Reading view

There are new articles available, click to refresh the page.

The FBI takes down a huge botnet but doesn’t end the problem

PUBLIC DEFENDER By Brian Livingston The US Defense Criminal Investigative Service (DCIS) and the FBI served a search warrant on a 22-year-old man in Oregon on August 6, 2025, shutting down one of the largest malware botnets ever seen. The bot operation extorted money from websites that didn’t want to be attacked. For instance, the […]

Training doesn’t save you from clicking on phishing messages

PUBLIC DEFENDER By Brian Livingston We all think we can tell malicious “phishing” messages from the real thing. But studies show that even receiving formal anti-phishing training doesn’t prevent people from clicking on links or opening attachments that let hackers infect their devices, steal their credit-card numbers, or worse. Like a tsunami, electronic communications flood […]

If Intel’s chips fry, will AMD’s chips fly?

ISSUE 22.36 • 2025-09-08 PUBLIC DEFENDER By Brian Livingston The Intel Corporation, long the world’s largest manufacturer of processors for personal computers, fried investors’ money with a catastrophic loss of $20 billion in the 12 months ending June 2025. Intel’s manufacturing (foundry) division alone lost $8 billion in the same period. Meanwhile, CPUs by Advanced […]

Apps with high privileges will lower your security

PUBLIC DEFENDER By Brian Livingston For many years, security software has run in Windows’ so-called kernel mode. This privileged execution level gives Windows — and any other software running in that mode — total control over your computer. But apps having this much power can be disastrous for your system and for you. Catastrophes have […]

Spotify takes musicians’ money to scuttle Shuffle

PUBLIC DEFENDER By Brian Livingston Spotify, the world’s largest music streaming service, charges fees to artists for more airplay than they would otherwise get. Worse, Spotify randomly turns off its Shuffle mode to give 20 or so fee-paying songs “heavy rotation” in your playlists. Unfortunately, other major streaming services also take money to give certain […]

Details emerge on BlackSuit ransomware takedown

BlackSuit’s technical infrastructure was seized in a globally coordinated takedown operation last month that authorities touted as a significant blow in the fight against cybercrime. The ransomware group’s leak site has displayed a seizure notice since July 24.

The takedown followed a long investigation, which allowed authorities to confiscate “considerable amounts of data,” and identify 184 victims, German officials said in a news release last week. The group’s total extortion demands surpassed $500 million by August 2024, with demands typically in the range of $1 million to $10 million, the Cybersecurity and Infrastructure Security Agency said in an advisory last year. 

U.S. authorities were heavily involved in the operation, but have yet to share details about the investigation or its results. BlackSuit’s extortion site was seized by the Department of Homeland Security’s Homeland Security Investigation department, a unit of U.S. Immigration and Customs Enforcement. 

A spokesperson for ICE told CyberScoop the Justice Department has been waiting for court documents to be unsealed before releasing any information about the law enforcement action dubbed “Operation Checkmate.” The FBI, Secret Service, Europol and cyber authorities from the United Kingdom, Germany, France, Ireland, Ukraine, Lithuania and Romania-based cybersecurity firm Bitdefender were also involved in the operation. 

German officials said the takedown prevented the spread of malware and disrupted BlackSuit’s servers and communication. BlackSuit’s data leak site contained more than 150 entries before the takedown, Bitdefender said in a blog post

The majority of BlackSuit’s victims were based in the U.S. and the industries most impacted by the ransomware group’s attacks included manufacturing, education, health care and construction, according to Bitdefender. The company did not respond to a request for comment.

While BlackSuit once commanded outsized attention for its consistent spree of attacks, researchers said the ransomware group’s activities significantly decreased starting in December and remained low until its infrastructure was disrupted last month.

BlackSuit associates were already dispersed prior to the global law enforcement action on the group’s operations. 

The impact from the takedown will be limited because members already abandoned the BlackSuit brand early this year, Yelisey Boguslavskiy, co-founder and partner at RedSense, told CyberScoop. 

BlackSuit’s reputation plummeted as victims learned of the group’s Russian cybercrime lineage and declined to pay extortion demands out of fear that any financial support would evade sanctions imposed by the Treasury Department’s Office of Foreign Assets Control, he said.

As part of that pivot, former BlackSuit members have primarily used INC ransomware and its associated infrastructure this year. 

“It’s not that they were concisely preparing for the takedown. Instead, they just felt brand fatigue,” Boguslavskiy said. “They are very prone to rebranding often. It was two years without a rebrand, so the one was coming, and in the meantime, they were using INC as a newer name without baggage.”

BlackSuit emerged from the Conti ransomware group after a major leak of Conti’s internal messages led to a break up in 2022. Members of the Russian-language ransomware collective rebranded under three subgroups: Zeon, Black Basta and Quantum, which quickly rebranded to Royal before rebranding again to BlackSuit in 2024.

The empowerment of INC is the “most important development in the Russian-speaking ransomware landscape, and the fact that now BlackSuit will double down on using their infrastructure is very concerning,” Boguslavskiy said. 

The ransomware syndicate is composed of about 40 people, led by “Stern,” who has established a massive system of alliances, forming a decentralized collective with links to other ransomware groups, including Akira, ALPHV, REvil, Hive and LockBit, according to Boguslaviskiy. 

INC is currently the second largest Russian-speaking ransomware collective behind DragonForce, he said. 

BlackSuit was prolific, claiming more than 180 victims on its dedicated leak site dating back to May 2023, according to researchers at Sophos Counter Threat Unit. 

The ransomware group’s main members have demonstrated their ability to rebrand and relaunch operations with ease. “It is likely that this latest takedown will have minimal impact on the ability of the individuals behind it to reorganize under a new banner,” Sophos CTU said in a research note.

Former members of BlackSuit emerged under a new ransomware group, Chaos, as early as February, Cisco Talos Incident Response researchers said in a blog post released the same day BlackSuit’s technical infrastructure was seized. Chaos targets appear to be opportunistic and victims are primarily based in the U.S., according to Talos.

The FBI seized cryptocurrency allegedly controlled by a member of the Chaos ransomware group in April, the Justice Department said in a civil complaint seeking the forfeiture of the cryptocurrency last month. Officials said the seized cryptocurrency was valued at more than $1.7 million when it was seized in mid-April.

The post Details emerge on BlackSuit ransomware takedown appeared first on CyberScoop.

Buying stuff with crypto? Hold on to your wallet.

PUBLIC DEFENDER By Brian Livingston Suddenly, cryptocurrency has become legitimized in the United States and elsewhere. It is fast becoming a threat to legacy credit-card issuers — potentially changing consumers’ preferred means of payment. Only four years ago, the US government treated crypto like a pariah. Back in November 2021, the Office of the Comptroller […]

Make Windows respect your choice of default apps

PUBLIC DEFENDER By Brian Livingston • Comment about this article You may have great difficulty changing away from a Microsoft Windows application that automatically opens images, documents, and websites and toward an independent, third-party app that you like better. It’s not that you’re technically inept. The reason for the headache is that Windows 10 and […]

Don’t want Google handling your text messages? Here’s the fix.

ISSUE 22.26 • 2025-06-30 Look for our BONUS issue on July 7, 2025!! PUBLIC DEFENDER By Brian Livingston Millions of Android smartphone users worldwide received an unpleasant surprise last month. The text-messaging app they’d long been using had been unceremoniously replaced during a seemingly routine update. Their usual texting vehicle was deep-sixed by Google Messages, […]

Microsoft Defender Weekly Wrap – Issue #56

========================= [Want to discuss this further? Hit me up on Twitter or LinkedIn] [Subscribe to the RSS feed for this blog] [Subscribe to the Weekly Microsoft Sentinel Newsletter] [Subscribe to the Weekly Microsoft Defender Newsletter] [Learn KQL with the Must Learn KQL series and book]

Microsoft Defender Weekly Wrap – Issue #55

========================= [Want to discuss this further? Hit me up on Twitter or LinkedIn] [Subscribe to the RSS feed for this blog] [Subscribe to the Weekly Microsoft Sentinel Newsletter] [Subscribe to the Weekly Microsoft Defender Newsletter] [Learn KQL with the Must Learn KQL series and book]

Microsoft Defender Weekly Wrap – Issue #54

========================= [Want to discuss this further? Hit me up on Twitter or LinkedIn] [Subscribe to the RSS feed for this blog] [Subscribe to the Weekly Microsoft Sentinel Newsletter] [Subscribe to the Weekly Microsoft Defender Newsletter] [Learn KQL with the Must Learn KQL series and book]

Webcast: Sacred Cash Cow Tipping 2020

Want to learn how attackers bypass endpoint products? Slides for this webcast can be found here: https://www.blackhillsinfosec.com/wp-content/uploads/2020/09/SLIDES_SacredCashCowTipping2020.pdf 3:41 – Alternate Interpreters 9:19 – Carbon Black Config Issue 15:07 – Cisco […]

The post Webcast: Sacred Cash Cow Tipping 2020 appeared first on Black Hills Information Security, Inc..

💾

Webcast: Endpoint Security Got You Down? No PowerShell? No Problem.

Do your PowerShell scripts keep getting caught? Tired of dealing with EDRs & Windows Defender every time you need to pop a box?  In this one-hour webcast, we introduce a somewhat […]

The post Webcast: Endpoint Security Got You Down? No PowerShell? No Problem. appeared first on Black Hills Information Security, Inc..

Getting PowerShell Empire Past Windows Defender

Carrie Roberts //* (Updated 2/12/2020) ADVISORY: The techniques and tools referenced within this blog post may be outdated and do not apply to current situations. However, there is still potential […]

The post Getting PowerShell Empire Past Windows Defender appeared first on Black Hills Information Security, Inc..

How to Bypass Anti-Virus to Run Mimikatz

Carrie Roberts // * Would you like to run Mimikatz without Anti-Virus (AV) detecting it? Recently I attempted running the PowerShell script “Invoke-Mimikatz” from PowerSploit on my machine but it was […]

The post How to Bypass Anti-Virus to Run Mimikatz appeared first on Black Hills Information Security, Inc..

Microsoft Defender Weekly Wrap – Issue #56

========================= [Want to discuss this further? Hit me up on Twitter or LinkedIn] [Subscribe to the RSS feed for this blog] [Subscribe to the Weekly Microsoft Sentinel Newsletter] [Subscribe to the Weekly Microsoft Defender Newsletter] [Learn KQL with the Must Learn KQL series and book]

❌