August 27, 2021
FBI issues FLASH alert about OnePercent ransomware group
In a first for the FBI, their Cyber Division has released a FLASH alert to warn about a ransomware affiliate. The cybercriminals in question are the OnePercent Group, which has operated since at least November 2020 and has ties to the REvil, Maze, and Egregor extortion gangs.
August 26, 2021
Sardonic backdoor targets stored payment credentials
A new backdoor under active development by the FIN8 cybercrime group has been identified following a failed attack on an unnamed U.S. financial institution.
August 26, 2021
InkySquid campaign exploits Internet Explorer vulnerability
A bug in Internet Explorer is being exploited by InkySquid — an advanced persistent threat group with ties to North Korea — to launch watering hole attacks.
August 25, 2021
Northeastern U.S. sees mass flooding, power outages
The Northeast United States has been inundated with rain from Tropical Storm Henri, causing mass flooding and power outages.
August 25, 2021
Phishing campaign utilizes UPS website vulnerability
A brand-new phishing campaign sees attackers sending out emails disguised as official UPS communications. These messages utilize an XSS vulnerability on UPS.com to appear remarkably legitimate.
August 10, 2021
LockBit is recruiting employees to breach corporate networks
The ransomware arms race continues to thrive as LockBit gangs recruit corporate insiders to help them breach and encrypt networks, offering employees hefty payouts in exchange for their help.
LockBit recently made news when they hit the UK’s Merseyrail this past April.
August 04, 2021
In cyberattacks, SMBs face an existential threat
Today we released the Acronis Cyberthreats Report Mid-year 2021, our latest in-depth review of current cyberthreat trends. It contains cutting-edge research, findings, and observations from the experts at our global network of Acronis Cyber Protection Operations Centers (CPOCs).
July 17, 2021
Acronis awarded OPSWAT Platinum Certification for Anti-Malware
Acronis Cyber Protection Agent 15.x for Windows has been granted OPSWAT Platinum Certification for Anti-Malware in July 2021. This represents another step forward for our cyber protection technology, which had previously earned Gold Certification, and demonstrates Acronis’ continued focus on refining the effectiveness and compatibility of our solutions, meeting the needs of the ever-evolving cyberthreat and IT landscapes.
July 14, 2021
Acronis protects customer’s server in REvil attack on Kaseya
The recent supply-chain attack on Kaseya by the REvil ransomware group impacted dozens of managed service providers (MSPs) who rely on Kaseya VSA, as well as thousands of small businesses that are managed by those MSPs. While the initial ransom demand was dropped from $70 million to $50 million, the pain and frustration of those targeted rose steadily during the incident.
June 05, 2021
JBS attack shows the immense threat posed by ransomware
The world’s largest meat supplier, JBS, was forced to halt operations at many of its U.S. and Australian processing plants after a massive cyberattack. This activity threatened supply chains across the world, and resulted in an immediate rise in wholesale red meat prices.
This cyberattack, while notable in its own right, is also simply the latest example in a dangerous pattern of escalating ransomware hazards.
May 29, 2021
SolarWinds hackers launch new attacks, warns Microsoft
The Microsoft Threat Intelligence Center (MSTIC) has uncovered a wide-scale spear phishing campaign driven by Nobelium — the threat actors behind the recent SolarWinds attacks and the SUNBURST backdoor used in those strikes.
Nobelium continues its attacks on U.S. agencies and the private organizations in their sphere. The group managed to hijack an email distribution account used by the United States Agency for International Development (USAID), sending thousands of authentic-looking but malware-laden messages to a variety of human rights groups, think tanks, and other organizations.
May 19, 2021
New attack vectors for the DarkSide ransomware gang
DarkSide stands out from other ransomware as a service (RaaS) threats, as one of its attack vectors is based on the Zloader botnet (also known as “Silent Night”). It has also been delivered through compromised third-party service providers.