HTC Global Services has confirmed that it has recently leaked the pictures of the Blackcat Rainsmware Group (also known as Alfav), recently leaked the pictures of claiming data stolen from IT services and business counseling company. The attack was faced. Data includes passport, contact list, email and confidential documents. In a small statement posted on X (East Twitter), HTC stated that it had faced a “cyber security incident” that she is investigating.
While currently there is a very little known details about the nature and range of the event, Cyber Safety Researcher Kevin Beomont suggested that HTC was dissolved as a result of citrics bleed vulnerability.
HTC is investigating the event to ensure the “safety and integrity” of user data
“HTC has experienced a cyber security incident. Our team is actively investigating and addressing the situation to ensure the safety and integrity of user data, ” Read the statement of the firm“We have listed cyber security experts and are working to solve it. Your faith is our priority. ,
Commenting on the incident, Senate Harpso, senior cyber analyst at Cyber Security Company Logpoint, said that it appears that HTC is being actively voiced by Blackcat/Alfav Group. “It is not clear whether Blackcat has hit HTC with ransomware and thus entangled in double extracens or if they have just left the ransomware and have gone directly to the recovery with leaked data. A strategy that we have recently employed to others. ,
Harapso said the potential initial attack vector-the Citrix Bleed Valancharibility-was published in mid-October, but has been actively exploited from at least August of this year, causing this zero day’s vulnerability. “It outlines the importance of publishing published weaknesses, but also underlining the need for depth protection.”
Blackcat/Alphv Ransomware Gang continued to collect victims
Blackcat/Alph Ransomware Group – which is now known for employing some of the most brutal forcible recovery seen, including leaking clinical photos of breast cancer patients – recently in its malicious activity. Last month, the gang reported one of its victims to the US Securities and Exchange Commission (SEC) to fail to follow the disclosure rule of the four -day cyber attack. The unprecedented step software company was an attempt to put more pressure on the Meridianlink, from which Blackcat/Alphvi claimed to have stolen customer data and operating information.
In the same week, the group was tracked to attack corporations and public institutions in a maltizing campaign in the US and Europe. A Russian-speaking affiliation of the gang adopted a strategy of new attack to infect the goals-according to the Essentary Research using Google advertisements to give Nitrogen Malware. The group was also behind the $ 100 million MGM resorts cyber attack in September.