Cyberattacks: Page 18


  • Okta booth at RSA Conference on April 27, 2023 in San Francisco.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Okta customers’ IT staff duped by MFA reset swindle

    IT workers at four organizations using Okta were successfully hit by a consistent pattern of social engineering attacks.

    By Sept. 6, 2023
  • Rendered image depicting global networks.
    Image attribution tooltip
    DKosig via Getty Images
    Image attribution tooltip

    Barracuda patch bypassed by novel malware from China-linked threat group

    Mandiant uncovered a months-long cyber espionage campaign targeting high value government entities and technology firms in the U.S. and abroad.

    By Sept. 1, 2023
  • An image of Federal Bureau of Investigation Director Christopher Wray at a press conference.
    Image attribution tooltip
    Kevin Dietsch/Getty Images via Getty Images
    Image attribution tooltip

    US leads takedown of Qakbot malware, which automated initial infections

    The botnet and malware had infected more than 700,000 computers worldwide and was linked to the abuse of OneNote files.

    By Aug. 30, 2023
  • Aerial view of a large crowd of people.
    Image attribution tooltip
    Dmytro Varavin/Getty Images via Getty Images
    Image attribution tooltip

    MOVEit attack victim count surpasses 1,000 organizations

    Months after the campaign was discovered, victims are still coming forward and, in most cases, breaches at third-party vendors are to blame.

    By Aug. 28, 2023
  • A stack of medical records displayed on a desk.
    Image attribution tooltip
    Alexandre Schneider/Getty Images via Getty Images
    Image attribution tooltip

    Prospect Medical stolen data listed for sale by emerging ransomware group

    Rhysida claims it stole more than 500,000 Social Security numbers, financial, legal and medical files. And it’s all for sale on the dark web.

    By Aug. 25, 2023
  • Matrix background of blurred programming code.
    Image attribution tooltip
    Getty Plus via Getty Images
    Image attribution tooltip

    Ransoming Linux and ESXi systems is getting easier

    Threat actors are using memory-safe languages to release payloads for Windows, Linux and ESXi simultaneously, SentinelOne researchers warn.

    By Aug. 24, 2023
  • Image attribution tooltip
    Getty Images / Staff via Getty Images
    Image attribution tooltip

    Hackers target Pentagon contract site via compromised routers

    Research from Black Lotus Labs says the new activity aligns with recent state-linked campaigns, including Volt Typhoon.

    By Aug. 23, 2023
  • Hourglass projects a dollar sign as shadow against a black/grey background
    Image attribution tooltip
    LdF via Getty Images
    Image attribution tooltip

    Ransomware attack dwell times fall, pressuring companies to quickly respond

    The median dwell time for ransomware attacks hit a new low of five days in the first half of the year, according to Sophos.

    By Aug. 23, 2023
  • Cones of strawberry, vanilla and chocolate ice cream stick out of a glass jar with an ice cream scoop and spoons on a blurred counter background.
    Image attribution tooltip
    ahirao_photo via Getty Images
    Image attribution tooltip

    MOVEit attack spree makes Clop this summer’s most-prolific ransomware group

    The financially-motivated threat actor was responsible for one-third of all ransomware attacks in July, according to NCC Group and Flashpoint.

    By Aug. 22, 2023
  • exclamation point depicted hovering above network infrastructure
    Image attribution tooltip
    Just_Super/Getty Images via Getty Images
    Image attribution tooltip

    Cuba ransomware group exploits Veeam to hit critical infrastructure

    The threat actor also used malicious tools from previous campaigns, according to BlackBerry research.

    By Aug. 21, 2023
  • Petro-Canada has more than 1,500 retail locations across the nation of Canada.
    Image attribution tooltip
    Courtesy of Suncor
    Image attribution tooltip

    Suncor CEO says company mostly recovered from June cyberattack

    The incident was serious and not worth repeating, President and CEO Rich Kruger said. "I’d rather have a root canal than go through one of these attacks again.”

    By Aug. 17, 2023
  • AWS logo on display at AWS Summit New York, July 26, 2023.
    Image attribution tooltip
    Courtesy of AWS
    Image attribution tooltip

    AWS customers’ most common security mistake

    All too often organizations are not doing least-privilege work with identity systems, AWS’ Mark Ryland told Cybersecurity Dive.

    By Aug. 16, 2023
  • The Dallas skyline
    Image attribution tooltip
    Pgiam via Getty Images
    Image attribution tooltip

    Dallas to pay vendors $8.6M for their ransomware recovery services

    The city paid vendors for hardware, software, incident response, consulting and monitoring in the wake of the attack.

    By Aug. 14, 2023
  • Wooden brown gavel on the table
    Image attribution tooltip
    Zolnierek via Getty Images
    Image attribution tooltip

    TIAA hit with class-action lawsuit over MOVEit data breach

    The suit claims the teachers’ retirement fund did not properly handle sensitive information compromised in the far-reaching cyberattack.

    By Anna Merod • Aug. 14, 2023
  • A big golden ticket on a top a glass with a variety of chocolate behind it
    Image attribution tooltip
    Permission granted by Specops
    Image attribution tooltip
    Sponsored by Specops Software

    Lock your doors to Kerberos golden ticket attacks

    Golden Ticket attacks hit the Key Distribution Service Account of the KDC, here's how to stop them.

    Aug. 14, 2023
  • Woman speaking on stage in front of a purple curtain in a black blazer and sparkly pants. There is also a podium that says "Black Hat USA 2023."
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    4 ways organizations can take back the advantage from attackers

    By reorienting systems defense around resilience, “we become more like attackers, we become nimble, empirical, curious,” Kelly Shortridge said at Black Hat USA 2023. 

    By Aug. 10, 2023
  • Threat actor views data file
    Image attribution tooltip
    iStock / Getty Images Plus via Getty Images
    Image attribution tooltip

    The MOVEit spree is as bad as — or worse than — you think it is

    The mass exploit has compromised more than 600 organizations, but that only scratches the surface of the potential number of downstream victims. Security experts project years of fallout.

    By Aug. 9, 2023
  • CrowdStrike booth at RSA Conference in San Francisco.
    Image attribution tooltip
    Matt Kapko/Cybersecurity Dive
    Image attribution tooltip

    Threat actors abuse valid accounts using manual tactics, CrowdStrike says

    The research underscores the outsized role and prevalence of legitimate credentials as an entry point for cyberattacks.

    By Aug. 8, 2023
  • exclamation point depicted hovering above network infrastructure
    Image attribution tooltip
    Just_Super/Getty Images via Getty Images
    Image attribution tooltip

    Ransomware attack on Prospect Medical Holdings impacts hospitals across 4 states

    Multiple hospitals in the system are still experiencing complications or closures as of Monday.

    By Aug. 7, 2023
  • Teenage students are walking up and down a staircase in a school hallway.
    Image attribution tooltip
    monkeybusinessimages via Getty Images
    Image attribution tooltip

    White House rolls out millions in funding to combat K-12 cyberattacks

    Federal officials are meeting with key administrators and technology providers to address a surge in ransomware and other malicious activity facing K-12 schools.

    By Aug. 7, 2023
  • A large hallway with supercomputers inside a server room data center.
    Image attribution tooltip
    luza studios via Getty Images
    Image attribution tooltip

    Poor access management besets most cloud compromises, Google says

    The prevalence of systems with weak access controls underscores a chronic security problem for organizations storing data in the cloud.

    By Aug. 3, 2023
  • Hot Topic hit by automated credential stuffing attack spree

    The U.S. retail chain doesn’t yet know what personal information was compromised or accessed by the threat actor.

    By Aug. 2, 2023
  • Tempur Sealy responding to cyberattack that disrupted operations

    The attack occurred almost two months after the company signed an agreement to acquire Mattress Firm, which will position it as one of the world's largest mattress manufacturers.

    By Aug. 1, 2023
  • Fredrick Lee, CISO at Reddit.
    Image attribution tooltip
    Permission granted by Reddit
    Image attribution tooltip

    Reddit names seasoned IT security leader as new CISO

    The hire of Fredrick “Flee” Lee comes about six months after hackers obtained company data and source code via a sophisticated phishing attack.

    By July 31, 2023
  • CISA, cybersecurity, agency
    Image attribution tooltip
    Photo illustration by Danielle Ternes/Cybersecurity Dive; photograph by yucelyilmaz via Getty Images
    Image attribution tooltip

    Valid account credentials are behind most cyber intrusions, CISA finds

    The success rate of these techniques underscores the staying power of the most common methods threat actors use to gain initial access to targeted systems.

    By July 28, 2023