Sunday, May 26, 2024
HomeNewsHunters Ransomware group has attacked multiple businesses and caused varying degrees of...

Hunters Ransomware group has attacked multiple businesses and caused varying degrees of damage.

Hunters Ransomware group has attacked multiple businesses and caused varying degrees of damage. Victims are listed below:

Caxton &CPT Printer and Publishers Ltd: This company prints and publishes free and sold community newspapers throughout South Africa. It has over 1,000 employees and a revenue of $375.4 million.

Frederick Wildman & Sons: This American business is dedicated to sourcing, distributing, and marketing the world’s finest wines and spirits to provide profit to partner suppliers and distributors. The company has over 200 employees and a revenue of $22.2 million.

Integrated Control Technology: ICT is a manufacturer of unified electronic access control and security solutions that enable scalable solutions for organizations to protect their people, operations, and information. The company specializes in Security, Integrated Access Control and Intrusion Detection, Access Control, Intrusion Detection, Security Access Control, Mobile Access Control, Access Control Solutions, Access Control Systems, Building Automation, Digital Video Surveillance, and Physical Access Control. ICT has over 500 employees and a revenue of $24.4 million.

NanoLumens: This is a US-based LED design manufacturer specializing in flexible displays, LED, digital signage, digital out-of-home advertising, large format displays, digital displays, and DOOH. NanoLumens has over 200 employees and a revenue of $18.2 million.

Threat Actors Deploy Python Backdoor in Palo Alto Zero-Day Attack

Security reports revealed the active exploitation of the newly disclosed Palo Alto Networks PAN-OS zero-day flaw. The vulnerability, a command injection flaw that permits unauthenticated execution of arbitrary code on the firewall, is tracked as CVE-2024-3400 with a CVSS score of 10.0. According to the Unit 42 division, “The tradecraft and speed employed by the attacker suggests a highly capable threat actor with a clear playbook of what to access to further their objectives.”

The security company assigned the adversary the moniker UTA0218 and suggested that “UTA0218’s initial objectives were aimed at grabbing the domain backup DPAPI keys and targeting active directory credentials by obtaining the NTDS.DIT file. They further targeted user workstations to steal saved cookies and login data, along with the users’ DPAPI keys.”

$12.3 Million Crypto Exchange Thefts Earned Ex-Security Engineer 3 Years Jail Term.

Shakeeb Ahmed, the defendant who pleaded guilty to a one-count computer fraud in December 2023 after his July arrest, was a former security engineer residing in Manhattan, New York, and a worker at Amazon. Further details about the situation by the U.S. Department of Justice (DoJ) revealed, “At the time of both attacks, Ahmed, a U.S. citizen, was a senior security engineer for an international technology company whose resume reflected skills in, among other things, reverse engineering smart contracts and blockchain audits, which are some of the specialized skills Ahmed used to execute the hacks.”

Some court documents showed that Shakeeb exploited a security flaw in a cryptocurrency exchange’s smart contracts to plant adulterated pricing data for generating millions of dollars in inflated fees.

Information also showed he agreed to return some funds if the law enforcement agency won’t be alerted about the flash loan attack. 



Please enter your comment!
Please enter your name here

Most Popular