The hottest Ransomware Substack posts right now

And their main takeaways
Category
Top Technology Topics
Zero Day 899 implied HN points 26 Oct 23
  1. The StripedFly malware was initially thought to be a crypto miner but turned out to be a sophisticated spy platform that infected over a million victims worldwide since 2017.
  2. One unique aspect of StripedFly is the custom-coded TOR client used for communication and data transfer, which shows the attackers' high level of skill and security consciousness.
  3. StripedFly includes a ransomware component named ThunderCrypt, raising questions about the intent behind including ransomware in an espionage tool and how it fits into the overall operation.
David Friedman’s Substack 125 implied HN points 19 Feb 24
  1. Technology has enabled a variety of scams, like mass production blackmail and forged evidence threats, taking advantage of a large number of people at a low cost.
  2. Legal and computer service scams are becoming more prevalent, with scammers using tactics like phone calls offering legal help after accidents or fake tech support from companies like Microsoft.
  3. Advanced technology like deepfake videos and ransomware pose serious risks, as seen in cases where fraudsters used deepfake technology to trick workers into transferring large sums of money or when victims are extorted for payments to decrypt their files.
Natto Thoughts 99 implied HN points 09 Feb 24
  1. China's state-backed cyber threat group Volt Typhoon is targeting critical infrastructure in the US, showing a shift from espionage to preparing for destructive cyberattacks.
  2. Chinese cyber campaigns have evolved to focus on offensive operations like disrupting or destroying target organizations, in addition to traditional cyber espionage.
  3. China's interest in offensive cyber operations has been growing since at least 2000, involving the integration of military, government, and private sector resources to build offensive cyber capabilities.
Natto Thoughts 39 implied HN points 15 Feb 24
  1. A new report by Prodaft sheds light on the intricate world of Russian cybercrime communities, revealing relationships among prominent hackers including Mikhail Matveev.
  2. Matveev, also known as Wazawaka, plays a significant role in leading a cybercriminal team orchestrating ransomware attacks, showcasing the dynamic and unethical practices within the ransomware ecosystem.
  3. Prodaft's report unveils Matveev's connections to other cybercriminal groups, such as Babuk and EvilCorp, underscoring the complex relationships and betrayals within the Russian cyber underground.
Get a weekly roundup of the best Substack posts, by hacker news affinity:
Natto Thoughts 19 implied HN points 22 Feb 24
  1. Matveev, a.k.a. Wazawaka, of the Babuk ransomware group aligns his attacks with Russian strategic interests, suggesting a possible connection to the Russian state.
  2. The Russian government views IT experts and hackers as valuable assets and can use them as a deterrent against adversaries, as seen in battles over extradition and state-coordinated cyber operations.
  3. Ransomware criminals like Matveev may mix financial motives with political considerations by targeting victims and timing attacks to align with state goals as seen in Babuk's attacks on the DC Metropolitan Police Department and Costa Rica.
Metacurity 19 implied HN points 08 Feb 24
  1. Chinese hacking group Volt Typhoon has been living in critical networks of some industries in the US for at least five years.
  2. Ransomware payments topped $1.1 billion in 2023, nearly doubling from the previous year, due to a surge in attacks.
  3. UN investigates 58 suspected cyberattacks by North Korea totaling $3 billion to fund its nuclear weapons program.
ussphoenix 2 HN points 06 Mar 23
  1. Cybersecurity strategies need to evolve and adapt to outmaneuver cyber threats.
  2. Moving Target Defense (MTD) is a crucial approach in cybersecurity, making it difficult for hackers to target systems.
  3. Implementing MTD can help organizations stay ahead of threats like ransomware, drive-by attacks, and reduce attacker dwell time.
Seriously Risky Business 0 implied HN points 30 Mar 23
  1. A proposal for a US Cyber Force as a 7th branch of the armed services is being considered, but there are concerns about the necessity and impact of such a move.
  2. Biden's executive order on spyware aims to restrict commercial spyware use by the US government, formalizing existing practices, and working in conjunction with legislative initiatives.
  3. The UK's NHS released a cyber security strategy focusing on collaboration, risk management, and learning from past cyber incidents, addressing challenges like limited cyber workforce and legacy technology.
Seriously Risky Business 0 implied HN points 11 Jan 24
  1. Russia's cyber activities in Ukraine are a mix of smart surveillance techniques and flashy, but counterproductive, destructive operations.
  2. Although a recent cyber attack by Russia on Kyivstar caused widespread disruption, it ultimately resulted in short-lived impact and missed potential intelligence gains.
  3. Israeli cyber operations, like the Predatory Sparrow attacks in Iran, aim to send warnings but may not be effective in the current high-conflict environment.
Seriously Risky Business 0 implied HN points 23 Feb 23
  1. An undercover investigation revealed the activities of an Israeli election interference-for-hire company called Team Jorge, involving disinformation tactics and interference capabilities.
  2. Team Jorge utilized a social media botnet named AIMS to control 30,000 personas across multiple platforms, alongside other tactics like denial of service attacks and hacking operations.
  3. Google's report on Russian cyber activities during the Ukraine conflict highlighted mixed results in the aggressiveness of Russian government cyber actors, particularly in destructive attacks and intelligence collection efforts.