Phobos Ransomware Aggressively Targeting U.S. Critical Infrastructure (thehackernews.com)
from kid@sh.itjust.works to cybersecurity@sh.itjust.works on 04 Mar 2024 12:29
https://sh.itjust.works/post/15665934

U.S. agencies warn of Phobos ransomware attacks on government entities and critical infrastructure since May 2019. The attacks exploit vulnerabilities and use advanced techniques for persistence and elevated privileges. Despite the high ransom costs, paying does not prevent new attacks, with 78% of victims being attacked again.

#cybersecurity

threaded - newest

potatopotato@sh.itjust.works on 04 Mar 2024 14:10 next collapse

Crazy opinion incoming: in the current climate ransomware is just pentesting equivalent of the “free” personal injury attorneys. If the pass the pentest, it’s free. If you fail, it’s crazy expensive. Either way it’s relatively benign security auditing that’s causing companies to be slightly less stupid about how they handle IT.

It’s not the ideal way of doing this, but it’s strangely having a positive impact and mitigating belligerent states abilities to conduct offensive cyber operations if things were to heat up.

kid@sh.itjust.works on 04 Mar 2024 21:41 next collapse

Makes sense

SpaceMan9000@lemmy.world on 05 Mar 2024 07:22 collapse

Honestly not what I have seen with some big companies. Even after getting hit with ransomware they just continue working as if it has never happened.

ogmios@sh.itjust.works on 04 Mar 2024 19:01 collapse

Maybe connecting literally everything to the Internet is a really fucking stupid idea…

heeplr@feddit.de on 05 Mar 2024 10:29 collapse

air gapping doesn’t really help when basically any interface is an attack vector.

evil maid attacks still work.