Italian liquor company Campari Group was hit by a Ragnar Locker ransomware attack, where 2 TB of unencrypted files was allegedly stolen. To recover their files, Ragnar Locker is demanding $15 million. Campari Group is an Italian beverage company known for its popular liquor brands, including Campari, Frangelico, SKYY vodka, Epsolon, Wild Turkey, and Grand Marnier. As first reported by ZDNet, Campari released a press statement on Monday where they stated they suffered a cyberattack over the weekend. READ MORE...
Florida-based private prison operator GEO Group this week revealed that it was recently targeted in a cyberattack that involved ransomware and which may have resulted in the theft of sensitive information. The GEO Group operates over 120 jails, rehabilitation facilities, processing centers, and community reentry centers in North America, the UK, Australia and South Africa. In the United States, it also operates some of the controversial ICE detention centers. READ MORE...
Brazil's Superior Court of Justice was hit by a ransomware attack on Tuesday during judgment sessions that were taking place over video conference. "The Superior Court of Justice (STJ) announces that the court's information technology network suffered a hacker attack on Tuesday (3), during the afternoon, when the six group classes' judgment sessions took place," STJ President Humberto Martins said in an official statement on the Supreme Federal Court's website. READ MORE...
Ubisoft says that it is investigating media claims that the Egregor ransomware gang has published a 558 GB archive of the source code and resources of the video game Watch Dogs: Legion on file-sharing site networks. The Egregor group claims that it obtained the source code of the newest game in the Watch Dogs series, following a security breach of Ubisoft's internal servers. If it really is the source code of Watch Dogs: Legion then it may be that the Egregor gang released it after failing to extort any money from the video game developer. READ MORE...
A Russian-speaking threat actor has been targeting hundreds of industrial enterprises for more than two years, Kaspersky's security researchers report. Focused on companies in Russia, the ongoing attacks are highly targeted, leveraging phishing emails for malware deployment. In some cases, legitimate documents that were stolen in previous attacks are leveraged for social engineering. Another characteristic of these attacks is the use of remote administration utilities. READ MORE...
New research also shows a divide between younger and older users in their security practices, including use of two-factor authentication and how often software updates are performed. Most home users and workers consider their devices "sufficiently secure," but more than a third never check for updates to their security software and more than half regularly connect to unprotected Wi-Fi networks, according to a new report from the National Cyber Security Alliance (NCSA). READ MORE...
Apple has patched three previously identified zero-day vulnerabilities in its iPhone, iPod and iPad devices potentially related to a spate of related flaws recently discovered by the Google Project Zero team that also affect Google Chrome and Windows. Apple this week released iOS 14.2 and iPadOS 14.2, which patch a total of 24 vulnerabilities-including the three already being exploited in the wild-in various components of the OSes, including audio, crash reporter, kernel and foundation. READ MORE...
Cops used the opportunity to figure out remote access traps. A tech support scammer making random phone calls in the hope of finding a victim called the cybercrime squad of an Australian police force, which used the happy accident to document the scam and inform the public what to watch out for. The call was placed to the Financial and Cybercrime Investigation Branch (FCIB) in the state of South Australia, where the local Police force serves 1.75 million citizens. READ MORE...