![]() BlackCat attacks usually involve encryption and theft of data if victims refuse to pay a ransom, the attackers typically publish the stolen data on a BlackCat-linked darknet site.īlackCat formed by recruiting operators from several competing or disbanded ransomware organizations - including REvil, BlackMatter and DarkSide. The DOJ reports that since BlackCat’s formation roughly 18 months ago, the crime group has targeted the computer networks of more than 1,000 victim organizations. “We will continue to prioritize disruptions and place victims at the center of our strategy to dismantle the ecosystem fueling cybercrime.” “With a decryption tool provided by the FBI to hundreds of ransomware victims worldwide, businesses and schools were able to reopen, and health care and emergency services were able to come back online,” Deputy Attorney General Lisa O. Department of Justice says the FBI developed a decryption tool that allowed agency field offices and partners globally to offer more than 500 affected victims the ability to restore their systems. BlackCat eventually managed to bring its site back online, blaming the outage on equipment malfunctions.īut earlier today, the BlackCat website was replaced with an FBI seizure notice, while federal prosecutors in Florida released a search warrant explaining how FBI agents were able to gain access to and disrupt the group’s operations.Ī statement on the operation from the U.S. Whispers of a possible law enforcement action against BlackCat came in the first week of December, after the ransomware group’s darknet site went offline and remained unavailable for roughly five days. Continue reading →Ī slightly modified version of the FBI seizure notice on the BlackCat darknet site (Santa caps added). Which of course made my week, and made me feel more at ease among the suits. Graham laughed and told me that was the best thing he’d heard all day. I was 23 years old, and I had no clue what to say except to tell him that paper route story, and that I’d already been working for him for half my life. “Hey Brian, not so fast! Come over and meet Don!” After wolfing down some food, I tried to slink away to the elevator with another copy aide, but was pulled aside by the guy who hired me. On the evening of my new hires dinner, I was feeling underdressed, undershowered and out of place. True story: At the time I was hired as a lowly copy aide by The Washington Post, all new hires - everyone from the mailroom and janitors on up to the executives - were invited to a formal dinner in the Executive Suite with the publisher Don Graham. (as a young teen, I inherited a largish paper route handed down from my elder siblings). Of course, not if you count the many years I worked as a paperboy schlepping The Washington Post to dozens of homes in Springfield, Va. ![]() But I do want to thank you all for your continued readership, encouragement and support, without which I could not do what I do.Īs of this birthday, I’ve officially been an independent investigative journalist for longer than I was a reporter for The Washington Post (1995-2009). ![]() Nor do I wish to hold forth about whatever cyber horrors may await us in 2024. KrebsOnSecurity celebrates its 14th year of existence today! I promised myself this post wouldn’t devolve into yet another Cybersecurity Year in Review. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |