Resources
Providing you the latest industry-specific news and insights.
- article
Malware Spotlight: Fog Ransomware
The Fog ransomware group is one of the few threat actors targeting one industry: education. This spotlight explores the group’s observed behavior, background information on the threat actor, and a technical analysis of Fog’s ransomware executable.
Read more - article
Ransomware and Cloud Security
Cloud infrastructures, seen as more secure than on-premise, face risks like cryptominers, DoS attacks, and extortion. Mr. Anazon, a threat actor, exploits these vulnerabilities, highlighting ongoing cloud security challenges.
Read more - article
Largest Data Breach of All Time (So Far)
On July 4th, 2024, a threat actor posted nearly ten billion unique passwords to a dark web forum. This was the second large dump of passwords from the threat actor calling themselves ObamaCare on the forum.
Read more - article
Threat Actor Spotlight: BlackSuit Ransomware
First observed by Arete in May 2023, BlackSuit ransomware is an emerging cyber threat targeting organizations across several sectors. This spotlight explores the ransomware behavior observed, incident response data, and technical analysis.
Read more - article
LockBit Claims to Have U.S. Federal Reserve Data
On June 25, LockBit claimed to have stolen 33 terabytes of data from the U.S. Federal Reserve. They posted 21 links with data from Evolve Bank & Trust, which was recently penalized for compliance issues.
Read more - article
Q1 2024 Crimeware Report
Q1 2024 Crimeware Report uses data from Arete’s ransomware and extortion responses. It covers ransomware variant trends, ransom demands, impacts on infrastructure, and Q2 forecasts.
Read more - article
Scattered Spider Adapts to Evolving Threat Landscaped
Delve into the dynamic threat landscape of cybersecurity with a comprehensive analysis of RansomHub and Scattered Spider's evolving tactics in ransomware and data theft. Learn how these groups adapt and pivot in response to disruptions.
Read more - article
Ransomware Realities: Additional Risks During the Crisis
After a ransomware attack, restoring data and minimizing business disruption is crucial. It's also vital to address post-incident factors to ensure full recovery and prevent further security issues. Discover key strategies to mitigate threats.
Read more - article
The Role of Space Systems in the U.S. Cybersecurity Strategy
The rising frequency and sophistication of cyber threats from state and non-state actors presents significant risk to U.S. national security and commerce.
Read more - article
Windows Native Ransomware – Encrypting with Bitlocker
Bitlocker, a Windows app for full-volume encryption, is exploited by threat actors to encrypt files and demand ransom. Despite more advanced options, new actors like "Shrinklocker" still prefer Bitlocker for encryption.
Read more - article
Avaddon Ransomware Hits AXA
Avaddon ransomware allegedly attacked European insurance provider AXA shortly after the company announced that it will stop paying ransoms for its clients. Our analysis provides an in-depth look at Avaddon’s tactics and recommended mitigations.
Read more - article
Colonial Pipeline Breached by Darkside Ransomware Group
On Saturday May 8, US Colonial Pipeline announced that they were victim of a ransomware attack that affected their network on Friday May 7. US Colonial Pipeline is said to be the largest fuel pipeline in the United States and the main source of…
Read more