BLUE
Profile banner
AV
AJ Vicens
@ajvicens.bsky.social
Reporter at CyberScoop covering state-aligned threats and cybercrime. Will bore you with skateboarding and UFO on request. Signal: 810.206.9411 or tinyurl.com/yrfasxfs
636 followers650 following99 posts
AVajvicens.bsky.social

He just did, and that's why I'm back!

0
AVajvicens.bsky.social

👋

1
AVajvicens.bsky.social

Turned out to be a good episode! LGs are too-tier in my book

0
AVajvicens.bsky.social

There was a bit of tax fraud, yes! www.bbc.com/news/world-e...

1
AVajvicens.bsky.social

This is wild!

0
Reposted by AJ Vicens
JKjkirk.bsky.social

The FBI responded to suggestions it wasn't doing enough about The Com: “Just because you don’t see actions being taken, it doesn’t mean there aren’t actions being taken,” a senior FBI official said on the call. By @ajvicens.bsky.socialcyberscoop.com/fbi-scattere...#infosec

U.S. officials urge more information sharing on prolific cybercrime group
U.S. officials urge more information sharing on prolific cybercrime group

An aggressive ransomware group has hit a series of prominent targets in recent months without any arrests being made.

0
Reposted by AJ Vicens
Iintel471.bsky.social

Ragnar or one of its affiliates recently attacked a health care facility in Israel. The group claimed to not have used encrypting malware against the facility’s critical servers “to avoid any harm to your patients.” Nonetheless, the group publicly released patient data and personnel information.

0
Reposted by AJ Vicens
Iintel471.bsky.social

Ragnar Locker was a ransomware-as-a-service group, but it appeared to closely vet its affiliates to known actors in the underground. It wasn’t one of the most prolific attack groups but nonetheless listed more than 150 victims on its data leak site over four years. #infosec

1
Reposted by AJ Vicens
Iintel471.bsky.social

The group also used the double-extortion technique, asking for a ransom for both the decryption key and to stop release of the data (the Maze group pioneered this; the two groups seem to have some cooperation at one time). #infosec

1
Reposted by AJ Vicens
Iintel471.bsky.social

When Ragnar started in late 2019, it didn’t use anti-debugging or anti-virtual machine techniques in its ransomware to halt analysis. Its operators appeared to have a good knowledge of offensive security techniques, and the ransomware was manually deployed by operators. #infosec

1
Profile banner
AV
AJ Vicens
@ajvicens.bsky.social
Reporter at CyberScoop covering state-aligned threats and cybercrime. Will bore you with skateboarding and UFO on request. Signal: 810.206.9411 or tinyurl.com/yrfasxfs
636 followers650 following99 posts