Cyberattacks: Page 28


  • Technician services a cloud server.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    What’s known about the ESXiArgs ransomware hitting VMware servers

    An initial strain affected thousands of devices before a new variant emerged. The latest burst of attacks hit Saturday.

    By Feb. 15, 2023
  • Digital technology vector background depicting a cyberattack.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    VMware ransomware was on the rise leading up to ESXiArgs spree, research finds

    Recorded Future analysis underscores a growing ransomware threat confronting organizations using VMware ESXi.

    By Feb. 13, 2023
  • Trendline

    Top 5 stories from Cybersecurity Dive

    tk

    By Cybersecurity Dive staff
  • Double exposure shot of backside of a computer and red binary codes.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    VMware ransomware evolves to evade data recovery, reinfects servers

    The new ESXiArgs strain has reinfected more than 1,150 VMware servers and represents more than 4 in 5 live infections, according to open-source ransomware data.

    By Feb. 10, 2023
  • Smiling businesswoman in headphones taking notes, working with laptop and talking smartphone, blue glowing information protection icons. Padlock, cloud and digital interface. Cyber security concept - stock photo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Unsophisticated ransomware campaign targeting VMware ripe for copycats

    Ransomware doesn’t typically hit thousands of potential victims at once. “All of it’s very strange,” one security researcher said.

    By Feb. 8, 2023
  • Ransomware spelled out in a creative depiction.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Ransomware attack spree hits thousands of VMware servers

    Cyber authorities linked the attacks, dubbed ESXiArgs, to a two-year-old VMware vulnerability. At least 2,250 machines have been compromised.

    By Feb. 6, 2023
  • An image of Federal Bureau of Investigation Director Christopher Wray at a press conference.
    Image attribution tooltip
    Kevin Dietsch/Getty Images via Getty Images
    Image attribution tooltip

    Hive takedown puts ‘small dent’ in ransomware problem

    Successful law enforcement actions against ransomware can only do so much. The threat is omnipresent, lucrative and largely in the shadows.

    By Feb. 6, 2023
  • Pedestrians walk by a T-Mobile store
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    T-Mobile CEO spins recent breach, says its cybersecurity chops ‘showed up’

    “Our systems and policies protected the most sensitive kinds of customer data,” Mike Sievert said on an earnings call. “We take this issue very seriously.”

    By Feb. 1, 2023
  • Double exposure shot of backside of a computer and red binary codes.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    GitHub resets code signing certificates following breach

    The incident closely follows a series of indirect source code repository breaches impacting Slack and Okta.

    By Feb. 1, 2023
  • The red lock and its structure explode in a digital computer setting.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Exchange Server under pressure as opportunistic actors step up attacks

    Bitdefender Labs warns threat actors are using the ProxyNotShell/OWASSRF exploit chains to launch attacks.

    By Jan. 25, 2023
  • Connection network in dark servers data center room storage systems.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Breach hits GoTo, the parent company of LastPass

    Damage caused by a cyberattack on a shared cloud storage service is adding to the fallout for both companies.

    By Jan. 24, 2023
  • Downtown Los Angeles aerial view.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Los Angeles school system shifts timeline of ransomware attack

    Post-breach investigations are complex. The timeline and scope of damage inflicted often change as investigations unfold.

    By Jan. 24, 2023
  • T-Mobile storefront in San Francisco.
    Image attribution tooltip
    Justin Sullivan/Getty Images via Getty Images
    Image attribution tooltip

    Experts question T-Mobile’s security culture as breach cycle churns

    The gap between the threat actor’s intrusion and T-Mobile’s detection underscores multiple unresolved challenges.

    By Jan. 20, 2023
  • Pedestrians walk by a T-Mobile store
    Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    T-Mobile breached again, 37M customer accounts exposed

    The incident marks the latest in a series of data breaches, the worst of which occurred in August 2021 and exposed the data of at least 76.6 million people.

    By Jan. 19, 2023
  • PayPal logo depicted on a sign.
    Image attribution tooltip
    Sean Gallup via Getty Images
    Image attribution tooltip

    PayPal warns 35,000 customers of exposure following credential stuffing attack

    Impacted customers were notified of the incident nearly a month after it was discovered. It’s unclear where or how customer account credentials were obtained.

    By Jan. 19, 2023
  • A depiction of computer hardware.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    World Economic Forum officials warn global instability could lead to catastrophic cyber event

    A report released at the WEF said top business leaders and security experts fear heightened geopolitical tensions could result in a major attack in the next two years.

    By Jan. 19, 2023
  • A Mailchimp logo on a phone with a larger Mailchimp in the background.
    Image attribution tooltip

    Rafael Henrique/Zumapress/Newscom

    Image attribution tooltip

    Mailchimp hit by second cyberattack in 6 months, 133 customers impacted

    The social engineering incident is similar to an August cyberattack that targeted customers in the crypto industry.

    By Jan. 19, 2023
  • Digital code data numbers and secure lock icons on hacker's hands working with keyboard computer on dark blue tone background.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CircleCI probe links malware placed on engineer’s laptop to larger breach

    An unauthorized actor, after stealing a valid SSO session, was able to exfiltrate data, including customer environment variables, tokens and keys.

    By Jan. 13, 2023
  • Picture of a cybersecurity lock
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Citrix flaw exploited in ransomware attack against small US business

    Threat actors linked to ransomware group Royal are actively exploiting a vulnerability in two Citrix products, researchers found.

    By Jan. 13, 2023
  • Connection network in dark servers data center room storage systems.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    CircleCI working with AWS to identify, revoke keys impacted by security incident

    The company assured customers there is no indication that AWS accounts were accessed. CircleCI has scheduled an incident report for Jan. 17.

    By Jan. 12, 2023
  • Image attribution tooltip
    Justin Sullivan via Getty Images
    Image attribution tooltip

    Ransomware attack exposes California transit giant’s sensitive data

    Vice Society, a prolific ransomware group, leaked data it claims to have stolen from San Francisco’s Bay Area Rapid Transit.

    By Jan. 10, 2023
  • Rendered image depicting global networks.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    FCC revives push to speed up telecom incident disclosures

    Telecom operators are a primary target for threat actors. A change to breach reporting rules is long overdue, one analyst said.

    By Jan. 10, 2023
  • Smiling businesswoman in headphones taking notes, working with laptop and talking smartphone, blue glowing information protection icons. Padlock, cloud and digital interface. Cyber security concept - stock photo
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Rackspace confirms ransomware attack hit a small percentage of its Hosted Exchange customers

    The cloud services firm said an investigation found no evidence the attackers read, misused or disseminated customer data or emails.

    By Jan. 6, 2023
  • Digital code data numbers and secure lock icons on hacker's hands working with keyboard computer on dark blue tone background.
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Slack employee tokens stolen, GitHub repository breached

    The firm said the threat actor downloaded private code repositories, but none had customer data or the company’s code base.   

    By Jan. 5, 2023
  • Computer engineer working in factory with laptop computer
    Image attribution tooltip
    Getty Images
    Image attribution tooltip

    Freight company Wabtec discloses June cyberattack impacting US, overseas operations

    The Pittsburgh-based company began notifications in late December, months after stolen data posted on a LockBit site.

    By Jan. 4, 2023
  • School buses stand idle on December 15, 2015 in Los Angeles, California.
    Image attribution tooltip
    David McNew via Getty Images
    Image attribution tooltip

    Ransomware hit US schools at steady rate in 2022

    The true numbers are likely much greater. Not all incidents are publicly disclosed or claimed as such by threat actors on the dark web.

    By Jan. 4, 2023