🧵The latest Threat Landscape Update from @RelativityHQ’s Calder7 security team focuses on Evil Corp and its new Macaw Locker #ransomware that is being used to evade U.S. sanctions which previously prevented victims from paying ransoms. (1/7) #CyberSecurity #Legaltech
Background: Evil Corp, also known as Indrik Spider, Gold Drake, and Dridex gang, is an international cybercrime network that has stolen over $100 million USD in over 40 countries through a variety of attacks on banking institutions (2/7)
The group also dabbles in #ransomare, including their notorious #BitPaymer operation which utilized Dridex malware to attack compromised networks and subsequently led to sanctions from the US Treasury in 2019: home.treasury.gov/news/press-rel… (3/7)
Since then, Evil Corp has dabbled in a bunch of smaller #ransomware campaigns under names like WastedLocker, Hades, PayLoadBin, and CryptoLocker to avoid attribution back to them. Macaw Locker is their latest campaign in this (4/7)
Macaw Locker has already caused a significant amount of chaos so far, including the loss of data from Olympus and the recently-disclosed disruption of the Sinclair television syndication network. In essence – it's drawn the spotlight back to Evil Corp (5/7)
Now that the affiliation is known, it wouldn’t surprise me if Macaw Locker (in its current label) went away and a new ransomware campaign popped up in its place to evade sanctions (6/7)
What you can do: Ransomware attacks are destructive; the best thing you can do is leveling up your preventative measures, including aggressively keeping up to date on patches and consistently training employees on phishing best practices /fin (7/7) #cybersecurity #LegalTech

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Amanda Fennell

Amanda Fennell Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @Chi_from_afar

22 Aug
🧵The latest Threat Landscape Update from @RelativityHQ’s Calder7 security team details a particularly concerning new trend in #ransomware, which combines Ransomware-as-a-Service (RAAS) with employee-led Insider Threats. #cybersecurity #infosec #hackers #SundayReads (1/7)
RAAS has been around since early 2020 and has quickly become the leading vector for deploying #ransomware. The newest iteration of it is enticing employees to intentionally deploy #ransomware w/i their own org. A particularly nasty case of insider threat (2/7)
Reported by @briankrebs, threat actors trying this technique are using the #Demonware strain and are targeting networks of interest in the U.S., Canada, Australia, U.K., and for RDP, VPN, - corporate email access specifically (3/7)
Read 7 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!

:(