Major European call center provider hit by Conti ransomware attack
The attack impacted call centers and automated customer support phone services for companies and government organizations in Spain and Latin America.
The attack impacted call centers and automated customer support phone services for companies and government organizations in Spain and Latin America.
The malware is capable of gathering and exfiltrating various types of data, including cookies, passwords, forms, and bank cards from browsers.
While UHC has yet to release an official statement regarding the alleged attack, this week Vice Society has published some of the data allegedly stolen from UHS on their data leak website.
ProxyLogon was first exploited by the group on March 3, before Microsoft released emergency patches to the public.
The flaw is a use-after-free error that occurs when processing HTML content within the Portals component in Chrome.
The attack involved a zero-day vulnerability in Zoho ManageEngine ADSelfService Plus.
Apple also backported security updates for two zero-days patched earlier this month.
The agencies observed more than 400 attacks on U.S. and international organizations involving the Conti ransomware.
The attackers made use of the vulnerabilities patched by Adobe more than ten years ago.
Scans are based on the workaround provided by VMware to customers who could not immediately update their appliances.
Showing elements 2851 - 2860