Tag Archive for: 6th

Police deny ransom demand of Rs 200 crore in cryptocurrency as server remains down for 6th day


Delhi AIIMS

All India Institutes of Medical Sciences (AIIMS).

Photo : IANS

New Delhi: The server of All India Institute of Medical Sciences (AIIMS), Delhi remained affected for the sixth consecutive day on Monday. The hackers, meanwhile, have allegedly demanded an estimated Rs 200 crore in cryptocurrency from the hospital authorities, official sources said on Monday.

However, the Delhi Police has claimed that no ransom demand, as being quoted by certain sections of the media, has been brought to the notice by the AIIMS authorities.

Meanwhile, the AIIMS computer facility on Monday wrote to all departments of the institute to make a backup of their files which are connected to the institute’s networks as they will have to be formatted and cleaned in the aftermath of the ransomware attack.

Reports said that it is being feared that the data of around 3 to 4 crore patients could have been compromised due to the hacking detected on Wednesday morning, reported PTI.

On Monday, AIIMS management informed that data restoration and server cleaning are in progress and the authorities are taking time due to the volume of data and large number of servers for hospital services.

“Measures are being taken for cyber security. All hospital services, including outpatient, in-patient, and laboratories continued to run on manual mode,” informed the hospital authorities.

On the other hand, Patient care services, including emergency, outpatient, inpatient, and laboratory are being managed manually as the server continued to remain down on Monday.

The India Computer Emergency Response Team (CERT-IN), Delhi Police, and representatives of the Ministry of Home Affairs have started an investigation into the ransomware attack, reported PTI.

On November 25, an extortion and cyber terrorism case was registered by the Intelligence Fusion and Strategic Operations (IFSO) unit of the Delhi Police.

At present, internet services have been blocked on computers at the hospital on the recommendations of the investigating agencies, said officials.

It may be worth mentioning here that the AIIMS server has stored data of several VIPs, including former prime ministers, ministers, bureaucrats, and judges.

“Hackers have…

Source…

Endace Awarded “Incident Forensics Solution of the Year” in 6th Annual CyberSecurity Breakthrough Awards Program | News


AUSTIN, Texas & AUCKLAND, New Zealand–(BUSINESS WIRE)–Oct 7, 2022–

Endace today announced that EndaceProbe has been selected as the “Incident Forensics Solution of the Year” winner in the 6 th annual CyberSecurity Breakthrough Awards program, conducted by CyberSecurity Breakthrough, a leading independent market intelligence organization that recognizes the top companies, technologies and products in the global information security market today.

“Capturing and analyzing packet data is an indispensable resource for securing the networking and protecting critical infrastructure. Network visibility across the network, from edge to edge, provides the most reliable defense,” said James Johnson, managing director, CyberSecurity Breakthrough. “EndaceProbe leads the industry in storage density, speed, and reliability – providing a common hardware platform for a complete and accurate source of network-wide packet data to all the teams and tools that need access to it – delivering ‘breakthrough’ visibility into network activity. Congratulations to the Endace team on being our choice for ‘Incident Forensics Solution of the Year.’”

The EndaceProbe platform provides accurate, always-on packet capture with zero-loss, and its modular design can scale to large global networks to provide weeks to months of full packet history. Its powerful API allows for integration and hosting of commercial and open-source network security and performance tools to analyze live or historical traffic. The EndaceProbe provides a common infrastructure that allows for the sharing of a single, authoritative source of packet data across SecOps, NetOps, and IT teams.

“Endace has specialized in scalable high performance, high reliability packet capture technology for more than two decades along with a strong legacy of third-party integrations. Organizations increasingly recognize the benefits of adopting a common hardware platform that can integrate with and host their chosen security and performance analytics tools and provide visibility into activity across the entire network,” said Endace CEO, Stuart Wilson. “EndaceProbe gives security analysts the ability to…

Source…

Forget the F-35: What Exactly Is a 6th Generation Fighter?


What exactly is a 6th Generation Fighter? Fifth-generation fighters are so advanced – and so expensive – that just three nations have designed and built models:  the United States, Russia, and China. The technology – stealth, supercruise, supermaneuverability, interconnectivity – is still cutting edge. Yet, the great powers are already looking ahead, as great powers tend to do, competing with each other, and contemplating the 6th generation of fighter technology.

Sixth-generation fighters exist only in concept. Several countries are working on 6th generation fighters – some of which have never even created a fifth-generation fighter – including the U.S., Russia, China, Japan, the UK, and France. No one is close yet to debuting a 6th generation fighter; the going expectation is that the next generation won’t debut until the 2030s. 

6th Generation Fighter: Designing Aircraft for Future Conflicts

Although the 6th generation of aircraft is still nascent, a set of distinct features have congealed to form the basis of what a 6th generation fighter is. Namely, all of the fifth-generation-worthy abilities for survivability in contested environments, air superiority, ground attack, etc. will need to be improved commensurate with the times.

The emphasis on close-combat dogfighting, which dominated twentieth-century aerial warfare, is becoming a peripheral concern of aircraft manufacturers. Instead, ground attacks, cyber warfare, and even space warfare are increasingly relevant. Beyond-visual-range (BVR) missile combat is also still important. 

The next generation of jet fighters will likely incorporate the ability to operate in a manned or unmanned configuration. And like the F-35 in the fifth generation of air fighters, sixth-generation fighters will need to integrate with a variety of other jets, drones, soldiers, and sensors – in a saturated network meant to provide warfighters with a comprehensive picture of the battlespace. 

To achieve the performance characteristics expected of a sixth-generation fighter, various design elements will be incorporated. The foundation of sixth-generation technology will be the “brains” of the aircraft: advanced digital…

Source…

India 6th Most Affected Country by Ransomware: Report


India 6th Most Affected Country by Ransomware

Virus, malware, and URL online scanning service VirusTotal has published a report analyzing 80 million ransomware samples submitted over the last year and a half. The report sheds light on the geographical distribution of ransomware-related submissions across over 140 countries.

VirusTotal Ransomware Activity Report

According to the report, users from Israel submitted the most samples, a 600 percent increase to its baseline. India stood at sixth place in the list behind South Korea, Vietnam, China, and Singapore. Other countries with the most number of VirusTotal submissions include Kazakhstan, Philippines, Iran, and the UK.

“Attackers are using a range of approaches, including well-known botnet malware and other Remote Access Trojans (RATs) as vehicles to deliver their ransomware. In most cases, they are using fresh or new ransomware samples for their campaigns,” said VirusTotal’s Vicente Diaz.

You can check out the submission trends in the chart below:

Geographical distribution of ransomware-related submissions

The report highlights that 95 percent of ransomware files detected were Windows-based executables or dynamic link libraries (DLLs). In addition, almost five percent of the analyzed samples were associated with exploits, most commonly Windows elevation of privileges, SMB information disclosures, and remote execution. On the other hand, Android-based submissions accounted for just 2 percent of the submissions.

Top 10 Ransomware Based on Sample Submissions

Going by the report, ransomware activity peaked in the first two quarters of 2020 due to ransomware-as-a-service group GandCrab. The report also lists the widely-used ones based on the number of samples submitted to VirusTotal. You can take a look at the list below:

  • Gandcrab (78.5%)
  • Babuk (7.61%)
  • Cerber (3.11%)
  • Matsnu (2.63%)
  • Wannacry (2.41%)
  • Congur (1.52%)
  • Locky (1.29%)
  • Teslacrypt (1.12%)
  • Rkor (1.11%)
  • Reveon (0.70%)

Source…