/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Raj Samani

@raj_samani
14 posts
2023-11-11
Our latest @rapid7 analysis details CVE-2023-47426, a zero-day path traversal vulnerability affecting on-premise SysAid servers. Including IoCs and @velocidex artifact: https://www.rapid7.com/... [image]
2023-11-11 View on X
BleepingComputer

Microsoft says the Clop ransomware group is exploiting a zero-day in IT support tool SysAid in “limited” attacks to access corporate servers and deploy Clop

blog post coming ASAP😜 Big thanks to @gleeda @HuskyHacksMK @DaveKleinatland @calebjstewart and the whole @HuntressLabs crew helping dig into this one! [image] @swiftonsecurity : I'...

2023-07-19
We have observed exploitation of Adobe ColdFusion in multiple customer environments. The attacks our team has responded to thus far appear to be chaining CVE-2023-29298. Further details included mitigation guidance here: https://www.rapid7.com/... #infosec #cybersecurity [image]
2023-07-19 View on X
Ars Technica

Rapid7: threat actors have exploited zero-day RCE flaws in Adobe ColdFusion and Citrix NetScaler; Citrix patched its flaw but Adobe issued an incomplete fix

The exploited code-execution flaws are the kind coveted by ransomware and nation-state hackers.  —  Organizations big and small …

2023-02-10
UK sanction 7 “Russian Cyber criminals” that have been “associated with the development or deployment of a range of ransomware strains which have targeted the UK and US."https://www.gov.uk/... #ramsomware #malware #cybercrime #infosec
2023-02-10 View on X
The Record

The US and the UK sanction seven people based in Russia, with likely FSB ties, connected to the Conti and Ryuk ransomware gangs and the Trickbot banking trojan

on par with terrorism and military crisis between states. Cheyenne Ligon / CoinDesk : Russian Cybercrime Gang Trickbot Sanctioned by US, UK Maggie Miller / Politico : U.S., U.K. sa...

2023-01-27
Analysis via @chainalysis details money laundering for #ransomware “going to mainstream exchanges grew from 39.3% in 2021 to 48.3% in 2022, while the share going to high-risk exchanges fell from 10.9% to 6.7%” https://blog.chainalysis.com/ ... #malware #infosec #cybersecurity https://twitter.com/...
2023-01-27 View on X
Chainalysis

A look at crypto money laundering in 2022: illicit addresses sent nearly $23.8B, up 68% YoY, four addresses got $1B+ combined, DeFi got record funds, and more

The 2023 Crypto Crime Report  —  Money laundering is crucial to all financially motivated crime because it's what enables criminals …

2022-03-24
LAPSUS$ “has been observed joining the organization's crisis communication calls and internal discussion boards (Slack, Teams, conference calls, and others) to understand the incident response workflow” https://www.microsoft.com/... #cybersecurity #infosec #malware H/T @msftsecurity https://twitter.com/...
2022-03-24 View on X
Bloomberg

Security researchers say a 16-year-old from England is the Lapsus$ group's mastermind; source: researchers identified seven unique accounts tied to Lapsus$

Cybersecurity researchers investigating a string of hacks against technology companies, including Microsoft Corp. and Nvidia Corp. …

2022-03-23
LAPSUS$ “has been observed joining the organization's crisis communication calls and internal discussion boards (Slack, Teams, conference calls, and others) to understand the incident response workflow” https://www.microsoft.com/... #cybersecurity #infosec #malware H/T @msftsecurity https://twitter.com/...
2022-03-23 View on X
The Verge

Microsoft confirms Lapsus$ compromised “a single account” and stole portions of source code for some products, but says no customer code and data was involved

Lapsus$ says it has accessed data from Okta, Nvidia, Samsung, and Ubisoft  —  The hacking group Lapsus$ …

2022-03-18
Excellent analysis into Initial Access Broker (IAB) group working with FIN12 “were sending more than 5,000 emails a day, to as many as 650 targeted organizations globally” - although only worked 9-5 on weekdays! https://blog.google/... #malware #ransomware #cybersecurity https://twitter.com/...
2022-03-18 View on X
TechCrunch

Google details Exotic Lily, a “financially-motivated threat actor” that works as an initial access broker for Russian hackers and ransomware gangs like Conti

Carly Page / TechCrunch :

2021-10-16
Excellent analysis into Client side scanning - detailing “options for mass surveillance via software embedded in people's devices,” https://www.lightbluetouchpaper.org/ ... H/T @rossjanderson #privacy #cybersecurity #infosec
2021-10-16 View on X
New York Times

Security researchers say Apple and EU plans to monitor phones for illicit material are ineffective and could embolden government surveillance

In August, Apple announced a system to check all our iPhones for illegal images … Jordan Robertson / Bloomberg : Apple's Child-Porn Tracking System Is Flawed, Report Says arXiv.org...

2021-07-05
Some small respite for victims of the Kaseya attack - “REvil representatives have told victims that they only encrypted networks, and nothing more. This means that REvil likely did not steal any of the victims' data” https://www.bleepingcomputer.com/ ... #ransomware #malware #cybersecurity https://twitter.com/...
2021-07-05 View on X
Reuters

President Biden says he has directed US intelligence agencies to investigate the Kaseya ransomware attack and adds “we're not certain” who is behind the attack

Trevor Hunnicutt / Reuters :

Some small respite for victims of the Kaseya attack - “REvil representatives have told victims that they only encrypted networks, and nothing more. This means that REvil likely did not steal any of the victims' data” https://www.bleepingcomputer.com/ ... #ransomware #malware #cybersecurity https://twitter.com/...
2021-07-05 View on X
The Record

In a post on the REvil dark web blog, the gang takes credit for the Kaseya attack, claims it infected 1M+ systems, and demands $70M in bitcoin for the decryptor

The REvil ransomware gang is asking for a $70 million ransom payment to publish a universal decryptor that can unlock …

2021-04-05
“Almost every user record contains a mobile phone number, a Facebook ID, a name, and the member's gender” https://www.bleepingcomputer.com/ ... #facebookleak #cybersecurity #infosec https://twitter.com/...
2021-04-05 View on X
Insider

Personally identifiable data of 533M Facebook users has been posted online; Facebook says the data comes from a leak that was reported on and fixed in 2019

- The personal data of over 500 million Facebook users has been posted online in a low-level hacking forum.

2020-09-18
“If the #ransomware attack and the hospital downtime are found to have been directly at fault for the woman's death, German police said it plans to turn their investigation into a murder case” https://www.zdnet.com/... #malware #cybersecurity
2020-09-18 View on X
BleepingComputer

German media: a patient died after ransomware attack forced a hospital to send them elsewhere; hackers backed down after police told them target was a hospital

A person in a life-threatening condition passed away after being forced to go to a more distant hospital due to a ransomware attack.

2020-05-03
Introducing #LockBit #ransomware - heavily targeted with an actual helpdesk “ineffective in solving the technical issues” but with a “big boss” https://www.mcafee.com/... #malware #cybercrime H/T @John_Fokker @Seifreed https://twitter.com/...
2020-05-03 View on X
Ars Technica

Researchers detail the increasingly prevalent LockBit ransomware, which may one day reach parity with other feared ransomware packages like Maze or Ryuk

You've probably never heard of LockBit, but that's likely to change.  —  Ransomware has emerged as one of the top threats facing large organizations …

2019-08-28
Coincidence? “#hackers are specifically extorting American companies that they know have cyber insurance. After one small insurer highlighted the names of some of its cyber policyholders on its website, three of them were attacked by #ransomware” https://www.propublica.org/... #malware
2019-08-28 View on X
ProPublica

Investigation finds cyber insurers often prefer to pay the ransom for ransomware attacks, even when backup files could be recovered, to save claim costs

Even when public agencies and companies hit by ransomware could recover their files on their own, insurers prefer to pay the ransom.  Why?