Auth Lab Community

Auth Lab Weekly Security Report

Blackbyte Gang Makes A Comeback With New Extortion Method

According to the Bleeping Computer, the BlackByte ransomware is back with version 2.0. The new version has undergone numerous upgrades, mainly including the creation of a new data breach website using new ransomware techniques borrowed from LockBit.

It’s no secret that new ransomware techniques emerge primarily to get victims to pay to delete their data, or to get other attackers to voluntarily buy that data. These ransomware tactics were also introduced when LockBit released its 3.0 version, but were seen as a gimmick rather than a viable ransomware.

Read More

A New Record of Identity Fraud Cases was set on 2021

Google Voice scams set a new record for identity-related fraud in 2021, according to the Identity Theft Resource Center (ITRC). The nonprofit said it received 14,947 reports from consumers in 2021, a 26 percent increase from 2020 and the most it has ever processed. Of these reports, half (50%) were victims of scams: that is, they shared personally identifiable information (PII) with the attackers. More than half (53%) of this group included Google Voice scams, making it the most popular type of scam this year.

Fraudsters often look for victims who sell goods online. They would send the target a Google verification code and ask the victim to share that code – ostensibly to verify that they are a “real” seller. In fact, if the victim does this, their phone number will be associated with a newly created fraudulent Google Voice account, which the fraudster then uses to move on to the next target.

Read More

Hacker Developed A  Bugdrop Malware That Bypasses Android Security Defense

Han Sahin of Dutch cybersecurity firm ThreatFabric said in a report that the malware attempts to infect devices using a new technology first seen to spread the extremely dangerous Xenomorph banking trojan, allowing criminals to dig into victims’ devices. Fraud attack on device.

Dubbed BugDrop by ThreatFabric, the malware is a dropper application that was designed for the very specific purpose of responding to a new feature introduced by the Android system update: making it difficult for malware to request accessibility services from victims.

ThreatFabric believes that the BugDrop malware is behind the notorious “Hadoken Security” cybercriminal group, which is also behind a series of Android malware such as Xenomorph/Gymdrop.

 

Read More

Cs:Go Trading Site Hacked, $6 Million Worth Of Skins Stolen

On August 16th, CS.MONEY, one of the largest skin trading platforms for the famous shooting game CS:GO, was stolen 20,000 game skins with a total value of about 6 million US dollars after a hacker attack, and the website was forced to be offline.

According to a post by Timofey Sobolevky, head of public relations at CS.MONEY, the attackers somehow gained access to the Mobile Authenticator (MA) file used for Steam authorization. Next, the attackers took control of 100 bot accounts and made about a thousand transactions to sink the items into their own accounts.

Read More

Cisa, Fbi Issue Joint Advisory Warning Of Zeppelin Ransomware Attack

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have issued a joint advisory warning of the Zeppelin ransomware attack.

Zeppelin ransomware first appeared in the threat landscape in November 2019, when experts from BlackBerry Cylance discovered a new variant of the Vega RaaS called Zeppelin. The ransomware involves attacks against technology and healthcare, defense contractors, educational institutions, manufacturers, companies in Europe, the US and Canada. Zeppelin was discovered when it was distributed through a watering hole attack, in which the PowerShell payload was hosted on the Pastebin website.

Read More