Tag Archive for: companies

Husband-Wife Arrested in Ukraine for Ransomware Attacks on Foreign Companies

Ransomware Attacks

Ukrainian police authorities have nabbed five members of a gang that’s believed to have helped orchestrate attacks against more than 50 companies across Europe and the U.S and caused losses to the tune of more than $1 million.

The special operation, which was carried out in assistance with law enforcement officials from the U.K. and U.S., saw the arrest of an unnamed 36-year-old individual from the capital city of Kyiv, along with his wife and three other accomplices.

A total of nine searches across the suspects’ homes were carried out, resulting in the seizure of computer equipment, mobile phones, bank cards, flash drives, three cars, and other items with evidence of illegal activity.

The Cyber Police of the National Police of Ukraine said the group offered a “hacker service” that enabled financially motivated crime syndicates to send phishing emails containing file-encrypted malware to lock confidential data pertaining to its victims, demanding that the targets pay cryptocurrency ransoms in return for restoring access to the files.

Automatic GitHub Backups

However, it’s not immediately clear what ransomware strain the perpetrators used to encrypt data on victim computers.

Besides ransomware attacks on foreign companies, the hacking cartel also provided IP-address spoofing services to transnational cybercrime actors, who unlawfully used the platform to break into systems belonging to government and commercial entities to collect sensitive information and carry out DDoS attacks to paralyze the networks.

“To launder criminal proceeds, the offenders conducted complex financial transactions using a number of online services, including those banned in Ukraine,” Ukraine’s Secret Service (SSU) said. “At the last stage of converting assets into cash, they transferred funds to payment cards of an extensive network of fictitious persons.”

Ransomware Attackers

The development is the latest in a string of law enforcement actions undertaken by Ukraine over the past year to tackle the menace of ransomware that’s crippled organizations and critical infrastructure alike.

Last month, authorities apprehended 51 people in connection with illegally possessing about 100 databases containing personal information of more than 300 million…


Mobile Threat Defense Solutions Market Size 2021 Analysis by Top Companies, And Forecast to 2028

Market Size And Forecast

New Jersey, United States,- Market Research Intellect has been analyzing technology and markets for Mobile Threat Defense Solutions since 2018. Since then, through Research Analysis of companies, we have been very close to the latest research and market development.

In addition, Market Research Intellect works closely with many customers to help them better understand the technology and market environment and develop innovation and commercialization strategies.

Market Research Intellect offers a wealth of expertise in Mobile Threat Defense Solutions Market analysis. We have been in this business for the past 20 years, and we have closely watched the rise and/or fall, success and/or disappointment of many emerging technologies during this time.

This gives us a uniquely experienced eye when it comes to analyzing emerging electronic materials technologies. This is very important because it helps build a realistic market and technology roadmap that reflects the true potential of technology based on its intrinsic characteristics and the true level of technology and commercial challenges it faces.

Get | Download Sample Copy with TOC, Graphs & List of [email protected] https://www.marketresearchintellect.com/download-sample/?rid=181264

In addition, market revenues based on region and country are provided in the report on Mobile Threat Defense Solutionss. The authors of the report also shed light on the common business tactics adopted by actors. The main players in the global bMobile Threat Defense Solutions market and their full profiles are included in the report. In addition, investment opportunities, recommendations and current trends in the global Mobile Threat Defense Solutions market are mapped by the report. Thanks to this report, key players in the global Mobile Threat Defense Solutions market will be able to make good decisions and plan their strategies accordingly to stay ahead of the curve.

The competitive landscape is an essential aspect that every key player must know. The report highlights the competitive scenario of the global Mobile Threat Defense Solutions market to know the competition at the national and global levels. The market experts also presented the broad…


dot: Telecom companies told to keep call data, internet-use records for 2 years

NEW DELHI: Department of Telecom (DoT) has extended the duration of archiving call data and internet usage records of subscribers to two years from one year due to security reasons.
The amendments in the licences were issued on December 21 and extended to other forms of telecom permits on December 22.
“The licensee shall maintain all commercial records/call detail record/exchange detail record/IP detail record with record to the communications exchanged on the network. Such records shall be archived for at least two years for scrutiny by the licensor for security reasons…,” the DoT circular said.
Telecom companies may destroy the data stored thereafter if there is no direction from the DoT thereafter. The circular said the amendment is necessary in “public interest or in the interest of the security of the state or for the proper conduct of the telegraphs”.
The amendment mandates telecom companies to maintain internet data records of subscribers, including login and logout details of all subscribers for services provided such as internet access, e-mail, internet telephony services like calls made from mobile applications or wifi calling for at least two years.
Earlier, the rules of the telecom department mandated the archival of call data and internet usage records for at least 1 year.
The order was issued because of security reasons. Earlier, the rules mandated that call data and internet-usage records be saved for a year.


Log4j threat and how it had a massive effect on various companies and sites?

Log4Shell is an internet vulnerability that affects millions of machines and is caused by a piece of software called Log4j, which is both obscure and nearly ubiquitous. The programme is used to keep track of everything that happens behind the scenes in a variety of computer systems.

The most significant vulnerability she’s seen in her career, according to Jen Easterly, director of the United States Cybersecurity and Infrastructure Security Agency. Hundreds of thousands, if not millions, of efforts, have already been made to take advantage of the flaw.

So, what exactly is this innocuous bit of internet infrastructure, how can hackers take advantage of it, and what kind of havoc may it cause?


What is the function of Log4j?

Log4j keeps track of events, such as faults and ordinary system processes, and sends out diagnostic warnings to administrators and users. Apache provides open source software.

Software Foundation is a nonprofit organisation dedicated to the advancement of software

When you type in or click on a poor online link and get a 404 error notice, this is a common example of Log4j in the workplace. There is no such webpage, according to the web server that hosts the domain of the web address you attempted to visit. It also uses Log4j to log the occurrence for the server’s system administrators.

Across all software applications, similar diagnostic messages are used. Log4j is used by the server in the online game Minecraft to log activity such as total memory utilised and user instructions sent into the console, for example.

What is the functionality of Log4Shell?

Log4Shell works by taking advantage of a Log4j feature that allows users to specify custom code for log message formatting. If a separate server maintains a directory linking user names and actual names, this feature allows Log4j to log not just the username associated with each attempt to log in to the server, but also the person’s true name. The Log4j server must communicate with the server that holds the real names in order to accomplish this.

This type of code, however, can be used for more than merely formatting log messages. Third-party servers can upload software code to Log4j that can conduct a…