AUMINT.io Blog
Welcome to our blog. Subscribe and get the latest industry news, stay up to date with discovered new attack types and resources
Recent Bite-Size Posts
CHwapi Hospital in Belgium Got Ransom Attacked
CHwapi Hospital in Belgium was attacked in a ransom attack, surgeries were postponed and patients were referred to other hospitals. The group of attackers, whose identities are unknown, reportedly encrypted about 80 servers and 100TB of information using Windows...
The dark art of Remote Online Social Engineering by PWC
PWC Published it's resent Cyber security research: The dark art of Remote Online Social Engineering Research conducted on an emerging attack vector: threat actors using so-called ‘catfishing’ techniques to target organisations. Cyber security research: Can...
Scam-as-a-Service operation made more than $6.5 million in 2020
According to ZDNet: Scam-as-a-Service operation made more than $6.5 million in 2020 "Classiscam" operation is made up of around 40 groups operating in the US and across several European countries. Read more about Examples and Numbers of Social Engineering attacks...
Don’t fall for it: Health officials warn of scammers trying to charge for COVID-19 vaccine
Don’t fall for it: Health officials warn of scammers trying to charge for COVID-19 vaccine. The technique is called water hole, the scammers know people looks for COVID-19 vaccines, so they build officially look websites that sells vaccines.Florida health officials...
Information stolen from companies after the hack into SolarWinds is now up for sale
SolarWind's Data Breach - Update Some of the information stolen from the various companies after the hack into Solarwinds is now up for sale. What's on the shelf: Microsoft Information (Partial Source Code) for $ 600k Cisco Information (source...
NATO horizon 2030 report predicts the rise of cyber AI / ML warfare
NATO horizon 2030 report predicts the rise of cyber AI / ML warfare. We are the only ones who already have an AI that can help you to defend against AI reinforced attacks. >> Add more data from the report <<
What can we learn from Mimecast Hacker Breach
Mimecast, which provides email management systems, updates that the hacker was able to hack into the company's systems and access customer information. According to the company, the hacker was able to gain access to a certificate used to identify Mimecast services...
1 of 10 shopping ads promoted on Google potentially lead to phishing sites
How email fishing to one of the company’s executives caused the leakage of 3GB of Namesouth sensitive information
Information from Namesouth, a company that supplies spare parts for vehicles, was published online after it refused to pay a ransom. The attacking group NetWalker is the one that attacked the company in November last year and is now releasing 3GB of sensitive...
How to reduce the risk of dealing with ransomware attacks on your business
Assault groups that specialize in ransomware attacks are a business entity for everything. At the same time, it should be remembered that unlike the business world where (usually) there are rules and ethics, with financial motivation fueled by relative anonymity, the...
Is Justpay are the only one to discover that their Card Holders database was leaked in the dark web ?
Cyble, a company that locates information in the dark web, contacted Justpay and informed them that their database was in the dark web, the non-publication of the information to the media was conditioned by Cyble that Justpay would become the company's customer, which...
New Tool to release the locked files and avoid paying a ransom
Bitdefender releases a tool to decrypt files encrypted by the DarkSide attack group. The DarkSide group has been active for about a year and a half and has hit many different organizations. ABT Bitdefender is now releasing a tool for decrypting files encrypted by...