Fake LockBit, Real Damage: Ransomware Samples Abuse Amazon S3 to Steal Data

Credit to Author: Jaromir Horejsi| Date: Wed, 16 Oct 2024 00:00:00 +0000

This article uncovers a Golang ransomware abusing Amazon S3 for data theft, and masking as LockBit to further pressure victims. The discovery of hard-coded AWS credentials in these samples led to AWS account suspensions.

Read more

Booking.com Phishers May Leave You With Reservations

Credit to Author: BrianKrebs| Date: Fri, 01 Nov 2024 21:12:38 +0000

A number of cybercriminal innovations are making it easier for scammers to cash in on your upcoming travel plans. This story examines a recent spear-phishing campaign that ensued when a California hotel had its booking.com credentials stolen. We’ll also explore an array of cybercrime services aimed at phishers who target hotels that rely on the world’s most visited travel website.

Read more

Chinese threat actor Storm-0940 uses credentials from password spray attacks from a covert network

Credit to Author: Microsoft Threat Intelligence| Date: Thu, 31 Oct 2024 17:00:00 +0000

Since August 2023, Microsoft has observed intrusion activity targeting and successfully stealing credentials from multiple Microsoft customers that is enabled by highly evasive password spray attacks. Microsoft has linked the source of these password spray attacks to a network of compromised devices we track as CovertNetwork-1658, also known as xlogin and Quad7 (7777). Microsoft is […]

The post Chinese threat actor Storm-0940 uses credentials from password spray attacks from a covert network appeared first on Microsoft Security Blog.

Read more

​​Microsoft now a Leader in three major analyst reports for SIEM

Credit to Author: Rob Lefferts| Date: Thu, 31 Oct 2024 17:00:00 +0000

Microsoft is positioned in the Leaders Category in the 2024 IDC MarketScape for worldwide SIEM for Enterprise—making it the third major analyst report in SIEM to name Microsoft as a Leader.

The post ​​Microsoft now a Leader in three major analyst reports for SIEM appeared first on Microsoft Security Blog.

Read more