(Adobe Stock)
TechCrunch reports that a dozen organizations have saved themselves millions in ransomware payments due to security issues affecting ransomware operations’ Internet dashboards.
Such vulnerabilities made it possible to send advanced encryption warnings to four compromised cryptocurrency entities, as well as grant decryption keys to two other companies, said Vangelis Stykas, researcher and lead generation lead at AtroposArrayai, ahead of the study’s presentation at Black Hat. USA this year. security conference. Array In addition to the Everest ransomware that exploited default credentials for its back-end SQL databases that compromised its log directors, the BlackCat ransomware also had API endpoints that revealed its targets while the attacks were in progress. Of course, Stykas noted. Meanwhile, Stykas received Mallox ransomware decryption keys after compromising the organization’s administrator’s chat messages via an insecure direct object reference vulnerability. These effects show the fallibility of ransomware operations, which can be exploited by law enforcement in their suppression efforts.
Laura FrenchAugust 9, 2024
The ransomware gang has extorted several agencies and hospitals over the past year.
The attack affected a computer formula that manages data from 40 museums.
In a post published on her leaked Tor, Rhysida threatened to leak Bayhealth’s data, adding ID cards and passports, if the company didn’t pay 25 Bitcoins.
By clicking the Subscribe button below, you agree to SC Media’s Terms and Conditions and Privacy Policy.