Several days ago Riot Games announced they were victim to a "social engineering attack". They stated they were being extorted for $10,000,000. Riot Games refused to pay the ransom
The source code to League of Legends is now up for sale online
The source code to League of Legends is now up for sale online
๐คช50๐5๐3๐2
The individual responsible for the Riot Games breach has given us more information
- Social engineered an employee via SMS
- Initial goal was stealing Vanguard
- They pivoted through the network, was unable to get Domain Controller
- SOC detected them in approx. 36 hours
- Social engineered an employee via SMS
- Initial goal was stealing Vanguard
- They pivoted through the network, was unable to get Domain Controller
- SOC detected them in approx. 36 hours
๐
37๐9๐6
vx-underground
The individual responsible for the Riot Games breach has given us more information - Social engineered an employee via SMS - Initial goal was stealing Vanguard - They pivoted through the network, was unable to get Domain Controller - SOC detected them inโฆ
- They did not deploy any malware to the network
- Managed to escalate privileges by social engineering a company director
- They stated they would not give us more information at this time, more information will be shared in the following days
There is your free DFIR report
- Managed to escalate privileges by social engineering a company director
- They stated they would not give us more information at this time, more information will be shared in the following days
There is your free DFIR report
โค41๐6๐4๐2โก1๐1
This media is not supported in your browser
VIEW IN TELEGRAM
Threat Intelligence the second a significant breach occurs
๐คฃ65๐คก8๐3๐2๐1
Microsoft has announced it intends on modernizing Windows Explorer
This is a preview image that has been released.
This is a preview image that has been released.
๐คฎ141๐ฟ20๐คก12๐4๐3๐ค1๐1
The United States Department of Justice has stated in their official press conference, regarding the disruption of HIVE ransomware group infrastructure, that they "hacked the hackers" to disrupt their operations and infrastructure. They state they have decrypted 1,500 companies.
โคโ๐ฅ18๐คช8๐6๐5๐3๐คก3๐1
This is the 2nd time, that we are aware of, that the United States Department of Justice, has admitted to using offensive operations to take down, or disrupt, ransomware groups.
The DoJ has announced that they are now focusing their efforts on HIVE affiliates and developers.
The DoJ has announced that they are now focusing their efforts on HIVE affiliates and developers.
๐คก5๐2๐ฅฐ1๐1
Conspiracy theories galore online right now as people speculate that the NSA used a 0day exploit to compromise HIVE. Others suggest it was an inside job - an admin at HIVE leaked information to EUROPOL agents.
Reality: Phishing (probably)
Reality: Phishing (probably)
๐24๐ค9โค6๐4๐ฅ3๐2
Ransomware group comment to the HIVE take down:
ALPHV: This would not work on us, we have too strong security and we do not store anything on our servers
BianLian: Too bad. I think they will be restored under a new name
Lockbit: Nice news. I love when FBI pwn my competitors
ALPHV: This would not work on us, we have too strong security and we do not store anything on our servers
BianLian: Too bad. I think they will be restored under a new name
Lockbit: Nice news. I love when FBI pwn my competitors
๐คฃ66๐ฅ12๐5๐3๐ฉ3๐1
Lockbit ransomware group has informed us they have acquired a 3rd ransomware variant.
- Lockbit Red
- Lockbit Black
- Lockbit Green
They also have modified their ESXI ransomware variant.
Yes, they actually wrote "TLP:RED" in the image.
- Lockbit Red
- Lockbit Black
- Lockbit Green
They also have modified their ESXI ransomware variant.
Yes, they actually wrote "TLP:RED" in the image.
๐19โคโ๐ฅ7๐คก6๐3
