Notes from the cyber phases of the hybrid war against Ukraine. Conti retires its brand, and LockBit 2.0 is now tops in ransomware. Extortion skips the encryption. Cyber exercise in the financial sector.

Published: June 27, 2022, 8:15 p.m.

Lithuania sustains a major DDoS attack. Lessons from NotPetya. Conti's brand appears to have gone into hiding. Online extortion now tends to skip the ransomware proper. Josh Ray from Accenture on how social engineering is evolving for underground threat actors. Rick Howard looks at Chaos Engineering. US financial institutions conduct a coordinated cybersecurity exercise.\n\nFor links to all of today's stories check out our CyberWire daily news briefing:\nhttps://thecyberwire.com/newsletters/daily-briefing/11/122\n\nSelected reading.\nRussia's Killnet hacker group says it attacked Lithuania (Reuters)\nThe hacker group KillNet has published an ultimatum to the Lithuanian authorities (TDPel Media)\xa0\n5 years after NotPetya: Lessons learned (CSO Online)\xa0\nThe cyber security impact of Operation Russia by Anonymous (ComputerWeekly)\nConti ransomware finally shuts down data leak, negotiation sites (BleepingComputer)\nThe Conti Enterprise: ransomware gang that published data belonging to 850 companies (Group-IB)\nFake copyright infringement emails install LockBit ransomware (BleepingComputer)\nNCC Group Monthly Threat Pulse \u2013 May 2022 (NCC Group)\nWe're now truly in the era of ransomware as pure extortion without the encryption (Register)\nWall Street Banks Quietly Test Cyber Defenses at Treasury\u2019s Direction (Bloomberg)\nLearn more about your ad choices. Visit megaphone.fm/adchoices