Tag Archive for: meet

Feel-good story of the week: 2 ransomware gangs meet their demise


A ransom note is plastered across a laptop monitor.

From the warm-and-fuzzy files comes this feel-good Friday post, chronicling this week’s takedown of two hated ransomware groups. One vanished on Tuesday, allegedly after being hacked by a group claiming allegiance to Ukraine. The other was taken out a day later thanks to an international police dragnet.

The first group, calling itself Trigona, saw the content on its dark web victim naming-and-shaming site pulled down and replaced with a banner proclaiming: “Trigona is gone! The servers of Trigona ransomware gang has been infiltrated and wiped out.” An outfit calling itself Ukrainian Cyber Alliance took credit and included the tagline: “disrupting Russian criminal enterprises (both public and private) since 2014.”

Poor operational security

A social media post from a user claiming to be a Ukrainian Cyber Alliance press secretary said his group targeted ransomware groups partly because they consider themselves out of reach of Western law enforcement.

“We just found one gang like that and did to them as they do to the rest,” the press secretary wrote. “Downloaded their servers (ten of them), deleted everything and defaced for the last time. TOR didn’t help them or even knowing they had a hole in it. Their entire infrastructure is completely blown away. Such a hunt forward.’”

A separate social media post dumped what the press secretary said was an administrative panel key and said the group wiped out Trigona’s “landing, blog, leaks site, internal server (rocketchat, atlassian), wallets and dev servers.” The person also claimed that the Ukrainian Cyber Alliance hacked a Confluence server Trigona used.

Screenshot showing purported hacker's control of Trigona Confluence server.
Enlarge / Screenshot showing purported hacker’s control of Trigona Confluence server.

By Friday, the Trigona site was unavailable, as evidenced by the message “Onionsite not found.”

Trigona first surfaced in 2022 with close ties to ransomware groups known as CryLock and BlackCat and looser ties to ALPHV. It primarily hacked companies in the US and India, followed by Israel, Turkey, Brazil, and Italy. It was known for compromising MYSQL servers,…

Source…

Where cybersecurity and physical security meet


Where cybersecurity and physical security meet

(Image by Pete Linforth from Pixabay
)

By Greg Kemper, Genetec

Data breaches are on the rise worldwide, and the energy sector is among the top five industries targeted most often for hacking and ransomware attacks. While some breaches are caused by weaknesses in an organization’s virtual perimeter that allow hackers to exploit software vulnerabilities, a growing number sneak through connected IoT/IIoT (Internet of Things/Industrial Internet of Things) devices. That figure was more than 112 million in 2022.

Security cameras, access control readers, and other devices that make up physical security systems are likewise often overlooked as a source of vulnerability. With physical security devices of the past, like perimeter fences and door locks, the approach was ‘install what you need and let it do its job.’ As security technology advanced, this mindset persisted. Even as organizations began implementing IP-based technology and IoT devices, they didn’t always think about how these assets might make their networks vulnerable. In some instances, even though a physical security system resides on an organization’s network, it is managed by corporate security instead of the IT department. 

Physical security and information security are linked. There’s no difference in the result whether a hacker accesses an organization’s network physically, or through a video surveillance camera, a piece of HVAC equipment, or an employee’s laptop. As cyber threats grow, physical security and IT must work together to safeguard network infrastructure.  

Unifying physical and cybersecurity

A unified IT-and-physical-security team can develop a comprehensive security program based on a common understanding of risk, responsibilities, strategies, and practices. First, the team should conduct a current posture assessment to identify devices of concern.

  • Create an inventory of all network-connected cameras, door controllers, and associated management systems, identify their functions and confirm their…

Source…

Meet the Brains Behind the Malware-Friendly AI Chat Service ‘WormGPT’ – Krebs on Security


WormGPT, a private new chatbot service advertised as a way to use Artificial Intelligence (AI) to write malicious software without all the pesky prohibitions on such activity enforced by the likes of ChatGPT and Google Bard, has started adding restrictions of its own on how the service can be used. Faced with customers trying to use WormGPT to create ransomware and phishing scams, the 23-year-old Portuguese programmer who created the project now says his service is slowly morphing into “a more controlled environment.”

Image: SlashNext.com.

The large language models (LLMs) made by ChatGPT parent OpenAI or Google or Microsoft all have various safety measures designed to prevent people from abusing them for nefarious purposes — such as creating malware or hate speech. In contrast, WormGPT has promoted itself as a new, uncensored LLM that was created specifically for cybercrime activities.

WormGPT was initially sold exclusively on HackForums, a sprawling, English-language community that has long featured a bustling marketplace for cybercrime tools and services. WormGPT licenses are sold for prices ranging from 500 to 5,000 Euro.

“Introducing my newest creation, ‘WormGPT,’ wrote “Last,” the handle chosen by the HackForums user who is selling the service. “This project aims to provide an alternative to ChatGPT, one that lets you do all sorts of illegal stuff and easily sell it online in the future. Everything blackhat related that you can think of can be done with WormGPT, allowing anyone access to malicious activity without ever leaving the comfort of their home.”

WormGPT’s core developer and frontman “Last” promoting the service on HackForums. Image: SlashNext.

In July, an AI-based security firm called SlashNext analyzed WormGPT and asked it to create a “business email compromise” (BEC) phishing lure that could be used to trick employees into paying a fake invoice.

“The results were unsettling,” SlashNext’s Daniel Kelley wrote. “WormGPT produced an email that was not only remarkably persuasive but also strategically cunning, showcasing its potential for sophisticated phishing and BEC attacks.”

SlashNext asked WormGPT to compose…

Source…

Home ministry to host 2-day G20 meet on crime, security in age of NFTs, AI, Metaverse, ET Telecom


<p>The conference will bring together G20 countries, guests from the invitee nations and international bodies.</p>
The conference will bring together G20 countries, guests from the invitee nations and international bodies.

The Union Ministry of Home Affairs will organise the “G20 Conference on Crime and Security in the Age of Non Fungible Tokens (NFTs), Artificial Intelligence (AI) and Metaverse” on July 13-14 in Gurugram.The two-day event is being organised in partnership with the Union Ministry of Electronics and Information Technology (MeitY), Ministry of External Affairs, National Security Council Secretariat and the Central Bureau of Investigation.

The Rashtriya Raksha University, National Forensic Science University, National Law School of India University, Interpol and UNODC are the event’s organising partners.

“The MHA will host the ‘G20 Conference on Crime and Security in the Age of NFTs, AI and Metaverse’ on July 13-14. It will bring together G20 countries, nine special invitee countries and domain experts (from) around the world to delve into the challenges of advancing technologies,” a Union Ministry of Home Affairs (MHA) spokesperson said.

The conference will bring together G20 countries, guests from the invitee nations and international bodies.

NFTs are assets that have been tokenised via a blockchain. These are assigned unique identification codes and metadata to distinguish these from other tokens. NFTs can be traded and exchanged for money or cryptocurrency.

AI is a rapidly growing field of technology that has already made significant contributions to industries such as health care, finance and transportation. AI has recently emerged as a critical component in the development of the Metaverse — a virtual world where people can interact with each other and digital entities in a fully immersive environment.

According to the officials, the conference will see the participation of ministries and central government organisations, chief secretaries and administrators of states and Union Territories, directors general of police of states and Union Territories and cyber experts.

Guest speakers from the legal fraternity, academia, training institutions, financial intermediaries, fintech, social media intermediaries, information and…

Source…