Saturday, 28 Feb 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Design > Ransomware Group Behind Indonesian Data Center Attack Wears Many Masks
Design

Ransomware Group Behind Indonesian Data Center Attack Wears Many Masks

Last updated: August 23, 2024 2:20 pm
Published August 23, 2024
Share
Ransomware Group Behind Indonesian Data Center Attack Wears Many Masks
SHARE

The menace actor behind a serious assault on Indonesian authorities companies is only one manifestation of an operation going by at the very least three different names.

On June 20, a ransomware operation referred to as “Mind Cipher” bit off greater than it may chew when it locked up Indonesia’s nationwide knowledge heart. Hours-long traces started to kind the world over’s fourth-largest nation as ferry passengers waited for reserving techniques to come back again on-line, and worldwide arrivals stood frozen at passport verification kiosks. Results had been felt all through greater than 200 nationwide and native authorities companies in all. Underneath strain and with no promise of cost, the group deserted its $8 million ransom demand, publishing its decryptor at no cost.

Researchers from Group-IB have since studied Mind Cipher and located that it is related to at least three other groups, or maybe simply working below 4 totally different names. Collectively, these variously named entities have carried out assaults throughout the globe, however usually with out a lot consequence.

Mind Cipher’s TTPs

Proof of Mind Cipher’s existence dates again solely to its assault in opposition to the Indonesian authorities. Regardless of being so younger, it already has unfold to Israel, South Africa, the Philippines, Portugal, and Thailand. This, nevertheless, is not essentially proof of any diploma of sophistication.

The malware it makes use of is predicated on the leaked Lockbit 3.0 builder. It has additionally used a variant of Babuk within the case of at the very least one Indonesian sufferer. “The usage of various encryptors permits menace actors to focus on a number of working techniques and environments,” explains Tara Gould, menace analysis lead at Cado Safety. “Totally different encryptors could also be optimized for various working techniques which widens the scope of potential targets, in the end maximizing the influence.”

See also  Tom Snyder: Data automation promises big advances in the next decade

What its ransom notes lack in persona they make up for in readability, with transient, step-by-step directions on easy methods to pay them for knowledge restoration…

Continue reading this article on Dark Reading.

Source link

TAGGED: attack, Center, data, Group, Indonesian, Masks, ransomware, Wears
Share This Article
Twitter Email Copy Link Print
Previous Article Sorella Labs Sorella Labs Raises $7.5M in Funding
Next Article Why Data Center Lightning Protection Requires More Than Just Lightning Rods Why Data Center Lightning Protection Requires More Than Just Lightning Rods
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Verizon and NVIDIA join forces to deliver real-time AI on private 5G edge networks

Verizon has partnered with NVIDIA to create an answer that permits AI purposes to run…

December 21, 2024

Light Field Lab launches SolidLight holographic imagery systems

Be part of our every day and weekly newsletters for the most recent updates and…

December 8, 2024

Understanding liquid immersion cooling – Data Centre Review

Chris Carreiro, CTO at Park Place Applied sciences, explains the specifics of liquid immersion cooling,…

July 6, 2024

How AWS secures its infrastructure with Sonaris

David Vance, a senior analyst from ESG World, affords an evidence, and it has to…

June 21, 2024

AI in data centre management

To offer the most effective experiences, we use applied sciences like cookies to retailer and/or…

November 24, 2024

You Might Also Like

AI is rewriting the rules of data centre power – who wins?
Global Market

AI is rewriting the rules of data centre power – who wins?

By saad
AI data centres
Innovations

ORNL institute to address power demand from AI data centres

By saad
Genetec unveils UK data centre for Security Center SaaS
Colocation

Genetec unveils UK data centre for Security Center SaaS

By saad
Spotlight report: Accelerating Data Center Modernization
Global Market

Spotlight report: Accelerating Data Center Modernization

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.