HomeCyber BalkansLaw enforcement action disrupts LockBit ransomware operation. Health care cyberattack disrupts prescription...

Law enforcement action disrupts LockBit ransomware operation. Health care cyberattack disrupts prescription processing.

Published on

spot_img

Operation Cronos, a law enforcement initiative, has successfully disrupted the activities of the LockBit ransomware gang, leading to the arrest of two members in Poland and Ukraine. The UK’s National Crime Agency spearheaded the operation, resulting in the seizure of 34 servers and over 200 cryptocurrency accounts linked to the gang. Reports from BleepingComputer indicate that indictments have been unsealed against two Russian nationals for their alleged involvement in LockBit attacks.

In a press release by Europol, it was stated that the National Crime Agency has taken control of the technical infrastructure used by LockBit for their criminal activities. This includes their leak site on the dark web where stolen data from ransomware attacks was hosted. The data gathered during the investigation will be used to further international efforts to dismantle the group and its affiliates.

Furthermore, decryption tools have been released by the Japanese Police, the National Crime Agency, and the FBI to assist in recovering files encrypted by LockBit ransomware. In a bid to crackdown on these cybercriminals, the US State Department has announced a $15 million reward for information leading to the identification or location of key leaders of the LockBit ransomware group. Additionally, the US Treasury Department has sanctioned two Russian nationals for their alleged participation in LockBit attacks.

Moving on to the cyberattack on Change Healthcare’s platform by Optum Solutions, the disruption in prescription processing at pharmacies across the US continues to cause concern. The American Hospital Association has recommended all healthcare organizations potentially exposed by the incident to disconnect from Optum until it is safe to reconnect. UnitedHealth Group, the parent company of Optum, disclosed in an SEC filing that a suspected nation-state actor had gained access to Change Healthcare systems. The company is working on containing and remediating the incident with the help of security experts and law enforcement.

Ransomware actors have been exploiting critical flaws in ConnectWise’s ScreenConnect product, leading to a surge in attacks targeting vulnerable servers and clients. Sophos has reported that attacks involving ScreenConnect have more than doubled since a proof-of-concept exploit was made public. It is essential for organizations using ScreenConnect to patch vulnerable systems and check for signs of compromise to prevent further breaches.

Malwarebytes has uncovered a data leak from i-Soon, a suspected Chinese government contractor based in Chengdu, that provides hacking services to government agencies. Leaked documents reveal the methods used by Chinese authorities to surveil dissidents overseas, hack other nations, and manipulate social media narratives. The Chinese police are reportedly investigating the leak, which aligns with previous threat intelligence on various threat groups.

Researchers at Varonis have identified high- and critical-severity vulnerabilities affecting Apex, the programming language used by Salesforce instances. Exploiting these vulnerabilities could lead to data leakage, data corruption, and disruptions to business functions within Salesforce. Users are responsible for ensuring the security of their Apex code uploaded to Salesforce instances under the shared responsibility model.

Trend Micro has described a PlugX malware campaign conducted by the Earth Preta threat actor, targeting entities in several Asian countries. The campaign, which used spear-phishing lures related to current events, is believed to be connected to previous Chinese-aligned cyber operations. The malware campaign highlights the ongoing threat posed by sophisticated cyber adversaries in the region.

In conclusion, these recent developments in the cybersecurity landscape underscore the importance of coordinated law enforcement efforts, proactive security measures, and constant vigilance against evolving cyber threats. Organizations and individuals must remain diligent in addressing vulnerabilities, monitoring for signs of compromise, and taking steps to enhance their overall cybersecurity posture in the face of persistent and sophisticated adversaries.

Source link

Latest articles

Attackers Abuse Google Ad Feature to Target Slack, Notion Users

 Attackers are once again abusing Google Ads to target people with info-stealing malware, this time...

Hackers allege to have infiltrated computer network of Israeli nuclear facility

An Iran-linked hacking group has declared that they successfully breached the computer network of...

Hacker allegedly uses white-hat approach to exploit crypto game for $4.6M

In a surprising turn of events, the food-themed crypto game Super Sushi Samurai fell...

Reducing Threats from the IABs Market

As ransomware attacks continue to escalate in frequency and severity, one of the key...

More like this

Attackers Abuse Google Ad Feature to Target Slack, Notion Users

 Attackers are once again abusing Google Ads to target people with info-stealing malware, this time...

Hackers allege to have infiltrated computer network of Israeli nuclear facility

An Iran-linked hacking group has declared that they successfully breached the computer network of...

Hacker allegedly uses white-hat approach to exploit crypto game for $4.6M

In a surprising turn of events, the food-themed crypto game Super Sushi Samurai fell...
en_USEnglish