Rapid7 Labs observed a 35% decrease in leak site posts by the top 10 ransomware groups from May to June. 👀 Notably, the LockBit #ransomware group made significantly fewer leak site posts, likely due to impacted operations by law enforcement making decryption keys available. Read Rapid7 Chief Scientist Raj Samani's related commentary in Forbes: https://lnkd.in/edAakDes
Rapid7’s Post
More Relevant Posts
-
Did you know Rapid7 has technology that can monitor Ransomware Forums to see if your organization is being mentioned and help your organization prepare for what may be an imminent attack?
Rapid7 Labs observed a 35% decrease in leak site posts by the top 10 ransomware groups from May to June. 👀 Notably, the LockBit #ransomware group made significantly fewer leak site posts, likely due to impacted operations by law enforcement making decryption keys available. Read Rapid7 Chief Scientist Raj Samani's related commentary in Forbes: https://lnkd.in/edAakDes
To view or add a comment, sign in
-
-
Check out the new blog from Jon DiMaggio around the latest on #LockBit #unfinishedbusiness #threatintelligence #Analyst1
Published Author and Chief Security Strategist at Analyst1 (Author of SANS Difference Maker Award Book of the Year 2022 AND 2023!) Author of the Ransomware Diaries and featured on 60 Minutes.
🚨 Law enforcement has resurrected the former #LockBit #ransomware leak site and it has some interesting messaging. Apparently, they plan to release the identity of the leader of the gang, LockBitSupp. They had planned to do this on Feb 25th but stated they were holding off because LockBit was cooperating. That relationship appears to have gone sour and they plan to release information about him on Tuesday. They even have a countdown timer similar to what LockBit uses for his victims. Must suck being on the other end of it! I also wanted to discuss the recent #Lockbit events in my own creative way and offer a unique but fun perspective compared to the norm in reference to my relationship with the gang and todays events. Check out “Unfinished Business” from me and Analyst1! https://lnkd.in/ejH9a32K
To view or add a comment, sign in
-
New #ransomware extortion practice used by the #Ransomed gang. The #Ransomed operators started to pressure their victims to deface their public websites while encrypting their data. The rise of triple-extortion schemes is not new, in the past years criminal gangs extort money from stolen data, encrypted files, and also from the DDoS threat. But the defacement practice was not very common, just a few gangs used it, such as #IndustralSpy, and not even every time, but the #Ransomed gang seems to have adopted the practice in a stable-looking manner. Technical details: https://lnkd.in/d2jq_Ucz
To view or add a comment, sign in
-
-
Semperis' Technology Evangelist Sean Deuby offered his thoughts to SC Media regarding several reports that ransomware gang BlackCat tattled last week to the Securities & Exchange Commission on one of its victims. With new corporate reporting laws taking effect in December, is this the first of many more incidents? Only time will tell. Regardless of possible future disclosures, organizations must remember that Active Directory environments are the most vulnerable entry points in a network, making it imperative to have real-time visibility of changes to elevated network accounts and groups. https://lnkd.in/g7VhmCdJ #ActiveDirectory
ALPHV/BlackCat reporting to the SEC could become the ‘new normal' for ransomware operators
scmagazine.com
To view or add a comment, sign in
-
tech blog A second article on lockbit: Since we’re posting about Lockbit today, I found a second article titled LockBit gang leader exposed in FBI ransomware breakthrough which talks about some of what bleeping computer has but even goes in to what the perp is charged with. Between the two articles, this is going to be huge! Big news. Whether arrests come […] check it out!
A second article on lockbit
https://technology.jaredrimer.net
To view or add a comment, sign in
-
Have you registered for our next #webinar on the 2nd November yet? If not, why not? We'll be talking about one of the most common routes used by ransomware groups and criminal actors - buying access through an #InitialAccessBroker, or credentials obtained via #infostealers. More info and register here:
[Upcoming] Initial Access Brokers and Infostealers: Your Business for Sale on the Dark Web
https://www.slcyber.io
To view or add a comment, sign in
-
ICYMI: tech blog A second article on lockbit: Since we’re posting about Lockbit today, I found a second article titled LockBit gang leader exposed in FBI ransomware breakthrough which talks about some of what bleeping computer has but even goes in to what the perp is charged with. Between the two articles, this is going to be huge! Big news. Whether arrests come […] check it out!
A second article on lockbit
https://technology.jaredrimer.net
To view or add a comment, sign in
-
Real solutions, nice. "By following the steps presented in section 8 of the TrueNAS SCALE Evaluation Guide, a user can be created for the sole purpose of replication. This user cannot authenticate to the TrueNAS SCALE webUI, connect to network shares, and may only login via a shared SSH key."
Ransomware waits for no one! Be ahead of the curve by observing best practices to ensure your data remains safe with the power of #TrueNAS. https://bit.ly/41TIJ07
Level Up your Ransomware Protection with TrueNAS
To view or add a comment, sign in
-
There's some really good information here for protecting your backups, worth a read for anyone responsible for backups and ensuring the integrity 👍
Ransomware waits for no one! Be ahead of the curve by observing best practices to ensure your data remains safe with the power of #TrueNAS. https://bit.ly/41TIJ07
Level Up your Ransomware Protection with TrueNAS
To view or add a comment, sign in