One Single Ransomware Gang Made over $121 Million. From Softpedia.
A group or individual operating a ransomware distribution operation has earned 189,813 Bitcoin (over $121 million) from his/their activities, according to a recent quarterly report published this week by McAfee Labs.
Experts say that the crook’s current Bitcoin wallet address still holds around $94 million, meaning the crook spent $27 million, either on servers and other costs or on himself.
These kinds of profits are exactly what drive cyber-criminals to ransomware operations.
Ransomware incidents up 128% compared to last year:According to McAfee’s telemetry data, the total number of ransomware infections has grown 128 percent year-over-year. Every quarter, the company’s security experts find new versions of ransomware, more than the previous one.
Israeli Online Attack Service ‘vDOS’ Earned $600,000 in Two Years. From KrebsOnSecurity.
vDOS — a “booter” service that has earned in excess of $600,000 over the past two years helping customers coordinate more than 150,000 so-called distributed denial-of-service (DDoS) attacks designed to knock Web sites offline — has been massively hacked, spilling secrets about tens of thousands of paying customers and their targets.
The vDOS database, obtained by KrebsOnSecurity.com at the end of July 2016, points to two young men in Israel as the principal owners and masterminds of the attack service, with support services coming from several young hackers in the United States.
How to Run a Russian Hacking Ring. From The Atlantic. And for many of those cybercriminals, hacking is as unglamorous as any other business. That’s what a group of security researchers found when they infiltrated a ring of hackers based in Russia earlier this year, and monitored its dealings over the course of five months. The researchers were with Flashpoint, an American cybersecurity company that investigates threats on the dark and deep web. Their undercover operation began when they came across a post on a Russian hacker forum on the dark web—a part of the internet that’s inaccessible to regular browsers—that read very much like a get-rich-quick ad you might find on Facebook.
Twitter denies security breach after hacker tries to sell 32M compromised accounts. From Washington Times. Twitter on Thursday denied being the victim of a security breach amid reports that a hacker has put the log-in credentials for more than 32 million accounts up for sale on the dark web. LeakedSource, an online search engine for stolen data, said Wednesday that a pseudonymous hacker provided the website with a data set purportedly containing the usernames, passwords and other data pertaining to 32,888,300 Twitter accounts. Fifteen of the victims identified in the breach were contacted by LeakedSource, and each one verified the validity of the information supplied to the website.
- Companies Are Stockpiling Bitcoin in Case They Get Infected with Ransomware. From Softpedia. According to the numbers crunched by Citrix and Censuswide, who polled 250 UK IT and security managers, one in three UK businesses is now creating a backup account for holding cryptocurrency such as Bitcoin in the event of a cyber-attack. Companies are willing to pay as much as £50,000 ($72,700) to unlock their computers and retrieve their IP (intellectual property) in case ransomware somehow makes it into their network. The exact percentages are 36 percent of the companies with 250-500 employees, 57 percent of the businesses with 501-1,000 employees, and 18 percent of the firms with over 2,000 employees.
Enterprises Still Don’t Base Vuln Remediation On Risk. From Dark Reading. “Despite the growing number of breaches, the state of application security is not improving significantly,” says Asma Zubair, director of product management for WhiteHat. “Applications continue to remain vulnerable. About one-third of insurance applications, about 40 percent of banking and financial services applications, about half of healthcare and retail applications, and more than half of manufacturing, food and beverage, and IT applications are always vulnerable.”