In this week’s Cyber Weekly Digest find out about the latest Window’s zero-day vulnerability CISA is urging agencies to patch, and the botnet behind the largest DDoS attack. Keep reading to stay up to date on the latest cyber security news from around the world.
The botnet behind the largest HTTPS distributed denial-of-service attack in June has been linked to a wave of attacks aimed at nearly 1,000 Cloudflare customers. Cloudflare noted that the botnet is Mantis and has carried out more than 3,000 HTTP DDoS attacks against its users. Cloudflare notes some key features of the botnet which makes is so powerful including, its ability to carry out HTTPS DDoS attacks, which are expensive in nature due to the computational resources required to establish a secure TLS encrypted connection. Secondly, Mantis leverages hijacked virtual machines and powerful servers, equipping it with more resources instead of IoT devices that traditional botnets rely on.
Maastricht University, a Dutch university with more than 22,000 students, announced that it had recovered the ransom paid after a ransomware attack that hit its network in December 2019. In 2019 the university decided to pay the ransom to have its files decrypted after deciding that rebuilding all infected systems from scratch or creating a decryptor were not viable options. The university paid a 30 bitcoin ransom for the ransomware decryptor. However, this week law enforcement traced and seized a wallet containing the cryptocurrency paid by the university. The value of the cryptocurrencies found at that time was €40,000 which at the current exchange rate, they are worth approximately €500,000. After recovering the money, the university has said it wants to create a fund that would allow the university to help students in need.
Cyber security firms are warning the public about an increase in phishing and credential harvesting around Amazon Prime Day deals. Threat actors are targeting users and consumers with phishing emails which promise an Amazon gift card in return for completing a survey. Researchers found that there has been a 37% increase in Amazon-related phishing attacks this month in comparison to June. All Amazon users should be extra mindful of any emails claiming to be from Amazon, especially as Amazon rarely sends out advertising emails.
Two ransomware gangs and a data extortion group have come up with a new strategy to force victim companies to pay threat actors to not leak stolen data. The threat actor’s websites now have search functions built in to make it easier to find victims or even specific details. More threat actors are likely to adopt this style of extortion. Many groups such as BlackCat and LockBit have created their own search functions to their websites, this allows for employees and users to search for their details and check if their information was a part of a data breach.