The U.S. FBI and international partners in Germany and the Netherlands seized multiple servers allegedly belonging to ransomware group Hive, CyberScoop reports. Hive, "considered a top-five ransomware threat by the FBI," allegedly targeted more than 1,500 victims globally since June 2021. The group allegedly offered its malware to other ransomware actors by selling “ransomware-as-a-service.� FBI Director Christopher Wray said only 20% of observed Hive victims reached out to law enforcement.
Full Story

The healthcare industry is transforming patient care through software, from 24/7 digital patient portals, to AI-fueled medical research, and everything in between. As innovation reaches new heights, how does healthcare stack up against other sectors in terms of software security flaws and the ability to remediate them? Our latest State of Software Security Report found that 77 percent of applications in this sector have vulnerabilities – a slight uptick from last year’s 75 percent – with 21 percent considered high severity. Healthcare takes first place for fixing flaws at 27 percent. Developers in the space should be applauded for tackling complex authentication issues and insecure dependencies with success over the last 12 months. When clocking the time it takes to remediate flaws found by static analysis (SAST), dynamic analysis (DAST), and software composition analysis (SCA), healthcare organizations fall right in the middle of the pack. It’s also worth mentioning that healthcare…

A ransomware named Play hit an entire judiciary system, therefore forcing the officials to shut down the IT systems since August 13th 2022. Argentina Judiciary of Cordoba is a government-based service that was hit by the malware last week, forcing the officials to use pen and paper for submitting official documents and to purview other administrative tasks.

Cadena 3, a news resource from Argentina, confirmed the attack on the Judiciary system and stated that a cyberattack contingency plan was activated to recover the IT systems and online portal from the pangs of the digital attack.

Microsoft, Cisco, Trend Micro and a third-party firm were hired to investigate the attack, confirm sources.

How the ransomware entered the IT infrastructure of the Court of Cordoba is apparently being investigated, as unconfirmed sources suspect the hand of an insider. As all the encrypted files are ending with (.) play extension, Argentinian Cadena 3 concluded that the attack could have been targeted by Play Ransomware group that was first discovered in June 2022.

The other news that is related to ransomware and trending on Google is about a water utility that supplies drinking water to customers.

South Staffordshire water utility claims that cyber criminals belonging to a noted extortion gang tried their best to compromise the water being supplied to Cambridge Water and South Staffs water customers. However, the cyber criminals failed to take over the control of the supply systems, as the water utility was having robust cyber security measures in place to tackle and neutralize such incidents.

CLOP Ransomware gang is suspected to be behind the attack, as they have posted some stolen documents on the dark web, alleging to have siphoned from the servers of South Staffordshire.

More details are awaited!

 

The post Play Ransomware attack news and Extortion Attempt on Water utility appeared first on Cybersecurity Insiders.