The WantToCry ransomware group exploits misconfigured Server Message Block (SMB) services to infiltrate networks and launch extensive attacks. Weak credentials, outdated software, and poorly configured security settings within SMB services create vulnerabilities that cybercriminals leverage to access exposed network drives and Network-Attached Storage (NAS) devices. Once attackers gain access, they can move laterally within the network, escalate privileges, and deploy ransomware that encrypts critical data. Exploiting flaws like weak authentication or outdated SMB versions, they gain unauthorized control, often leveraging vulnerabilities such as EternalBlue to spread the attack across interconnected systems, amplifying the damage. Since its initial appearance in December 2023, WantToCry has increasingly targeted SMB-related vulnerabilities. By employing brute-force techniques and a vast password database containing over a million entries, the group breaches systems with weak or default login credentials. After successfully penetrating a network, they encrypt files remotely, avoiding traces on local systems, which makes detection and recovery far more challenging. To protect against these threats, experts advise organizations to strengthen SMB security through robust authentication methods, regular software updates, and restricted external access to SMB ports. Network segmentation and the deployment of advanced monitoring tools are also critical for detecting and stopping ransomware activities before they escalate.
IBM released security patches for over 100 vulnerabilities across various products. The biggest sufferers of these patches were Storage Defender, for which patches were issued for ...
Fieldtex Products, a U.S.-based provider of contract sewing and medical supply fulfillment, has reported a data breach following an attack attributed to a well-known ransomware ope...
The Pierce County Library System (PCLS) has announced a major data breach affecting more than 340,000 individuals, including library patrons, employees, former employees, and some ...