Blog

Archive for the ‘cybercrime/malcode’ category: Page 135

Dec 8, 2020

Spies with Russia’s foreign intelligence service believed to have hacked a top American cybersecurity firm and stolen its sensitive tools

Posted by in category: cybercrime/malcode

The Russians stole hacking tools that FireEye uses to detect weaknesses in its customers’ networks, according to a person familiar with the matter.

Dec 8, 2020

FireEye, a Top Cybersecurity Firm, Says It Was Hacked by a Nation-State

Posted by in category: cybercrime/malcode

The Silicon Valley company said hackers — almost certainly Russian — made off with tools that could be used to mount new attacks around the world.

Dec 8, 2020

Cybersecurity firm FireEye says it was hacked by a nation-state

Posted by in categories: cybercrime/malcode, government

FireEye, normally the first company that cyberattack victims will call, has now admitted it too has fallen victim to hackers, which the company called a “sophisticated threat actor” that was likely backed by a nation-state.

In a blog post confirming the breach, the company’s chief executive Kevin Mandia said the nation-backed hackers have “top-tier offensive capabilities,” but did not attribute blame or say which government was behind the attack.

Mandia, who founded Mandiant, the incident response firm acquired by FireEye in 2014, said the hackers used a “novel combination of techniques not witnessed by us or our partners in the past” to steal hacking tools used typically by red teams, which are tasked with launching authorized but offensive hacking campaigns against customers in order to find weaknesses or vulnerabilities before malicious hackers do.

Nov 29, 2020

Elon Musk’s Starlink May Potentially Revolutionize Healthcare

Posted by in categories: biotech/medical, cybercrime/malcode, education, Elon Musk, finance, internet, satellites

Global #connectivity lets for #digitalidentity for billions of people worldwide, giving them access to #telehealth, #education, #careers, #entertainment and #finance services, as well as raising #cybersecurity and #dataprivacy concernsRe-sharing. Starlink can help telemedicine become more reliable and available to people in need. Especially those in rurual or far flung locations.


Video Source/Credit: SpaceX Youtube Channel

Continue reading “Elon Musk’s Starlink May Potentially Revolutionize Healthcare” »

Nov 26, 2020

US Fertility says patient data was stolen in a ransomware attack

Posted by in categories: biotech/medical, cybercrime/malcode

The company has 55 fertility clinics across the U.S.

Nov 24, 2020

China’s State-Sponsored Hacking Hits Companies Around the World

Posted by in categories: cybercrime/malcode, government

The group uses tools outside of the country for this attack campaign, as well as custom malware, including custom malware – including backdoor. Hartip – that Symantec has never used. Compromised computers at the time of the attack included domain controllers and file servers, and there is evidence that files are being filtered by some compromised computers. Attackers frequently used DLL side loading in this campaign and took advantage of the patched Zerologon vulnerability in August 2020.

Symantec first addressed this campaign when suspicious DLL-side loading activity on one the customers networks triggered a warning from Cloud Analytics technology available in Symantec Endpoint Security Complete (SESC).

The campaign is spread across the world, with a large number of regions detected as the victims of the attack. The common link between all the organisations that were attacked were their links to japan or japan based organisations. In the map you can clearly see that there was a reportedly Chinese-government-linked group attacking companies within China’s borders but, like many of the companies targeted in this campaign, the target in that instance is a subsidiary of a Japanese organization.

Nov 24, 2020

Coronavirus: North Korea and Russia hackers ‘targeting vaccine’

Posted by in categories: biotech/medical, cybercrime/malcode

Tech giant Microsoft says it has detected cyber-attacks aimed at vaccine researchers.

Nov 23, 2020

Gene editing technologies and applications for insects

Posted by in categories: bioengineering, biotech/medical, cybercrime/malcode, genetics

Initially discovered in bacteria, CRISPR-based genome editing endonucleases have proven remarkably amenable for adaptation to insects. To date, these endonucleases have been utilized in a plethora of both model and non-model insects including diverse flies, bees, beetles, butterflies, moths, and grasshoppers, to name a few, thereby revolutionizing functional genomics of insects. In addition to basic genome editing, they have also been invaluable for advanced genome engineering and synthetic biology applications. Here we explore the recent genome editing advancements in insects for generating site-specific genomic mutations, insertions, deletions, as well as more advanced applications such as Homology Assisted Genome Knock-in (HACK), potential to utilize DNA base editing, generating predictable reciprocal chromosomal translocations, and development gene drives to control the fate of wild populations.

Nov 23, 2020

GoDaddy Employees Used in Attacks on Multiple Cryptocurrency Services

Posted by in categories: cryptocurrencies, cybercrime/malcode

Fraudsters redirected email and web traffic destined for several cryptocurrency trading platforms over the past week. The attacks were facilitated by scams targeting employees at GoDaddy, the world’s largest domain name registrar, KrebsOnSecurity has learned.

The incident is the latest incursion at GoDaddy that relied on tricking employees into transferring ownership and/or control over targeted domains to fraudsters. In March, a voice phishing scam targeting GoDaddy support employees allowed attackers to assume control over at least a half-dozen domain names, including transaction brokering site escrow.com.

Nov 21, 2020

Botnets have been silently mass-scanning the internet for unsecured ENV files

Posted by in categories: cybercrime/malcode, internet

Threat actors are looking for API tokens, passwords, and database logins usually stored in ENV files.