Twelve people have been targeted by an international law enforcement operation for involvement in over 1,800 ransomware attacks on critical infrastructure and large organisations around the world.
A statement by Europol describes the 12 suspects in Ukraine and Switzerland as “high-value targets” responsible for “wreaking havoc across the world” by distributing LockerGoga, MegaCortex, Dharma and other ransomware attacks against organisations in 71 countries.
Footprinting and Reconnaissance using Windows OS
Highly recommended guide for aspiring penetration testing out there. – CyberHunting.com
Information Gathering By CMD Commands
There are some commands in information gathering that you can try for other websites as well, but it is still advised not to try on them. Now let’s start with practical concept of footprinting.
Use: With this command you get the path(number of hops) to reach the website for which you are running this command.
You can see the “ * * * “ pattern in some places. This is due to fact that the response from the router exceeded the ttl(time to live), therefore no information regarding the router could be found. The tracert sends three packets, and the round trip time is displayed of each packet. Round trip time is just a time taken for the packet to reach the destination router and come back to our device. Also the tracert command gives the IP address of the website for which you are finding route.
Schreiber Foods Back To Normal After Ransomware Attack Shuts Down Milk Plants
Schreiber Foods said its plants and distribution centers are back up and running after a ransomware attack took down their systems earlier last weekend.
The food production giant became the latest critical industry company to be hit with ransomware in recent months as cybercriminals continue to show little fear in attacking a variety of industries. Schreiber Foods mostly focuses on yogurt, processed and natural cheese as well as cream cheese.
New ‘Shrootless’ Bug Could Let Attackers Install Rootkit on macOS Systems
Microsoft on Thursday disclosed details of a new vulnerability that could allow an attacker to bypass security restrictions in macOS and take complete control of the device to perform arbitrary operations on the device without getting flagged by traditional security solutions.
Dubbed “Shrootless” and tracked as CVE-2021-30892, the “vulnerability lies in how Apple-signed packages with post-install scripts are installed,” Microsoft 365 Defender Research Team’s Jonathan Bar Or said in a technical write-up. “A malicious actor could create a specially crafted file that would hijack the installation process.”
Sugar Daddy Scams Promise Weekly Payments to Young Women
Here’s a reminder that scams can happen anywhere — even on your favorite social media platform
I’m a young woman in my 20s and am an active Instagram user. Recently, I was scrolling through my Instagram feed and received a notification about a new direct message request. I saw an older man pictured in the channel’s photo.
continue reading: https://blog.avast.com/sugar-daddy-scams-avast
Data Breach at University of Colorado
An American university is notifying thousands of former and current students that their personal information may have been compromised during a recent data breach.
In a security notice issued October 25, the University of Colorado Boulder (CU Boulder) attributed the breach to an unpatched vulnerability in software provided by a third-party vendor, Atlassian Corporation Plc.
Atlassian is an Australian software company headquartered in Sydney that develops products for software developers, project managers and other software development teams.
Forrester Predicts Mass Cybersecurity Brain Drain
Analyst house Forrester has warned of a significant exodus of cybersecurity professionals from the industry due to stress, burnout and limited career progression opportunities.
In its 2022 predictions report for cybersecurity, risk and privacy, the firm said as many as a tenth of professionals could head for the exit.
Some of this may be part of what’s being dubbed the “Great Resignation” — a period of post-pandemic reflection leading many individuals to change career paths.
continue reading: https://www.infosecurity-magazine.com/news/forrester-predicts-mass/
Teen Rakes in $2.74M Worth of Bitcoin in Phishing Scam
The kid was busted after abusing Google Ads to lure users to his fake gift card site.
During the early days of the pandemic, while the rest of the world was stress streaming and working on sourdough starter, an ambitious teen stuck in his bedroom decided to set up a fake “Love2Shop” gift card site to harvest people’s payment information, invest the stolen money in cryptocurrency and become a millionaire.
Read more Cyber Security News at https://que.com/tag/cybersecurity/