• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

New Python-based Ransomware Targeting JupyterLab Web Notebooks

You are here: Home / General Cyber Security News / New Python-based Ransomware Targeting JupyterLab Web Notebooks
March 31, 2022

JupyterLab Web-based Notebooks

Researchers have disclosed what they say is the 1st-at any time Python-centered ransomware strain exclusively created to goal uncovered Jupyter notebooks, a web-based mostly interactive computing platform that lets modifying and running programs through a browser.

“The attackers attained first accessibility by using misconfigured environments, then ran a ransomware script that encrypts every file on a presented path on the server and deletes itself right after execution to conceal the attack,” Assaf Morag, a details analyst at Aqua Security, mentioned in a report.

✔ Approved Seller From Our Partners
Malwarebytes Premium 2022

Protect yourself against all threads using Malwarebytes. Get Malwarebytes Premium with 60% discount from a Malwarebytes official seller SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


CyberSecurity

The new ransomware sample, which the cloud security business detected after it was trapped in 1 of its honeypot servers, is reported to have been executed right after the unnamed adversary acquired entry to the server and downloaded the essential tools essential to carry out the encryption system by opening a terminal.

JupyterLab Web-based Notebooks

Aqua Security characterised the attack as “easy and uncomplicated,” compared with other common ransomware-as-a-services (RaaS) techniques, incorporating that no ransom observe was introduced on the process, elevating the possibility that the threat actor might have been experimenting with the modus operandi, or that the honeypot timed out right before it could be comprehensive.

CyberSecurity

The identity of the attacker remains unclear, whilst proof unearthed during the incident investigation factors to an actor of Russian origin, citing similarities with previous cryptomining attacks aimed at Jupyter notebooks.

“Due to the fact Jupyter notebooks are made use of to analyze information and develop information designs, this attack can guide to significant damage to organizations if these environments aren’t thoroughly backed up,” Morag stated.

Identified this post attention-grabbing? Adhere to THN on Fb, Twitter  and LinkedIn to read through a lot more unique information we publish.


Some areas of this report are sourced from:
thehackernews.com

Previous Post: «hackers increasingly using 'browser in a browser' technique in ukraine Hackers Increasingly Using ‘Browser in a Browser’ Technique in Ukraine Related Attacks
Next Post: QNAP Customers Adrift, Waiting on Fix for OpenSSL Bug qnap customers adrift, waiting on fix for openssl bug»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • QNAP Customers Adrift, Waiting on Fix for OpenSSL Bug
  • New Python-based Ransomware Targeting JupyterLab Web Notebooks
  • Hackers Increasingly Using ‘Browser in a Browser’ Technique in Ukraine Related Attacks
  • Patch finally released for Spring4Shell zero-day after vulnerable businesses put on high alert
  • Australian gov promises new cyber capabilities despite “massive skills shortage”
  • Australian gov promises new cyber capabilities despite “massive skills shortage”
  • Global Police Arrest 65 in Multimillion-Dollar BEC Bust
  • Viasat: Denial of Service Attack Impacted Tens of Thousands
  • No Patch Available Yet for Critical SpringShell Bug
  • Unpatched Java Spring Framework 0-Day RCE Bug Threatens Enterprise Web Apps Security

Copyright © TheCyberSecurity.News, All Rights Reserved.