Archive for the ‘cybercrime/malcode’ category: Page 139
Dec 8, 2020
Hackers Breached Israeli Water Reservoir HMI System
Posted by Quinn Sena in categories: cybercrime/malcode, cyborgs, internet
Hackers with possible links to Iran appear to have breached an unprotected human-machine interface system at an Israeli water reservoir that connected directly to the internet and lacked security protocols, according to industrial cybersecurity firm Otorio.
See Also: Live Webinar | Securing Mobile Endpoints to Protect IP in the Pharma Industry
The security firm reports that the alleged Iranian hacking group, referred to as “Unidentified TEAM,” published a video of the attack on an unnamed reclaimed Israeli water reservoir human-machine interface (HMI) system, which did not require any authentication to access and modify the system. This allowed the threat actors to tamper with the water pressure, change temperatures and more.
Dec 8, 2020
Norway says Russian groups ‘likely’ behind Parliament cyber attack
Posted by Quinn Sena in category: cybercrime/malcode
Norway’s domestic security agency has said that Russian hackers linked to the country’s military intelligence service were “likely” behind a cyber attack against the Norwegian parliament this year.
The network operation behind the attack was part of “a broader national and international campaign that lasts at least since 2019” the Norwegian Police Security Service (PST) said in a statement.
Dec 8, 2020
Spies with Russia’s foreign intelligence service believed to have hacked a top American cybersecurity firm and stolen its sensitive tools
Posted by Quinn Sena in category: cybercrime/malcode
The Russians stole hacking tools that FireEye uses to detect weaknesses in its customers’ networks, according to a person familiar with the matter.
Dec 8, 2020
FireEye, a Top Cybersecurity Firm, Says It Was Hacked by a Nation-State
Posted by Genevieve Klien in category: cybercrime/malcode
The Silicon Valley company said hackers — almost certainly Russian — made off with tools that could be used to mount new attacks around the world.
Dec 8, 2020
Cybersecurity firm FireEye says it was hacked by a nation-state
Posted by Quinn Sena in categories: cybercrime/malcode, government
FireEye, normally the first company that cyberattack victims will call, has now admitted it too has fallen victim to hackers, which the company called a “sophisticated threat actor” that was likely backed by a nation-state.
In a blog post confirming the breach, the company’s chief executive Kevin Mandia said the nation-backed hackers have “top-tier offensive capabilities,” but did not attribute blame or say which government was behind the attack.
Mandia, who founded Mandiant, the incident response firm acquired by FireEye in 2014, said the hackers used a “novel combination of techniques not witnessed by us or our partners in the past” to steal hacking tools used typically by red teams, which are tasked with launching authorized but offensive hacking campaigns against customers in order to find weaknesses or vulnerabilities before malicious hackers do.
Nov 29, 2020
Elon Musk’s Starlink May Potentially Revolutionize Healthcare
Posted by Raphael Ramos in categories: biotech/medical, cybercrime/malcode, education, Elon Musk, finance, internet, satellites
Global #connectivity lets for #digitalidentity for billions of people worldwide, giving them access to #telehealth, #education, #careers, #entertainment and #finance services, as well as raising #cybersecurity and #dataprivacy concernsRe-sharing. Starlink can help telemedicine become more reliable and available to people in need. Especially those in rurual or far flung locations.
Video Source/Credit: SpaceX Youtube Channel
Continue reading “Elon Musk’s Starlink May Potentially Revolutionize Healthcare” »
Nov 26, 2020
US Fertility says patient data was stolen in a ransomware attack
Posted by Genevieve Klien in categories: biotech/medical, cybercrime/malcode
Nov 24, 2020
China’s State-Sponsored Hacking Hits Companies Around the World
Posted by Quinn Sena in categories: cybercrime/malcode, government
The group uses tools outside of the country for this attack campaign, as well as custom malware, including custom malware – including backdoor. Hartip – that Symantec has never used. Compromised computers at the time of the attack included domain controllers and file servers, and there is evidence that files are being filtered by some compromised computers. Attackers frequently used DLL side loading in this campaign and took advantage of the patched Zerologon vulnerability in August 2020.
Symantec first addressed this campaign when suspicious DLL-side loading activity on one the customers networks triggered a warning from Cloud Analytics technology available in Symantec Endpoint Security Complete (SESC).
The campaign is spread across the world, with a large number of regions detected as the victims of the attack. The common link between all the organisations that were attacked were their links to japan or japan based organisations. In the map you can clearly see that there was a reportedly Chinese-government-linked group attacking companies within China’s borders but, like many of the companies targeted in this campaign, the target in that instance is a subsidiary of a Japanese organization.