home.social

#vicesociety — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #vicesociety, aggregated by home.social.

  1. ViceSociety revendique des attaques informatiques à l'encontre de:

    #usa #canada #italy #uk #belgium #ecuador #education #ransomware #vicesociety #líder #teachers #community #campus #databreach #financial #vehículos #services #students #electronics #antennen #employees #diritto #konzepte #tuition #payments #digital #leistungen #shops #kundenservice #products #automatie #web #chemie #elektrische #online #microelectronics #actividades #smart #threats #grades #inteligente #portal #insights #balances #college #siniestros #telekommunikation #elektronica #systems #electrónico #virtual #competitivo #careers #mobilfunk #retails #semiconductors #technologies #brevetti #analysis #digital #mercado #telefonische #fysica #autotechnieken #courses #karriere #sanitair #market #robotics #direktvertrieb #innovative #coberturas #webapi #equipayment #business #póliza #cyberaanval #mercati #mobile #consultas #produkte #competitive #autoconectado #property #application #consumers #laws #firms #facturación #serviceleistungen #productos #patents #seguros #electrónica #riesgos #fiduciaros #automation #wiskunde #tecnología #industriële #piattaforma #asistencias #admissions #soluzioni #belgique #italie #informatique

  2. With #Hive ransomware infrastructure taken down last week and speculation of similar action against #LockBit, which groups will likely take the “top” #RaaS spots in the first part of the year? If you don’t track #ransomware-as-a-service closely, you may not realize how many other groups regularly carry out attacks (or at least claim & extort victims publicly)

    Since the takedown on Thursday, five RaaS groups have claimed nearly 30 victims publicly, with LockBit 3.0, #Clop, and #ViceSociety leading the pack. In our ransomware landscape briefing last week, a participant asked which group concerned us most into the new year. My answer is “most” seen in the slide here (but if I had to narrow, I choose LockBit in the short-term, and Vice Society in the medium/longer term)

    Last week I argued that many, if not most, of the “top” groups (measured quickly by last year’s victim count) should be on most security teams’ radars. While there are some notable trends in victim sectors, like a relative increase in attacks on public services organizations, in general most of the leading groups are associated with a broad range of victim verticals (a similar trend holds for victim size too – a relative rise in mid-sized organizations, but still a notable number of large enterprises like in years past)

    Rather than burn resources trying to track each new victim associated with each group every day, there is value in identifying top common tactics, techniques, & procedures among groups with generally similar motivations & victim patterns, and focusing response drills, defensive reinforcements, log source & detection tuning, and, where resources allow, unit testing or adversary simulation or emulation around that subset of TTPs

    Our living matrix of top ransom & extortion group #TTPs is found here, covering nearly 30 groups and 175 techniques, although the cluster of top common ones is much smaller. Click the labels in the ribbon at the top to see source references for every mapping and procedural details for many: app.tidalcyber.com/share/9a0fd

    You can also catch the recording of last week’s session and slides with this and similar metrics & graphics on-demand here: brighttalk.com/webcast/19703/5

    #threatinformeddefense #TTP #risk

  3. "Angriff mit #Schadsoftware - #Daten der Uni Duisburg-Essen im #Darknet aufgetaucht"

    "Nachdem #Hacker zunächst .. Systeme der Universität .. lahmgelegt hatten, erhöhen sie .. Druck + stellen erbeutete Daten ins Netz. #Lösegeld will .. Hochschule aber nicht bezahlen."

    ".. steckt hinter dem Angriff die Hacker-Truppe »#ViceSociety«."

    ".. Hochschule war innerhalb weniger Wochen zweimal Ziel eines ..angriffs .."

    spiegel.de/netzwelt/web/univer

    #Datensicherheit #Datenschutz #Cybersecurity #UDE

    17.1.2023

  4. Here's a look at which #ransomware leak sites were the most active during the first week of 2023!

    1️⃣​ #ViceSociety
    2️⃣​ #PlayRansomware
    3️⃣​​ #Lockbit

    🔗​ Dashboard Source Code:
    github.com/colincowie/LeakSite

    ℹ️​ Data provided via RansomWatch

    #ThreatIntel #CTI

  5. Analyzing #TTP overlap for nine top #ransomware

    This originates from analysis of ransomware targeting schools, but most of these families have threatened a range of critical infrastructure & other industries too

    Each ransomware covered here has published extortion threats involving a school or university during the past year, and this trend is increasing. I tallied 66 ransomware extortion threats against these #education entities since last October. A few groups dominate (see pie chart), and victim count jumped especially high in recent months for schools (K-12) (see bar chart).

    The #malware covered here (and count of associated extortion threats against education entities) are: #ViceSociety (25), #Pysa (8), #LockBit 3.0 (7), #ALPHV / #BlackCat (6), LockBit 2.0 (5), #Hive (4), #BianLian (3), #Quantum, Snatch (2), & #Conti, #REvil, Sabbath, and Stormous (1 each). Also #HelloKitty / #FiveHands, which is used by Vice Society, but no relevant posts were observed.

    Visual summary of my analysis: app.tidalcyber.com/share/8d9f2

    Overall the nine ransomware map to 131 unique techniques total, sourced from 30 recent public reports, mainly malware analysis & government advisories ("Show only labelled techniques" gives the best view). The underlines & numbers in the cells indicate number of malware mapped to that technique. Background color gradient represents number of sources referencing it. This tool helps with pivoting to defenses and analytics (think Sigma rules), offensive tests (Atomic Red Team), and data sources (make sure you have proper logging enabled) mapped to the same techniques.
    #threatintel #SharedWithTidal

  6. Mehrere Drucker-Schwachstellen bedrohen Windows. An diesen setzen Angreifer nun abermals an und infizieren Systeme mit Schadcode. Admins sollten jetzt handeln.
    Windows: Vice-Society-Ransomware schlüpft durch PrintNightmare-Lücken