Category: Heimdal Security Blog

RailYatri Data Breach Leaves Over 30 Million Users Exposed

Over 31 million people’s personal information was exposed as a result of a massive data breach at RailYatri, India’s government-approved online travel agency. An online database of private information has been released, and it is thought the breach occurred late…

Companies Affected by Ransomware [2022-2023]

The increasing frequency and size of ransomware attacks are becoming a huge concern for thousands of organizations globally. All over the world, threat actors take advantage of security vulnerabilities and encrypt data belonging to all sorts of organizations: from private…

Indian Government Agencies Targeted by Updated ReverseRAT Backdoor

An updated version of a backdoor called ReverseRAT is being deployed through spear-phishing campaigns targeting Indian government entities. Cybersecurity firm ThreatMon attributed the activity to a threat actor called SideCopy. Known for copying the infection chains associated with SideWinder to deliver…

Europol Shuts Down a Franco-Israeli CEO Fraud Group

Europol put an end to the operations of a Franco-Israeli CEO fraud group. The threat actors used business email compromise (BEC) attacks to steal money. This led to €38,000,000 stolen in just a few days from one organization. Details About…

GoDaddy Discloses Data Breach Spanning Multiple Years

GoDaddy, a major provider of web hosting services, claims that a multi-year attack on its cPanel shared hosting environment resulted in a breach where unidentified attackers stole source code and installed malware on its servers. While the attackers had access…

FBI Investigates NYC Network Security Incident

The U.S. Federal Bureau of Investigation (FBI) is investigating potential cyber activity on their network. The agency stated that they have already contained the issue and are currently assessing the extent of the damage. The FBI has not released any…

What Is SSO? Single Sign-On Explained

Single Sign-On (SSO) is an authentication method that allows a user to securely authenticate with multiple applications and websites by using solely one set of login information (eg. username & password). In a nutshell, SSO simplifies the user authentication process.…

What Are Deepfakes and How to Spot Them

In the age of technological advancement, it’s not just tech-savvy online bad actors that you have to watch out for – fake videos created using AI-driven software known as “deepfakes” are becoming increasingly hard to spot. In this article, we’ll…

Five Ways Heimdal® Can Help You Against Ransomware Attacks

Ransomware attacks affect everyone, from local governments to large corporations, therefore ransomware protection is critical. It is up to all of us to help prevent them from being jeopardized. Unfortunately, many victims are paying the ransom, and despite efforts to…

CISA Warns About Four New Vulnerabilities Exploited as Zero-Days

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added four new vulnerabilities, exploited as zero-day vulnerabilities, to its KEV (Known Exploited Vulnerabilities) catalog. The vulnerabilities affect Windows and iOS devices. New Vulnerabilities Discovered As also mentioned by BleepingComputer, two…

Seven German Airports Hit by Suspected Cyber Attack

The ADV airport association reported that the websites of seven German airports were hit by a suspected cyber attack on Thursday. Düsseldorf, Nuremberg, and Dortmund airports were among those impacted, but the websites for Germany’s three busiest airports: Frankfurt, Munich,…

What Is Cybercrime-as-a-Service (CaaS)?

Keep in mind that the primary goal of every cybercriminal is to make as much money as possible. So, the apparition of the cybercrime-as-a-service (CaaS) model was the next inevitable step in pursuing this goal. CaaS, as an organized action,…

What Is Transmission Control Protocol (TCP)?

Transmission Control Protocol (TCP) is a fundamental communication protocol, used in computer networks, that does exactly what its name says: it controls how data is transmitted between two systems – the client and the server, and it makes sure this…

What Is OPSEC: Operational Security Explained

Also known as operational security or procedural security, OPSEC is a security and risk management process that prevents sensitive information from falling into the hands of malicious actors. Originating in the military, OPSEC became a popular practice in the private…

Lazarus Hackers Use New Mixer to Hide Stolen Cryptocurrency

Blockchain analysts have discovered that North Korean hackers are laundering cryptocurrency proceeds from their heists despite U.S. sanctions. Through a single crypto-mixing service called Sinbad, the advanced persistent threat known as Lazarus Group has laundered about $100 million in stolen Bitcoin…

North Korean Hackers Target the Healthcare Sector with Ransomware

U.S. and South Korean cybersecurity and intelligence agencies warned in a joint advisory that North Korean hackers are launching ransomware attacks against healthcare and critical infrastructure facilities to fund illicit activities. The attacks, which demand cryptocurrency ransoms in exchange for…

Endpoint Security vs. Antivirus: A Comparison

Switching from Antivirus to an Endpoint security solution will offer you not only better cybersecurity but also a centralized and easy-to-handle security management system. These two may look the same to an inexperienced eye but take a closer look. Then…

Canadian Bookstore Indigo Hit By Cyberattack

Indigo Books & Music, the largest bookstore chain in Canada, experienced a cyber attack, leading the company to temporarily shut down its website and only allow cash payments. The details of the incident have yet to be determined, but Indigo…

What Is An IT Asset?

Have you ever wondered what the concept of IT asset refers to and what is its importance to your business? Continue reading to find your answer! IT Asset: Definition By definition, an IT asset is a piece of hardware or…

10 Free & Open Source Threat-Hunting Tools for 2023

Are you on the lookout for threat-hunting tools? If so, you’ve come to the right place.  Compared to network security systems that include appliances such as firewalls that monitor traffic as it flows through a scenario, threat hunting is a…

How The UK Is Taking A Stand Against Ransomware Criminals

As part of a new coordinated action against international cybercrime, the UK and the US have sanctioned seven Russian cyber criminals today (Thursday, 9 February). Several ransomware strains have been developed or deployed by these individuals that have targeted the UK…

What Is API Security?

The API is a fundamental component of innovation in the world of apps we live in today. APIs are an essential component of modern mobile, SaaS, and web apps and can be found in partner-facing, internal, and applications for banks,…

List of Proxy IPs Used by Killnet, Released

Cybersecurity researchers published a list of proxy IP addresses used by the pro-Russian group Killnet to neutralize its attacks. The list, which contains over 17,746 IPs, was disclosed by SecurityScorecard researchers. Since March 2022, the Killnet group has launched DDoS attacks…

Heimdal® Announces Rebrand and Name Consolidation

Copenhagen, February 9th, 2023 – Heimdal unveils a consolidated new name with a bold and distinct new visual identity as a part of an extensive rebranding initiative. As of February 9th, 2023, we are consolidating our name and getting a brand-new…

AmerisourceBergen Healthcare Company Has Been Breached

The healthcare company AmerisourceBergen confirmed a data breach in the IT system of one of its subsidiaries. The announcement comes after the Lorenz ransomware posted what the threat actor claims to be exfiltrated data from the pharmaceutical distributor. AmerisourceBergen has…

What Are Industrial Control Systems?

An industrial control system (or ICS) is a type of computer system that monitors and controls industrial processes and infrastructure. ICSs are used in a variety of industries, including oil and gas, chemical, water and wastewater, energy, food and beverage,…

PixPirate Malware Is Actively Stealing Banking Passwords

Pix is an instant payment platform developed and managed by the Central Bank of Brazil (BCB), which enables quick payment and transfer execution, with over 100 million registered accounts worldwide. A new strain of mobile malware targeting Brazil and other…

Iranian Threat Group Behind Charlie Hebdo Data Breach

The „Holy Souls” or NEPTUNIUM threat group is considered responsible for the recent attack on the satirical French magazine Charlie Hebdo. The group is known to be backed up by the Iranian state and was previously sanctioned by the U.S.…

New HeadCrab Malware Hijacks 1,200 Redis Servers

Since September 2021, over a thousand vulnerable Redis servers online have been infected by a stealthy malware dubbed “HeadCrab”, designed to build a botnet that mines Monero cryptocurrency. At least 1,200 servers have been infected by the HeadCrab malware, which…

Pro-Russian Hackers Target European Hospitals

According to the Dutch National Cybersecurity Center (NCSC), several hospitals from European countries supporting Ukraine have been targeted by pro-Russian threat actors, including their own UMCG hospital in Groningen. UMCG Groningen Shutdown The cause behind UMCG’s shutdown seems to be…

Top 10 SOAR Tools to Enhance Your SecOps Experience

In a previous article, we talked about the core differences (and similarities) between SOAR and XDR. And because no SecOps specialist should be without an adequate toolkit, here are some SOAR tools you can try out to up your security…

Hive Ransomware: A Detailed Analysis

Before we dive in, you might have heard the good news. This past week, on January 26th, to be exact, the FBI successfully shut down the Hive ransomware group and saved victims over a hundred million dollars in ransom payments…

Russian Hacktivists Target US and Dutch Hospitals

Russian hackers have claimed responsibility for a cyberattack that took more than a dozen US hospitals’ websites offline on Monday morning. Killnet, a pro-Russian hacking group infamous for DDoS attacks over the last year, claims to have taken down the…

What Is Data Erasure?

One of the major topics of cybersecurity is sheltering your data against data breaches. And while many Internet users have in place measures to protect their information from hackers’ hands while using them, once they delete the data, they might…

Hackers Abuse Google Ads to Send Antivirus Avoiding Malware

A Google ads malvertising campaign was found using KoiVM virtualization technology to install the Formbook data stealer without being spotted by antiviruses. MalVirt loaders are promoted by threat actors in advertising that appears to be for the Blender 3D program.…

Hackers Stole GitHub Desktop and Atom Code-Signing Certificates

Monday, GitHub announced that unidentified threat actors were able to exfiltrate encrypted code signing certificates for certain versions of the GitHub Desktop for Mac and Atom applications. Therefore, the company is taking the precautionary action of canceling the exposed certificates.…

What Is Dynamic Host Configuration Protocol (DHCP)?

DHCP, or Dynamic Host Configuration Protocol, is a network protocol that allows devices on a network to be automatically assigned an IP address. DHCP is used extensively in both home and enterprise networks, as it simplifies the process of configuring…

New HeadCrab Malware Hijacks 1,200 Redis Servers

Since September 2021, over a thousand vulnerable Redis servers online have been infected by a stealthy malware dubbed “HeadCrab”, designed to build a botnet that mines Monero cryptocurrency. At least 1,200 servers have been infected by the HeadCrab malware, which…

Pro-Russian Hackers Target European Hospitals

According to the Dutch National Cybersecurity Center (NCSC), several hospitals from European countries supporting Ukraine have been targeted by pro-Russian threat actors, including their own UMCG hospital in Groningen. UMCG Groningen Shutdown The cause behind UMCG’s shutdown seems to be…

Hive Ransomware: A Detailed Analysis

Before we dive in, you might have heard the good news. This past week, on January 26th, to be exact, the FBI successfully shut down the Hive ransomware group and saved victims over a hundred million dollars in ransom payments…

Russian Hacktivists Target US and Dutch Hospitals

Russian hackers have claimed responsibility for a cyberattack that took more than a dozen US hospitals’ websites offline on Monday morning. Killnet, a pro-Russian hacking group infamous for DDoS attacks over the last year, claims to have taken down the…

Hackers Stole GitHub Desktop and Atom Code-Signing Certificates

Monday, GitHub announced that unidentified threat actors were able to exfiltrate encrypted code signing certificates for certain versions of the GitHub Desktop for Mac and Atom applications. Therefore, the company is taking the precautionary action of canceling the exposed certificates.…

What Is Dynamic Host Configuration Protocol (DHCP)?

DHCP, or Dynamic Host Configuration Protocol, is a network protocol that allows devices on a network to be automatically assigned an IP address. DHCP is used extensively in both home and enterprise networks, as it simplifies the process of configuring…