Top 5 Cybersecurity Updates: Last Week's Key Highlights in the Digital Sphere
1. Akira Ransomware Gang Extorts $42 Million; Now Targets Linux Servers
Dangerous Ransomware Group Makes Millions, Expands Attacks: The Akira ransomware group has become a major threat, stealing $42 million from over 250 businesses globally. They've been active for roughly a year and target organizations across North America, Europe, and Australia. Recently, they began attacking Linux systems in addition to their usual Windows targets.
How Akira Operates: Akira hackers break into networks by exploiting weaknesses in Cisco systems, unsecured remote connections, and phishing scams. Once inside, they use sneaky tactics to stay hidden, steal important information, and gain control over the network . They encrypt a victim's files to hold them for ransom and make it difficult for businesses to recover.
The Evolving Ransomware Threat: Akira's move to target Linux systems shows how ransomware groups are constantly adapting. Law enforcement efforts have hurt major players like LockBit , but others, like Agenda, are still active. Worryingly, even less experienced hackers can now use cheap and widely available ransomware to launch attacks.
2.Evil XDR: Researcher Turns Palo Alto Software Into Perfect Malware
Security Tool Turned into Malware: Security researcher Shmuel Cohen demonstrated how Palo Alto's XDR software, designed to protect systems, could be used as a powerful attack tool. He found a way to bypass the XDR's security mechanisms and manipulate its settings.
How the Attack Worked: Cohen exploited unencrypted configuration files and outsmarted security features. This allowed him to control the XDR , disabling its defenses and deploying malware like ransomware.
What Was Fixed: Palo Alto has fixed most of the issues, but the core files remain unencrypted. This type of attack may be possible with other security tools as well.
The Danger: This highlights the risk that powerful security software if compromised, can become the perfect tool for malicious actors.
3. New 'CR4T' Backdoor Targets Middle East Governments
A previously unknown hacking campaign dubbed "DuneQuixote " targets Middle Eastern government entities. The attack uses a new type of backdoor malware called "CR4T" discovered by Kaspersky. The malware is designed to be stealthy and hard to detect.
How the Attack Works
领英推荐
4. New Redline Malware Variant Disguised as Game Cheat
How it Works
5. North Korean Hackers Employ AI for Espionage
North Korean Hacking Tactics Evolve
Cryptocurrency Heists and Supply Chain Attacks
To stay updated in the cyber security sphere visit our Blogs and subscribe to our newsletter.
Cyber security pentesters and a web developer
6 个月too much happening and here i cant land a job xD