January 20, 2020 By David Bisson 3 min read

Last week in security news, security researchers discovered Nemty ransomware’s plans to create a website for the purpose of publishing its non-paying victims’ data. Speaking of ransomware, researchers also spotted Ryuk using a hardware feature to increase its scope and infect more of a compromised network. Numerous phishing attacks, including some using Microsoft Sway domains to create landing pages, also came to light.

Top Story of the Week: Nemty Ransomware to Begin Publishing Victims’ Data

In a “News” post shared with Bleeping Computer, the operators of Nemty ransomware announced their intention to create a website for publishing victims’ data in the event that they do not initially pay the ransom. The computer self-help site said that the malware operators will begin by building functionality into Nemty that enables the ransomware to steal a victim’s data prior to encrypting it. Researchers observed that Nemty will then gradually leak a victim’s stolen information to the new website until they agree to pay the ransom or until all of their data is publicly exposed.

Nemty is not the first ransomware strain to announce plans for publishing noncompliant victims’ data. Prior to this announcement, Bleeping Computer observed the Maze and Sodinokibi families using the same technique against their respective victims.

Source: iStock

Also in Security News

  • Critical Vulnerability in CryptoAPI Library Patched by Microsoft: In its first Patch Tuesday of 2020, Microsoft included a fix for a critical vulnerability in its CryptoAPI library that allowed a threat actor to fake signatures on encrypted HTTPS communications and launch man-in-the-middle (MitM) attacks. Microsoft learned of the flaw from the National Security Agency (NSA), which first discovered the bug.
  • Potentially Over 200 Million Modems Vulnerable to Cable Haunt: Denmark-based security firm Lyrebirds observed attackers using malicious JavaScript code to exploit a buffer flow vulnerability in the spectrum analyzer of visitors’ modems. Dubbed Cable Haunt, this exploit could enable nefarious individuals to enlist devices into a botnet or change its DNS settings.
  • United Nations Email Addresses Targeted by Phishers: In a sample email shared with Bleeping Computer, digital fraudsters posed as representatives of Norway to the United Nations and sent out attack emails to about 600 email addresses associated with the organization. Those emails used malicious Word documents to download Emotet.
  • Phishing Landing Pages Hosted on Microsoft Sway: Avanan observed that malicious actors have begun using Microsoft Sway to create landing pages for their phishing campaigns. This choice allowed attackers’ operations to go undetected by many URL filters and to appear more legitimate by incorporating Office 365 styling and menus.
  • Over $2 Million Lost by Texas School in Phishing Attack: According to CBS Austin, Manor Independent School District fell for an email phishing scam in which it sent three separate transactions totaling $2.3 million to an account under attackers’ control. The school district reported the incident to the Manor Police Department, which in turn enlisted the FBI’s help.
  • Ryuk Ransomware Capable of Waking Up Powered-Down Devices: As reported by Bleeping Computer, a security researcher observed Ryuk ransomware samples using a hardware feature called Wake-on-Lan to send specially crafted network packets to powered-down devices. This technique allowed Ryuk to encrypt even more devices connected to a compromised network.
  • More Than a Dozen Adware Android Apps Discovered in Google Play: Bitdefender researchers spotted 17 Android apps available for download in Google Play that concealed their presence on users’ devices and aggressively displayed ads to users upon installation. Upwards of 550,000 Android users had downloaded those apps at the time of discovery.
  • Magecart Skimmer Behind Compromise of Australian Bushfire Donation Site: Bleeping Computer observed that bad actors had used a Magecart credit card skimmer to compromise a site that was collecting donations for the Australian bushfires. The skimmer activated whenever visitors added an item to their cart, including a donation, and proceeded to checkout.

Security Tip of the Week: Protect Your Data Against a Ransomware Infection

Security professionals can help protect enterprise data against a ransomware infection by creating an effective data discovery and classification strategy. This plan should include automated processes and reflect the goals for why the organization wants to classify its data in the first place. Infosec personnel should also use artificial intelligence (AI)-driven solutions to obtain visibility into their data, cloud networks and endpoints.

More from

Cloud Threat Landscape Report: AI-generated attacks low for the cloud

2 min read - For the last couple of years, a lot of attention has been placed on the evolutionary state of artificial intelligence (AI) technology and its impact on cybersecurity. In many industries, the risks associated with AI-generated attacks are still present and concerning, especially with the global average of data breach costs increasing by 10% from last year.However, according to the most recent Cloud Threat Landscape Report released by IBM’s X-Force team, the near-term threat of an AI-generated attack targeting cloud computing…

Testing the limits of generative AI: How red teaming exposes vulnerabilities in AI models

4 min read - With generative artificial intelligence (gen AI) on the frontlines of information security, red teams play an essential role in identifying vulnerabilities that others can overlook.With the average cost of a data breach reaching an all-time high of $4.88 million in 2024, businesses need to know exactly where their vulnerabilities lie. Given the remarkable pace at which they’re adopting gen AI, there’s a good chance that some of those vulnerabilities lie in AI models themselves — or the data used to…

FBI, CISA issue warning for cross Apple-Android texting

3 min read - CISA and the FBI recently released a joint statement that the People's Republic of China (PRC) is targeting commercial telecommunications infrastructure as part of a significant cyber espionage campaign. As a result, the agencies released a joint guide, Enhanced Visibility and Hardening Guidance for Communications Infrastructure, with best practices organizations and agencies should adopt to protect against this espionage threat. According to the statement, PRC-affiliated actors compromised networks at multiple telecommunication companies. They stole customer call records data as well…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today