Tag

ransomware

0 views collected around this technical thread.

Java Architect Essentials
Java Architect Essentials
Oct 7, 2024 · Information Security

Insider Ransomware Attack by a Former Engineer: Case Study and Security Lessons

A disgruntled former infrastructure engineer at a U.S. industrial firm deleted backups, locked administrators, and demanded $750,000 in Bitcoin, leading to his arrest and highlighting the severe risks, legal consequences, and mitigation strategies associated with insider ransomware threats.

IT governanceIncident Responseinformation security
0 likes · 10 min read
Insider Ransomware Attack by a Former Engineer: Case Study and Security Lessons
IT Services Circle
IT Services Circle
Jul 8, 2022 · Information Security

Weak Passwords Lead to Massive AMD Data Breach: RansomHouse Exposes Security Lapses

A recent ransomware group called RansomHouse revealed that AMD suffered a massive data breach of over 450 GB due to employees using simple passwords like "admin" and "123456", highlighting the dangers of weak credentials and prompting urgent security awareness.

AMDdata breachinformation security
0 likes · 5 min read
Weak Passwords Lead to Massive AMD Data Breach: RansomHouse Exposes Security Lapses
Laravel Tech Community
Laravel Tech Community
Nov 11, 2020 · Information Security

Bitcoin Ransomware Cases and Police Crackdown in China

The article describes how Bitcoin‑based ransomware such as WannaRen encrypts victims' files, the large‑scale attacks on Chinese enterprises and institutions, the police investigations that led to the arrest of the mastermind Ju Mou and his accomplices, and practical advice for preventing such threats.

BitcoinData Recoverycybersecurity
0 likes · 7 min read
Bitcoin Ransomware Cases and Police Crackdown in China
Efficient Ops
Efficient Ops
Jan 16, 2020 · Information Security

What Are the Top 10 Cybersecurity Threats Predicted for 2020?

The article outlines ten major 2020 cybersecurity forecasts—including surging ransomware, sophisticated phishing, faster threat detection, expanding attack surfaces, emerging IoT security laws, stricter GDPR enforcement, OT security challenges, and the rise of managed security services—to help organizations prepare for the evolving threat landscape.

2020cybersecurityinformation security
0 likes · 13 min read
What Are the Top 10 Cybersecurity Threats Predicted for 2020?
Architects' Tech Alliance
Architects' Tech Alliance
Apr 9, 2019 · Information Security

GandCrab V5.2 Ransomware: Global Impact, Attack Methods, and Defense Strategies

GandCrab V5.2, a Bitcoin‑based ransomware first seen in 2018, has recently surged across Brazil, the US, India, Indonesia, Pakistan and especially China, using spam‑email delivery, web‑inject attacks and known vulnerabilities, while remaining largely uncrackable and prompting security teams to recommend strict email hygiene, patching, and anti‑malware measures.

CryptocurrencyGandCrabinformation security
0 likes · 7 min read
GandCrab V5.2 Ransomware: Global Impact, Attack Methods, and Defense Strategies
Architects' Tech Alliance
Architects' Tech Alliance
May 15, 2017 · Information Security

Ransomware Defense: Attack Vectors, C2 Communication, Defensive Chain, and Enterprise Security Gaps

This article provides an in‑depth analysis of ransomware, detailing its typical propagation methods, common intrusion techniques, C2 communication behaviors, the defensive chain across reconnaissance, deployment and persistence stages, and highlights current enterprise security gaps and comprehensive protection strategies.

C2 communicationEnterprise Securityinformation security
0 likes · 13 min read
Ransomware Defense: Attack Vectors, C2 Communication, Defensive Chain, and Enterprise Security Gaps
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
May 14, 2017 · Information Security

How to Analyze and Recover from the WannaCry Ransomware Attack

This article summarizes the latest technical analysis of the WannaCry ransomware, offers official prevention guidelines, and provides step‑by‑step recovery tools to help victims restore encrypted files as quickly as possible.

Data RecoveryWannaCryinformation security
0 likes · 3 min read
How to Analyze and Recover from the WannaCry Ransomware Attack
Architects' Tech Alliance
Architects' Tech Alliance
May 13, 2017 · Information Security

WannaCry Ransomware Attack: Overview, Vulnerabilities, and Defense Strategies

The article explains the global outbreak of the WannaCry ransomware in May 2017, its exploitation of the SMB MS17-010 vulnerability (EternalBlue), the impact on governments, schools and hospitals, and provides detailed technical analysis and recommended security measures to prevent such attacks.

SMB vulnerabilityWannaCryinformation security
0 likes · 12 min read
WannaCry Ransomware Attack: Overview, Vulnerabilities, and Defense Strategies
Tencent Cloud Developer
Tencent Cloud Developer
Mar 10, 2017 · Information Security

Automated Exploitation of Common Vulnerabilities: MongoDB Ransomware, Struts2, Redis, and ElasticSearch Cases

The article shows how attackers automate mass exploitation of widely‑known flaws—scanning the Internet for open MongoDB, Redis, ElasticSearch or Struts2 services, using unauthenticated access or public PoCs to encrypt data, execute code, or build botnets, and stresses that timely patching and secure defaults are essential to stop such N‑day attacks.

ElasticsearchMongoDBRedis
0 likes · 11 min read
Automated Exploitation of Common Vulnerabilities: MongoDB Ransomware, Struts2, Redis, and ElasticSearch Cases
Tencent Cloud Developer
Tencent Cloud Developer
Mar 1, 2017 · Information Security

MySQL Ransomware Attacks: Security Analysis and Hardening Guide

MySQL has become a ransomware target because many servers expose the database to the internet with empty or weak passwords, so administrators should audit open ports, enforce strong authentication, restrict access via security groups or iptables, bind services to internal IPs, and avoid using root or high‑privilege accounts to harden MySQL, MongoDB, and Redis against compromise.

MongoDB hardeningMySQL securityRedis security
0 likes · 8 min read
MySQL Ransomware Attacks: Security Analysis and Hardening Guide