- John Hammond
- Posts
- Cybersecurity Shenanigans #013: Ruthless ransomware, a trip across the pond, and...an endless conference?
Cybersecurity Shenanigans #013: Ruthless ransomware, a trip across the pond, and...an endless conference?
This month's cybersecurity scoop.
š Hey friend,
This month, we've got a(nother) cyberattack on journalists, a ransomware strain that doesnāt stop (so to speak), and a vulnerability that basically turns your well-intentioned scanner into an attack vector. In other words, itās just another Wednesday. š
On my end, Iāve been catching up on projects, planning some new training drops, and hanging out with some friends from the scambait scene overseas (photos forthcoming). Also squeezed in some sightseeing and found tech that absolutely needed to be rebooted. š
Letās dive ināand as always, thanks for being here!
ā JH
News & Commentary
Washington Post hit by targeted cyberattack šÆ
The Washington Post is investigating a cyberattack that breached the Microsoft email accounts of journalists, particularly those reporting on national security, economics, and China. (š)
The intrusion was discovered on June 12, and itās suspected to be the work of a foreign government actorāespecially since the tactics used are eerily similar to those we saw in the 2022 News Corp incident.
A full investigation is underway, and it sounds like credential resets for targets have already happened. I havenāt seen any reports that a broader system compromise happened, but the attack highlights the persistent risks journalists face as they naturally handle sensitive info.
Anubis ransomware campaign encrypts and wipes files š
A rare and ruthless ransomware strain has emerged, packing one heck of a punch.
Anubis, first discovered in the ransomware-as-a-service scene in December 2024, is a dual-threat vector. Itās able to encrypt data or trigger a wipe mode that reduces files to zero bytes, making recovery virtually impossibleāeven if the ransom is paid. (!!!)
Anubisās wipe mode (/WIPEMODE) doesnāt stop at just locking files. It erases content while leaving file names intact, ratcheting up the pressure on victims. So far, itās been widely deployed against healthcare, hospitality, and construction sites across Australia, Canada, Peru, and the US.
Anubis isnāt just encrypting your data. Itās daring you to pay up before everythingās gone (because we know how much hackers love rushing victims into taking action). If you see shadow copies vanish, think fast, act faster, and hope your backups are locked down off the grid.
Use Nessus Agent for Windows? Time to patch. š©¹
A fresh (as of June 16) set of high-severity vulnerabilities in Tenableās Nessus Agent prompted a quick patch in version 10.8.5 for Windows hosts. These flaws could allow a local attacker to escalate privileges to System, overwrite or delete arbitrary files, or even execute code remotelyāall while masquerading as legitimate agent activity.
The patch addressed three core issues: improper file handling that enabled data tampering, a privilege escalation pathway, and unchecked code executionāall bundled into a risk cluster that could be exploited by anyone with local access. If you're running Nessus Agent on Windows and havenāt moved to 10.8.5 yetā¦you know what to do.
No biggie hereājust a security scanner becoming a threat itself. š Seriously though, if you use Nessus Agent, patch ASAP.
Sponsor

Automate your most important workflows today with Tines Community Edition
From SOAR to incident response, Tines breaks down barriers across systems with fewer duplicate efforts, unnecessary alerts, and information silos.
Build, run, and monitor workflows safely and securely within minutes with Tines Community Edition.
It's free to use and includes enterprise-grade features like Action templates, reporting, SSO/SAML, and more. Sign up nowāno credit cards or sales call requiredāand start building today!

Email being clipped?
Hereās some actually helpful advice: You can view the email in your browser: https://johnhammond.beehiiv.com/p/cybersecurity-shenanigans-013.
(And as always, thanks for nothing, Clippy. š)
Latest Content
YouTube Videos
// My good friend Shikata (right X tag this time, I promise š ) chats with me about how to hack Active Directory Certificate Services. |
// Itās almost summer. Do you have your phishing kit ready? š |
// Hackers are using fake AI video generators to spread malwareā¦because the actual Minecraft movie isnāt 164kb, I promise you. š |
Just Hacking Training š¤
June Announcements
ConDef Lite is Available NOW!
ConDef Lite is the DIY lab version of Constructing Defense 2025. All the same great content (100+ videos, step-by-step instructions, quizzes, and more), but you also get the hands-on practical knowledge to launch your cybersecurity career in your own home lab. Only $120 until June 30 at Midnight ET.
Two Amazing Deals!
Win JHT Training! Buy Cori Macyās Phishing: A Technical Course for Red Teaming for only $10 before the official July 1 release for a chance to win courses by me and JHT All-Stars!
Free OpSec Course! In honor of Fatherās Day, Mishaal Khan lowered the minimum price of OpSec ā Privacy for Security Professionals to $0 for everyone until June 20!
Additional Releases This Month:
Free UC ā Space Security by Adam Scheuer
Free UC ā Google Dorking by Bailey Marshall
Free UC ā AWS Security by Carlos Polop
Blog ā Mind Over Malware ā The Psychology of CTI by Jennifer Funk
Coming Soon!
WMD Advanced, MADS Vol 4
Monthly CTFs!
Lots of Hack-Alongs and Free Upskill Challenges
Just Hacking Training is a platform providing "Focused Technical Training for All Levels" with 60+ affordable, hands-on options in four categories: Courses, Free Upskill Challenges, Hack-Alongs and CTFs. With new content released twice a month throughout 2025, bi-monthly livestreams with me and our All-Star contributors, and even some āName Your Priceā options, JHT will advance your career regardless of experience level or budget.
Come hang out with us hackers in Discord and engage with me, our All-Star instructors, students, and the rest of our community.
You might not believe me but @ScammerPayback took me on a very fancy date in Paris
ā John Hammond (@_JohnHammond)
6:57 PM ⢠Jun 9, 2025
record for two hours
get eight minutes of usable footageā John Hammond (@_JohnHammond)
10:40 PM ⢠Jun 8, 2025
"Talk Tuah" was my favorite Web challenge that I created for #NahamCon2025 CTF š
ā John Hammond (@_JohnHammond)
10:43 PM ⢠May 23, 2025
Scambait Community, Assemble š
I just got back from an overseas trip where I met up with the Peopleās Call Center: a group of folks (including my friends Pierogi and Jim Browning) who love giving scammers a taste of their own medicine.
For obvious reasons, I canāt share much of what happened at the call center, so instead, Iāll share a collage of photos from London and Paris.

And of course, I had to goof off a bit. š

And I found the random piece of technology that needs to be turned off and on again.

ContinuumCon Begins This Friday!
Ready for a conference that doubles as a hands-on workshop? Join me and my friends over at Level Effect for ContinuumCon, the conference that doesnāt end. (Seriously.)
Got feedback?
Weāre 13 issues into this newsletter, and Iād love to check in with you: Is this thing helpful? Mildly entertaining? Awkward?
I canāt promise to make it less awkward, but I would love your ideas on how to make it more entertaining and helpful as a resource.
Please reply to this email and let me know what youāre loving ā and what youād like to see in this thing.
Thank you!
Social