Nonilex, to Energy
@Nonilex@masto.ai avatar

plans to claim sweeping over
In a 2nd term, Trump will look at unilateral funding cuts for the & initiatives. He is vowing to wrest key spending powers from & to assert more control over the federal than any president in .


https://wapo.st/3XekhX4

slcw, to random
@slcw@newsie.social avatar

What the #OhioRepublicans are demanding isn’t “compromise,” but #extortion. Again, there is a clean bill ready to go in the state house, allowing #Biden’s name to be added to the #ballot. It’s a very simple matter to pass that bill, without any additional provisions. #Republicans are simply taking advantage of the situation in order to advance their own interests to the detriment of Ohio #voters.

#GOPfascists #GOPLies #RepublicansAreTheProblem #abortionRights #VoteBlue

https://www.dailykos.com/stories/2024/5/28/2242997/-Ohio-GOP-will-only-let-Biden-on-the-ballot-if-they-can-restrict-abortion

davidaugust, to Russia
@davidaugust@mastodon.online avatar

If you have that kind of pull, make the call now. Otherwise, you are the hostage taker.

#hostage #russia #vote #election #extortion #ethics #EvanGershkovich #WallStreetJournal

mattotcha, to Cybersecurity
@mattotcha@mastodon.social avatar
PogoWasRight, to Cybersecurity
PogoWasRight, to infosec

Arctic Wolf Labs has an interesting article on an investigation of two cases: "Follow-On Extortion Campaign Targeting Victims of Akira and Royal Ransomware:"

https://arcticwolf.com/resources/blog/follow-on-extortion-campaign-targeting-victims-of-akira-and-royal-ransomware/

This may not be a new kind of threat, but it is something to educate victims about as a potential follow-up threat.

Of note, it turns out I was in communication with the same TA from their second case at around the same time, and I can confirm their conclusion that their two cases are likely the same TA. See my report, "Follow-on extortion campaign: confirmation of some findings by Arctic Wolf:"

https://www.databreaches.net/follow-on-extortion-campaign-confirmation-of-some-findings-by-arctic-wolf/

#infosec #cybersecurity #extortion #databreach #ransomware

@campuscodi @briankrebs @lbleepingcomputer @brett @gcluley

PogoWasRight, (edited ) to Cybersecurity

On Christmas Eve, Integris Health in Oklahoma was sending emails to patients and issuing notices about an attack by threat actors in November who were allegedly contacting patients directly.

According to their notices, the threat actors did not lock/encrypt anything but did exfiltrate files with #PHI

https://integrisok.com/landing/cyber-event

https://integrisok.com/landing/cyber-event/cyber-event-dec-24-comm

https://integrisok.com/-/media/pdf/integris-health-faqs-final-122523.ashx?revision=4b6008b9-e0f3-4acb-9190-9166ff50bce2

#HealthSec #databreach #HIPAA #cybersecurity #extortion #infosec

PogoWasRight, to random
PogoWasRight, to infosec

AlphV/BlackCat replaced their post on with an updated post, and a TA involved in the attack confirmed for me what their original -- and somewhat confusing -- post meant in terms of the rationale for their strategy.

https://www.databreaches.net/alphv-claims-they-have-started-contacting-some-of-tipaltis-clients/

Note that AlphV has NOT named which Tipalti clients have been contacted already or whether there has been any response. Posts by some others claiming that named companies are being extorted seem premature until either the TA announces who they have already contacted or the victims confirm they have been contacted.

@bretthaines @dalias @BleepingComputer @brett @euroinfosec

PogoWasRight, to infosec

So AlphV (aka BlackCat) is trying something different again. This time, it seems they are claiming a victim before they have even attempted to contact the victim or extort them. They post no proof of claims. They state that they are taking this approach because the victim's cyberinsurance policy does not cover extortion, and their research into the victim (Tipalti) and one of the victim's clients (Roblox) suggests that their usual approach will not work. They intend to try to extort those firms and Twitch, all individually.

They even cite an academic reference on the potential benefit of paying ransom.

This listing is not the nasty approach that we've seen in some other listings on that leak site. But we'll see what happens if or when the victims don't respond.

I've sent an inquiry to Tipalti who is probably already swamped and running around trying to figure out what happened. AlphV claims to have been in multiple systems of theirs since September 8. Whether that's true or not remains to be seen.

#databreach #infosec #cybersecurity #ransom
#extortion #AlphV #BlackCat

@brett @briankrebs @campuscodi @GossiTheDog @BleepingComputer

PogoWasRight, (edited ) to Cybersecurity

The listing for plastic surgeon Dr. Jaime Schwartz has reappeared on the Hunters International leak site. Dr. Schwartz has not responded to multiple inquiries since October about this incident and there is no substitute notice or statement on his website -- even though patient data was already being leaked.

Has he notified patients? We do not know.

Has he notified HHS? We do not know.

#databreach #ransomware #extortion #HealthSec #cybersecurity #incidentresponse #transparency

h/t, @brett

(Edited to delete statement that Schwartz's identity info is also now listed, as @brett alerted me that it was listed even before now.)

iuculano, to italy
@iuculano@masto.ai avatar

Via #ANSA

> 200 #mobsters in #Italy sentenced to 2200 yrs in prison in 1 of country's largest mob trials, involving 400 lawyers & 900 witnesses. After deliberating for a month, 3-judge panel took ~ 2 hrs 2 hand down rulings today. Mobsters were affiliated w/ notorious 'ndrangheta crime group & convicted o #Mafia association, #extortion, #bribery, & 5 #murders. 207 were jailed, incl 1-time #ForzaItalia lawmaker, frmr police chief, & 1 ex-Mayor, while more than 100 were acquitted

#ndrangheta

veronica, (edited ) to Facebook
@veronica@mastodon.online avatar
xeophin, to Instagram
@xeophin@swiss.social avatar

Well, guess that’s it for for me then for the time being – until the forces to backpedal.

But hey, enough time to rake in „consent“ or money until then …

msquebanh, to Massachusetts
@msquebanh@mastodon.sdf.org avatar

Former who served time for shaking down motorists to support his drug habit - now accused of trying to from while working at Admin office in

Michael J. Darrah, 45, was by federal agents at his home in after into allegations that he sought & extorted money from veterans who needed help accessing their benefits.

https://www.msn.com/en-us/news/crime/former-brockton-police-officer-arrested-for-extorting-money-from-ri-veterans/ar-AA1jGphn

gcluley, to Cybersecurity
@gcluley@mastodon.green avatar

Women sue plastic surgery after hack saw their naked photos posted online.

Read more in my article on the Bitdefender blog: https://www.bitdefender.com/blog/hotforsecurity/women-sue-plastic-surgery-after-hack-saw-their-naked-photos-posted-online/

PogoWasRight, to hacking

For those of you who have been following the reporting on the prosecution of the Dutch hacker most recently known as "Umbreon," he was sentenced today in Amsterdam to 4 years in prison with one year suspended and three years probation. I think they'll deduct time in detention until now (10 months) from that, but I'm trying to get confirmation on the details.

I will be writing another installment of my interviews with him that will include info on the corporate victims in his trial like TicketCounter, but for now, if you don't know much about him, here was the first interview I reported after his arrest:

I had been chatting with a blackhat. They had been working with a whitehat. We were both dealing with the same person:
https://www.databreaches.net/i-had-been-chatting-with-a-blackhat-they-had-been-working-with-a-whitehat-we-were-both-dealing-with-the-same-person/

@campuscodi @aj_vicens @briankrebs @BleepingComputer

And btw, his case is a useful example of why victims should contact law enforcement. It was a report by RDC that got law enforcement started finding a pattern and pursuing it.

PogoWasRight, to random

The U.S. And Its Allies Are Pledging Never To Pay Hacker Ransoms:

https://themessenger.com/tech/ransomware-us-international-hacking-ransom-pledge

From the article:

"Data provided to the U.S. government by ransomware negotiators shows that companies with good backups are able to recover “far more quickly” than companies that pay a ransom, according to the senior administration official."

My questions: So when they don't have a good backup and have pledged not to pay, what exactly is going to happen next? And if this does work, does that just shift the threat actors over even more to softer targets like, say, healthcare and education entities?

@brett @campuscodi @douglevin @amvinfe

PogoWasRight, (edited ) to Cybersecurity

Hackers escalate: leak 200k students' data; claim to still have access to CCSD email system:

https://www.databreaches.net/hackers-escalate-leak-200k-ccsd-students-data-claim-to-still-have-access-to-ccsd-email-system/

More data was leaked, so this post is an update on the situation with Clark County School District.

@brett @douglevin @funnymonkey @BleepingComputer @jgreig @campuscodi

PogoWasRight, to Cybersecurity
BPStuart, (edited ) to random
@BPStuart@mstdn.social avatar

Congressional MAGA Republicans took an oath to “preserve, protect and defend the Constitution,” while intending to weaken and destroy the very democracy that seated them in the House and Senate. That’s what they’re doing: dismantling U.S. democracy.

Congressional moderate Republicans took the same oath. They’re betraying it by condoning Trump’s lawlessness and having failed to vote for his impeachment and removal from office.

Republicans are corrupt and weak.

PogoWasRight, to infosec
ai6yr, to business
@ai6yr@m.ai6yr.org avatar

Ah yes, if running a useful doesn't work, you can always try . "Businesses are being warned that they will lose their gold checkmark if they haven’t forked out at least $1,000 on ads in the past 30 days or $6,000 in the previous 180 days" https://www.msn.com/en-us/money/other/rebranded-twitter-x-warns-businesses-to-spend-on-ads-or-lose-verification/ar-AA1eodSS

PogoWasRight, to random

Mount Desert Island Hospital notifies 24,180 patients of April network attack:

https://www.databreaches.net/mount-desert-island-hospital-notifies-24180-patients-of-april-network-attack/

So, they call it a "data security incident" and haven't updated their June 5 notice. Yet there's a listing on a leak site that may be populated at some point....

@brett @amvinfe @allan

PogoWasRight, to random

So is this listing by AlphV aka BlackCat about Barts NHS Trust related to the U. of Manchester report the other day about 1.1 million patients, etc.?

@brett @GossiTheDog @amvinfe

  • All
  • Subscribed
  • Moderated
  • Favorites
  • Leos
  • ngwrru68w68
  • InstantRegret
  • thenastyranch
  • magazineikmin
  • GTA5RPClips
  • rosin
  • osvaldo12
  • tacticalgear
  • Youngstown
  • slotface
  • khanakhh
  • kavyap
  • DreamBathrooms
  • JUstTest
  • modclub
  • everett
  • provamag3
  • cubers
  • cisconetworking
  • ethstaker
  • Durango
  • mdbf
  • anitta
  • megavids
  • normalnudes
  • tester
  • lostlight
  • All magazines