HomeCyber BalkansLaw enforcement action disrupts LockBit ransomware operation. Health care cyberattack disrupts prescription...

Law enforcement action disrupts LockBit ransomware operation. Health care cyberattack disrupts prescription processing.

Published on

spot_img
Law enforcement action disrupts LockBit ransomware operation. Health care cyberattack disrupts prescription processing.

Operation Cronos, a law enforcement initiative, has successfully disrupted the activities of the LockBit ransomware gang, leading to the arrest of two members in Poland and Ukraine. The UK’s National Crime Agency spearheaded the operation, resulting in the seizure of 34 servers and over 200 cryptocurrency accounts linked to the gang. Reports from BleepingComputer indicate that indictments have been unsealed against two Russian nationals for their alleged involvement in LockBit attacks.

In a press release by Europol, it was stated that the National Crime Agency has taken control of the technical infrastructure used by LockBit for their criminal activities. This includes their leak site on the dark web where stolen data from ransomware attacks was hosted. The data gathered during the investigation will be used to further international efforts to dismantle the group and its affiliates.

Furthermore, decryption tools have been released by the Japanese Police, the National Crime Agency, and the FBI to assist in recovering files encrypted by LockBit ransomware. In a bid to crackdown on these cybercriminals, the US State Department has announced a $15 million reward for information leading to the identification or location of key leaders of the LockBit ransomware group. Additionally, the US Treasury Department has sanctioned two Russian nationals for their alleged participation in LockBit attacks.

Moving on to the cyberattack on Change Healthcare’s platform by Optum Solutions, the disruption in prescription processing at pharmacies across the US continues to cause concern. The American Hospital Association has recommended all healthcare organizations potentially exposed by the incident to disconnect from Optum until it is safe to reconnect. UnitedHealth Group, the parent company of Optum, disclosed in an SEC filing that a suspected nation-state actor had gained access to Change Healthcare systems. The company is working on containing and remediating the incident with the help of security experts and law enforcement.

Ransomware actors have been exploiting critical flaws in ConnectWise’s ScreenConnect product, leading to a surge in attacks targeting vulnerable servers and clients. Sophos has reported that attacks involving ScreenConnect have more than doubled since a proof-of-concept exploit was made public. It is essential for organizations using ScreenConnect to patch vulnerable systems and check for signs of compromise to prevent further breaches.

Malwarebytes has uncovered a data leak from i-Soon, a suspected Chinese government contractor based in Chengdu, that provides hacking services to government agencies. Leaked documents reveal the methods used by Chinese authorities to surveil dissidents overseas, hack other nations, and manipulate social media narratives. The Chinese police are reportedly investigating the leak, which aligns with previous threat intelligence on various threat groups.

Researchers at Varonis have identified high- and critical-severity vulnerabilities affecting Apex, the programming language used by Salesforce instances. Exploiting these vulnerabilities could lead to data leakage, data corruption, and disruptions to business functions within Salesforce. Users are responsible for ensuring the security of their Apex code uploaded to Salesforce instances under the shared responsibility model.

Trend Micro has described a PlugX malware campaign conducted by the Earth Preta threat actor, targeting entities in several Asian countries. The campaign, which used spear-phishing lures related to current events, is believed to be connected to previous Chinese-aligned cyber operations. The malware campaign highlights the ongoing threat posed by sophisticated cyber adversaries in the region.

In conclusion, these recent developments in the cybersecurity landscape underscore the importance of coordinated law enforcement efforts, proactive security measures, and constant vigilance against evolving cyber threats. Organizations and individuals must remain diligent in addressing vulnerabilities, monitoring for signs of compromise, and taking steps to enhance their overall cybersecurity posture in the face of persistent and sophisticated adversaries.

Source link

Latest articles

12 leading contact center platforms in 2024

Contact center software has evolved significantly in recent years, with new technologies like generative...

France begins extensive operation to combat cyber espionage in preparation for Olympics

French authorities have launched a major operation aimed at cleaning the country's computer systems...

CBI and FBI collaborate to dismantle global cyber fraud ring in Delhi-NCR, leading to arrest of 43 individuals | Delhi News

The Central Bureau of Investigation (CBI) has recently made a significant breakthrough in dismantling...

Hacktivists Alleged Leak of CrowdStrike Threat Intelligence

A recent cyber incident has put cybersecurity firm CrowdStrike in the spotlight, as a...

More like this

12 leading contact center platforms in 2024

Contact center software has evolved significantly in recent years, with new technologies like generative...

France begins extensive operation to combat cyber espionage in preparation for Olympics

French authorities have launched a major operation aimed at cleaning the country's computer systems...

CBI and FBI collaborate to dismantle global cyber fraud ring in Delhi-NCR, leading to arrest of 43 individuals | Delhi News

The Central Bureau of Investigation (CBI) has recently made a significant breakthrough in dismantling...
en_USEnglish