Logo Logo
  • Home
  • Modshield SB
  • services
    • Application Security Testing
    • Infrastructure Security Testing
    • IoT Security Testing
    • Testing for Compliance
    • Red Team Exercise
    • Performance Testing
  • Training
    • Cybersecurity Awareness Program
    • Secure Development – Web
    • Secure Development – Mobile
  • Resource
    • Blog
    • CyberNews
  • About
    • Partners
    • Contact

Top Cyber News April Week 3

  • Home
  • Blog Details
Top Cyber news April Week 3 - Oil Indian $7.5 Million Ransom, US Warns North Korea, Russia With Most Data Breaches
April 21 2022
  • CyberNews

Oil Indian $7.5 Million Ransom, US Warns North Korea, Russia With Most Data Breaches 

Read April 3rd Weeks’ Top Cyber news

Cyberattack hits Oil India field headquarters

Recent cyber-attack on Oil India’s systems was noted which involved a malware threat noticed by the company’s officials and reported, but it did not have any effect on its operations.

Cyber news - Recent cyber-attack on Oil India's systems was noted which involved a malware threat noticed by the company's officials and reported, but it did not have any effect on its operations.

The state-owned company had suffered a major ransomware attack in its field headquarters in Assam’s Duliajan, with the hacker demanding a ransom of about $75,00,000.

The security team was immediately notified and everything was back in order according to the statement given by Oil India.

Ransomware is malware that encrypts all data of a computer with a key that only the attackers have access to.

The US warns about North Korean hackers focusing on blockchain

The FBI, CISA, and the US Treasury released an advisory saying that North Korean state-sponsored advanced persistent threat (APT) groups target cryptocurrency-related businesses.

Cyber news - The US warns about North Korean hackers focusing on blockchain

The famed hacking gang is known as the ‘Lazarus Group’ is also known in the business as APT38, BlueNoroff, and Stardust Chollima.

Crypto exchanges, DeFi protocols, play-to-earn cryptocurrency video games, cryptocurrency trading organisations, and individuals holding huge quantities of crypto or valuable NFTs are all potential victims.

Threat actors employ a variety of approaches, including social engineering and targeted malware, according to the report. The final purpose, however, is always the same – to steal money.

Russia experienced the most data breaches in the first quarter of 2022

Since the beginning of 2022, millions of users have been affected by data breaches around the world.

Cyber news: Russia experienced the most data breaches in the first quarter of 2022

According to a report by Surfshark, Russia ranked #1 in terms of compromised accounts from January to March 2022, with over 3.5 million internet users affected. 

Since the Russian invasion of Ukraine began in March, 136 percent more Russian accounts have been hacked than in February.

For the second quarter in a row, the United States, which came in second, shows a favourable downward trend in data breaches. 

In 2022, there were nearly half as many affected consumers in the United States as there were in the previous quarter, with around 2.5 million users affected.

Know the top cyber news

Previous Post Next Post

Leave a Comment

Recent Posts

  • Top Cyber News April Week 3
  • Top Cyber News April Week 2
  • Data security in cloud computing
  • Cybersecurity For Fintech – Finance Industry
  • Top Cyber News April Week 1

Recent Comments

  1. Vishnu on IEC 62443 – Cybersecurity for Industrial Automation and Control Systems

Archives

  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • June 2020

Categories

  • Blog
  • CyberNews
  • WAF
© Copyright 2020. Anada WordPres Theme By WordPressRiver
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}