urbanists.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
We're a server for people who like bikes, transit, and walkable cities. Let's get to know each other!

Server stats:

582
active users

#ransomware

20 posts18 participants1 post today

#NSA warns “fast flux” threatens national #security. What is fast flux anyway?

A technique that hostile nation-states & financially motivated #ransomware groups are using to hide their operations poses a threat to critical #infrastructure & national security, the NSA has warned.

The technique is known as #FastFlux. It allows decentralized networks operated by threat actors to hide their infrastructure and survive takedown attempts that would otherwise succeed
#privacy

arstechnica.com/security/2025/

Ars Technica · NSA warns that overlooked botnet technique threatens national securityBy Dan Goodin

An international ransomware group has claimed responsibility for a cyberattack against Australian IVF provider Genea, exfiltrating an alleged 700GB of sensitive patient data spanning six years and posting samples on the dark web to validate the breach. Despite Genea securing an interim NSW Supreme Court injunction to prohibit dissemination, the leaked data remained online as of mid-Wednesday, with affected patients not directly notified at the time. Cybersecurity experts note this tactic is typical ransomware pressure behavior, and the group—linked to prior supply chain incidents—has not issued public ransom demands. Genea, criticized for limited patient communication and lack of immediate support services, confirmed the breach involved personal and medical information and is working with the Australian government’s cyber coordination team, while urging clients to remain vigilant against identity fraud and phishing attempts. #CyberSecurity #Ransomware abc.net.au/news/2025-02-26/gen

ABC News · Patient information posted on dark web after cyber attack on IVF company GeneaBy Elise Worthington

👋 Ready for a fresh day of Cyber horrors? Me neither!

Oh well, here you go: opalsec.ghost.io/daily-news-up

Here's a few of the key items to be aware of:

🚨 Palo Alto GlobalProtect Scans: Observed a significant spike in scans targeting Palo Alto Network GlobalProtect login portals, possibly prior to new exploit releases. Time to audit those logs! 🧐

🇨🇳 China as Top Cyber Threat: Gen. Paul Nakasone (former NSA/Cyber Command Head) highlights China's unprecedented cyber activities, including malicious code in critical infrastructure and rapid exploitation of vulnerabilities. It's time to rethink our defense strategies! 🛡️

🇰🇵 North Korean IT Worker Expansion: North Korean "IT warriors" are infiltrating European companies, using fake identities to secure remote work and fund their regime. Stay vigilant and double-check those remote hires! 🕵️

🔑 Identity Flaws in Breaches: A new report indicates 60% of incidents involved an identity attack, with compromised valid accounts being a top initial access vector. Focus on robust MFA, least privilege, and AD security! 🔒

Read the full post for all the details and more actionable insights, and if you want all this straight to your inbox, you're in luck! 👉 opalsec.ghost.io/daily-news-up

Opalsec · Daily News Update: Wednesday, April 2, 2025 (Australia/Melbourne)Increased scans of Palo Alto GlobalProtect devices may indicate imminent attack. Nakasone names China the biggest Cyber threat to the US. DPRK expands prolific IT Worker campaigns to Europe. Talos finds Identity a key culprit in 69% of Ransomware incidents.

»Gmail Gets End-To-End Encryption From Google As 21'st Birthday Present:
[…] Google Claims To Have Invented An Entirely New Type Of Encryption For Gmail Users […]«

This is not an April joke and yes Google offers OpenPGP for Gmail Accounts. This is not difficult to set up but too many people are too lazy in my opinion.

📧 forbes.com/sites/daveywinder/2

ForbesGmail Gets End-To-End Encryption From Google As 21st Birthday PresentAs Gmail turns 21, Google has announced it is bringing end-to-end encryption to the email party. Here's what you need to know.
#e2ee#openpgp#email

Die Cyber-#Forensikerinnen Melanie Kubli und Tabea Nordieker bei der Arbeit: Der Schweizer Tagesanzeiger hat einen detaillierten und spannenden Bericht über die Arbeit der beiden IT-Spezialistinnen bei einem #Ransomware-Vorfall veröffentlicht - und wie sie mit #Cybercrime-Gruppierungen wie zB #Akira erfolgreich verhandeln - lesenswert und vielen Dank für das Engagement in der #Cybersicherheit!

tagesanzeiger.ch/digitale-fore #cybersecurity

Tamedia AG · Digitale Forensikerinnen: Sie verhandeln mit HackernBy Jacqueline Büchi

A little ray of sunshine:

The Journal Times, part of Lee Enterprises, had been seriously impacted by the #ransomware attack by Qilin in February. Today, they announced that they are back to full strength: journaltimes.com/opinion/colum

Sincere congrats to them after what was almost two months of intensive and dedicated efforts to fully recover.

Journal TimesAfter cyberattack, The Journal Times is back to full strengthToday, we cannot be more pleased to tell you we are back to full strength.

Here's another notification where it sounds like the victim paid the extortion demand but doesn't come right out and say that. Instead, their notification letter says that the data had temporarily been posted online but "The data is no longer posted on the dark web and, at this time, Kronick has no reason to believe this data was retained by the unknown third party or that any additional data was taken."

They don't name the attackers, but this was an incident involving #Rhysida that Rhysida had claimed on August 22, 2024.

Given how often we are told that these ransomware groups do retain data even after pinky-swearing and providing videos of it supposedly being destroyed forever, should entities like the law firm above say they have no reason to believe that their data was retained?

The notification letter by Kronick Moskovitz Tiedemann & Girard can be found at oag.ca.gov/system/files/KMTG_I