Opens profile photo
Follow
Click to Follow BrettCallow
Brett Callow
@BrettCallow
Threat Analyst . Mastodon: @brett@infosec.exchange
Shawnigan Lake 🇨🇦Joined June 2009

Brett Callow’s Tweets

Check out this new job from ⁦⁩ - remote US - contract to FTE - FTE medical benefits & 4 day work week - lead a team running some of the biggest #bugbounty programs in the world - email careers@Lutasecurity.com with questions or to apply
24
Ransomwhere has compiled a list of > 1,700 ransomware payment addresses used in the ESXi Nevada ransomware attacks, sourced from Censys and Shodan data. 2 payments worth $58k have been made so far. We will keep this updated.
2
28
Show this thread
The year is 2033. There are no more snow days because there is no more in-school education due to extreme weather and societal meltdown making it to too dangerous to go outdoors, but there are still #ransomware days.
Landscape Tumbleweed GIF
GIF
Quote Tweet
The year is 2023, there are no more snow days because of remote learning options implemented in 2020...but there are ransomware days.
7
Image
Quote Tweet
San Benito CISD - which had data stolen by #Karakurt last year - auctioned >3.5k devices in July, some of which contained employees’ and students’ PI. The district wants to buy the devices back, but doesn’t want to pay the asking price. #shitshow 1/2 govtech.com/education/k-12
Show this thread
#Royal has listed ICS. According to the company's website, it is "actively supporting the U.S. Department of Defense, the Cyber and Intelligence Community, multiple Federal and Civilian agencies, Mass Transit authorities, the Healthcare IT market ...." #ransomware
Image
3
This a yearly reminder to all the ransomware threat actors wanting to quit or screw over a former partner or rival group. You can reach me anonymously via XMPP at fabian.wosar@anonym.im or via Tox at 4544D87C884D6FAA11A91BAB190F98B2DDBC7547D94B0CCBC5ABE0FFD4CAE65D2A071A6EABB1.
1
33
Out of the 426 addresses listed here, it appears that there is only one with a balance (0.5 BTC, ~$11,700). So far, the scale of disruption and destruction likely outweighs any financial gain for the threat actor.
Quote Tweet
I extracted the bitcoin wallet addresses from the affected ESXi ( 315 indexed by shodan at the moment of pulling them) feel free to PR and add new ones. github.com/soufianetahiri
Show this thread
Image
1
4
In case anybody is interested, I still have a few of these left. Okay, okay, I have all of them left - but so what?
Quote Tweet
I’m selling rapid-deploy, relocatable countersurveillance devices starting at 1 BTC. Image is for illustration purposes only and may not be an exact representation of the actual product #Balloon
Image
🚨 Right now, at least 115 VMware ESXi servers (and counting) are compromised with this aggressive #Ransomware campaign. Beware!!! 👇 beta.shodan.io/search?query=h /cc
Image
Quote Tweet
🚨A tous : Si vous utilisez ESXi 6.x, mettez à jour IMMÉDIATEMENT, un cryptolock est en train de se propager à toute vitesse ! If you're using ESXi 6.x, update IMMEDIATELY, a cryptolock is rolling out fast!
Show this thread
15
448
Show this thread
Canon would pay up to $7.5k for monetary losses and $300 for out-of-pocket expenses to each victim of an August 2020 data breach that compromised the personal information of employees and their beneficiaries, under a proposed deal filed in federal court.
IKOULA is reporting their clients are experiencing semi-automated ransomware attacks targeting ESXi versions 6.5 and 6.7. Speculation: CVE-2021–21974 Intel via &
Quote Tweet
🚨Ransomware alert 🚨: We have noticed that some client servers under OS ESXi (6.5 and 6.7) are victims of a Ransomware. ⚠️ We recommend you to check your servers, to filter the access on your firewall and to disable SSH access.
9
92
Show this thread
This can't be stressed enough: employees should not be blamed for being phished. This professor's comment shows a profound .... oh, I'll just leave it at that.
Quote Tweet
Blame the phished employee? Utter bollocks. Security should be planned around the fact that humans make mistakes. If anybody is to be blamed, it's DCAD for failing to implement MFA (which could have prevented the incident.) 2/
Show this thread
Image
7
Blame the phished employee? Utter bollocks. Security should be planned around the fact that humans make mistakes. If anybody is to be blamed, it's DCAD for failing to implement MFA (which could have prevented the incident.) 2/
Image
3
100
Show this thread
Tallahassee Memorial hospital is current dealing with a suspected ransomware attack. 3/
Quote Tweet
TMH is redirecting EMS patients due to a suspected #ransomware attack. <- Via @PeterSchorschFL 1/ floridapolitics.com/archives/58568
Show this thread
1
Show this thread