Plus: Share ID raises $2.1M Seed to detect the authenticity of government-issued documents
Part of Network | |
Presented by |
The BlackCat Ransomware group claims to have stolen 2TB of sensitive information from an Indian explosives company named Solar Industries India. The threat actor claims the company has conducted industrial spying in other countries. More: - The Russia-based hacker group has stolen information such as:
- Personal information belonging to employees and customers,
- Weapon engineering documentation,
- Information about the company's partnership deals,
- Government documents,
- Records from all cameras,
- Backups and databases,
- Details of warhead composition,
- Security audits and reports on security laws and vulnerabilities found in the company's digital infrastructure, etc.
- BlackCat published images of the stolen documents and pictures taken from the company's security cameras as proof that it could hack the company.
- The group has stated that it is putting this data up for sale on the dark web for the next 24 hours.
Zoom Out: - The FBI first tracked the BlackCat Ransomware Group in late 2021. In a short period, the threat actor has managed to breach dozens of organizations.
- BlackCat's ransomware is written in Rust, making it adaptable and more deceptive.
- It operates as a Ransomware-as-a-Service, allowing its operators to take as much as 70% of the stolen amount.
| |
An arrested Dutch hacker claims to have stolen the data of almost all Austrian citizens in a 2022 breach. Law authorities believe he held information about tens of millions of people worldwide. More: - Law authorities in the Netherlands and the U.K. believe that the 25-year-old hacker stole information about millions of people in the Netherlands, Thailand, Colombia, China, and the United Kingdom.
- He is being trialed on four offenses:
- possession or making non-public data available,
- possession of phishing software and hacker tools,
- computer trespass,
- and regular money laundering.
- The hacker was tracked by the Austrian Federal Crime Investigation Service, which contacted Dutch law authorities to inform them of the illegal activities the Dutch citizen was conducting.
- After his arrest and the seizure of proof, law authorities claimed that the hacker was using phishing tools and other software that enabled him to breach millions of victims to sell that information on cybercrime internet forums.
- Law authorities found proof that ties the hacker to money laundering activity, specifically laundering $489,000 worth of cryptocurrency.
| |
A message from LACEWORK Discover cloud insights and harden your security posture In the latest installment of the Cloud Threat Report series, Lacework Labs covers the significant increase in efficiencies used by cybercriminals. Get insights into these trends that cover how: - Attackers are automating key discovery and exploits, taking advantage of momentary mistakes
- Simple mistakes turn into misconfigurations that attackers use to compromise your cloud identity infrastructure
- Vulnerabilities continue to stick around for months (sometimes even years) and attackers quickly exploit any new vulnerabilities
- Cryptojacking continues to be a staple in cybercriminal tool belts
Discover detailed intelligence about ongoing infrastructure compromise activities and best practices for hardening your cloud security posture. Read the Lacework Labs Cloud Threat Report, Vol. 4 today. get the report | |
A new hacking campaign is scamming internet users in West Africa by convincing them that they're being contacted by American investors and financial advisors. Researchers have been unable to track the hacker group behind the campaign. More: - Hackers target their victims by first selecting financial advisor targets from the United States government's publicly available advisor certification records. Then they find biographical data on employer websites, professional histories on LinkedIn, and social media accounts. Some of the websites where hackers have stolen this information are FINRA's BrokerCheck and the SEC's Investment Adviser Public Disclosure.
- After creating fake profiles, they target victims on social media with video ads, emails, and other forms of communication to convince them to invest in schemes that promise to return large profits to them in a short period of time.
- Some campaigns have led their targets to impersonation websites that have live chat, allowing them to interact with what they believe is an investor.
- Researchers have found that many of these websites are being hosted by a company named SpeedHost247. While this company claims to be based in Canada, researchers have tied it with cellphone numbers used in Florida and Nigeria.
| |
Share ID has raised a $2.1M Seed round to detect the authenticity of government-issued documents that are uploaded online. More: - Share ID uses artificial intelligence to detect if there are any irregularities with government-issued documents that are uploaded online.
- The company claims its product is 99% accurate in detecting authenticity levels in these documents.
- Newfund led the Seed round with participation from 212 Founders.
- The company is based in Paris, France.
- Founded in 2020, this is the company's first significant funding round.
- In addition to its headquarters in Paris, the company has an office in San Francisco.
| |
Hadrian has raised a growth round to help companies identify weaknesses in their system and prioritize them based on their risk rating. The company is based in Amsterdam. More: - Hadrian provides automated security insights through its AI-driven SaaS platform. This platform tests the digital infrastructure of its users until it finds weaknesses that need to be patched.
- ABN AMRO Ventures led the funding round.
- The investment firm has backed companies such as:
- BehavioSec (exit in 2022),
- OpenInvest (exit in 2021),
- Penta (exit in 2022),
- Tink (exit in 2021),
- Trifacta (exit in 2022),
- DFNS,
- Doconomy,
- Oper,
- Quantexa,
- Solaris,
- and Upvest.
- Hadrian also has an office in London.
| |
Quick Hits: - We know that talent development is a major challenge. So we made a planner to lend a helping hand!*
- The Coast Guard has released a new cybersecurity guide named The Maritime Cybersecurity Assessment & Annex Guide.
- The Joint Cyber Defense Collaborative, a public-private cybersecurity group headed by CISA, will focus on the risks that the energy and water industry face during 2023.
- Security researchers have tracked a PlugX malware variant that can automatically infect any attached USB device.
- Microsoft has stated that a five-hour-long Microsoft 365 worldwide outage that happened this week was caused by a router IP address change.
- Looking for the right learning and development tools in 2023? Don't decide until you've read this comprehensive checklist.*
*This is sponsored content. | |
Upcoming events at Inside: - January 29 - Inside Interview with Lacework - 4 Common Attack Paths in Cloud Security (Register Here)
- January 30 - Inside Coffee Break (Register Here)
- January 31 - Inside Startups Coffee Break (Register Here)
- April 18 - Human Resources Summit'23 (Register Here)
| |
| | Arbër is an Inside writer who also has experience in entrepreneurship. He has experience covering Consumer Tech, Venture Capital, NFTs, Crypto, etc. Arbër holds a Bachelor's degree in Business from XAMK University in Finland. When he is not reading(and writing) business news, he chooses to watch sports or anime...and then read news about sports or anime. | | Editor | Aaron Crutchfield is based in the high desert of California. Over the last two decades, he has spent time writing and editing at various local newspapers and defense contractors in California. When he's not working, he can often be found looking at the latest memes with his kids or working on his 1962 and 1972 Fords. | |
|
767 Bryant St. #203, San Francisco, CA 94107 Copyright © 2023 Inside.com | |
|