Ransomware | SC Media

Ransomware

Sale of Dharma ransomware source code draws hackers’ scrutiny, but the price is right

An unidentified party has reportedly placed the source code for Dharma ransomware up for sale on at least two Russian hacker forums, adding a formidable new competitor to an already crowded underground market. And while cybercriminals have met the offer with some healthy skepticism, the bargain-basement selling price of $2,000 may be alluring enough for…

Locky Ransomware

Ransomware attacks vs Kimchuk, Visser reveal supply chain threat to DOD

The operators behind DoppelPaymer ransomware reportedly attacked electronics manufacturer Kimchuk earlier this month, disrupting the company’s operations and stealing sensitive data that they have been publishing online as part of an extortion plot. Meanwhile, the cybercriminal outfit has continued to also publish information stolen earlier this year from Visser Precision, a parts maker and manufacturing solutions…

FBI warns of COVID-19 phishing scams promising stimulus checks, vaccines

The FBI’s Internet Crime Complaint Center (IC3) has issued a public service announcement warning citizens to watch out for email-based fraud and malware schemes that take advantage of the coronavirus pandemic. Among the scams to look out for are emails purporting to contain helpful information from the Centers for Disease Control and Prevention (CDC) and…

Maze ransomware attackers extort vaccine testing facility

The cybercriminal gang behind Maze ransomware has been extorting a UK-based clinical research organization that’s been preparing to play a potential role in testing vaccine candidates for the novel coronavirus, despite assurances that they would not harm any health care organizations during the COVID-19 crisis. SC Media first reported an attack on the medical center,…

Some cybercriminals consider laying off health care targets amid COVID-19 crisis

Certain members of the cybercriminal community, including a few malware developers and operators, have reportedly expressed a willingness to avoid attacking health care companies and other organizations that are key to battling the COVID-19 pandemic. Meanwhile, two cyber firms have pledged to offer free services to health care organizations hit by ransomware. BleepingComputer this week…

Password found to rescue victims of malicious COVID-19 tracker app

Members of the IT and cybersecurity communities have successfully obtained a password key for victims of CovidLock Android ransomware, which comes disguised as an app that supposedly helps track cases of the coronavirus, but actually locks users’ phones and demands a ransom in order to restore access. The unlock token has been verified as 4865083501.…

Coronavirus tracking app locks up Android phones for ransom

A malicious Android app that supposedly helps track cases of the coronavirus actually locks users’ phones and demands a ransom in order to restore access. (Note: a password key has since been published. See follow-up story here.) Dubbed CovidLock, the newly discovered ransomware performs a screen-lock attack by forcing a change in the password required…

Durham, N.C. bull rushed by ransomware; recovery underway

The city of Durham, North Carolina and the government of Durham County have experienced disruptions since a ransomware attack last Friday, but local government officials claim the damage was contained and recovery efforts are well underway. “Fortunately, the City was prepared with notification systems in place that worked as planned, providing immediate notice to City…

Data-stealing ransomware hits parts maker for Tesla, Boeing and Lockheed Martin

Visser Precision, a parts maker and manufacturing solutions provider for the aerospace, automotive, industrial and manufacturing industries, has reportedly suffered a combination ransomware attack and data breach that has compromised files pertaining to multiple business partners, including Tesla, SpaceX, Boeing and Lockheed Martin. In a statement, Denver, Colorado-based Visser confirmed it was “the recent target…

Next post in Cybercrime