Connect with us

Press Release

AN APPLICATION REQUIRES ADMINISTRATIVE REVIEW FOR GROUP POSTS, A PHOTO AND VIDEO OF VIOLENCE AT THE CAPITOL WILL BE REMOVED, AND MORE (TAYLOR HATMAKER/TECHCRUNCH).

Published

on

AN APPLICATION REQUIRES ADMINISTRATIVE REVIEW

Facebook will delete material that encourages violence at the Capitol, including images and videos of the incident, and group posts will now need admin approval. The U.S. Capitol building was broken into by a violent group of President Trump’s supporters, who were later praised in a video that was later taken down.

Continue Reading

Press Release

Ransomware assault costs $50 million on computer giant Acer

Published

on

Ransomware assault costs $50 million on computer giant Acer

Revil ransomware has attacked computer company Acer, and the threat actors are requesting the $50,000,000,000 ransom, which is the highest known ransom to date.

Acer is a well-known Taiwanese manufacturer of computers, electronics, and monitors. About 7,000 people work for Acer, which had revenue of $7.8 billion in 2019.

The ransomware gang said yesterday that they have infiltrated Acer and posted some screenshots of purportedly stolen files as evidence on their data leak website.

These documents, which contain financial spreadsheets, bank balances, and bank correspondence, were exposed through the use of leaked photos.

In response to BleepingComputer’s queries, Acer said that they “reported recent odd situations” to pertinent LEAs and DPAs but did not give a clear statement as to whether they had been the victim of a REvil ransomware assault.

Below is a link to their full response:

“Acer regularly checks its IT infrastructure, and the majority of hacks are successfully thwarted. Companies like ours are frequently targeted, and we have recently witnessed strange circumstances that we have notified to the appropriate law enforcement and data protection agencies in several different countries.”

“To ensure company continuity and information integrity, we have been steadily improving our cybersecurity infrastructure. We strongly advise all businesses and organisations to follow cyber security best practises and guidelines and to keep an eye out for any unusual network behaviour.” – Acer.

Acer responded to queries for additional information by saying “there is an ongoing investigation and for the sake of security, we are unable to comment on details.”

Known highest ransom demand
Following the release of our article, LegMagIT’s Valery Marchive found the REvil ransomware sample that was utilised in the Acer assault and demanded a huge $50 million ransom.

Soon after, BleepingComputer discovered the sample and is able to corroborate that it is from the onslaught on Acer based on the ransom message and the victim’s chat with the attackers.

Beginning on March 14th, the victim began speaking with REvil, who displayed disbelief at the victim’s enormous $50 million demand.

The REvil representative offered a link to the Acer data leak page later on in the chat, which was still under wraps at the moment.

A 20% discount was also provided by the assailants if payment was completed by this past Wednesday. The ransomware group would deliver a decryptor, a vulnerability report, and the destruction of the files they had stolen in exchange.

The REvil operation once issued a mysterious warning to Acer, telling them “not not repeat the fate of the SolarWind.”

The previous greatest known ransom was the $30 million extortion from the Dairy Farm cyberattack, which was also perpetrated by REvil. REvil’s 50 million demand is the largest known ransom to date.

Possibly exploited Microsoft Exchange
According to Vitali Kremez of BleepingComputer, the Revil gang recently targeted a Microsoft Exchange server on the Acer domain, which Advanced Intel’s Andariel cyberintelligence technology was able to identify.

Kremez told BleepingComputer that “Advanced Intel’s Andariel cyberintelligence technology noticed that one specific REvil affiliate pursued Microsoft Exchange weaponization.”

Although they are a smaller operation with fewer victims, the threat actors behind the DearCry ransomware have already deployed their ransomware via the ProxyLogon vulnerability.

If the current Microsoft Exchange flaws were utilised by REvil to steal data or encrypt devices, it would mark the first time one of the ransomware operations that targets large-scale threats used this kind of attack.

Continue Reading

Press Release

Sang Sultantoto

Published

on

Sang Sultantoto

If you’re trying to find Moenime Then, this is where you can locate several sources that provide in-depth information.

BANDAR TOGEL – TOGEL ONLINE HONGKONG, SULTANTOTO
To those who play togel, particularly those who play togel in Hong Kong, this statement applies: TOGEL ONLINE INDONESIA & BANDAR TOGEL HONGKONG. Togel is a very popular game in Indonesia and is played frequently. SULTANTOTO was established to give you the time and space to play Hong Kong togel and handle payments.

https://sangsultan.asia/
BANDAR TOGEL – TOGEL ONLINE HONGKONG, SULTANTOTO
Sultantoto bandar SGP, which emerged in recent years and now serves as a togel marketplace for all Indonesian online togel players, makes it easier for players to engage in togel play wherever they may be.

https://sangsultan.asia/wap
Bandar Togel Online Direkturtoto Penyedia DIREKTUR TOTO
Link Alternate: https://rebrand.ly/direkturtoto01 | https://rebrand.ly/direkturtoto02 | Bandar Togel Singapore dan Togel Hongkong Versi Togel WAP

https://sangdirektur.co/wap/permainan/play.html?

loc=gvszgvt7
I hope the materials mentioned above are useful in providing you with knowledge about sung sultantoto. If not, you can contact me through the comments.

Continue Reading

Press Release

Critical GitLab flaw permits account takeover by attackers

Published

on

Critical GitLab flaw permits account takeover by attackers

GitLab has patched a critical severity flaw that may have let remote attackers exploit hardcoded passwords to seize control of user accounts.

Both the Community Edition (CE) and Enterprise Edition of GitLab are impacted by the flaw, which was identified internally and is designated CVE-2022-1162 (EE).

During OmniAuth-based registration in GitLab CE/EE, static passwords were unintentionally set, which led to this vulnerability.

In a security advisory released on Thursday, the GitLab team stated that “a hardcoded password was set for accounts registered using an OmniAuth provider (e.g. OAuth, LDAP, SAML) in GitLab CE/EE versions 14.7 prior to 14.7.7, 14.8 prior to 14.8.5, and 14.9 prior to 14.9.2 allowing attackers to potentially take over accounts.”

In order to thwart such assaults, GitLab strongly advised users to update all GitLab installations right away to the most recent versions (14.9.2, 14.8.5, or 14.7.7).

We STRONGLY RECOMMEND UPGRADING TO THE LATEST VERSION AS SOON AS POSSIBLE FOR ALL INSTALLATIONS RUNNING A VERSION AFFECTED BY THE ISSUES DESCRIB

A code patch made two days ago reveals that GitLab removed the ‘lib/gitlab/password.rb’ file, which was used to give the ‘TEST DEFAULT’ constant a shoddy hardcoded password.

Some GitLab users had their passwords reset.
GitLab also stated that as part of the CVE-2022-1162 mitigation effort, it reset a select few GitLab.com users’ passwords.

Additionally, it did not discover any proof that any accounts had been compromised by hackers exploiting the hardcoded password security weakness.

As of 15:38 UTC, “We completed a reset of GitLab.com passwords for a chosen selection of users,” the GitLab staff stated.

Although there is no evidence to suggest that users’ or accounts’ security has been compromised, we are nonetheless taking precautions for our users’ safety.

A GitLab representative provided the information already included in the advisory with BleepingComputer when asked how many Gitlab.com users had their passwords reset, adding that they only did it for “a selected set of people.”

A programme to recognise affected user accounts
GitLab has developed a script that self-managed instance administrators can use to find user accounts that might be affected by CVE-2022-1162, despite the fact that the firm claims no user accounts have been compromised so far.

Administrators are urged to reset the users’ passwords after identifying any user accounts that might have been impacted.

GitLab claims that over 100,000 businesses utilise its DevOps platform, and it has over 30 million estimated registered users from 66 different nations.

Continue Reading

Trending