Tag Archive for: south

Florida Memorial University reportedly targeted in ransomware cyberattack | South Florida News


Florida Memorial University (FMU), South Florida’s only historically Black college or university has reportedly fallen victim to a cybersecurity breach by the ransomware group known as INC Ransom. The specifics of the data compromised during this incident remain uncertain, and the university has yet to issue a formal statement regarding the breach.







INC Ransom Blog Post

INC Ransom posts on their blog confirming their recent attack on Florida Memorial University. 


In a disturbing display of their malicious capabilities, INC Ransom has uploaded a ‘proof pack’ on its website, showcasing scans of passports, Social Security numbers, and contractual documents, ostensibly sourced from FMU’s databases.







INC Ranson's FMU Proof Pack

INC Ransom has uploaded a so-called “proof pack” on its website, showcasing scans of passports, Social Security numbers, and contractual documents, ostensibly sourced from FMU’s databases.

Source…

South Korea’s Battle Against North Korean Hackers


In the dimly lit corridors of digital warfare, a new chapter unfolds as South Korean authorities mount a determined response to a series of cyberattacks that bear the hallmark of a familiar adversary. This isn’t just a skirmish in the nebulous realm of cyberspace; it’s a direct assault on the country’s judicial backbone, compelling the National Police Agency to take unprecedented action against a threat that’s as intangible as it is insidious.

The Frontline: Supreme Court Servers Under Siege

The serene city of Seongnam, merely a stone’s throw from the bustling capital of Seoul, found itself at the epicenter of this cyber confrontation. Here, within the premises of the Supreme Court’s digital data bureau, police initiated search and seizure operations aimed at reclaiming sovereignty over servers that fell victim to the cyberattacks orchestrated by the Lazarus Group, a notorious entity with indelible ties to North Korea. The operations, marking a significant escalation in the fight against cyberterrorism, commenced on February 13th, signaling a clear intent to safeguard national security interests.

A Persistent Threat: The Lazarus Group’s Shadow

The Lazarus Group isn’t a new player on the global stage of cyberterrorism. Known for its sophisticated attacks and elusive operations, this North Korean-affiliated collective has cast a long shadow over international cybersecurity efforts. The breach of the Supreme Court servers is but the latest in a series of provocations that underscore the group’s audacious approach to digital espionage and sabotage. By targeting the judicial system, the attackers not only compromise sensitive legal information but also challenge the very integrity of South Korea’s governance structures.

Securing the Digital Frontier: Response and Repercussions

In response to this brazen incursion, the National Police Agency’s cyber terror division has not only intensified its efforts to recover and secure the compromised servers but also to assess and mitigate the impact of the breach. These efforts are emblematic of a broader struggle to protect critical infrastructure from the increasingly sophisticated…

Source…

South Korean Agencies Investigate $82M Orbit Bridge Hack


Orbit Bridge HackOrbit Bridge Hack
Source: DALL·E

Orbit Bridge, which serves as the main bridge for the Claytont ecosystem, was exploited for nearly $82 million hours before the new year’s eve. Multiple South Korean agencies are currently investigating the multi million hack.

Allegations have emerged identifying North Korea’s hacking group, ‘Lazarus,’ as the orchestrator of the exploit, prompting several South Korean National Intelligence Service (NIS) to intervene for a comprehensive investigation.

The bridge was utilized by prominent Korean domestic platforms such as Kakao’s blockchain platform Claytont and WEMIX, a blockchain project by WEMADE.

Intelligence Agencies Investigate the Exploit


The NIS’s involvement in determining the perpetrator of the attack signifies an unusual level of engagement for a blockchain-related virtual asset theft. According to Orbit Bridge’s operating company, OZYS, they promptly reported the asset misappropriation incident to the Korea Internet & Security Agency (KISA) and the National Police Agency on January 1st, complying with mandatory reporting obligations under the Information and Communication Network Act.

The NIS commented on the ongoing investigation, stating, “We are currently investigating the cause and the perpetrator of the incident. While no direct link to North Korea has been confirmed so far, we are collaborating with relevant agencies and considering the possibility,” local news media reported.

NIS Involvement in Investigation Deemed Unusual


The incident follows a pattern observed in the cryptocurrency space where cybercrime incidents trigger the involvement of agencies like the Cyber Investigation Division of the National Police Agency and KISA. However, the inclusion of the NIS in this case is deemed exceptional.

OZYS has actively cooperated with the investigation, notifying authorities promptly and seeking assistance from global blockchain analysis firms such as UPsala Security and the TON Foundation.

As the fallout from this incident reverberates not only within the Claytont…

Source…

US, South Korea and Japan strengthen cyber security


Reuters Now

Posted

The United States, South Korea and Japan have agreed on new initiatives to respond to North Korea’s threats in cyberspace, satellite launches and cryptocurrency abuses, White House National Security Advisor Jake Sullivan said on Saturday (December 9).

Reuters Now

for-phone-onlyfor-tablet-portrait-upfor-tablet-landscape-upfor-desktop-upfor-wide-desktop-up

Source…