The @FBI is raising awareness on BlackCat ransomware-as-a-service (RaaS), which it said has attacked around 60 entities worldwide from November 2021 to March 2022.
@FBI Rust offers the attackers opportunity to take advantage of a lower detection ratio from static analysis malware detection tools, which aren't adapted to all programming languages.
@FBI BlackCat's modus operandi involves the theft of victim data prior to the execution of the ransomware, w/ the malware often leveraging compromised user credentials to gain initial access to the target system.
Ransom payments are often in Bitcoin, Monero or other cryptocurrencies.
review domain controllers, servers, workstations, and active directories for new or unrecognized user accounts, take offline backups, implement network segmentation, apply software updates, and secure accounts with multi-factor authentication and more.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
@ElephantStatus's Treasury contract experienced a #flashloan attack leading to a loss of around $11M. The Treasury contract is unverified and unaudited.
The attacker took advantage of the redeem mechanism of the $TRUNK token, manipulated the price oracle to empower the token return, and stole ELEPHANT from the unverified Treasury contract.
Attack Steps 👇
1. The attacker deployed an attacker contract and borrowed $WBNB and $BUSD using flashloan from multiple pair pools.
2. Most of the borrowed WBNB was swapped for ELEPHANT to raise the price of ELEPHANT.