More than 40,417,167,937 data were hacked or lost last year. In 2021, many hackers used blackmail programs to collect Bitcoin ransom by exploiting security vulnerabilities.

ransomware tactics
Authors: Pixabay

The “Threat Landscape Report,” an annual report released by U.S. cybersecurity company Tenable, paints an alarming picture. data leaks from last year. In short, there have never been as many data leaks as in 2021, as Damien Bancal, an IT security expert on the Zataz blog, points out.

“In January-November 2021, 21,957 new exploits were granted, up 20% from 2020. 105 zero-day vulnerabilities were revealed, an increase of 262% from 2020.”, explains Tenable in his report. Characters like this are a legion.

On the same topic: One million hacked debit cards are available for free online

Recurrence of tightening programs

At least according to Tenable 40 417 167 937 miscellaneous records had to be revealed online last year, an increase of 78% compared to 2020. For example, 3,000 French ID cards were put up for sale in the dark online. A few months earlier, we found data from 39 million French people for sale on the black market.

Not surprisingly, Tenable points to a resurgence of blackmail programs. During the past year many companies have indeed fallen victim to this type of malware. This type of virus steals confidential information and exchanges it in return.

These blackmail programs, implemented by groups of experienced hackers, were successful paralyze important infrastructure. Last May, the ransom program paralyzed all operations of oil pipeline operator Colonial Pipeline. This transports more than 45% of the fuel off the east coast of the United States. Hackers are demanding a $ 4.4 million ransom as Bitcoin.

The most disturbing violation last year was the lack of it Log4j, logging utility is based on Java, which is present in many web application frameworks. The vulnerability threatens the servers of companies such as Apple, Amazon, Twitter and Cloudflare. However, “It’s important that Log4Shell doesn’t distract us from countless other vulnerabilities.”, says Tenable.

Source: Zataz

About the author

admin

Leave a Comment