Skip to main content
News

Cyber News Rundown: LockBit restores operations after law enforcement takedown

Cyber News Rundown: LockBit restores operations after law enforcement takedown
Forum|alt.badge.img+7
  • Threat Research Analyst
  • 4 replies

Just days after the global law enforcement takedown of LockBit ransomware was revealed, the threat actors behind the group have confirmed that they re-established a victim data leak site and dismissed a sizable portion of the information that the FBI released. As law enforcement attempts to further crack down on the global ransomware epidemic, the threat actors continue to learn from the takedowns and are improving their tactics to avoid future incidents.

See our writeup of the incident here:

Media not available

 

Insomniac Games employees affected by data breach

Officials for Insomniac Games have recently begun contacting current and former employees regarding a data breach from last November by the Rhysida ransomware group, who failed in their ransom negotiations. The stolen data included sensitive intellectual property and employee data, which has since been leaked and sold on their dark web site. Along with creating a call center for employees with questions regarding the incident, they have also offered credit and identity monitoring services for all affected individuals.

Cyberattack compromises data of pharmaceutical provider, Cencora

Last week, officials for the pharmaceutical solutions provider, Cencora, confirmed that they had fallen victim to a cyberattack that exfiltrated data from their systems, though they haven't identified if it includes employees or customers. Currently, no ransomware group has claimed responsibility for the incident, as the investigation continues into how many systems were compromised or what type of information was accessed.

67,000 U-Haul customers impacted by data breach

Staff at U-Haul have recently started notifying nearly 67,000 customers of a data breach that lasted for several months last year, though they didn’t discover the intrusion until December. The investigation revealed that the unknown threat actor used legitimate credentials to access employee systems and compromised customer records and sensitive reservation data. Fortunately, officials have confirmed that no payment card data was accessed during the breach, though they are offering credit and identity monitoring to impacted customers.

BlackCat ransomware targets Optum pharmacy solutions

Following the December takedown of BlackCat ransomware leak sites and systems, the threat group have resurged with an increased directive to target healthcare organizations, an industry that they previously avoided out of acknowledgement for life-saving services. Their latest victim is Optum Solutions, which is a subsidiary of UnitedHealth, and provides payment exchange services for healthcare operations. Many of their systems have been taken offline to halt any further access but have impacted pharmacies across the US.

Did this help you find an answer to your question?

11 replies

TripleHelix
Moderator
Forum|alt.badge.img+63
  • Moderator
  • 8905 replies
  • March 1, 2024

Good stuff and thanks @ConnorM 👍


Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54

Thank you @ConnorM , great article.


ProTruckDriver
Moderator

Informative article. Thank you Connor.


Forum|alt.badge.img+1
  • New Member
  • 56 replies
  • March 1, 2024

Good info cheers Connor 


russell.harris
Popular Voice
Forum|alt.badge.img+5

Great article as always. Thanks @ConnorM 


Robis
New Member
Forum|alt.badge.img+1
  • New Member
  • 74 replies
  • March 2, 2024

Thank You Connor.


Martin.1
Popular Voice
Forum|alt.badge.img+4
  • Popular Voice
  • 424 replies
  • March 4, 2024
ConnorM wrote:

Just days after the global law enforcement takedown of LockBit ransomware was revealed, the threat actors behind the group have confirmed that they re-established a victim data leak site and dismissed a sizable portion of the information that the FBI released. As law enforcement attempts to further crack down on the global ransomware epidemic, the threat actors continue to learn from the takedowns and are improving their tactics to avoid future incidents.

See our writeup of the incident here:

Media not available

 

Insomniac Games employees affected by data breach

Officials for Insomniac Games have recently begun contacting current and former employees regarding a data breach from last November by the Rhysida ransomware group, who failed in their ransom negotiations. The stolen data included sensitive intellectual property and employee data, which has since been leaked and sold on their dark web site. Along with creating a call center for employees with questions regarding the incident, they have also offered credit and identity monitoring services for all affected individuals.

Cyberattack compromises data of pharmaceutical provider, Cencora

Last week, officials for the pharmaceutical solutions provider, Cencora, confirmed that they had fallen victim to a cyberattack that exfiltrated data from their systems, though they haven't identified if it includes employees or customers. Currently, no ransomware group has claimed responsibility for the incident, as the investigation continues into how many systems were compromised or what type of information was accessed.

67,000 U-Haul customers impacted by data breach

Staff at U-Haul have recently started notifying nearly 67,000 customers of a data breach that lasted for several months last year, though they didn’t discover the intrusion until December. The investigation revealed that the unknown threat actor used legitimate credentials to access employee systems and compromised customer records and sensitive reservation data. Fortunately, officials have confirmed that no payment card data was accessed during the breach, though they are offering credit and identity monitoring to impacted customers.

BlackCat ransomware targets Optum pharmacy solutions

Following the December takedown of BlackCat ransomware leak sites and systems, the threat group have resurged with an increased directive to target healthcare organizations, an industry that they previously avoided out of acknowledgement for life-saving services. Their latest victim is Optum Solutions, which is a subsidiary of UnitedHealth, and provides payment exchange services for healthcare operations. Many of their systems have been taken offline to halt any further access but have impacted pharmacies across the US.

@ConnorM  Thank you for the update, interesting read. 


AsadP
New Voice
Forum|alt.badge.img+1
  • New Voice
  • 56 replies
  • March 4, 2024

Thanks for great read Connor!


Thanks for posting this article.  Very informative.


kleinmat4103
Popular Voice
Forum|alt.badge.img+6
  • Popular Voice
  • 512 replies
  • March 4, 2024

Thanks for the weekly rundown. Always very informative.


FasteasyPhil
New Member
Forum|alt.badge.img+3

thx connor


Reply