These ransomware groups are tricking law enforcement.
Luigi Tiano
Co-Founder at Assurance IT ??| Data Protection & Data Privacy | Podcast Host of 10 Questions to Cyber Resilience | Speaker | Thought Leader
We have now reached more than?22,360 subscribers! Thanks for your unwavering support! Help us with our mission of helping 100,000 organizations become cyber-resilient by sharing this newsletter with your network.
Be sure to read?the "My thoughts" section to learn strategies for navigating and combating cyber attacks. I'm here to assist you in avoiding and battling?these threats should they ever affect you.
Contact me if you have any questions regarding your enterprise's cybersecurity strategy --> Luigi Tiano.
Blaming law enforcement for what? ?
?
The BlackCat/ALPHV ransomware operation, targeted by law enforcement, shut down after a breach and subsequent attacks on critical infrastructure, including the healthcare sector. Despite law enforcement's efforts, the group continued its operations and extorted a $22 million ransom from Change Healthcare. However, the gang performed an exit scam, blaming law enforcement for seizing their assets and absconding with the ransom. This incident highlights the recurring cycle of ransomware attacks and the challenges in combating cybercrime. (bleepingcomputer.com)?
?
My Thoughts: The BlackCat/ALPHV ransomware operation's exit scam exemplifies the audacity of cybercriminals and the challenges in combating ransomware attacks effectively. Despite law enforcement's efforts to target the gang, they managed to escape with a substantial ransom, leaving victims grappling with severe disruptions and financial losses.??
To strengthen defenses against ransomware threats, focus on implementing a robust backup strategy. Regularly backup critical data and ensure that backups are stored securely, both offline and offsite if possible (in the cloud) In the event of a ransomware attack, having reliable backups can enable swift recovery without succumbing to extortion demands.?
?
Check out our cloud backup solution here.
Hear what our client has to say about his experience with us:?
?
Only through collective action can we effectively address the growing threat posed by ransomware and safeguard our digital ecosystem against cyber threats.?
??
Today, cybersecurity is not an option. It’s the common standard.??
?
Emergency phone lines go silent?
?
The City of Hamilton is currently facing a ransomware attack that has severely disrupted city services for over a week. City Manager Marnie Cluckie confirmed the cyber attack during a media conference, highlighting its extensive impact on various services including phone lines, city council operations, and online applications. While the city is actively working to address the situation, there's no clear timeline for resolution. Cluckie assured that personal data hasn't been accessed and the city has engaged cybersecurity experts for assistance. Ransomware attacks encrypt systems or data until a ransom is paid, with potential devastating consequences. The attack has led to service disruptions in various sectors, including municipal offices, libraries, transit services, and online platforms. (msm.com)?
?
领英推荐
My Thoughts: As a professional in cybersecurity and crisis management, the ransomware attack on Hamilton's city services underscores the critical importance of robust cybersecurity measures for municipalities. This incident serves as a reminder of the relentless threat posed by cybercriminals and the devastating impact of ransomware attacks on essential services and public trust. It is imperative for municipalities to prioritize cybersecurity investments, including robust defense mechanisms, regular training for staff, and effective incident response protocols. This incident should prompt municipalities across the country to reassess their cybersecurity posture and invest in proactive measures to prevent, detect, and respond to cyber-attacks effectively.?
?
Would you fake an FBI takedown??
?
A Russian hacker group known as AlphV orchestrated a ransomware attack on Optum, a healthcare management system in the US, demanding a hefty sum of $22 million for decryption and deletion of stolen data. Optum allegedly paid the ransom, but a partner involved in exfiltrating the data claims AlphV scammed them out of their share and didn't delete the data as promised. Despite a supposed FBI takedown of AlphV's dark website, independent research reveals it's likely a ruse, with evidence suggesting AlphV is exit scamming its affiliates. There's uncertainty about AlphV's next move, but it's speculated they may reorganize under a different name on the dark web, leaving the fate of the 4TB of stolen data in question. (techspot.com)?
?
My thoughts: This case underscores the challenges of attribution and enforcement in cyberspace, emphasizing the importance of international cooperation and legal frameworks to hold cybercriminals accountable. Moving forward, proactive vigilance, adaptation, and collaboration are essential in safeguarding our digital infrastructure against evolving cyber threats.??
?
Looking to improve your security? We got you.??
?
?
Check your credit card statements NOW?
?
American Express issues a warning to customers regarding a third-party data breach involving a merchant processor, leading to exposure of credit card information. The breach, not originating from American Express itself, compromised account numbers, names, and card expiration dates of some cardholders. Although details regarding the affected customers, the breached merchant processor, and the timeline of the attack remain unclear, American Express has notified regulatory authorities and impacted customers. The company reassures customers that they won't be held liable for fraudulent charges and advises vigilance in monitoring account statements for suspicious activity. Additionally, customers are encouraged to enable instant notifications through the American Express mobile app and consider requesting a new card number to mitigate risks associated with stolen credit card information. (bleepingcomputer.com)?
?
My Thoughts: This breach underscores the need for American Express to vet third-party partners rigorously and enhance transparency regarding breach details. To mitigate future risks, American Express should improve monitoring and incident response protocols, consider encryption or tokenization, and encourage customers to enable instant notifications and request new card numbers as precautions. Things like this cannot continue happening.??
?
Need to enhance your cybersecurity posture in your enterprise? At Assurance IT, we have an 18-month cyber insurance guarantee.??
?
Here’s our customer process:??
?