Remote encryption ransomware attackers scour for weakness

Dec 21 2023

Gone Phishing Banner

Welcome to Gone Phishing, your daily cybersecurity newsletter thatโ€™s counting on Santaโ€™s little hackers to deliver the #EpsteinClientList for Christmas ๐Ÿ‘€๐Ÿ’€๐Ÿคฎ

Todayโ€™s hottest cybersecurity news stories:

  • ๐Ÿ“ก Remote encryption ransomware attackers scour for weakness ๐ŸŽฏ

  • ๐Ÿ“ Product review: Memcycoโ€™s fight against website spoofing ๐Ÿ‘จโ€๐Ÿ’ป

  • ๐Ÿ‘ฎ 3500 cyber criminals nicked by Interol in global campaign ๐ŸŒŽ

Hackers: You are the weakest link, goodbye hello ๐Ÿ’€๐Ÿ’€๐Ÿ’€

๐Ÿ”’ Ransomware Alert: Rise of Remote Encryption Attacks! ๐Ÿ”’

Ransomware groups are now employing remote encryption tactics, a game-changer in their pursuit of financial gains. ๐Ÿ’ป๐Ÿ”“

According to Mark Loman, VP of Threat Research at Sophos, the shift to remote ransomware poses a severe threat. With just one vulnerable device, entire networks can be compromised! ๐Ÿ˜ฑ๐ŸŒ

Microsoft reports that a whopping 60% of ransomware attacks now involve malicious remote encryption, aiming to reduce their footprint. Unmanaged devices contribute to over 80% of these compromises. ๐Ÿšจ๐Ÿ“ˆ

Notorious ransomware families like Akira, BlackMatter, and Royal are embracing this technique, rendering process-based remedies useless. The trend signals a broader shift in cybercrime, with actors adopting atypical languages, targeting diverse systems, and launching attacks strategically after business hours. ๐ŸŒ๐Ÿ’ผ

A recent report by Sophos unveils the intriguing relationship between ransomware gangs and the media. Gangs leverage media to control narratives, correct inaccuracies, and even interact with journalists through dedicated PR channels. The professionalisation of cybercrime is evident, with catchy names and slick graphics becoming commonplace. ๐Ÿ“ฐ๐Ÿ‘ฅ

Moreover, ransomware groups, including Conti and Pysa, are showcasing organisational structures akin to legitimate businesses. There are even signs of recruitment for English writers, highlighting a disturbing evolution in cybercriminal tactics. ๐Ÿ•ต๏ธโ€โ™‚๏ธ๐Ÿ’ผ

Stay vigilant, protect your networks, and beware of the evolving landscape of cyber threats! ๐Ÿ”’๐ŸŒ

Your SOC 2 Compliance Checklist from Vanta

Are you building a business? Achieving SOC 2 compliance can help you win bigger deals, enter new markets and deepen trust with your customers โ€” but it can also cost you real time and money.

Vanta automates up to 90% of the work for SOC 2 (along with other in-demand frameworks), getting you audit-ready in weeks instead of months. Save up to 400 hours and 85% of associated costs.

Download the free checklist to learn more about the SOC 2 compliance process and the road ahead.

Memcyco for life-o ๐Ÿ˜๐Ÿ™ˆ๐Ÿ˜‚

๐Ÿ›ก๏ธ Review: Memcyco's Cutting-Edge Website Spoofing Protection! ๐Ÿ›ก๏ธ

As website impersonation becomes a rampant threat, with a new phishing site emerging every 11 seconds in 2023, organisations face the challenge of unseen attacks. Traditional takedown solutions often leave fake sites active during the critical exposure window, leading to financial scams and data breaches.

๐Ÿ” Exposing the Challenge of Unseen Threats ๐Ÿ”

Despite heavy investments in threat intelligence, companies lack visibility into the scope of attacks and compromised user details. Memcyco's solution addresses this gap, providing real-time protection from the moment the attack window opens.

๐ŸŒŸ Redefining Protection with Memcyco ๐ŸŒŸ

Memcyco's Real-Time Website Spoofing Protection Solution introduces Proof of Source Authenticity (PoSAโ„ข), ensuring protection regardless of the attack duration. The agentless installation offers simplicity, securing websites within minutes.

๐Ÿš€ Safeguarding Simplicity with Memcyco's Features ๐Ÿš€

  • Real-Time Detection: Memcyco immediately alerts security teams upon attempted access to spoofed sites.

  • PoSAโ„ข Technology: Alerts on reconnaissance efforts, providing a proactive defence.

  • Digital Watermark: Personalised and memorable user authentication, enhancing trust.

  • Back-End Dashboard: Comprehensive tools for real-time monitoring and post-attack analysis.

  • SIEM Integration: Seamless integration for workflow activation and rapid response.

๐Ÿ›ก๏ธ Memcyco's Benefits in Defending Against Website Impersonation ๐Ÿ›ก๏ธ

  • Less data leakage and privacy issues.

  • Reduced financial losses for customers.

  • Lower costs for companies.

  • Improved customer retention and engagement.

  • Support in regulatory compliance.

  • Protection of brand reputation.

๐Ÿ”’ Summarising Memcyco's Solution ๐Ÿ”’

Memcyco emerges as a game-changer, offering maximum attack visibility and protection, redefining the landscape of phishing, website spoofing, and account takeovers. Stay secure with Memcyco's real-time capabilities! ๐Ÿ’ป๐ŸŒ

๐ŸŽฃ Catch of the Day!! ๐ŸŒŠ๐ŸŸ๐Ÿฆž

๐Ÿƒย The Motley Fool: โ€œFool me once, shame on โ€” shame on you. Fool me โ€” you can't get fooled again.โ€ Good olโ€™ George Dubya ๐Ÿ˜‚ Let us tell whoโ€™s not fooling around though; thatโ€™s the Crรผe ๐Ÿ‘€ at Motley Fool. Youโ€™d be a fool (alright, enough already! ๐Ÿ™ˆ) not to check out their Share Tips from time to time so your savings can one day emerge from their cocoon as a beautiful butterfly! ๐Ÿ› Kidding aside, if you check out their website theyโ€™ve actually got a ton of great content with a wide variety of different investment ideas to suit most budgets ๐Ÿค‘ย (LINK)


๐Ÿšตย Wander: Find your happy place. Cue Happy Gilmore flashback ๐ŸŒ๏ธโ›ณ๐ŸŒˆ๐Ÿ•Š๏ธ Mmmm Happy Placeโ€ฆ ๐Ÿ˜‡ So, weโ€™ve noticed a lot of you guys are interested in travel. As are we! We stumbled upon this cool company that offers a range of breath-taking spots around the United States and, honestly, the website alone is worth a gander. When all you see about the Land of the free and the home of the brave is news of rioting, looting and school shootings, itโ€™s easy to forget how beautiful some parts of it are. The awe-inspiring locations along with the innovative architecture of the hotels sets Wander apart from your run of the mill American getaway ๐Ÿž๏ธ๐Ÿ˜ย (LINK)


๐ŸŒŠย Digital Ocean: If you build it they will come. Nope, weโ€™re not talking about a baseball field for ghosts โšพ๐Ÿ‘ป๐Ÿฟ (Great movie, to be fair ๐Ÿ™ˆ). This is the Digital Ocean whoโ€™ve got a really cool platform for building and hosting pretty much anything you can think of. If you check out their website youโ€™ll find yourself catching the buzz even if you canโ€™t code (guilty ๐Ÿ˜‘). But if you can and youโ€™re looking for somewhere to test things out or launch something new or simply enhance what youโ€™ve got, weโ€™d recommend checking out their services foโ€™ sho ๐Ÿ˜‰ And how can you not love their slogan: Dream it. Build it. Grow it. Right on, brother! ๐ŸŒฟย (LINK)

Woop, Woop, Itโ€™s the sound of the Interpolice ๐Ÿšจย ๐Ÿšจย ๐Ÿšจ

๐Ÿšจ Operation HAECHI-IV: Massive Success in Fighting Financial Crimes! ๐ŸŒ๐Ÿ’ผ

In a six-month-long mission spanning 34 countries, Operation HAECHI-IV has led to the arrest of nearly 3,500 individuals involved in a variety of financial crimes. ๐ŸŒ๐Ÿ’ฐ

From July to December 2023, authorities targeted offences like voice phishing, romance scams, online sextortion, and more. A whopping $300 million in seizures showcases the operation's effectiveness against transnational organised crime. ๐Ÿ’ช๐Ÿ’ผ

Cooperation between Filipino and Korean authorities resulted in the arrest of a high-profile online gambling criminal in Manila, ending a two-year manhunt. ๐Ÿ’ป๐Ÿš“

Notably, investment fraud, business email compromise, and e-commerce fraud constituted 75% of the cases. A new scam involving the sale of non-fungible tokens (NFTs) in South Korea was also detected, highlighting the evolving tactics of criminals. ๐Ÿ›ก๏ธ๐Ÿ’”

Operation HAECHI-IV uncovered the use of artificial intelligence (AI) and deepfake technology to enhance scam authenticity. Criminals impersonated known individuals, leading to scams involving online sexual blackmail, investment fraud, and more. ๐Ÿ•ต๏ธโ€โ™‚๏ธ๐Ÿคฏ

This success follows HAECHI-III's crackdown, seizing $130 million in virtual assets. Interpol emphasises the urgent need to combat unlawful wealth accumulation, labelling it a serious threat to global security and economic stability. ๐ŸŒ๐Ÿ’”๐Ÿ’ผ

Stay vigilant against evolving financial crimes! ๐Ÿ’ณ๐Ÿšซ Always nice to see hackers get whatโ€™s coming to them ๐Ÿฅ‚

๐Ÿ—ž๏ธ Extra, Extra! Read all about it!

Every few weeks, we carefully select three hot newsletters to show you. Reputation is everything, so any links we share come from personal recommendation or carefully researched businesses at the time of posting. Enjoy!

  • The GeekAI: A daily 3 min newsletter on what matters in AI, with all the new AI things coming to market its good to stay ahead of the curve.

  • Libby Copa:ย The Rebel Newsletter helps writers strengthen their writing and creative practice, navigate the publishing world, and turn their art into an act of rebellion.

  • Techspresso:ย Receive a daily summary of the most important AI and Tech news, selected from 50+ media outlets (The Verge, Wired, Tech Crunch etc)

Let us know what you think!

So long and thanks for reading all the phish!

Recent articles