FUD and Security Leftovers
-
Monti Ransomware Deploying New Linux Encryptor [Ed: This does not mean the culprit is Linux, and moreover it seems like a distraction from Windows as ransomware paradise]
A ransomware campaign by the recently emerged Monti ransomware group is targeting victims with a new Linux variant of its malware. The threat group is the latest in a growing number of ransomware groups finding profit in going after Linux infrastructure.
[...]
Monti is among an increasing number of ransomware groups that tweaked its malware infrastructure to target Linux servers and operating systems. Eight in 10 web servers run on Linux. While the number of ransomware groups using Linux variants stood at 118 in the first half quarter of 2022, it increased by fourfold in 2023, a recent report from security firm Recorded Future found.
-
The Linux Threat Landscape Report - Noticias de seguridad - Trend Micro ES
Linux security is more crucial than ever. With over 32 years of use, the operating system (OS) has grown immensely popular, with usage now spanning personal desktops to large scale enterprise servers, containers, and cloud infrastructure. However, this broad adoption makes it a prominent target for potential cyber threats.
-
From Conti to Akira | Decoding the Latest Linux & ESXi Ransomware Families
The evolution of the ransomware landscape has seen a shift from the more traditional approach involving Windows payloads to ones targeting other platforms, most notably Linux. In this shift, ransomware operators are shortening the time gaps between different payload releases and bringing feature parity across diverse platforms.
-
Martin Thompson: Fraud, Abuse, Fingerprinting, Privacy, and Openness
Fraud and abuse online are pretty serious problems. How sites manage fraud is something of a mystery to most people. Indeed, as this post will show, that’s deliberate.
-
Security updates for Thursday
Security updates have been issued by Debian (w3m), Fedora (libqb), Mageia (docker-containerd, kernel, kernel-linus, microcode, php, redis, and samba), Oracle (kernel, kernel-container, and openssh), Scientific Linux (subscription-manager), SUSE (ca-certificates-mozilla, erlang, gawk, gstreamer-plugins-base, indent, java-1_8_0-ibm, kernel, kernel-firmware, krb5, libcares2, nodejs14, nodejs16, openssl-1_1, openssl-3, poppler, postfix, redis, webkit2gtk3, and xen), and Ubuntu (php8.1).
-
Joint statement on data scraping and data protection
The Information Commissioner’s Office and eleven other data protection and privacy authorities from around the world have today published a joint statement calling for the protection of people’s personal data from unlawful data scraping taking place on social media sites.
Data scraping is an automated way to pull large amounts of information from the web. Scraping from social media creates privacy risks and potential harms, such as the information people post online being used for reasons they don’t expect, exploited in cyberattacks or used for identity fraud.
The joint statement published today sets expectations for how social media companies should protect people’s data from unlawful data scraping. It also recommends steps people can take to minimise risks when sharing information online.
-
Rochester Public Schools announces cause behind spring cyberattack
Rochester Public Schools has clarified what it believes opened the door to the large-scale cyberattack that crippled the district’s operations this spring.
Superintendent Kent Pekel spoke about the issue on Wednesday, Aug. 23, while giving a presentation about the district’s upcoming technology referendum in November.
“We weren’t negligent,” Pekel said. “But clearly one of two things happened.”
Pekel went on to say that someone either clicked on a link they shouldn’t have. Or, they used the same password for a district account that they also used for some other account, such as one for social media.
-
IoT Security Report Sheds Light on Hospitals’ Device Risks
Asimily, an Internet of Things (IoT) and Internet of Medical Things (IoMT) risk management platform, announced the availability of a new report: Total Cost of Ownership Analysis on Connected Device Cybersecurity Risk. The following is their press release:
The full report highlights the unique cybersecurity challenges that healthcare delivery organizations (HDOs) face and the true costs of their IoT and IoMT security risks. HDOs have a low tolerance for service interruptions to network-connected devices and equipment because of their crucial role in patient outcomes and quality of care. Resource-constrained HDO security and IT teams continue to face operational difficulties in sufficiently securing critical systems from increasingly-sophisticated attacks, as their vast and heterogeneous IoMT device fleets complicate management and, left unchecked, offer a broad attack surface. The report concludes that adopting a holistic risk-based approach is the most cost-efficient and long-term-effective path for HDOs to secure their critical systems and IoMT devices..