Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

November 2023

Criminals Are Cautious About Adopting Malicious Generative AI Tools

Researchers at Sophos have found that the criminal market for malicious generative AI tools is still disorganized and contentious. While there are obvious ways to abuse generative AI, such as crafting phishing emails or writing malware, criminal versions of these tools are still unreliable. The researchers found numerous malicious generative AI tools on the market, including WormGPT, FraudGPT, XXXGPT, Evil-GPT, WolfGPT, BlackHatGPT, DarkGPT, HackBot, PentesterGPT, PrivateGPT.

Rubrik Expands SaaS Data Protection to Atlassian Jira Cloud: Now Available

With Atlassian ending support in February 2024 for Jira Software Server – an on-premises deployment of Jira Software - what’s your plan for data protection if you choose to migrate to the cloud? While Atlassian has plenty of tools in place out of the box to protect your data, there’s always more you can do to help prevent data loss.

AMOS Infostealer, BiBi Wiper, FreeWorld Ransomware, and More: Hacker's Playbook Threat Coverage Round-up: November 2023

In this version of the Hacker’s Playbook Threat Coverage round-up, we are highlighting newly added coverage for several recently discovered or analyzed ransomware and malware variants, including NoEscape ransomware, AvosLocker ransomware, and Retch ransomware, amongst others. SafeBreach customers can select and run these attacks and more from the SafeBreach Hacker’s Playbook™ to ensure coverage against these advanced threats.

CISO Advisory Board Response to The State of Data Security: Securing an Uncertain Future

Rubrik Zero Labs’ recent study accentuated several hard truths we think are important and warrant a response from Rubrik’s CISO Advisory Board. First, let’s confirm what many of us have already discussed: It’s not fun to be a CISO right now. There’s an overwhelming amount of expectation—from the board to business unit owners—to figure out how to grow and use data, but also keep it secure, and figure out what happens when it’s not.

Qlik Sense Exploited in Cactus Ransomware Campaign

Arctic Wolf Labs has observed a new Cactus ransomware campaign which exploits publicly-exposed installations of Qlik Sense, a cloud analytics and business intelligence platform.[1] Based on available evidence, we assess that all vulnerabilities exploited were previously identified by researchers from Praetorian [2,3]. For more information on these vulnerabilities, see the advisories published by Qlik (CVE-2023-41266, CVE-2023-41265, and CVE-2023-48365) as well as our Security Bulletin.

Unlocking Cyber Resilience: Strategies from the 2023 Global Ransomware Trends Report

Recent findings from the 2023 Global Ransomware Trends Report, reveal a concerning uptick: 85% of organizations experienced a cyberattack in the past year, up from 76% the previous year. Understanding the nuances of defense and recovery becomes paramount as cyber threats escalate. Join us for this essential discussion based on insights from one of the most extensive independent studies to date, encompassing 1,200 organizations from 14 different countries. All these organizations have one thing in common – they’ve braved cyberattacks.

How To Recover From a Ransomware Attack

If you’re the victim of a ransomware attack, there are no guarantees that you can recover your stolen data. The best you can do is mitigate the effects of the attack and remove the ransomware from your device. The steps to recover from a ransomware attack include isolating your device, removing the ransomware, restoring your backed-up data and changing any compromised login credentials.

From Transparency to Coercion, Emerging Threat Actor Tactics

“The evolving threat landscape” sounds like an overused clichè; however, marked shifts in threat actor tactics in the past year are evidence of widespread and brazen growth in confidence among threat actors. Evident in recent incidents, such as ALPHV, AKA Black Cat’s exploitation of legal avenues, and the emergence of “The Five Families” alliance, cybercriminals are stretching their levels of coordination and reach.

Your Backup Data: An Untapped Source of Security Intelligence

It goes without saying that organizations must back up their critical data to ensure business continuity in the event of cyber attacks, disasters, operational failures, or insider threats. But are passive backups enough in today’s environment of sophisticated cyber threats? Despite having backups and various security tools to monitor infrastructure, organizations remain vulnerable to attackers who are still managing to penetrate defenses.

Lessons Learned From the Clark County School District Ransomware Attack

Clark County School District in Nevada, the fifth-largest school district in the United States, recently experienced a massive data breach. Threat actors gained access to the school district’s email servers, which exposed the sensitive data of over 200,000 students. The district is now facing a class-action lawsuit from parents, alleging it failed to protect sensitive personal information and take steps to prevent the cybersecurity attack.

The Lumma Stealer InfoStealer: The Details

The information stealers ecosystem continues to expand as we witness the ongoing maintenance and new capabilities in the latest stealers versions. 2023 was a good year for InfoStealers as they keep evolving along with exploiting the popular vulnerabilities from the last years to infiltrate targeted devices. InfoStealer malware has become increasingly widespread, new business models are being introduced and new detection evasion capabilities are being implemented.

Unveiling LummaC2 stealer's novel Anti-Sandbox technique: Leveraging trigonometry for human behavior detection

The Malware-as-a-Service (MaaS) model, and its readily available scheme, remains to be the preferred method for emerging threat actors to carry out complex and lucrative cyberattacks. Information theft is a significant focus within the realm of MaaS, with a specialization in the acquisition and exfiltration of sensitive information from compromised devices, including login credentials, credit card details, and other valuable information.

The Different Types of Ransomware

The different types of ransomware include crypto ransomware, locker ransomware, scareware, leakware and Ransomware-as-a-Service (RaaS). Ransomware is a type of malware, also known as malicious software, that prevents victims from accessing the data stored on their devices until they’ve paid a cybercriminal a certain amount of money, commonly referred to as a ransom.

BlackCat Ransomware's New SEC Reporting Tactic: Turn Regulations Against Victims

Man Bites Dog: In an unusual twist in cybercrime, the ransomware group BlackCat/ALPHV is manipulating the SEC's new 4-day rule on cyber incident reporting to increase pressure on their victims. This latest maneuver highlights a sophisticated understanding of regulatory impacts in ransomware strategies.

Reporting and Alerting: Gootloader and the NCSC

Join Bill and Robin as they dive into the latest and greatest cybersecurity news. In this weeks episode Bill covers the ever-present threat of Gootloader, and Robin dives into a recent 70+ page report published by the UKs National Cyber Security Center (NCSC.) What is Gootloader? What threats/trends have the NCSC identified, and what's their recommendations for the future? Learn all this and more on the latest episode.

Rubrik and Microsoft: Pioneering the Future of Cybersecurity with Generative AI

We’re excited to announce Rubrik as one of the first enterprise backup providers in the Microsoft Security Copilot Partner Private Preview, enabling enterprises to accelerate cyber response times by determining the scope of attacks more efficiently and automating recoveries. Ransomware attacks typically result in an average downtime of 24 days. Imagine your business operations completely stalled for this duration.

Rubrik Unveils Rapid Cyber Recovery for Large Enterprises Using Microsoft 365 Backup Storage

Every day more than 2 billion documents and emails are added to Microsoft 365, making this critical data a priority target for ransomware and other cyber attacks. After all, 61% of attacks affect SaaS applications, the most targeted platform / environment. This data can also often be unstructured, and rapidly processing and managing the content at enterprise scale is critical when it comes to both applying protection and performing restores.

How Rubrik Enhances Protection and Speeds Recovery for Microsoft 365 Backup Storage

What if a malicious attack deleted your Microsoft Entra ID (formerly Azure Active Directory) objects? Or what if hundreds of objects get deleted across your Microsoft OneDrive account from a rogue script? Think about it. If you’re a large enterprise customer, would you be prepared to rapidly recover from these scenarios at scale?

Coffee Talk with SURGe: 2023-NOV-14 ICBC Ransomware, Sandworm Cuts Power in Ukraine, Volt Typhoon

Grab a cup of coffee and join Mick Baccio, Ryan Kovar, and Audra Streetman for another edition of Coffee Talk with SURGe. The team from Splunk will discuss the latest security news, including: Mick and Ryan will also compete in a charity challenge to explain what constitutes an influence operation, and why network defenders should care.

City of Huber Heights Targeted by Ransomware Attack Sunday

The City of Huber Heights is in east Ohio, north of Dayton. The suburban area has a population of around 50,000, but other populated areas are nearby. Sunday morning, November 12th, 2023, the City of Huber Heights was subject to a ransomware attack; the investigation is ongoing, as the attack disrupted many City divisions.

Cyber Attack Preparedness

Rubrik has been assisting our customers with recovery from cyber attacks since 2018. We immediately took notice of these attacks, and early on, began developing processes and procedures to respond more effectively to better assist our customers. Our spirit of continuous improvement and execution of lessons learned from the field has led to a number of improvements to both our products and processes.

The Dark Side of Online Bookings: Infostealers and Phishing in the Hospitality Industry

The high profile MGM Resorts hack by ransomware group ALPHV/BlackCat has served as a wake up call to the hospitality industry, demonstrating that the industry is a lucrative target for cybercriminals. The hack was hugely impactful to MGM making for sensational headlines in mainstream media, however what struck security experts were the social engineering methods used by the threat actors and how effective they were in bypassing security controls and technologies.

Top tips: 4 ways to bounce back from a ransomware attack

Top tips is a weekly column where we highlight what’s trending in the tech world today and list out ways to explore these trends. This week we’re looking into how your organization can recover from a ransomware attack. It’s well known at this point that ransomware attacks are an inevitability. With around 493.33 million ransomware attempts in 2022 alone, it’s not a question of if you’ll fall victim to a ransomware attack, but rather it’s a question of when.

IMPERIAL KITTEN Deploys Novel Malware Families in Middle East-Focused Operations

CrowdStrike Counter Adversary Operations has been investigating a series of cyberattacks and strategic web compromise (SWC) operations targeting organizations in the transportation, logistics and technology sectors that occurred in October 2023. Based on a detailed examination of the malicious tooling used in these attacks, along with additional reporting and industry reports, CrowdStrike Intelligence attributes this activity to the IMPERIAL KITTEN adversary.

11 Tips for Cyber Security Success

Cyber resilience goes beyond mere security tools or yearly employee training. While both are crucial, a multi-layered cybersecurity approach is essential for the most robust protection. You might be asking “Where is the best place to start?” Or “Is what I am doing enough?” I think we all recognize that cybercrime is on the rise. Recent research indicates that cybercrime is indeed up 300% since 2020.

"Skillful Social Engineering of the IT Support Desk" One of the Most Common Tactics in Ransomware Attacks

As ransom payments reach an all-time high, it’s time to look at attacks from a data perspective and find the greatest opportunities to stop these attacks. Every quarter, I’ve been covering the Quarterly Ransomware Reports from ransomware response company Coveware. In their latest report covering Q3 of this year, we get a greater sense of what trends their security researchers are seeing from the data: This last one is interesting.

Announcing Ruby - your new Generative AI companion for Data Security

Say hello to Ruby, your new Generative AI companion for the Rubrik Security Cloud. Ruby is designed to simplify and automate cyber detection and recovery, something that IT and Security teams struggle with as cyber incidents are getting wildly frequent and the attacks are evolving quickly. A study by Rubrik Zero Labs revealed that 99% of IT and Security leaders were made aware of at least one incident, on average of once per week, in 2022.

BrickLink, LEGO Fanatic Building Site, Allegedly Targeted by Ransomware

The ever-changing universe of LEGO dominates the toy industry; LEGO is one of the most recognizable toy brands in the world, a perk of which is die-hard fans. LEGO fanatics flock to BrickLink, a privately owned website where individuals can design, sell, and buy block sets. LEGO also features some designs following community voting. An estimated 1.4 million people have registered accounts with the platform, including sellers and consumers.

How Does a Ransomware Attack Work?

Ransomware works by exploiting vulnerabilities in a computer system's security. Criminals typically use email phishing or other deceptive tactics to install malicious software on the victim's computer. Once the ransomware has infiltrated the system, it will begin to lock down files and encrypt them using advanced cryptography techniques, making them inaccessible. The cybercriminal will then demand payment for a decryption key that will allow the victim to regain access to their files.

The New InfoStealer in Town: The Continental Stealer

In the last several days, a new info stealer known as the “Continental stealer” has gained traction in dark web forums. This stealer has the potential to become one of the more powerful participants in the InfoStealer industry, thanks to its simple and easy-to-use architecture. In this report, we will review the stealer infrastructure, features, and functionality.

CrowdStrike Achieves 100% Ransomware Protection Accuracy and 100% EDR Rating in SE Labs Test

Ransomware is a scourge that is on track to inflict over $30 billion in damages in 2023. Businesses and organizations that are hit by a ransomware attack face a potentially devastating data breach, with system downtime, recovery, negative publicity and the likelihood of a ransom payment to deal with. Many small businesses are unable to recover from the ordeal and end up permanently shutting their doors within months of being hit.

Healthcare Sector Experiencing Increases in Ransomware, Ransoms and Downtime

An analysis of ransomware attacks on healthcare organizations from 2016 through October of 2023 shows the healthcare sector is likely to continue to suffer as a viable ransomware target. In the last seven years, there have been 539 confirmed ransomware attacks on U.S. hospitals, costing a total of around $77 billion. Consumer tech comparison website Comparitech performed an analysis of these attacks to show the trends – with both positive and negative results.

Pilot Union APA Discloses Ransomware Attack Following Disruptions

The Allied Pilots Association (APA) is the collective pilot agent for American Airlines; it provides a range of services to 15,000 members, including acting as a bargaining entity. On October 30th, the APA experienced a network disturbance—a ransomware cyberattack potentially exposing members.

Ransomware readiness assessment services

Discover the key to safeguarding your business from ransomware attacks with our Ransomware Readiness Assessment services. In this video, we delve into the importance of assessing your readiness, uncover common issues, and outline our robust methodology to conduct a comprehensive assessment. Service quality underpins everything we do.

Network Monitor, LiveAction, Announces Ransomware Incident

LiveAction Incorporated is a software company specializing in analytics, network monitoring, and application management tools. They’ve reported a revenue of over $5 million and provide services to companies in various industries; technical manufacturers, hospitals, biotechnology, and transportation professionals all use LiveAction services. Earlier this year, LiveAction suffered a ransomware attack where hackers took significant consumer information.

National Behavioral Health Clinic Suffers Ransomware

Deer Oaks Behavioral Health is a national provider of mental health based in San Antonio, Texas. They offer the nation long-term care focused on psychiatry and psychology. Deer Oaks hosts more than 1,500 facilities nationwide. Their services include medication and medical treatment planning while spearheading new techniques for rural tele-behavioral health.

Data Detection & Response (DDR): From Noise to Signal to Solution

An often-heard concern in cybersecurity is the amount of tools a single organization has to manage to protect its environment from malicious actors, both internal and external. The environments cybersecurity professionals need to secure have grown a lot more complex over the years, as we have adopted new architectural principles and hybrid and multi-cloud infrastructures in the race for a competitive edge.

Unveiling Socks5Systemz: The Rise of a New Proxy Service via PrivateLoader and Amadey

Proxy services offer users the ability to rent a set of IP addresses for internet use, granting a level of online anonymity. Essentially, they make your internet traffic appear as if it's coming from a regular IP address while keeping the real origin hidden. Recently, our Threat Research team discovered a new malware sample, distributed by the PrivateLoader and Amadey loaders.

New DarkGate Variant Uses a New Loading Approach

In the past month, the Netskope Threat Labs team observed a considerable increase of SharePoint usage to deliver malware caused by an attack campaign abusing Microsoft Teams and SharePoint to deliver a malware named DarkGate. DarkGate (also known as MehCrypter) is a malware that was first reported by enSilo (now Fortinet) in 2018 and has been used in multiple campaigns in the past months.

The Evolving Role of the CISO and the Language of Resilience with Marene Allison

In this episode of Cyber Security Decoded, Steve Stone, Head of Rubrik Zero Labs, is joined by a former CISO at Johnson & Johnson to discuss the ever-evolving role of the CISO. They discuss what she has learned from the biggest threat intrusions in her career, how the role of the CISO is evolving to adapt to new cyber threats, and what we can tactically do to empower more professionals from different backgrounds to pursue a career in cybersecurity.