Tag Archive for: Interactive

Interactive administration in the cloud: managing the risks – NCSC.GOV.UK – National Cyber Security Centre



Interactive administration in the cloud: managing the risks – NCSC.GOV.UK  National Cyber Security Centre

Source…

D#NUT ransomware gang claims Ready or Not dev Void Interactive as a victim


D#NUT ransomware gang claims Ready or Not dev Void Interactive as a victim

The developer of a SWAT-based first-person shooter has allegedly lost four terabytes of data including source code to a ransomware attack.

The D#NUT ransomware gang is claiming to have successfully exfiltrated four terabytes of data from Void Interactive, the developer of popular tactical shooter Ready or Not.

“voidinteractive.net you are welcome in our chat,” D#NUT declared on its dark net leak site on March 14.

“You has been pwned. All data related Ready Or Not will be posted here if u will keep silent. We got 4Tb of source code and game related data.”

The gang do not appear to be native English speakers.

“Send us a message via for on that blog as soon as possible. We will provide more profs (list of exfiltrated files).”

To add proof to its claim, the gang shared a link to the Imgur image-hosting site, and a screenshot of a list of various builds of the game in what appears to be a dev environment. More than 20 distinct builds are listed, for both PC and consoles, as well as various performance test builds.

The screenshot appears to be authentic.

D#NUT – whose leak site features a lurid illustration of the gang’s namesake – is a relatively small ransomware operation. Since it was first observed by threat tracker FalconFeeds.io in April 2023, the gang has claimed ten victims, with Void Interactive being the latest. Half of its victims have been North American organisations, with the rest spread across Europe and the UK.

However, the authenticity of the gang’s claims has been questioned by some observers. On February 5 the gang claimed to have successfully hacked the US Department of Defense, stealing documents related to a host of contractors, but one security analyst poured cold water on the claim.

“I would approach this claimed ‘breach’ by donut ransomware with caution and scepticism,” the X account CyberKnow posted on the same day.

“All the claimed US defence contractor victims have been posted to leak sites in the past year or two.”

There are some earlier incidents that D#NUT has taken responsibility for, while in…

Source…

Phosphorus Unveils Interactive xIoT Security Lab and Experiences at S4x23 as a Prime Sponsor


Phosphorus Cybersecurity Inc.

Phosphorus Cybersecurity Inc.

xIoT security leader will showcase interactive hacking demonstrations, a hands-on lab, CTF and more at S4 to raise awareness about the security risks of critical OT, ICS, IoT, and Network devices.

NASHVILLE, Tenn., Jan. 31, 2023 (GLOBE NEWSWIRE) — Phosphorus, the leading provider of proactive and full-scope security for the extended Internet of Things (xIoT), is proud to be a Prime Sponsor at S4x23, a leading conference focused on the future of OT and ICS cybersecurity. As part of its S4 presence, Phosphorus will offer live demonstrations of high-risk OT/ICS and IoT devices through its Mobile xIoT Security Lab, speaking sessions on the state of xIoT security and how to thwart bad actors, as well as a “Mystery Device” security and hacking challenge which it is hosting as part of S4’s ICS CTF.

The company’s interactive, on-site space and experiences at S4 will provide attendees with hands-on opportunities to examine the security risks posed by widely used xIoT devices and to test their skills at discovering, analyzing, and exploiting these vulnerable devices. All of these events, from the mobile lab to the CTF and speaking sessions, will be located at Phosphorus’s S4 sponsor room at the Sundial Room, 3rd Floor of the Loews Hotel.

“The ability to move beyond just detecting threats, attacks, and vulnerabilities that target critical OT, IoT, IIoT, and Network devices is still poorly understood, which is why we’re making these hands-on, prevention-based activities a key part of our sponsorship and presence at this year’s S4,” said John Vecchi, Chief Marketing Officer of Phosphorus. “We want to move beyond the high-level discussions to physically show attendees just how vulnerable and easily exploitable these devices can be, while also demonstrating our ability to proactively find, fix, and manage them. And over the coming year, our new xIoT research division, Phosphorus Labs, will be releasing new research highlighting the persistent security issues, challenges, and vulnerabilities with xTended Internet of Things devices.”

One-of-a-Kind Security Lab at S4
Phosphorus’s Mobile xIoT Security Lab offers S4 participants a unique…

Source…