Cable krebs group ransomwhere5/20/2023 ![]() Multinational beverage corporation Coca-Cola Company has launched an investigation after the Russia-linked ransomware gang Stormous announced it has stolen 161 GB of data from the company’s servers, including financial documents, credentials, and other sensitive information. Soft drink giant Coca-Cola is investigating claims of a hack and data theft In October 2020, the US Department of Justice charged the above mentioned officers for carrying out destructive cyberattacks using KillDisk, Industroyer, and Olympic Destroyer malware with an aim to disrupt and destabilize other nations. ![]() The US authorities announced a reward of up to $10 million for information on six officers of Unit 74455 associated with the Main Intelligence Directorate of the General Staff of the Armed Forces of the Russian Federation believed to be the members of a hacker group known as Sandworm Team, Telebots, Voodoo Bear, and Iron Viking.Īccording to the US Department of State, these six individuals were responsible for the widespread NotPetya hacking campaign in 2017 that compromised computer systems of hospitals and medical facilities, as well as other private entities in the United States and caused nearly $1 billion in losses. US offers a reward of up to $10 million for info on Sandworm hackers Threat actors exploited zero-day flaws in Microsoft, Apple, and Google products most frequently, likely reflecting the popularity of these vendors. The report also noted that the proportion of financially-motivated cyber criminals, including ransomware gangs, exploiting zero-day vulnerabilities grew to one-third in 2021. The researchers said they identified 80 zero-day flaws exploited in the wild last year, with most of the attacks conducted by state-backed hackers, mainly from China, Russia, and North Korea. Zero-day hacking attacks hit record in 2021, researchers sayĢ021 was a record year for zero-day vulnerabilities, more than doubling the previous maximum, according to a report from the threat intelligence firm Mandiant. T-Mobile has confirmed the security breach, but stated that no customer or government information had been stolen in the incident. The group used social engineering techniques to gain access to the network and targeted the company’s employees who had access to the internal tools that could allow the attackers to conduct a “SIM swapping” attack. The hackers compromised the telecoms giant’s network using initial access they bought from sites like Russian Market, a marketplace that specializes on stolen data. The security breach came to light after security expert Brian Krebs released a report detailing internal chats between members of Lapsus$, according to which, the group several times hacked into the T-Mobile systems in March and stole source code for a range of projects. The Lapsus$ hacker group compromised systems of the telecom firm T-Mobile and stole source code for various company projects. Lapsus$ hackers breached systems of telecom giant T-Mobile ![]()
0 Comments
Leave a Reply. |