Cyber criminals release data following attack on world’s largest wind turbine manufacturer

Personal data stolen from Danish wind turbine maker Vestas by hackers in a ransomware attack last month has been made public, the company said.

A cyber security incident on 19 Nov forced Vestas to shut down IT systems across multiple business units and locations to contain the issue.

The company said it was able to continue operations but that data had been compromised.

“The hackers managed to retrieve data from the compromised internal file share systems and have made some of the compromised data public,” Vestas said in a statement.

It added that the majority of compromised data includes personal information such as names, contact details and CVs but also some cases of more sensitive information such as social security numbers and bank account information.

“Due to the potential risk caused by the leak of personal data, Vestas encourages all employees and business partners to continue to stay vigilant of any indications of misuse of their personal data,” it said.

According to a recent report by Gartner, the ransomware business model has become more specialized and otherwise efficient, including ransomware-as-a-service (RaaS) and demand for bitcoin pay-outs, resulting in a proliferation of attacks

The technology for the attacks themselves has also evolved, with viruses that linger and infect backup systems, do not rely on phishing as a vector, and harder-to-identify viruses, such as fileless and crypto-jacking attacks.

Suspected ransomware payments totalling $590 million were made in the first six months of this year, more than the $416 million reported for the whole of 2020, according to the US Treasury.

The US Treasury Department said the average amount of reported ransomware transactions per month in 2021 was $102.3 million, with REvil/Sodinokibi, Conti, DarkSide, Avaddon, and Phobos the most prevalent ransomware strains reported.

US President Joe Biden has made the government’s cybersecurity response a top priority for the most senior levels of his administration following a series of attacks this year that threatened to destabilize US energy and food supplies.

Follow us on twitter: @risksEmerging

Cybercriminals target #metaverse investors with phishing scams

https://www.cnbc.com/amp/2022/05/26/cybercriminals-target-metaverse-investors-with-phishing-scams.html #fintech

Great blog post explaining how RBAC work in #Kubernetes .
https://medium.com/@danielepolencic/how-does-rbac-work-in-kubernetes-d50dd34771ca #CloudSecurity #CloudBreach #RedTeam #AzureSecurity #AKS #DevSecOps #DevOps #BlueTeam #Azure #BreachingAzure

Found 0 vulns with #wapiti on my wordpress server. That's good. The only major one is #wpscan so far.
#Ethicalhacking #ethicalhacker #Pentesting

#Malware #Stealer #BlueShtorm

BlueShtorm.exe:
https://bazaar.abuse.ch/sample/dd7002a597142a426c7710e84485e6047450cbcb58e44cbbec73c20b0ee50771/
https://www.virustotal.com/gui/file/dd7002a597142a426c7710e84485e6047450cbcb58e44cbbec73c20b0ee50771/

Special thanks to @James_inthe_box!

Charity, Breast Cancer Now, had almost immediate results during their pilot of SKURIO's BreachAlert

Find out more about how the charity benefited from Dark Web monitoring
https://info.skurio.com/breast-cancer-now-case-study-2020
#DataBreach #DarkWebMonitoring

How to reset the #AppleID password

@Apple @AppleNews

#appleiphone #AppleUsers #applelife #appleproducts #securityservices #securitychallenges #appleindia #applelifestyle #iphoneonly #iphonechallenge #IPhonelock #technews #delhi #india

https://www.mymobileindia.com/how-to-reset-the-apple-id-password/

It’s hard to tell whether it is #REvil or a copycat, attribution is difficult, especially in #DDoS, says @Akamai's Chad Seaman. Learn more on @techrepublic. @WatchTheStone #cybersecurity https://bit.ly/3LRegGg

Load More...
SHARE: