Azure Storage instances have been targeted by the ALPHV/BlackCat ransomware gang in new attacks with an updated Sphynx encryptor with custom credential support, BleepingComputer reports.
ALPHV/BlackCat attackers leveraged a stolen one-time password to infiltrate an organization's Sophos Central account before disabling Tamper Protection and altering security policies to eventually encrypt systems and remote Azure cloud storage, according to a Sophos X-Ops report.
After using stolen Azure keys to access the impacted organization's Azure portal, threat actors proceeded to leverage AnyDesk, Atera, Splashtop, and other remote monitoring and management tools.
Meanwhile, the new Sphynx variant used in the attack, which was initially identified in March, was recently found by Microsoft to contain the Impacket networking framework and Remcom hacking tool.
The findings come after ALPHV/BlackCat was reported to have begun using a new extortion scheme involving a clear website for exposing stolen data, as well as a data leak API.
The Philippine Health Insurance Corporation, which manages the country's universal healthcare system, had its websites and portals disrupted by a Medusa ransomware attack last week, from which it is struggling to recover, reports The Record, a news site by cybersecurity firm Recorded Future.
Japanese multinational conglomerate Sony has begun an investigation into an alleged cyberattack, which was reported to have resulted in the exposure of 3.14 GB of data in hacking forums, amid the emergence of different attackers claiming to be behind the hack, according to BleepingComputer.
Threat actors have leveraged the ZeroFont phishing attack technique, which initially involved the insertion of hidden characters or words in emails to evade security detection systems, to modify message previews as shown on Microsoft Outlook and other email clients, BleepingComputer reports.