Tag Archive for: responsibility

Russian hacking group takes responsibility for DDoS attacks on Lithuania


A Russian hacking group has taken responsibility for a distributed denial-of-service attack targeting government and private organizations in Lithuania.

According to a report today in The Baltic Times, the attack, from a group known as “Killnet,” caused delays in processing passports and residence permits through Lithuania’s Migration Department. Other public agencies and companies in the communications and finance sectors also suffered temporary service disruptions.

The cyberattacks follow a decision by Lithuania to restrict the transit of steel and ferrous metals to Kaliningrad, a Russian exclave on the Baltic Sea that can only be accessed by land through Lithuania or Poland. Lithuania restricted the goods because of European Union sanctions, but the decision enraged the Kremlin, who denounced the move as unprecedented and unlawful.

A spokesperson for Killnet told Reuters that the DDoS attack was in direct response to Lithuania’s decision to block the transit of sanctioned goods. “The attack will continue until Lithuania lifts the blockade,” the spokesperson said. “We have demolished 1,652 web resources. And that’s just so far.”

The figure of 1,652 “web resources” being demolished was not backed up with evidence. Jonas Skardinskas, director of Lithuania’s National Cyber Security Center, told Yahoo News that the attacks have already been “contained,” but warned that “it is very likely that attacks of similar or higher intensity will continue in the coming days, especially in the transport, energy and financial sectors.”

Attacks originating from Russia have been prolific since the start of the invasion of Ukraine, including an attack on the Viasat satellite service in February. On June 22, Microsoft Corp. warned that Russian hacking against allied governments — Lithuania is a member of NATO — continues to increase.

“Every significant military power in the world has developed cyber capabilities,” Chris Clymer, director and chief information security officer of cybersecurity risk management provider Inversion6, told SiliconANGLE. “These have evolved from espionage tools into full-fledged weapons to be used as part of a…

Source…

Panasonic Admits Suffering a Second Cyber Attack in 6 Months With Conti Ransomware Gang Claiming Responsibility


Japanese tech company Panasonic disclosed that it was the victim of a “targeted cyber attack” on its Canadian operations. According to malware analysis group VX Underground, the Conti ransomware group claimed responsibility for the attack. The group claims to have stolen 2.8 gigabytes of data from Panasonic Canada.

The February attack was the second to devastate the company within six months. In November 2021, Panasonic Japan disclosed that a third party had breached its network and accessed files on its servers.

The company disclosed in January 2022 that the attack leaked the personal information of job candidates and interns.

According to the Japanese media outlet NHK, the illegal access lasted from June to November 2021.

Similarly, Panasonic Corporation India suffered a cyber attack in December 2020, leaking 4 GB of financial information.

Conti ransomware group leaks files allegedly stolen from Panasonic

Conti ransomware group started sharing allegedly stolen documents on its leak site. The dump includes files and spreadsheets reportedly stolen from the HR and accounting departments. Some of the documents had names like “HR Global Database” and “Budget.”

Panasonic hasn’t disclosed the hacking group’s identity or ransomware demands, the intrusion method, the nature of the information stolen, or the number of potential victims.

However, the company says the attack affected the Canadian operation, which employs 400 people and is part of the North American segment.

Panasonic spokesperson Airi Minobe told TechCrunch that the company “took immediate action to address the issue with assistance from cybersecurity experts and our service providers.”

Its response “included identifying the scope of impact, containing the malware, cleaning and restoring servers, rebuilding applications and communicating rapidly with affected customers and relevant authorities.” This description perfectly resembles a ransomware attack response.

Minobe added that efforts to restore operations were still in progress, although the top priority was to mitigate the impacts of the suspected Conti ransomware attack.

“Since confirming this attack, we have worked diligently to restore operations and…

Source…

Bridgestone Americas Hacked: LockBit Ransomware Gang Claims Responsibility


The LockBit ransomware gang has returned.

Bleeping Computer report mentioned that the ransomware gang recently took responsibility for the cyberattack on Bridgestone Americas, one of the world’s largest tire manufacturers. 

LockBit claims to have stolen data important or sensitive enough to threaten Bridgestone with the leaking of these data. 

What is LockBit?

LockBit is currently one of the most active ransomware gangs that ask for large amounts of money as ransom for stolen information. The ransomware gang previously targeted global IT consultancy Accenture in August 2021, according to a separate Bleeping Computer report.

The ransomware gang uses LockBit, a self-spreading malware that uses tools like Windows Powershell and Server Message Block to spread itself within an organization, per a Kaspersky report. 

Industrial cybersecurity expert Dragos mentioned in its report that the ransomware gang actively targeted companies in the industrial and manufacturing sector in 2021. Dragos’ report also mentioned that the transportation sector and food and beverage sector were the second and third most targeted sectors, respectively. 

Currently, LockBit is threatening Bridgestone with the release of the data it stole in its attack on the tire manufacturer in late February. The ransomware gang also did not mention what data it stole or the amount it was asking to keep the data from being leaked. 

Bridgestone also didn’t mention if the leaking of the stolen data will be detrimental to the company.

What Happened?

The tire manufacturer mentioned that it detected an IT security incident on February 27 and has “proactively notified federal law enforcement” about the incident. Bridgestone has since determined that the incident is the result of a ransomware attack but has no evidence to prove it was a targeted attack. 

The company decided at the time to disconnect many of its manufacturing and retreading facilities in Latin America and North America from its network to “contain and prevent any potential impact…,” per WRDW-TV’s article.

Read Also: Anonymous Continues Hacking of Russia, Targets Streaming Services

The disconnection resulted in the shutting down first…

Source…

How Much Responsibility Should Monster.com Take for Third Party Data Breach? – CPO Magazine

How Much Responsibility Should Monster.com Take for Third Party Data Breach?  CPO Magazine

Monster.com does not consider itself responsible for reporting the recent third party data breach which exposed thousands of resumes as they claimed the client …

“data breach” – read more