LockBit slams Mandiant’s research, tries to distance itself from Evil Corp cybercrime gang
The group said it has nothing to do with Evil Corp, politics, or special services like the FSB and FBI.
The group said it has nothing to do with Evil Corp, politics, or special services like the FSB and FBI.
Hackers used a phishing scam to convince victims to open the malicious documents.
Since the sanctions hit, Evil Corp used various ransomware variants such as WestedLocker, Macaw Locker and Phoenix CryptoLocker.
The data-extortion gang began selling data allegedly stolen from Novartis on their extortion marketplace.
Last week, Atlassian released a fix to address the vulnerability.
Microsoft’s Digital Crimes Unit has taken down 41 domains used by the hackers in their C&C-infrastructure.
Specifically, the attacks targeted embedded microcontrollers such as the Intel Management Engine or Intel Converged Security Management Engine.
The researchers believe that multiple threat actors from China are using this zero-day exploit.
The goal of the attacks is to infect networks belonging to Ukrainian government agencies with the Cobalt Strike Beacon malware.
Showing elements 2511 - 2520