The boost of attacks-data breaches confirm that the phenomenon is growing and the crisis in Ukraine will worsen it. Will we move from cyber espionage to desruptions?
Coveware cybersecurity experts: The shift is due to the increasing pressing by law enforcements. However, data exfiltration stll remains one of the RaaS most used tactic.
Cybereason Nocturnus cybersecurity Team: The Iran’s linked malicious code, a backdoor, features encrypted C2 channels and supports downloading additional payloads.
Palo Alto Unit 42 cybersecurity researchers: The malware is offered on underground forums as a ransomware-as-a-service (RaaS). Affiliates keep 8’-90% of the ransoms.
London and Canberra sign the Cyber and Critical Technology Partnership to improve their cybersecurity and to increase deterrence, building also greater resilience to ransomware amongst Indo-Pacific nations.
Microsoft cybersecurity experts: It looks like ransomware but is designed to render targeted devices inoperable. It has been detected on dozens of systems and the numbers could grow.