January Mag | Refresh Your Memory

January Mag | Refresh Your Memory

Here you are.

Welcome to your most readable and elucidator newsletter page, B'News, the Biweekly Cybersecurity Newsletter from the Brandefense Team.

In our newsletter episodes, you will find significant security news, some findings from the dark web, blogs, details of apt groups, and more and more...

So, Let's Begin!


Massive Data Leak at Volkswagen Exposes EV Driver Locations for Months        

A major data breach at Cariad, a Volkswagen subsidiary, exposed the personal and location data of approximately 800,000 electric vehicle (EV) owners, including those of VW, Audi, Seat, and Skoda cars. The leaked data, available online for months, allowed access to sensitive information such as driver geolocation, contact details, and movement patterns, as reported by Germany's Spiegel magazine. [Read More]


Refresh Your Memory        

Brandefense's Ransomware Trends Report | Q4 2024 will be published soon. Let's refresh your memory for these three quarters:

Total Cases Analyzed:

? Q1: 947 incidents .

? Q2: 1206 incidents .

? Q3: 1218 incidents .

? Ransomware Groups: The number of active ransomware groups increased each quarter (Q1: 46, Q2: 51, Q3: 58 ).


Key Findings:

1. Affected Sectors:

? Q1: Most affected sectors were business services (25.9%), manufacturing (18.2%), and retail (12.5%).

? Q2: Manufacturing led with 22.9%, followed by business services (13.7%) and retail (10.1%).

? Q3: Manufacturing (20.5%), business services (14.9%), and retail (11.6%) remained the top targets.

2. Geographical Distribution:

? The United States was the most targeted country in each quarter (Q1: 55.1%, Q2: 56.9%, Q3: 54.2%). The UK, Canada, and Germany were also prominent targets.

3. Ransomware Groups:

? LockBit remained the most active group but showed a decline in activity from Q1 to Q2. Groups like Play and Medusa increased their activity.

? Smaller and newer groups significantly increased their attacks, accounting for 44.1% of Q3 incidents.

4. Multi-Layered Extortion:

? Many groups opted for double or triple extortion methods, combining encryption with threats of data leaks. Medusa and INC Ransom frequently used this strategy.


Notable Trends:

1. Threat to Small Businesses:

? Small-scale businesses are the most frequently targeted group, likely due to weaker cybersecurity measures.

2. Evolving Tactics and Tools:

? The number of groups leveraging new tools and zero-day vulnerabilities is increasing. For example, RansomHub employs advanced social engineering techniques to enhance its attacks.

3. Operational Efforts:

? International operations have successfully disrupted ransomware infrastructures. Europol’s “Operation Endgame” is a prime example of these efforts.


Reach the reports:

Q1: https://brandefense.io/reports/ransomware-trends-report-q1-2024/

Q2: https://brandefense.io/reports/ransomware-trends-report-q2-2024/

Q3: https://brandefense.io/reports/ransomware-trends-report-q3-2024/


Dark Web Diaries        

NPM and Quasar RAT: A malicious npm package disguised as an Ethereum tool is installing Quasar RAT, compromising developer systems and posing a significant threat to the software supply chain.

Compromised Chrome Extensions: Over 35 extensions have been hacked, putting 2.5 million users at risk. ?? The attack began with phishing emails and leveraged malicious OAuth permissions. [Read More]


Number with Brandefense        
Wrap-Up 2024

In 2024, Brandefense significantly enhanced our clients' security and satisfaction and advanced its technological capabilities. By protecting over 12,000 brands globally, we have demonstrated our commitment to safeguarding digital assets and maintaining trust.

?? 9.3B credentials detected

?? 4.62M stolen CC detected

?? 17.64M total identified IoCs

?? 198 threat actors analyzed

?? 12K happy brands

As we look forward to the coming year, we remain dedicated to innovation and excellence in digital risk management.

要查看或添加评论,请登录

BRANDEFENSE的更多文章

社区洞察

其他会员也浏览了