laurencewolfe, to photography
@laurencewolfe@toot.wales avatar

Can’t hide the fact that #Ransom is only 7 months old… #puppy #photography #DogsOfMastodon #peace #love

raymondpert, to nigeria
@raymondpert@mastodon.cloud avatar

Over 200 Nigerian students released after abduction in Kaduna

> Over 200 students and staff abducted by gunmen from a school in northern #Nigeria earlier this month have been released unharmed, the office of the governor of the state of Kaduna said on Sunday, days before a deadline to pay a $690,000 ransom.
https://www.reuters.com/world/africa/over-200-nigerian-school-hostages-released-after-abduction-2024-03-24/ #students #abduction #kidnapping #ransom

RememberUsAlways, to random
@RememberUsAlways@newsie.social avatar

"Operation Cronos"
Hacker group's site taken over by law enforcement.




https://www.bbc.com/news/technology-68344987

PogoWasRight, to Cybersecurity
PogoWasRight, to random

Emsisoft's recent report advocating for a ban on payments has been generating discussion and debate -- and that's a good thing.

I came across some stats from the UK this morning which are also food for thought on this issue.

[ If you missed Emsisoft's report it's at https://www.emsisoft.com/en/blog/44987/the-state-of-ransomware-in-the-u-s-report-and-statistics-2023/ ]

provides a summary from a Trellix report:

"One-third of UK-based have confessed to paying groups millions of dollars in recent years in a bid to alleviate the impact of an attack, according to new research.

Analysis from security firm Trellix found four-in-ten UK CISOs have managed a ransomware attack in the last five years – and in every single case, their organization opted to pay.

found that one-third of CISOs paid between $5 million and $15 million for a ransom demand while 13% paid between $10 and $15 million.

The minimum ransom paid by all UK businesses across a five year period stood at around $250,000, the study found."

ITpro: https://www.itpro.com/security/ransomware/uk-cisos-are-cowing-to-ransomware-demands-more-than-you-think-heres-why-they-shouldnt-pay-up

@brett

laurencewolfe, to photography
@laurencewolfe@toot.wales avatar
mattblaze, to random
@mattblaze@federate.social avatar

Currently blocking people piling on in replies to an 8 month old post of mine that was apparently just re-boosted by the Mastodon Scold Squad.

This is less fun than it sounds.

mattblaze,
@mattblaze@federate.social avatar

Things I get routinely yelled at here for:

  • expressing opinions about usability and safety deficiencies in the Mastodon PM function.

  • posting and discussing photos in a manner perceived as "showing off"

  • having too many followers

  • not filling my posts with #enOugH #HaSHTagS #to #mAke #TheM #LOOk #LiKE #rAnSOM #notes.

18+ fasterthanlime, (edited ) to random
@fasterthanlime@hachyderm.io avatar

starting the year off right by accidentally exposing a postgres server on 5432 of a hetzner host and IMMEDIATELY getting ransomed

(docker run -p exposes on 0.0.0.0, in case you were wondering)

thankfully there is no sensitive data in there and I have backups 😌

kkarhan,
@kkarhan@mstdn.social avatar

@c0dec0dec0de @rabc @fasterthanlime It's an arbitrary rate that is set to the level to pay for the costing to yet not high enough to be unaffordable for most victims.

They obviously use :bitcoin: because most wouldn't pay / reimburse [yes, for some bizarre reason they pay ransom, which is inherently bad, NEVER EVER DO THAT!!!] if it was in :monero: ...

laurencewolfe, to photography
@laurencewolfe@toot.wales avatar

Not all security blankets are blankets…

laurencewolfe, to animals
@laurencewolfe@toot.wales avatar
PogoWasRight, to infosec

So AlphV (aka BlackCat) is trying something different again. This time, it seems they are claiming a victim before they have even attempted to contact the victim or extort them. They post no proof of claims. They state that they are taking this approach because the victim's cyberinsurance policy does not cover extortion, and their research into the victim (Tipalti) and one of the victim's clients (Roblox) suggests that their usual approach will not work. They intend to try to extort those firms and Twitch, all individually.

They even cite an academic reference on the potential benefit of paying ransom.

This listing is not the nasty approach that we've seen in some other listings on that leak site. But we'll see what happens if or when the victims don't respond.

I've sent an inquiry to Tipalti who is probably already swamped and running around trying to figure out what happened. AlphV claims to have been in multiple systems of theirs since September 8. Whether that's true or not remains to be seen.


@brett @briankrebs @campuscodi @GossiTheDog @BleepingComputer

laurencewolfe, to animals
@laurencewolfe@toot.wales avatar
laurencewolfe, to animals
@laurencewolfe@toot.wales avatar

In a world where you can be anything, be kind… #DogsOfMastodon #puppy #Ransom #GermanShepherd #peace #kindness

laurencewolfe, to animals
@laurencewolfe@toot.wales avatar
PogoWasRight, to infosec
laurencewolfe, to animals
@laurencewolfe@toot.wales avatar
mattblaze, to photography
@mattblaze@federate.social avatar

Yes, I know about hashtags. I use them. albeit sparingly, as I think is appropriate, without making my posts . For example, I tag my photos with "". What I won't do is label my "boring" posts, because I like to think that every one of them has the potential to be boring to someone.

quinn,
@quinn@alaskan.social avatar

@mattblaze please stop muddying up the hashtag feed...

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

deleted_by_author

  • Loading...
  • kkarhan,
    @kkarhan@mstdn.social avatar

    @hacks4pancakes @GossiTheDog people who pay are the weirdest kind...

    AAKL, to infosec
    @AAKL@noc.social avatar

    deleted_by_author

  • Loading...
  • kkarhan,
    @kkarhan@mstdn.social avatar

    @AAKL Why else would you think exists to this day?

    In fact, there are even insurances that do pay -based ...

    THAT'S THE PROBLEM!

    PogoWasRight, to Cybersecurity

    This week, Nuance (a MSFT-owned tech firm) disclosed a number of their clients who are HIPAA-covered entities were affected by the MOVEit breach. They did not reveal numbers and their disclosure is not on HHS's public breach tool yet.

    But other covered entities of theirs may have chosen to make their own disclosures. While Nuance disclosed for some (see https://www.databreaches.net/more-victims-of-moveit-breach-are-revealed-nuance-discloses-for-covered-entities/)

    St. Luke's Health System in Idaho did its own disclosure, reporting that 4,679 of their patients were affected.

    We still may see more.

    majorlinux, to random
    @majorlinux@toot.majorshouse.com avatar

    I mean, we all know they got it.

    Caesars reportedly paid millions to stop hackers releasing its data https://www.engadget.com/caesars-reportedly-paid-millions-to-stop-hackers-releasing-its-data-081052820.html?src=rss

    PogoWasRight, to infosec
    PogoWasRight, to hacking
  • All
  • Subscribed
  • Moderated
  • Favorites
  • provamag3
  • thenastyranch
  • magazineikmin
  • ngwrru68w68
  • mdbf
  • rosin
  • Youngstown
  • vwfavf
  • slotface
  • modclub
  • khanakhh
  • cubers
  • kavyap
  • DreamBathrooms
  • cisconetworking
  • PowerRangers
  • everett
  • Durango
  • InstantRegret
  • osvaldo12
  • tester
  • Leos
  • tacticalgear
  • ethstaker
  • GTA5RPClips
  • normalnudes
  • anitta
  • megavids
  • All magazines