WastedLocker Ransomware Using Hacked Websites to Spread via Fake Software Updates
Dozens of US news sites hacked in WastedLocker ransomware attacks
By Sergiu Gatlan
Image: C Drying
The Evil Corp gang hacked into dozens of US newspaper websites owned by the same company to infect...
Google Play Malware Spies On Users For Years
Kaspersky Lab experts have warned of the ongoing PhantomLance malware campaign, in which malicious applications in the Google Play Store secretly spy and steal user data on Android devices.
According to experts,...
Fake Reservation Links Prey on Weary Travelers
Fake travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and overbooked hotels.
A longtime threat group identified as TA558...
Hacking Operational Technology for Defense: Lessons Learned From OT Red Teaming Smart Meter Control Infrastructure
High-profile security incidents in the past decade have brought increased scrutiny to cyber security for operational technology (OT). However, there is a continued perception across critical infrastructure organizations that...
Ghostwriter Update: Cyber Espionage Group UNC1151 Likely Conducts Ghostwriter Influence Activity
In July 2020, Mandiant Threat Intelligence released a public report detailing an ongoing influence campaign we named “Ghostwriter.” Ghostwriter is a cyber-enabled influence campaign which primarily targets audiences in...
Law Firm to the Fortune 500 Breached with Ransomware
Deep-pocketed clients’ customers & suppliers could be in the attacker’s net, with potential PII exposure from an A-list clientele such as Apple, Boeing and IBM.
Campbell Conroy & O’Neil, P.C....
M-Trends 2021: A View From the Front Lines
We are thrilled to launch M-Trends 2021, the 12th edition of our annual FireEye Mandiant publication. The past year has been unique, as we witnessed an unprecedented combination of...
U.K. Water Supplier Hit with Clop Ransomware Attack
The incident disrupted corporate IT systems at one company while attackers misidentified the victim in a post on its website that leaked stolen data.
A U.K. water supplier suffered a...
Abusing Replication: Stealing AD FS Secrets Over the Network
Organizations are increasingly adopting cloud-based services such as Microsoft 365 to host applications and data. Sophisticated threat actors are catching on and Mandiant has observed an increased focus on...
Black Hat and DEF CON Roundup
‘Summer Camp’ for hackers features a compromised satellite, a homecoming for hackers and cyberwarfare warnings.
There was nothing typical this year at BSides LV, Black Hat USA...