Colonial Pipeline Company fell victim to a cyber attack that resulted in 5,500 miles of its US fuel pipelines being shut down, causing public distress and fears of fuel shortages. The attack was attributed to the ransomware group “DarkSide”, but was likely conducted by one of its affiliates. The group responded quickly to the attack, claiming that DarkSide’s only motive is financial gain, and that they do not want to create problems for society. They also announced that the group will begin approving or denying encryption of any companies the group’s affiliates want to target, to avoid future social consequences. Regardless of such efforts to distance the group from the attack, the consequences could be significant for DarkSide; the involvement of US government agencies and law enforcement will likely add pressure to the group’s operations, and the arrest of DarkSide’s members and/or the responsible affiliate is a realistic possibility.
A “Conti” ransomware attack on Ireland’s healthcare system, the Health Service Executive (HSE), significant...
Want To Try Our Digital Risk Protection Tool?Get Started Free
Other content in this Stream
Join Digital Shadows to learn about best practices for detecting exposed data across online.
This guide outlines how to detect, analyze, and remediate data leakage–including a treasure chest of free tooling.
This Solutions Guide to learn how to protect your organizations social footprint with the top Social Media Monitoring use cases Digital Shadows has identified.
The well-established “Mozi” peer-to-peer (P2P) botnet has developed new persistence capabilities.
Digital Shadows reviews and expands on observed ransomware attacks and how security teams can fortify their defenses.
A configurable, malicious Traffic Direction System (TDS) has been enabling widespread malware attacks.
Digital Shadows custom intelligence services allow you to leverage our industry-leading team of global intelligence analysts and security researchers for more custom intelligence requirements.
Ensure you get the most value from SearchLight by providing white glove services for onboarding, technical maintenance, playbooks and automation, and remediation.
ShadowTalk hosts Sean, Ivan, Charles, and CISO Rick Holland bring you the latest in threat intelligence.
A years-long reconnaissance campaign against an employee of a US aerospace defense company was discovered and attributed to “TA456”, an Iranian state-backed advanced persistent threat (APT) group.
ShadowTalk hosts Adam, Dylan and Kim bring you the latest in threat intelligence.
The new “BlackMatter”, “Haron”, and “El_Cometa” ransomware groups, which surfaced in the past three weeks, bear significant similarities to ransomware groups that disappeared last month