• John Hammond
  • Posts
  • Cybersecurity Shenanigans #013: Ruthless ransomware, a trip across the pond, and...an endless conference?

Cybersecurity Shenanigans #013: Ruthless ransomware, a trip across the pond, and...an endless conference?

This month's cybersecurity scoop.

👋 Hey friend,

This month, we've got a(nother) cyberattack on journalists, a ransomware strain that doesn’t stop (so to speak), and a vulnerability that basically turns your well-intentioned scanner into an attack vector. In other words, it’s just another Wednesday. 😛

On my end, I’ve been catching up on projects, planning some new training drops, and hanging out with some friends from the scambait scene overseas (photos forthcoming). Also squeezed in some sightseeing and found tech that absolutely needed to be rebooted. 😂

Let’s dive in—and as always, thanks for being here!

— JH

News & Commentary

Washington Post hit by targeted cyberattack 🎯

The Washington Post is investigating a cyberattack that breached the Microsoft email accounts of journalists, particularly those reporting on national security, economics, and China. (👀)

The intrusion was discovered on June 12, and it’s suspected to be the work of a foreign government actor—especially since the tactics used are eerily similar to those we saw in the 2022 News Corp incident.

A full investigation is underway, and it sounds like credential resets for targets have already happened. I haven’t seen any reports that a broader system compromise happened, but the attack highlights the persistent risks journalists face as they naturally handle sensitive info.

Anubis ransomware campaign encrypts and wipes files 😖

A rare and ruthless ransomware strain has emerged, packing one heck of a punch.

Anubis, first discovered in the ransomware-as-a-service scene in December 2024, is a dual-threat vector. It’s able to encrypt data or trigger a wipe mode that reduces files to zero bytes, making recovery virtually impossible—even if the ransom is paid. (!!!)

Anubis’s wipe mode (/WIPEMODE) doesn’t stop at just locking files. It erases content while leaving file names intact, ratcheting up the pressure on victims. So far, it’s been widely deployed against healthcare, hospitality, and construction sites across Australia, Canada, Peru, and the US.

Anubis isn’t just encrypting your data. It’s daring you to pay up before everything’s gone (because we know how much hackers love rushing victims into taking action). If you see shadow copies vanish, think fast, act faster, and hope your backups are locked down off the grid.

Use Nessus Agent for Windows? Time to patch. 🩹

A fresh (as of June 16) set of high-severity vulnerabilities in Tenable’s Nessus Agent prompted a quick patch in version 10.8.5 for Windows hosts. These flaws could allow a local attacker to escalate privileges to System, overwrite or delete arbitrary files, or even execute code remotely—all while masquerading as legitimate agent activity.

The patch addressed three core issues: improper file handling that enabled data tampering, a privilege escalation pathway, and unchecked code execution—all bundled into a risk cluster that could be exploited by anyone with local access. If you're running Nessus Agent on Windows and haven’t moved to 10.8.5 yet…you know what to do.

No biggie here—just a security scanner becoming a threat itself. 😅 Seriously though, if you use Nessus Agent, patch ASAP.

Sponsor

Automate your most important workflows today with Tines Community Edition

From SOAR to incident response, Tines breaks down barriers across systems with fewer duplicate efforts, unnecessary alerts, and information silos.

Build, run, and monitor workflows safely and securely within minutes with Tines Community Edition.

It's free to use and includes enterprise-grade features like Action templates, reporting, SSO/SAML, and more. Sign up now—no credit cards or sales call required—and start building today!

Email being clipped?

Here’s some actually helpful advice: You can view the email in your browser: https://johnhammond.beehiiv.com/p/cybersecurity-shenanigans-013.

(And as always, thanks for nothing, Clippy. 💙)

Latest Content

YouTube Videos

// My good friend Shikata (right X tag this time, I promise 😅) chats with me about how to hack Active Directory Certificate Services.

// It’s almost summer. Do you have your phishing kit ready? 😏

// Hackers are using fake AI video generators to spread malware…because the actual Minecraft movie isn’t 164kb, I promise you. 😂

Just Hacking Training 🤓
June Announcements

ConDef Lite is Available NOW!

ConDef Lite is the DIY lab version of Constructing Defense 2025. All the same great content (100+ videos, step-by-step instructions, quizzes, and more), but you also get the hands-on practical knowledge to launch your cybersecurity career in your own home lab. Only $120 until June 30 at Midnight ET.

Two Amazing Deals!

Additional Releases This Month:

Coming Soon!

  • WMD Advanced, MADS Vol 4

  • Monthly CTFs!

  • Lots of Hack-Alongs and Free Upskill Challenges

Just Hacking Training is a platform providing "Focused Technical Training for All Levels" with 60+ affordable, hands-on options in four categories: Courses, Free Upskill Challenges, Hack-Alongs and CTFs. With new content released twice a month throughout 2025, bi-monthly livestreams with me and our All-Star contributors, and even some “Name Your Price” options, JHT will advance your career regardless of experience level or budget.

Come hang out with us hackers in Discord and engage with me, our All-Star instructors, students, and the rest of our community.

Social

Scambait Community, Assemble 😏

I just got back from an overseas trip where I met up with the People’s Call Center: a group of folks (including my friends Pierogi and Jim Browning) who love giving scammers a taste of their own medicine.

For obvious reasons, I can’t share much of what happened at the call center, so instead, I’ll share a collage of photos from London and Paris.

And of course, I had to goof off a bit. 😜

And I found the random piece of technology that needs to be turned off and on again.

ContinuumCon Begins This Friday!

Ready for a conference that doubles as a hands-on workshop? Join me and my friends over at Level Effect for ContinuumCon, the conference that doesn’t end. (Seriously.)

Check out the schedule, grab your ticket, and see you Friday, June 20!

Got feedback?

We’re 13 issues into this newsletter, and I’d love to check in with you: Is this thing helpful? Mildly entertaining? Awkward?

I can’t promise to make it less awkward, but I would love your ideas on how to make it more entertaining and helpful as a resource.

Please reply to this email and let me know what you’re loving — and what you’d like to see in this thing.

Thank you!