attacks, indicating that cybercriminals are still active and finding new ways to exploit vulnerabilities. The decline in payments could be attributed to better security practices or a shift in how companies respond to demands. Overall, while there is some cautious optimism about the decrease in payments, the ongoing prevalence of ransomware means that businesses and individuals must remain vigilant.

Impact: N/A
Remediation: N/A
Read Original
Space Bears Ransomware Claims Comcast Data Theft Through QuasarBreach

Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

Actively Exploited

The Space Bears ransomware group claims to have stolen data from Comcast through a breach at Quasar Inc., threatening to release the data publicly. This incident highlights the ongoing risks associated with ransomware attacks and the potential exposure of sensitive information from large corporations.

Impact: Comcast, Quasar Inc.
Remediation: Organizations should enhance their cybersecurity measures, including regular data backups, employee training on phishing attacks, and implementing robust incident response plans. Specific remediation steps for affected entities have not been detailed.
Read Original

Tri-Century Eye Care has suffered a data breach due to an attack by the Pear ransomware group, which has reportedly stolen over 3 terabytes of sensitive data. This incident has affected approximately 200,000 individuals, raising significant concerns about the security of personal information in the healthcare sector.

Impact: Tri-Century Eye Care, personal data of 200,000 individuals
Remediation: N/A
Read Original
Actively Exploited

Barts Health NHS Trust has become a victim of a cyberattack linked to the Cl0p ransomware group, which has targeted Oracle EBS systems. This incident raises significant concerns regarding the security of sensitive data within healthcare organizations and highlights the ongoing threat posed by ransomware groups.

Impact: Oracle EBS systems
Remediation: N/A
Read Original

The article highlights recent developments in cybersecurity, including a patched flaw in React and Node.js, as well as a ransomware intrusion that has revealed an espionage foothold. These incidents underscore the ongoing challenges in securing software frameworks and the risks posed by cyber threats to sensitive information.

Impact: React, Node.js
Remediation: Patches released for React and Node.js vulnerabilities
Read Original

Barts Health NHS Trust has reported a data breach involving the Clop ransomware group, which exploited a vulnerability in the Oracle E-business Suite software to steal files from their database. This incident highlights the ongoing risks associated with unpatched software vulnerabilities and the potential for significant data loss in healthcare organizations.

Impact: Oracle E-business Suite software
Remediation: Organizations should apply the latest security patches for Oracle E-business Suite and review their security protocols to prevent future breaches.
Read Original

Inotiv, an American pharmaceutical company, has reported a data breach following a ransomware attack that occurred in August 2025, compromising the personal information of thousands of individuals. This incident highlights the ongoing risks associated with ransomware attacks and the importance of data protection in the pharmaceutical sector.

Impact: Personal information of individuals associated with Inotiv
Remediation: N/A
Read Original
Qilin Ransomware Claims Data Theft from Church of Scientology

Hackread – Cybersecurity News, Data Breaches, Tech, AI, Crypto and More

Qilin ransomware has claimed responsibility for stealing internal data from the Church of Scientology, providing 22 screenshots as evidence of the breach. The Church has not confirmed the incident, highlighting the ongoing concerns regarding ransomware attacks and data security within organizations.

Impact: Church of Scientology internal data
Remediation: N/A
Read Original
PreviousPage 7 of 9Next