Deep and Dark Web Round Up
Weekly Highlights
Middle East Conflict
Physical and digital activities continue to rage on both sides of the Israel-Hamas conflict:
Malware/Ransomware
Proving resilient, LockBit ransomware came back into operation using new infrastructure just days after a global law enforcement operation took them offline. The actors debuted a new onion address and already had 12 new victims in their post-takedown operations. Additionally, the actors themselves authored a long note explaining what happened from their perspective.
ThyssenKrupp revealed a breach of its automotive division on February 26, 2024. One of the largest producers of steel, the company had to shut down parts of its systems to contain the incident. The company stated that no other parts of their businesses were impacted.?
Threat Actor Activity
Threat actors continue to heavily target the healthcare sector
US law enforcement agencies warned of continued hospital targeting after BlackCat/ALPHV actors targeted Change Healthcare, part of United Health’s subsidiary Optum, on February 26, 2024. The outage impacted a payment exchange platform as well as pharmacies all over the United States, delaying prescription deliveries; some services were noted offline on the website setup to provide the status during this incident. United Health and Optum themselves were not believed to be impacted in this incident.
领英推荐
Furthermore, the city of Oakley, California experienced a ransomware attack on February 26, 2024. City services were not disrupted or impacted, but systems were taken offline in order to contain the incident.
Iranian actors observed targeting aerospace and aviation industries in the Middle East
Malicious Iranian cyber activity was observed targeting various industries using cloud infrastructure for their command and control (C2) along with social engineering tactics to deliver two backdoors named Minibike and Minibus. Targeting these industries allows for strategic information to be procured and sent back to the Iranian government.?
Notable Leaks and Breaches
Suggested Further Reading
About DarkOwl
DarkOwl uses machine learning to collect automatically, continuously, and anonymously, index and rank darknet, deep web, and high-risk surface net data that allows for simplicity in searching.? ?
Our platform collects and stores data in near real-time, allowing darknet sites that frequently change location and availability, be queried in a safe and? secure manner without having to access the darknet itself.?
DarkOwl is unique not only in the depth and breadth of its darknet data, but also in the relevance and searchability of its data, its investigation tools, and its passionate customer service. As importantly, DarkOwl data is ethically and safely collected from the darknet, allowing users secure and anonymous access to information and threats relevant to their mission. Our passion, our focus, and our expertise is the darknet.?
For more information, visit www.darkowl.com.