The Original APT: Advanced Persistent Teenagers

Credit to Author: BrianKrebs| Date: Wed, 06 Apr 2022 17:55:38 +0000

Many organizations are already struggling to combat cybersecurity threats from ransomware purveyors and state-sponsored hacking groups, both of which tend to take days or weeks to pivot from an opportunistic malware infection to a full blown data breach. But few organizations have a playbook for responding to the kinds of virtual “smash and grab” attacks we’ve seen recently from LAPSUS$, a juvenile data extortion group whose short-lived, low-tech and remarkably effective tactics are putting some of the world’s biggest corporations on edge.

Read more

A week in security (March 28 – April 3)

Credit to Author: Malwarebytes Labs| Date: Mon, 04 Apr 2022 10:08:24 +0000

The most important and interesting security stories from the last seven days.

The post A week in security (March 28 – April 3) appeared first on Malwarebytes Labs.

Read more

Globant suffers network breach due to LAPSUS$ compromise

Credit to Author: Jovi Umawing| Date: Fri, 01 Apr 2022 18:56:37 +0000

LAPSUS$ is a young group believed to be ran by teenagers. In their latest heist, they leaked data from Globant, a software firm.

The post Globant suffers network breach due to LAPSUS$ compromise appeared first on Malwarebytes Labs.

Read more

Fake Emergency Search Warrants Draw Scrutiny from Capitol Hill

Credit to Author: BrianKrebs| Date: Thu, 31 Mar 2022 22:54:45 +0000

On Tuesday, KrebsOnSecurity warned that hackers increasingly are using compromised government and police department email accounts to obtain sensitive customer data from mobile providers, ISPs and social media companies. Today, one of the U.S. Senate’s most tech-savvy lawmakers said he was troubled by the report and is now asking technology companies and federal agencies for information about the frequency of such schemes.

Read more

Hackers Gaining Power of Subpoena Via Fake “Emergency Data Requests”

Credit to Author: BrianKrebs| Date: Tue, 29 Mar 2022 14:07:27 +0000

There is a terrifying and highly effective “method” that criminal hackers are now using to harvest sensitive customer data from Internet service providers, phone companies and social media firms. It involves compromising email accounts and websites tied to police departments and government agencies, and then sending unauthorized demands for subscriber data while claiming the information being requested can’t wait for a court order because it relates to an urgent matter of life and death.

Read more

A week in security (March 21 – 27)

Credit to Author: Malwarebytes Labs| Date: Mon, 28 Mar 2022 10:17:58 +0000

The most important and interesting security stories from the last seven days.

The post A week in security (March 21 – 27) appeared first on Malwarebytes Labs.

Read more

Stolen Nvidia certificates used to sign malware—here’s what to do

Credit to Author: Pieter Arntz| Date: Tue, 15 Mar 2022 17:20:32 +0000

Two Nvidia code signing certificates have been leaked by the LAPSUS$ ransomware group. We explain what it means and what you can do about it.

The post Stolen Nvidia certificates used to sign malware—here’s what to do appeared first on Malwarebytes Labs.

Read more