article thumbnail

How Did Authorities Identify the Alleged Lockbit Boss?

Krebs on Security

NEROWOLFE A search on the ICQ number 669316 at Intel 471 shows that in April 2011, a user by the name NeroWolfe joined the Russian cybercrime forum Zloy using the email address d.horoshev@gmail.com , and from an Internet address in Voronezh, RU. 2011 said he was a system administrator and C++ coder. “P.S. .”

article thumbnail

Stolen Nvidia certificates used to sign malware—here’s what to do

Malwarebytes

The two leaked Nvidia certificates have expired, being valid from 2011 to 2014 and 2015 to 2018. For system administrators, David Weston, Vice President of OS Security and Enterprise at Microsoft, has tweeted some guidance on how you can configure Windows Defender Application Control policies to control which Nvidia drivers can be loaded.

Malware 135
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Exclusive: Lighting the Exfiltration Infrastructure of a LockBit Affiliate (and more)

Security Affairs

Our investigation revealed that this remote endpoint is associated with criminal activities dating back to 2019, indicating that these hosts were likely under the control of the same technical administration. He is a former member of the ANeSeC CTF team, one of the firsts Italian cyber wargame teams born back in 2011.

Scams 145
article thumbnail

MY TAKE: Michigan’s Cyber Range hubs provide career paths to high-schoolers, underutilized adults

The Last Watchdog

Both were well-equipped to teach, test and train individuals ranging from teen-agers and non-technical adults, to working system administrators and even seasoned tech security pros. Rick Snyder had no idea these dynamics would unfold when he boldly made cybersecurity readiness a top priority upon taking office in 2011.

article thumbnail

Dissecting the malicious arsenal of the Makop ransomware gang

Security Affairs

The tool is basically a search engine for local and network shared files inside a Windows environment: unlike the default Windows search, it is designed to locate files and folders by filename instantly, speeding up system information discovery. Its name is YDArk and it is an open-source tool available even on GitHub ( link ).

article thumbnail

Updates from the MaaS: new threats delivered through NullMixer

Security Affairs

The Originating Malvertising Campaign According to CTI investigation on the adversary infrastructure, we were able to identify an ongoing campaign luring system administrators to install the malicious code into their machines. He is a former member of the ANeSeC CTF team, one of the firsts Italian cyber wargame teams born back in 2011.

Malware 98
article thumbnail

Will Autonomous Security Kill CVEs?

ForAllSecure

It evolved to a place where system administrators and cybersecurity professionals had to monitor several different lists, which didn’t scale well. Without this, it’s going to be hard for autonomous systems to go the extra mile and hook up to a public reporting system.