- Boys’ sleepovers vs. girls’ sleepovers meme takes stereotypes to absurd heights Tuesday 7:30 PM
- Petition wants Keanu Reeves to be named ‘Time Person of the Year’ Tuesday 6:33 PM
- 8 women accuse Max Landis of sexual, emotional abuse Tuesday 5:37 PM
- Taylor Swift accused of copying Beyoncé—again Tuesday 5:00 PM
- Everything you need to know about Libra, Facebook’s new cryptocurrency Tuesday 4:45 PM
- Netflix just renewed ‘Queer Eye’ for 2 more seasons Tuesday 4:32 PM
- YouTube’s queen of failed robots just unveiled a one-of-a-kind Tesla truck Tuesday 3:58 PM
- AOC infuriates conservatives with ‘concentration camps’ remark Tuesday 3:33 PM
- TikTok users explore identity with Lin Manuel Miranda-inspired meme Tuesday 3:24 PM
- TikTok apology video inspires new duet meme Tuesday 2:51 PM
- Man sues brewery after identifying as female to get beer discount Tuesday 2:31 PM
- Here’s what’s coming and going on Hulu in July 2019 Tuesday 2:22 PM
- This biotech company’s logo is almost straight out of Resident Evil Tuesday 1:26 PM
- Trump says mass deportations to start next week Tuesday 12:28 PM
- GOP pollster bothered by broken elevator in Austria blames socialism Tuesday 10:50 AM
Richard Patterson/Flickr (CC-BY)
Cybercriminals are shifting focus to high-value targets.
Cybersecurity experts are warning of an uptick in ransomware attacks after a campaign against large enterprises netted hackers more than $3 million.
According to two leading cybersecurity firms, CrowdStrike and FireEye, a strain of ransomware known as Ryuk has been used to elicit over $3.7 million in cryptocurrency payments since August of last year.
CrowdStrike has attributed the attacks to the cybercrime cell “GRIM SPIDER,” a part of the larger “WIZARD SPIDER” criminal enterprise group suspected of operating out of Russia.
Media reports initially placed the blame on North Korean government hackers after Ryuk ransomware was used in December of last year to cripple Tribune Publishing, a company which prints newspapers for major outlets such as the Chicago Tribune.
Many of GRIM SPIDER’s victims, CrowdStrike notes, were found to have TrickBot malware on their computers as well, used prior to the deployment of Ryuk.
The attacks are believed to have been started primarily by a large spam email campaign. The hackers then carried out reconnaissance against their victims in order to locate computers at large companies.
After finding a high-value target, the Ryuk ransomware is used to lock victims’ computers before demanding a large sum of money in exchange for the return of their files.
“Since Ryuk’s appearance in August, the threat actors operating it have netted over 705.80 BTC across 52 transactions for a total current value of $3,701,893.98 USD,” CrowdStrike writes.
FireEye adds that “a notable uptick in the latter half of 2018” has proven lucrative for the hackers.
“FireEye Intelligence expects that these operations will continue to gain traction throughout 2019 due the success these intrusion operators have had in extorting large sums from victim organizations,” the company states.
CrowdStrike characterizes such attacks as “big game hunting,” in which a few highly-profitable organizations are targeted instead of many individual internet users.
- A man found a camera in his Airbnb and the company didn’t seem to care
- Sprint promises to stop selling location data after outcry
- New Nike shoes can be controlled from your smartphone
H/T Digital Trends
Mikael Thalen is a tech and security reporter based in Seattle, covering social media, data breaches, hackers, and more.