Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 11540

Checks for new stories every ~15 minutes

Title Summary
ROWS
2023-09-01 12:15:14 bleepingcomputer MALWARE Free Key Group ransomware decryptor helps victims recover data
Security experts at EclecticIQ have developed a decryption tool for Key Group ransomware The tool works for versions of the malware built in early August The ransomware uses a static salt in its encryption scheme, making it possible to reverse Key Group is a Russian-speaking threat actor that has attacked various organizations and uses private Telegram channels for ransom negotiations The ransomware appends the .KEYGROUP777TG file extension to all entries and deletes Volume Shadow copies to prevent system restoration Users can run the Python decryption script to search for anddecrypt files with the .KEYGROUP777TG extension, but should backup their data before doing so The release of the decryptor may prompt Key Group to improve the security of its ransomware
Details
2023-09-01 12:15:14 bleepingcomputer DATA BREACH LogicMonitor Customers Hacked in Reported Ransomware Attacks
LogicMonitor, a network monitoring company, confirms cyberattacks on some users of its SaaS platform The hacking campaign has affected a small number of users Anonymous sources reveal that threat actors hacked customer accounts, created local accounts, and deployed ransomware Ransomware was deployed using the platform's on-premise LogicMonitor Collector sensors The attacks targeting LogicMonitor's customers occurred last week LogicMonitor is investigating technical abnormalities impacting customer accounts Weak default passwords assigned by LogicMonitor to new users were exploited in the attacks LogicMonitor is sharing minimal information with users about the incidents
Details
2023-09-01 12:15:14 bleepingcomputer NATION STATE ACTIVITY North Korean Hackers Behind Malicious VMConnect PyPI Campaign
North Korean state-sponsored hackers are behind a campaign that uploaded malicious packages to the PyPI repository The packages impersonated popular software projects such as the VMware vSphere connector module vConnector The campaign is attributed to the Labyrinth Chollima subgroup of North Korean hackers known as Lazarus The malicious packages featured minimal differences from the originals and contained a malicious function for data collection Data collected from infected machines is sent to the attacker's command and control servers The campaign is linked to Lazarus based on evidence such as the payload decoding routine found in the malicious packages Attribution confidence is high due to similarities with other Lazarus subgroups and the malware they have been associated with
Details
2023-09-01 12:15:14 bleepingcomputer DATA BREACH Forever 21 Data Breach Exposes Personal Information of 500,000 Individuals
Forever 21, a clothing and accessories retailer, suffered a data breach that exposed the personal information of over 500,000 individuals Hackers had intermittent access to Forever 21 systems between January and March, and stole select files during this time The breach primarily affected current and former Forever 21 employees, not customers Forever 21 has taken steps to ensure the stolen data has been erased, indicating potential communication with the attackers There is no confirmation of a ransomware attack, and the company believes the risk to exposed individuals is low Impacted individuals will receive instructions on enrolling in a free 12-month fraud and identity theft protection service This is not the first data breach for Forever 21, as they previously notified customers of a breach in 2017 affecting payment card data from transactions made between March and October
Details
2023-09-01 12:15:14 bleepingcomputer DATA BREACH Sourcegraph Website Breached Due to Leaked Admin Access Token
The website of the AI-powered coding platform Sourcegraph was breached using a leaked admin access token. The token was accidentally leaked online on July 14th, and an attacker used it on August 28th to create a new site-admin account. The breach was discovered after an increase in API usage was observed by Sourcegraph's security team. The attacker probed Sourcegraph's system by switching account privileges multiple times. Sourcegraph customers' information, including license keys, names, and email addresses, was accessed, but no sensitive data such as private code or passwords was exposed. Sourcegraph took immediate action by deactivating the malicious account, reducing API rate limits, and rotating potentially exposed license keys.
Details