U.S. Department of State’s $10M Bounty on Conti Ransomware

The U.S. Department of State announced last week that it is offering a $10,000,000 bounty for information on the identification or location of five highly ranked members of Wizard Spider, the Conti ransomware syndicate. Since the emergence of Conti in [...]

2022-12-15T00:57:47-08:00August 24th, 2022|

OFAC Sanctions Cryptocurrency Mixer Tornado Cash

What is Tornado Cash? A virtual cryptocurrency mixer on the Ethereum blockchain, Tornado Cash was officially sanctioned by the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) on August 8th, 2022. The platform works to facilitate [...]

2022-09-09T18:43:16-07:00August 19th, 2022|

The EPA Adds Cybersecurity Rules for Water Sector

As cyber attacks continue suppressing critical infrastructure sectors like water and wastewater systems, implementing proper cybersecurity practices is becoming more vital in protecting against highly disruptive cybersecurity incidents. According to the Environmental Protection Agency (EPA), these threats on process control [...]

2022-12-15T00:58:31-08:00August 17th, 2022|

Windows 11’s New Update Defends Against Compromised Credentials

Passwords protect our identity in the digital space, allowing for safe and secure interactions. Despite the strength and efficacy of any given sophisticated password, private data is at risk when credentials are compromised. To combat these online attacks, Microsoft is [...]

2023-02-20T21:14:22-08:00August 1st, 2022|

Lack of Ransomware Reporting a Major Issue in Cybercrime Defense

For a country that boasts economic and technical progression, the United States falls short on ransomware proficiency. Malware groups and the mitigation of cyber attacks run rampant. Many organizations, as well as individuals, do not report these attacks because they [...]

2022-08-08T22:45:03-07:00July 21st, 2022|

SHI International Cyberattack

Over the Fourth of July weekend, prominent IT services provider SHI International, was a victim of a major malware attack. Based in Somerset, New Jersey, SHI is a private provider of tech services and a supplier of tech products to [...]

2022-07-21T20:08:04-07:00July 12th, 2022|

AstraLocker 2.0 Ransomware is a Smash & Grab Variant

A version of AstraLocker, AstraLocker 2.0 ransomware, has just been released. This updated version is what some threat analysts call a rapid attack, or smash-and-grab style of ransomware. The AstraLocker 2.0 developers use Microsoft Word attachments in emails to distribute [...]

2022-12-15T01:00:38-08:00July 1st, 2022|

What is Enterprise Patch Management?

What is Enterprise Patch Management (a.k.a. the application of software security updates according to NIST SP 800-40r4)? The National Institute of Standards and Technology (NIST) just released Report 800-40r4: Guide to Enterprise Patch Management Planning: Preventive Maintenance for Technology. [...]

2022-04-08T13:23:38-07:00April 7th, 2022|

LAPSUS$: The New Extortion Group Causing a Scene

A new threat actor group is behind an infamous wave of attacks impacting companies like Microsoft, Nvidia, Okta, and most recently Globant, among others. LAPSUS$, tracked as DEV-0537 by Microsoft, is relatively less sophisticated than other hacking and extortion groups [...]

2022-04-08T17:40:39-07:00April 1st, 2022|

Cybersecurity Transformations Since the Russia/Ukraine Conflict

In the past few days since the Russia/Ukraine conflict, there have been some changes in the cybersecurity landscape. Below are some of my personal observations from our Ransomware Recovery business unit. I am curious if other incident response professionals, ransomware [...]

2022-03-04T12:27:57-08:00March 2nd, 2022|