Two days after an international team of authorities struck a major blow to LockBit, one of the Internet’s most prolific ransomware syndicates, researchers have detected a new round of attacks that are installing malware associated with the group. From a report: The attacks, detected in the past 24 hours, are exploiting two critical vulnerabilities in ScreenConnect, a remote desktop application sold by Connectwise. According to researchers at two security firms — SophosXOps and Huntress — attackers who successfully exploit the vulnerabilities go on to install LockBit ransomware and other post-exploit malware. It wasn’t immediately clear if the ransomware was the official LockBit version.

“We can’t publicly name the customers at this time but can confirm the malware being deployed is associated with LockBit, which is particularly interesting against the backdrop of the recent LockBit takedown,” John Hammond, principal security researcher at Huntress, wrote in an email. “While we can’t attribute

Link to original post https://it.slashdot.org/story/24/02/23/1533214/ransomware-associated-with-lockbit-still-spreading-2-days-after-server-takedown?utm_source=rss1.0mainlinkanon&utm_medium=feed from Teknoids News

Read the original story