cybernews.com Open in urlscan Pro
2606:4700:3108::ac42:2bc5  Public Scan

URL: https://cybernews.com/news/att-hit-everest-ransomware/
Submission: On November 25 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

GET https://cybernews.com/search/

<form class="header__search-form" action="https://cybernews.com/search/" method="get" data-js-search-mobile="">
  <input class="header__search-form-input" placeholder="Search..." type="search" data-js-search-input-mobile="">
  <button type="submit" class="header__search-form-button" title="Search">
    <svg class="svg-icon header__search-form-button-icon" width="22" height="22">
      <use xlink:href="#mdi-magnify"></use>
    </svg>
  </button>
</form>

POST /api/add-comment/

<form id="comment-form" class="space space_size_n text text_size_small" action="/api/add-comment/" method="POST">
  <label for="comment-form-text">
    <strong class="form-label form-label_required">Comment</strong>
    <textarea id="comment-form-text" name="comment" required="" cols="45" rows="8" class="form-input space space_size_s" minlength="3"></textarea>
  </label>
  <div class="space space_size_n">
    <div class="cells cells_responsive">
      <label class="cells__item cells__item_width cells__item_width_2" for="comment-form-name">
        <strong class="form-label form-label_required">Name</strong>
        <input id="comment-form-name" type="text" name="name" required="" class="form-input space space_size_s" minlength="3">
      </label>
      <label class="cells__item cells__item_width cells__item_width_2" for="comment-form-email">
        <strong class="form-label form-label_required">Email</strong>
        <input id="comment-form-email" type="email" name="email" required="" class="form-input space space_size_s" minlength="3">
      </label>
    </div>
    <label class="space space_size_n display_block" for="privacy_policy">
      <strong class="form-label form-label_required">Privacy Policy Agreement</strong>
      <span class="space space_size_s content display_block">
        <input id="privacy_policy" name="privacy_policy" required="" type="checkbox"> &nbsp; I agree to the <a class="link" href="https://cybernews.com/terms-conditions/" target="_blank" rel="noreferrer">
Terms &amp; Conditions
</a> and <a href="https://cybernews.com/privacy-policy/" target="_blank" rel="noreferrer">
Privacy Policy
</a>. </span>
    </label>
  </div>
  <div class="space space_size_l">
    <button class="button" type="submit"> Post comment </button>
  </div>
</form>

Text Content

 * News
   * Cybersecurity news
   * Cyber war news
 * Editorial
 * Security
 * Privacy
 * Crypto
 * Tech
 * Resources
   * What is a VPN?
   * How to use a VPN?
   * What is malware?
   * Are password managers safe?
   * More resources
 * Tools
   * Strong password generator
   * Personal data leak checker
   * Password leak checker
   * Website security checker
   * VPN speed test
 * Reviews
   * Antivirus software
   * Best VPN services
   * Password managers
   * Secure email providers
   * Best website builders
   * Best web hosting services

 * Follow
   * 
   * 
   * 
   * 
   * 
   * 



© 2022 CyberNews - Latest tech news,
product reviews, and analyses.

If you purchase via links on our site, we may receive affiliate commissions.
 1. Home
 2. News


EVEREST RANSOM GROUP ADDS AT&T TO ITS VICTIM LIST

Jurgita Lapienytė
Chief Editor
Updated on: 28 October 2022

--------------------------------------------------------------------------------

By Shutterstock


AT&T, an American multinational telecommunications company with nearly $170
billion in revenue, allegedly fell victim to a ransomware attack.

The Everest ransomware gang, believed to be connected to the Black-Byte
ransomware operations, said it had hacked AT&T.

On its leak page, Everest claims to be selling access to the corporate network
in the US. The post on the website appeared on October 27.

Screenshot by Cybernews

Cybernews reached out to the telecommunications company for a statement.

“We are currently investigating this, but at this time we have no evidence of a
compromise of our systems," the company told Cybernews via email.

This is not the first time AT&T has come under the spotlight in relation to
cybersecurity concerns. Mere days after the infamous T-Mobile data breach, the
same actor posted an ad on the dark forum, selling 70 million AT&T user records.
The mobile service provider denied the data leak claim, saying the data didn’t
come from any of their systems.

AT&T had already suffered a data breach before. In 2015, the company agreed to
pay a $25 million fine for an insider breach, when call center workers accessed
sensitive information of hundreds thousands customers without authorization.

According to the NCC group, the Everest threat actor has been observed
exploiting compromised user accounts and remote desktop protocol (RDP) for
lateral movement.

“Everest’s action on objectives appears to focus on data exfiltration of
sensitive information as well as encryption, commonly referred to as double
extortion,” researchers said.

--------------------------------------------------------------------------------


MORE FROM CYBERNEWS:

Thomson Reuters collected and leaked at least 3TB of sensitive data

Elon Musk’s finish line: “Chief Twit” visits Twitter HQ, carries a sink

Best VPNs for AT&T

China-linked threat group sowing discord ahead of US elections, analyst warns

Pope: even nuns and priests watch adult content online

Subscribe to our newsletter

Share
Tweet
Share
Share
Share

--------------------------------------------------------------------------------

Editor's choice
SECURITY
Attack of drones: airborne cybersecurity nightmare
by  Adam Kohnke
24 November 2022

Once a niche technology, drones are about to explode in terms of market growth
and enterprise adoption. Naturally, threat actors follow the trend and exploit
the technology for surveillance, payload delivery, kinetic operations, and even
diversion.

Read more about Once a niche technology, drones are about to explode in terms of
market growth and enterprise adoption. Naturally, threat actors follow the trend
and exploit the technology for surveillance, payload delivery, kinetic
operations, and even diversion.
Why individual arrests will not shut down LockBit
24 November 2022
Virtual product placement – game-changing gold mine for ad industry
21 November 2022
Weakest passwords of 2022
14 November 2022
Crowded market leaves streaming services scrambling for profits
15 November 2022

--------------------------------------------------------------------------------



--------------------------------------------------------------------------------

--------------------------------------------------------------------------------

Leave a Reply

Your email address will not be published. Required fields are marked

Comment
Name Email
Privacy Policy Agreement   I agree to the Terms & Conditions and Privacy Policy
.
Post comment

 * Categories
   * News
   * Editorial
   * Security
   * Privacy
   * Crypto
   * Cloud
   * Tech
 * Reviews
   * Antivirus Software
   * Password Managers
   * Best VPNs
   * Best VPN for Android
   * Secure Email Providers
   * Website Builders
   * Best Web Hosting Services
 * Tools
   * Password generator
   * Personal data leak checker
   * Password leak checker
   * Website security checker
   * VPN speed test
   * Coupon codes
 * ENGAGE
   * About Us
   * Send Us a Tip
   * Careers

 * 
 * 
 * 
 * 
 * 
 * 

 * About Us
 * Contact
 * Send Us a Tip
 * Privacy Policy
 * Terms & Conditions
 * Vulnerability Disclosure

© 2022 Cybernews – Latest Cybersecurity and Tech News, Research & Analysis.



This website uses cookies. By continuing to use this website you are giving
consent to cookies being used. Visit our Privacy Policy .
I Agree