Cyberattacks: Page 31


  • Image attribution tooltip
    Dean Mouhtaropoulos via Getty Images
    Image attribution tooltip

    Ransomware attack against Kaseya creates rippling supply chain compromise

    The remote monitoring software provider is warning customers to shut down servers after an incident that security researchers linked to REvil. 

    By July 2, 2021
  • Image attribution tooltip
    Leon Neal via Getty Images
    Image attribution tooltip

    Cloud targeted in widespread brute force campaign

    The defense, logistics and energy sectors are among the various entities under threat by the campaign, which targets organizations using Microsoft Office 365.

    By July 2, 2021
  • Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Critical goods industries face existential ransomware decisions

    For certain industries, the choice is between paying millions to settle a criminal extortion or allowing a catastrophic supply chain disruption.

    By June 30, 2021
  • Image attribution tooltip
    Rob Kim via Getty Images
    Image attribution tooltip

    Microsoft customer service agent briefly hit by fresh Nobelium attacks

    The threat actor behind the SolarWinds attacks used brute force and password spraying in a new round of attacks, mainly targeting IT and government agencies.

    By June 28, 2021
  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Traitov/iStock/Getty via Getty Images
    Image attribution tooltip

    Attacks against container supply chains grow more sophisticated

    Bad actors are finding novel methods of attacking cloud-native environments, raising new security challenges for developers. 

    By June 21, 2021
  • check, checkbook
    Image attribution tooltip
    Retrieved from Flickr/RikkisRefuge.
    Image attribution tooltip

    Cost of ransomware: CISO exits, staff layoffs and unaccounted losses

    Two-thirds of organizations incurred significant losses due to ransomware, a Cybereason survey found.

    By Samantha Schwartz • June 17, 2021
  • A JBS meatpacking plant in Greeley, Colorado.
    Image attribution tooltip
    Matthew Stockman/Getty via Getty Images
    Image attribution tooltip

    JBS paid hackers $11M ransom to avoid further disruption

    Law enforcement remained aware of the decisions the company was making, JBS USA CEO Andre Nogueira told The Wall Street Journal. 

    By Samantha Schwartz • June 10, 2021
  • U.S. Capitol Building
    Image attribution tooltip
    Brian Tucker/Cybersecurity Dive
    Image attribution tooltip

    Colonial CEO defends oversight response, urges transparency on ransomware

    Private industry needs more immediate and detailed threat intelligence to prevent these attacks from happening in the future, CEO Joseph Blount said.

    By June 10, 2021
  • Illustration of locks layered above circuity.
    Image attribution tooltip
    Traitov/iStock/Getty via Getty Images
    Image attribution tooltip

    Bad actors hide in everyday IT tools, complicating detection

    Security tools automatically block certain threats, yet there's often a larger intrusion detection teams and services need to weed out.

    By Samantha Schwartz • June 9, 2021
  • Image attribution tooltip
    Mark Wilson via Getty Images
    Image attribution tooltip

    What to consider before paying a ransom

    Amid rampant attacks, businesses have a choice: pay or suffer.

    By Samantha Schwartz • June 7, 2021
  • Image attribution tooltip
    Stefani Reynolds / Stringer via Getty Images
    Image attribution tooltip

    Phishing attack against US government, NGOs shakes assumptions on containment

    As federal authorities flex new, aggressive steps to deter malicious activity, analysts warn that an evolving threat actor may challenge industry's ability to trust anything. 

    By June 2, 2021
  • A JBS meatpacking plant in Greeley, Colorado.
    Image attribution tooltip
    Matthew Stockman/Getty via Getty Images
    Image attribution tooltip

    White House steps in as JBS ransomware interrupts consumer supply chain

    The FBI attributed the attack to Russia-based REvil, and JBS is on schedule to restore operations Thursday.

    By Samantha Schwartz • Updated June 3, 2021
  • Image attribution tooltip
    Getty Images / Staff via Getty Images
    Image attribution tooltip

    APT actors ramp up cyber campaign targeting Pulse Secure VPNs

    Mandiant researchers have identified four new malware families in an ongoing campaign targeting several key sectors, including the U.S. defense industry.

    By May 28, 2021
  • Image attribution tooltip
    Courtesy of Colonial Pipeline Company
    Image attribution tooltip

    TSA directive will add teeth to pipeline security oversight

    The Transportation Security Administration will require companies to appoint a cybersecurity coordinator, and report confirmed and potential security incidents to CISA.

    By Samantha Schwartz • May 27, 2021
  • Image attribution tooltip
    Jack Taylor / Stringer via Getty Images
    Image attribution tooltip

    Pinning ransomware gangs is a game of 'whack-a-mole'

    Dismantling international criminal enterprises takes a combination of law enforcement, intelligence and allies. But gangs rebrand to evade detection.

    By Samantha Schwartz • May 26, 2021
  • Image attribution tooltip
    Dan Kitwood/Getty Images News via Getty Images
    Image attribution tooltip

    CNA Financial's reported $40M ransom payment likely a record

    The company, among the top-10 cyber insurance firms, had a cyber insurance policy, but losses could exceed its coverage.

    By Samantha Schwartz • May 21, 2021
  • Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip
    Long-term SolarWinds consequences

    SolarWinds CEO extends hack timeline, rethinks intern blame

    Investigators established the timeline after stumbling upon code that showed the attackers were embedded in the system since the beginning of 2019.

    By May 20, 2021
  • cyberattack, privacy, connection
    Image attribution tooltip
    Orbon Alija/ E+/Getty via Getty Images
    Image attribution tooltip

    WannaCry lesson still echoes: Patch

    The EternalBlue leak and unpatched Windows 7 operating systems created the perfect storm.

    By Samantha Schwartz • May 17, 2021
  • Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    The fallout when OT companies lack confidence in IT security barriers

    While a controlled pipeline closure is preferred over one carried out by nefarious groups, the decision is up for debate in the security community.

    By Samantha Schwartz • May 14, 2021
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    Ransomware fears escalate as Irish health service, Toshiba unit targeted

    "We are seeing more broad based cyber incidents from our adversaries who are growing more aggressive," said Brandon Wales, CISA acting director. 

    By May 14, 2021
  • Image attribution tooltip
    Courtesy of Colonial Pipeline Company
    Image attribution tooltip

    Colonial Pipeline begins fuel delivery relaunch after ransomware attack

    While the company has not disclosed the attack vector, one expert said its quick recovery could be a post-breach success story. 

    By May 13, 2021
  • Image attribution tooltip
    Michael M. Santiago via Getty Images via Getty Images
    Image attribution tooltip

    Colonial Pipeline hack highlights grid disruption risks even with IT-focused cyberattack

    While the risk of malware migrating from IT to OT may be minimal, if it were to happen, the effects could be devastating, experts said. 

    By Robert Walton • May 13, 2021
  • Image attribution tooltip
    Drew Angerer via Getty Images
    Image attribution tooltip

    Colonial Pipeline disconnects OT systems to silo ransomware IT threat

    Anxiety is rising among corporate security officials concerned about the impact of ransomware among critical infrastructure providers.

    By May 12, 2021
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    CISA left in the dark during Colonial Pipeline's initial response

    With an agency mandate to share threat information with critical infrastructure, notification delays can stall industry response.

    By Samantha Schwartz • May 12, 2021
  • Image attribution tooltip
    Tim Boyle/Staff via Getty Images
    Image attribution tooltip

    Colonial Pipeline attack embodies security risk to nation's critical infrastructure

    Security experts warned for years about attacks against critical infrastructure, but one analyst called this the most brazen yet.

    By Updated May 10, 2021