cybernews.com
Open in
urlscan Pro
2606:4700:3108::ac42:2bc5
Public Scan
URL:
https://cybernews.com/news/att-hit-everest-ransomware/
Submission: On November 25 via api from US — Scanned from DE
Submission: On November 25 via api from US — Scanned from DE
Form analysis
2 forms found in the DOMGET https://cybernews.com/search/
<form class="header__search-form" action="https://cybernews.com/search/" method="get" data-js-search-mobile="">
<input class="header__search-form-input" placeholder="Search..." type="search" data-js-search-input-mobile="">
<button type="submit" class="header__search-form-button" title="Search">
<svg class="svg-icon header__search-form-button-icon" width="22" height="22">
<use xlink:href="#mdi-magnify"></use>
</svg>
</button>
</form>
POST /api/add-comment/
<form id="comment-form" class="space space_size_n text text_size_small" action="/api/add-comment/" method="POST">
<label for="comment-form-text">
<strong class="form-label form-label_required">Comment</strong>
<textarea id="comment-form-text" name="comment" required="" cols="45" rows="8" class="form-input space space_size_s" minlength="3"></textarea>
</label>
<div class="space space_size_n">
<div class="cells cells_responsive">
<label class="cells__item cells__item_width cells__item_width_2" for="comment-form-name">
<strong class="form-label form-label_required">Name</strong>
<input id="comment-form-name" type="text" name="name" required="" class="form-input space space_size_s" minlength="3">
</label>
<label class="cells__item cells__item_width cells__item_width_2" for="comment-form-email">
<strong class="form-label form-label_required">Email</strong>
<input id="comment-form-email" type="email" name="email" required="" class="form-input space space_size_s" minlength="3">
</label>
</div>
<label class="space space_size_n display_block" for="privacy_policy">
<strong class="form-label form-label_required">Privacy Policy Agreement</strong>
<span class="space space_size_s content display_block">
<input id="privacy_policy" name="privacy_policy" required="" type="checkbox"> I agree to the <a class="link" href="https://cybernews.com/terms-conditions/" target="_blank" rel="noreferrer">
Terms & Conditions
</a> and <a href="https://cybernews.com/privacy-policy/" target="_blank" rel="noreferrer">
Privacy Policy
</a>. </span>
</label>
</div>
<div class="space space_size_l">
<button class="button" type="submit"> Post comment </button>
</div>
</form>
Text Content
* News * Cybersecurity news * Cyber war news * Editorial * Security * Privacy * Crypto * Tech * Resources * What is a VPN? * How to use a VPN? * What is malware? * Are password managers safe? * More resources * Tools * Strong password generator * Personal data leak checker * Password leak checker * Website security checker * VPN speed test * Reviews * Antivirus software * Best VPN services * Password managers * Secure email providers * Best website builders * Best web hosting services * Follow * * * * * * © 2022 CyberNews - Latest tech news, product reviews, and analyses. If you purchase via links on our site, we may receive affiliate commissions. 1. Home 2. News EVEREST RANSOM GROUP ADDS AT&T TO ITS VICTIM LIST Jurgita Lapienytė Chief Editor Updated on: 28 October 2022 -------------------------------------------------------------------------------- By Shutterstock AT&T, an American multinational telecommunications company with nearly $170 billion in revenue, allegedly fell victim to a ransomware attack. The Everest ransomware gang, believed to be connected to the Black-Byte ransomware operations, said it had hacked AT&T. On its leak page, Everest claims to be selling access to the corporate network in the US. The post on the website appeared on October 27. Screenshot by Cybernews Cybernews reached out to the telecommunications company for a statement. “We are currently investigating this, but at this time we have no evidence of a compromise of our systems," the company told Cybernews via email. This is not the first time AT&T has come under the spotlight in relation to cybersecurity concerns. Mere days after the infamous T-Mobile data breach, the same actor posted an ad on the dark forum, selling 70 million AT&T user records. The mobile service provider denied the data leak claim, saying the data didn’t come from any of their systems. AT&T had already suffered a data breach before. In 2015, the company agreed to pay a $25 million fine for an insider breach, when call center workers accessed sensitive information of hundreds thousands customers without authorization. According to the NCC group, the Everest threat actor has been observed exploiting compromised user accounts and remote desktop protocol (RDP) for lateral movement. “Everest’s action on objectives appears to focus on data exfiltration of sensitive information as well as encryption, commonly referred to as double extortion,” researchers said. -------------------------------------------------------------------------------- MORE FROM CYBERNEWS: Thomson Reuters collected and leaked at least 3TB of sensitive data Elon Musk’s finish line: “Chief Twit” visits Twitter HQ, carries a sink Best VPNs for AT&T China-linked threat group sowing discord ahead of US elections, analyst warns Pope: even nuns and priests watch adult content online Subscribe to our newsletter Share Tweet Share Share Share -------------------------------------------------------------------------------- Editor's choice SECURITY Attack of drones: airborne cybersecurity nightmare by Adam Kohnke 24 November 2022 Once a niche technology, drones are about to explode in terms of market growth and enterprise adoption. Naturally, threat actors follow the trend and exploit the technology for surveillance, payload delivery, kinetic operations, and even diversion. Read more about Once a niche technology, drones are about to explode in terms of market growth and enterprise adoption. Naturally, threat actors follow the trend and exploit the technology for surveillance, payload delivery, kinetic operations, and even diversion. Why individual arrests will not shut down LockBit 24 November 2022 Virtual product placement – game-changing gold mine for ad industry 21 November 2022 Weakest passwords of 2022 14 November 2022 Crowded market leaves streaming services scrambling for profits 15 November 2022 -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- Leave a Reply Your email address will not be published. Required fields are marked Comment Name Email Privacy Policy Agreement I agree to the Terms & Conditions and Privacy Policy . Post comment * Categories * News * Editorial * Security * Privacy * Crypto * Cloud * Tech * Reviews * Antivirus Software * Password Managers * Best VPNs * Best VPN for Android * Secure Email Providers * Website Builders * Best Web Hosting Services * Tools * Password generator * Personal data leak checker * Password leak checker * Website security checker * VPN speed test * Coupon codes * ENGAGE * About Us * Send Us a Tip * Careers * * * * * * * About Us * Contact * Send Us a Tip * Privacy Policy * Terms & Conditions * Vulnerability Disclosure © 2022 Cybernews – Latest Cybersecurity and Tech News, Research & Analysis. This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy . I Agree