{"id":30341,"date":"2020-07-30T17:37:20","date_gmt":"2020-07-30T23:37:20","guid":{"rendered":"https://www.webroot.com/blog/?p=30341"},"modified":"2020-07-30T17:37:21","modified_gmt":"2020-07-30T23:37:21","slug":"cyber-news-rundown-wastelocker-ransomware","status":"publish","type":"post","link":"https://www.webroot.com/blog/2020\/07\/30\/cyber-news-rundown-wastelocker-ransomware\/","title":{"rendered":"Cyber News Rundown: WasteLocker Ransomware"},"content":{"rendered":"\n<h2>Garmin Hit with WastedLocker Ransomware<\/h2>\n\n\n\n<p>Nearly a week after the company announced they had suffered\na system outage, <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/garmin-attack-ransomware\/\">Garmin<\/a>\nhas finally admitted to falling victim to a ransomware attack, likely from the increasingly\npopular WastedLocker variant. As is the norm for WastedLocker, the attack was\nvery specific in its targeting of the company (even mentioning Garmin by name\nin the ransom note) and took many of their services offline. Though Garmin has\nconfirmed that no customer data was affected, they are still unsure when their\nservices will return to full functionality. <\/p>\n\n\n\n<h2>Israeli Marketing Firm Suffers Data Breach<\/h2>\n\n\n\n<p>More than 14 million user accounts held by the Israeli\nmarketing firm <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/promo-data-breach-hits-146-million\/\">Promo<\/a>\nwere compromised in a recent breach. Subsequently, at least 1.4 million\ndecrypted user passwords were found for sale on a Dark Web forum, along with 22\nmillion records containing highly sensitive information. The company has since\ncontacted affected customers and is pushing a forced password reset.<\/p>\n\n\n\n<h2>Netwalker Ransomware Targets U.S. Government Organizations<\/h2>\n\n\n\n<p>The FBI has released a security statement concerning <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fbi-warns-of-netwalker-ransomware-targeting-us-government-and-orgs\/\">Netwalker<\/a>\nransomware attacks, which have targeted both U.S. and foreign government\nagencies in recent months. Netwalker is known for exploiting remote desktop\nutilities to compromise major enterprise networks. It also offers ransomware-as-a-service\nto other cybercriminals. The best methods for blocking these types of attacks\nis setting up two-factor authentication (2FA) and creating offline data backups\nto protect in case of a successful breach.<\/p>\n\n\n\n<h2>Lazarus Hacking Group Branches Out to Ransomware<\/h2>\n\n\n\n<p>The North Korean state-sponsored hacking group <a href=\"https:\/\/arstechnica.com\/information-technology\/2020\/07\/north-korea-backed-hackers-dip-their-toes-into-the-ransomware-pool\/\">Lazarus<\/a>\nhas added ransomware to their latest attacks. Unfortunately for the group, the\nransomware variant they\u2019ve chosen is inefficient at encrypting data, sometimes\ntaking up to 10 hours to fully encrypt a single system. These attacks are\nsimilar to those targeting Sony Pictures in 2014 and those that affected the\n2018 Winter Olympic games, both of which are suspected to have been conducted\nby state-backed actors.<\/p>\n\n\n\n<h2>Nefilim Ransomware Begins Publishing Dussman Groups Data<\/h2>\n\n\n\n<p>At least 14GB of data belonging to a subsidiary of <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/business-giant-dussmann-groups-data-leaked-after-ransomware-attack\/\">Dussmann\nGroup<\/a>, a major German MSP, is being leaked by the operators of the Nefilim\nransomware variant. The operators have confirmed they were able to obtain\nroughly 200GB of data from the subsidiary after discovering a still-unknown method\nfor compromising the network. Customers affected by the leak have already been\nnotified. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Garmin Hit with WastedLocker Ransomware Nearly a week after the company announced they had suffered a system outage, Garmin has finally admitted to falling victim to a ransomware attack, likely from the increasingly popular WastedLocker variant. As is the norm for WastedLocker, the attack was very specific in its targeting of the company (even mentioning [&hellip;]<\/p>\n","protected":false},"author":47,"featured_media":30343,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[21944],"yst_prominent_words":[],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/30341"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=30341"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/30341\/revisions"}],"predecessor-version":[{"id":30345,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/30341\/revisions\/30345"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/30343"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=30341"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=30341"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=30341"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=30341"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}