Cyber Security News

Two Hacker Groups Responsible for 60% of Crypto Hacks
Date

Two Hacker Groups Responsible for 60% of Crypto Hacks

A report published by blockchain analysis firm Chainalysis has revealed that two separate hacker groups are responsible for up to 60% of all publicly reported cryptocurrency exchange hacks. Further, it is estimated that the two groups combined have stolen approximately 1 billion USD worth of cryptoc

US Authorities Move to Shutdown Joanap Botnet
Date

US Authorities Move to Shutdown Joanap Botnet

It is no secret that the US faces many cybersecurity threats to national and business interests. With government workers returning to jobs after a lengthy government shutdown over President Trump’s planned border wall the true cost of how the shutdown impacted cybersecurity can be calculated. Howeve

Trojans Looking to Steal Your Money
Date

Trojans Looking to Steal Your Money

Last week new ransomware variants come to light which grabbed more than a few headlines. First, we had Phobos, operated by the group behind the Dharma ransomware family, then secondly hAnt which targeted mining rigs. Towards the end of last week, it would seem that those using trojans in financially

New Ransomware Targets Chinese Mining Rigs
Date

New Ransomware Targets Chinese Mining Rigs

It has been a busy week in the news for ransomware. First, it emerged a new family called Phobos was discovered and been used by the group behind the Crysis and Dharma families of ransomware. Then reports emerged of another new ransomware called Anatova. Then finally, although the week has not ended

Phobos Ransomware Emerges from the Dark
Date

Phobos Ransomware Emerges from the Dark

Discovered in December 2018, a new ransomware variant called Phobos was discovered by researchers at Covewave which it would seem is a combination of the Dharma and Crysis ransomware variants. The naming of the new ransomware variant will pique the interest of those fond of Greek Mythology as Phobos

Collection #1: The Monster Breach
Date

Collection #1: The Monster Breach

Data breaches have become a no longer ignorable fact of life. A fair amount of articles on this publication have dealt with breaches in their varying forms. From the record-breaking Equifax breach which was unrivaled in scale, to how much cash is to be made by hackers selling data acquired from a br

NanoCore Proves Hard to Kill
Date

NanoCore Proves Hard to Kill

Remote Access Trojans, or RAT, are a favored malware variant of hackers and other cybercriminals across the globe. The use of such trojans is as varied and diverse as those using them illegally. They have been seen in cyber espionage campaigns to financial fraud campaigns and are a stable tool in an

Ryuk and TrickBot Now Partners in Crime
Date

Ryuk and TrickBot Now Partners in Crime

The Ryuk ransomware, named after a character from the popular Death Note anime, has become known as targeted ransomware. Discovered in August 2018, it was seen been used by hackers to first scope out potential targets. Once a suitable target was found the ransomware gained access to the targeted com

New Tool Bypasses 2FA
Date

New Tool Bypasses 2FA

It is the best practice to enable two-factor authentication, often simply referred to as 2FA, when one can. Beyond best practice, it is recommended by experts to enable 2FA to prevent becoming a victim of the numerous phishing campaigns that stalk the Internet on a daily basis. Two events that have

Vidar and GandCrab Distributed in Same Campaign
Date

Vidar and GandCrab Distributed in Same Campaign

With the recent spate of cyber-attacks utilizing two or more different malware variants or tactics, the smart money would have predicted the trend to continue into 2019. In a recently discovered campaign, the smart money appears to be right. Hackers are targeting victims with a two-pronged attack th