company logo


Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.



By Industry




IT & Telecom

By Role





Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Threat Feeds

Threat Research

White Paper

SB Blogs

Subscribe to Our Weekly Threat Digest


Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

Our Story

Our Team


Press & Media

Contact Us

Edward Don

Qbot Trojan



Edward Don, a Foodservice supplier, hit by a ransomware attack identified as Qbot Trojan

Edward Don has not received a response yet; however, reportedly ransomed and disrupted operations such as...

2 min read

Related Articles


Data Theft


IntelBroker sells GE's pipelines for $500 amid cyberattack probe. Uncover the th...

General Electric (GE), a stalwart in the American multinational scene, finds itself under scrutiny. A threat actor self-identified as IntelBroker, claims to have breached GE's development environment, an incident that has sparked concerns about the security of the company's data and systems. ## Alleged Breach Earlier this month, IntelBroker attempted to monetize their alleged access to GE's _"development and software pipelines"_ on a hacking forum, seeking $500 for the information. When met with a lack of serious buyers, the threat actor escalated their efforts, now offering both network access and supposedly stolen data. >>> "I am now selling the entire thing here separately, including access (SSH, SVN etc). Data includes much DARPA-related military information, files, SQL files, documents, etc.," IntelBroker declared on the forum. As evidence of the breach, screenshots were shared, purporting to be stolen GE data, notably including a database from GE Aviation with information on military projects. ## GE's Response In response to these claims, GE released a statement acknowledging the situation and asserting its commitment to investigating the alleged data leak. >>> _"We are aware of claims made by a bad actor regarding GE data and are investigating these claims. We will take appropriate measures to help protect the integrity of our systems,"_ stated a GE spokesperson to BleepingComputer. While the breach is yet to be confirmed, the involvement of IntelBroker raises eyebrows, given their track record of successful high-profile cyberattacks. ## IntelBroker's Notorious History IntelBroker has a history marked by successful cyber intrusions, including a breach of the [Weee! grocery service]( However, their most notable exploit involved the theft of sensitive personal information from the District of Columbia's D.C. Health Link program. In March, IntelBroker breached DC Health Link, exposing a misconfigured server accessible online. The ensuing sale of a stolen database containing personal information triggered widespread media coverage and a congressional hearing to scrutinize the breach's origins. ## Technical Insights ### Code Exposure and Vulnerabilities The threat actor's ability to compromise GE's development environment implies potential vulnerabilities in their code repositories and version control systems. The mention of _"access (SSH, SVN, etc.)"_ raises concerns about the exposure of critical components in GE's infrastructure. ### DARPA-Related Military Information The alleged inclusion of DARPA-related military information in the stolen data underscores the severity of the breach. This not only poses a risk to GE but also raises questions about the broader implications for national security. ![forum-post(4).jpg]( ***Screenshot of GE data and access sold on a hacking forum (BleepingComputer)*** ## Investigating Past Exploits To understand the potential ramifications of the GE breach, delving into IntelBroker's past exploits is crucial. The breach of DC Health Link, a healthcare marketplace for Washington, D.C., highlighted the vulnerability of misconfigured servers. ### Congressional Scrutiny The congressional hearing that followed the DC Health Link breach aimed to unravel the intricacies of the incident. Mila Kofman, Executive Director of the District of Columbia Health Benefit Exchange Authority, emphasized the exposure through a [misconfigured server](, emphasizing the importance of robust server configurations.

loading..   29-Nov-2023
loading..   3 min read



Ransomware attack on "Ethyrial: Echoes of Yore" MMORPG. 17,000 player accounts w...

The indie game publisher Gellyberry Studios experienced a severe setback as their MMORPG, "Ethyrial: Echoes of Yore," fell victim to a ransomware attack last Friday. The attackers targeted the main server, encrypting all data, including local backup drives, and disarmed the gaming world. ## Unfortunate Fallout The ransomware attack impacted a staggering 17,000 player accounts, wiping out in-game items and progress. The attack on this free-to-play MMORPG, available on [Steam]('s Early Access, sent shockwaves through the gaming community. The game, still in its early development phase, relies on monthly subscriptions and community support for ongoing development. The assailants, leveraging cryptographic ransomware, demanded payment in Bitcoin for a decryption key. Faced with the grim reality that paying might not guarantee the recovery of their data, Gellyberry Studios opted for a manual restoration of all affected systems. > "Last Friday morning, our server fell victim to a cryptographic ransomware attack... As such, we were forced to rebuild the server and create new account and character databases." - [Announcement on Discord]( ![announcement.png]( ***Discord Announcement*** ## Gellyberry's Resilience and Commitment Despite the challenges posed by the attack, Gellyberry Studios reassured the affected players that they would restore everything lost to the fullest extent possible. As a gesture of appreciation for the community's understanding and support, impacted players would receive all their items and progress back, along with a premium "pet." In response to the incident, Gellyberry Studios outlined proactive measures for the future, including an increased frequency of offline account database backups, the implementation of a P2P VPN for remote access to the development server, and restricted access through specific IP addresses. The attack on "Ethyrial: Echoes of Yore" is not an isolated incident. Ransomware has, unfortunately, become a recurring threat in the gaming industry. The attack on CD PROJEKT RED in February 2021 and the recent ransom demand of $10,000,000 from hackers targeting Riot Games in January 2023 underscore the severity of the issue. ### CD PROJEKT RED: A Precedent in Ransomware In 2021, the developers of "Cyberpunk 2077" and "Witcher 3," CD PROJEKT RED, faced a [ransomware attack]( by [HelloKitty ransomware]( The incident highlighted the vulnerability of even well-established game developers to cyber threats. ### Riot Games: A Recent Ransom Demand In the more recent case involving [Riot Games](, the creators of popular titles like "[League of Legends](" and "Valorant," hackers issued a ransom demand of $10,000,000. The threat to release stolen source code added a layer of complexity to the situation, emphasizing the high stakes in play. Gellyberry Studios, in their response to the attack, not only focused on technical solutions but also on empathetic gestures. Providing a premium "pet" to affected players demonstrates a commitment to the community's well-being beyond the digital realm. ### Strengthening Defenses: A Technical Perspective From a technical standpoint, the implementation of a P2P VPN and restricting server access to specific IP ranges are commendable steps taken by Gellyberry Studios. These measures aim to fortify the infrastructure against unauthorized access and potential breaches. ### Codebase and Scripts The underlying codebase and scripts are the silent guardians of virtual worlds. Developers must assess and reinforce the security of these foundations continually. Regular code audits, penetration testing, and adherence to secure coding practices become paramount in the face of evolving cyber threats. ### Key Takeaways: - The gaming industry faces recurring ransomware threats. - Gellyberry Studios opted for manual restoration post-ransomware attack. - Proactive cybersecurity measures include increased backups and restricted server access. - The human impact of cybersecurity incidents in gaming is profound. - The industry must collectively work towards a more secure gaming environment.

loading..   29-Nov-2023
loading..   4 min read


Discover how Slovenia's major power giant, HSE, experienced a ransomware attack....

Slovenia's power giant, Holding Slovenske Elektrarne (HSE), fell victim to a ransomware attack. While the incident compromised IT systems and encrypted files, HSE emphasizes that power production remains unscathed. ## **Attack Timeline and Response** The attack was disclosed last Wednesday, with containment achieved by Friday, November 24. Despite the crypto virus locking files, Uroš Svete, the Director of the Information Security Office, assured the public that power generation continued seamlessly. Immediate action involved notifying Si-CERT and the Ljubljana Police, with external experts engaged to curb the attack's spread. ## **Operational Resilience** Today, Uroš Svete and HSE's General Manager, Tomaž Štokelj, issued a [joint statement](, alleviating concerns about operational disruptions or significant economic damage. The impairment, confined to the websites of Šoštanj Thermal Power Plants and Velenje Coal Mine, underscores HSE's resilience amid adversity. ## **Rhysida Ransomware Group Implicated** Unofficial [reports]( point to the Rhysida ransomware gang as the perpetrator. Known for its sophisticated Techniques, Tactics, and Procedures (TTPs), Rhysida's recent activities triggered warnings from the FBI and CISA. Notably, Rhysida's ransom notes eschew monetary demands, only providing an email contact—a potential explanation for HSE's [lack of a ransom demand]( ![Rhysida_ransom_note.png]( ***Ransom Note by Rhysida Ransomware*** ## **Potential Breach Vector: Cloud Storage** Allegedly, Rhysida gained access by exploiting an unprotected cloud storage instance, pilfering passwords for HSE's systems. While these claims await HSE's confirmation, the incident underscores the evolving threat landscape, emphasizing the need for robust cloud security measures. ## **Rhysida's Track Record** Rhysida emerged in May 2023 and swiftly targeted high-profile organizations globally. From infiltrating the Chilean Army to affecting Prospect Medical and the British Library, the ransomware gang displayed a penchant for strategic targeting. Its attacks on healthcare entities even prompted a U.S. Department of Health and Human Services advisory. ## **Data Leak and Auction Dynamics** In a bold move, Rhysida recently listed stolen data from a Chinese state-owned electric power conglomerate for auction on its data leak site. The audacious demand of 50 BTC ($1,840,000) exemplifies the evolving monetization strategies employed by ransomware actors, posing severe challenges for cybersecurity professionals. ## **HSE's Response and Investigation** We tried to seek HSE's input on the allegations but are awaiting a response. The ongoing investigation underscores the intricacies of attributing these incidents and the challenges in verifying unofficial information.

loading..   28-Nov-2023
loading..   3 min read