The Breach News

Can Ransom Payments Be Recovered? An In-Depth Examination of Cybercrime and Law Enforcement Strategies

The challenge surrounding the recovery of ransom payments made to cybercriminals has become increasingly complex, particularly following the recent arrest of Rostislav Panev. Apprehended by Interpol in Israel, Panev is connected to the notorious LockBit ransomware group that has exploited numerous targets globally. Notably, the U.S. Department of Justice alleges…

Read MoreCan Ransom Payments Be Recovered? An In-Depth Examination of Cybercrime and Law Enforcement Strategies

North Korean Hackers Linked to $1.3 Billion in Cryptocurrency Theft in 2024

Blockchain & Cryptocurrency, Cryptocurrency Fraud, Fraud Management & Cybercrime Researchers Trace 61% of Known Losses This Year to State-Sponsored Cybercriminals in North Korea Mathew J. Schwartz (euroinfosec) • December 23, 2024 North Korea currently lacks a memorial for its stolen cryptocurrency. (Image: Shutterstock) In a disconcerting trend, hackers purportedly associated…

Read MoreNorth Korean Hackers Linked to $1.3 Billion in Cryptocurrency Theft in 2024

Top 7 Cybersecurity Headlines of 2024

This year has witnessed a significant surge in cybersecurity incidents, with numerous breaches, attacks, and operational failures capturing global headlines. Among these, select events stand out for their profound implications, potentially altering protective measures within the industry, challenging vendors to bolster the security of customer systems, and prompting security leaders…

Read MoreTop 7 Cybersecurity Headlines of 2024

Understanding Ransomware Impersonation and Its Effects on Data Networks

Ransomware impersonation represents a significant cybersecurity threat in which cybercriminals pose as legitimate entities to extort money from their victims. Utilizing various tactics including phishing emails, telephone scams, and social engineering, attackers trick targets into believing they are engaging with trusted organizations or individuals. Once the victim is deceived, malware—specifically…

Read MoreUnderstanding Ransomware Impersonation and Its Effects on Data Networks

Turmoil Strikes the Rockstar 2FA Phishing-as-a-Service Toolkit

As 2024 draws to a close, cybersecurity firms are reporting significant upheaval in the cybercrime landscape, particularly relating to phishing-as-a-service operations. Recent assessments by Sophos indicate that the once-prominent phish-tool Rockstar 2FA, notorious for its sophisticated phishing campaigns, has reportedly ceased operations. Following this disruption, many of its users have…

Read MoreTurmoil Strikes the Rockstar 2FA Phishing-as-a-Service Toolkit

FTC Directs Marriott and Starwood to Strengthen Data Security Measures

The Federal Trade Commission (FTC) announced on Friday that it has finalized an order mandating Marriott International and its subsidiary, Starwood Hotels, to enhance their digital security protocols. This development follows allegations against the companies for insufficient security practices that led to three major data breaches occurring in 2015, 2018,…

Read MoreFTC Directs Marriott and Starwood to Strengthen Data Security Measures

Health Care Leader Ascension Reports 5.6 Million Patients Impacted by Cyberattack

Cyberattack on Ascension Exposes Data of 5.6 Million Individuals Health care provider Ascension has reported a significant data breach affecting approximately 5.6 million individuals, the result of a cyberattack linked to a recognized ransomware group. This disclosure came via documents submitted to the Maine attorney general in December, revealing the…

Read MoreHealth Care Leader Ascension Reports 5.6 Million Patients Impacted by Cyberattack

US Contemplates TP-Link Ban Following Volt Typhoon Cyberattack

Cyberwarfare / Nation-State Attacks, Endpoint Security, Fraud Management & Cybercrime Increased Scrutiny on Major Chinese Router Manufacturer Following Espionage Allegations Chris Riotta (@chrisriotta) • December 23, 2024 TP-Link routers are under investigation for potential security risks linked to Chinese hacking targeting U.S. critical infrastructure. (Image: Shutterstock) U.S. government officials are…

Read MoreUS Contemplates TP-Link Ban Following Volt Typhoon Cyberattack