Technical Details for Recent Hive Ransomware Activity

Context The Hive ransomware variant has been extremely active in the past year. The ransomware was originally discovered in June of 2021, and reportedly is responsible for more than 300 compromises since September 2021. The FBI released a notice warning the public of the threat in August 2021 after Hive ransomware compromised dozens of medical…

Read More

How to Write an Incident Response Plan for Ransomware Recovery

“It does not do to leave a live dragon out of your calculations, if you live near one.” – J.R.R. Tolkien In 2022, ransomware is the live dragon for many companies working to develop incident response plans. According to Fortinet’s Global Threat Landscape Report, the first half of 2021 saw a 10.7x increase in the…

Read More

Different Types of Ransomware Attacks

Crypto Ransomware The first ransomware attack, known as the AIDS Trojan, hit the healthcare industry in 1989, but it’s only been in the last decade that strains such as CryptoLocker, Petya, NotPetya, WannaCry, TeslaCrypt, and Locky have pushed ransomware to the forefront of cybersecurity discussions. These strains have variations in the way they deploy, but…

Read More

Member Spotlight: Mike Fair

This month’s Member Spotlight is Mike Fair, associate vice president of cybersecurity at Victoria’s Secret. Like many others in the cybersecurity field, tech was not his original career path. He briefly considered political science before settling on public relations for his undergraduate degree. Mike first began his career at Target in their IT department. After…

Read More

New Cyber Tools Targeting ICS/SCADA Devices

Context The Department of Energy (DOE), Cybersecurity and Infrastructure Agency (CISA), National Security Agency (NSA), and Federal Bureau of Investigation (FBI) issued a joint cybersecurity advisory on April 13, 2022 detailing new advanced persistent threat (APT) cyber tools targeting Industrial Control System and Supervisory Control and Data Acquisition (ICS/SCADA) devices. The advisory notes three key…

Read More