Blog

Archive for the ‘cybercrime/malcode’ category: Page 137

Nov 7, 2020

Hacker group uses Solaris zero-day to breach corporate networks

Posted by in category: cybercrime/malcode

The zero-day appears to have been bought off a black-market website for $3,000.

Nov 6, 2020

Linux version of RansomEXX ransomware discovered

Posted by in category: cybercrime/malcode

This marks the first time a major Windows ransomware strain has been ported to Linux to aid hackers in their targeted intrusions.

Nov 5, 2020

Ransomware Hackers Just Slammed Capcom’s Corporate Networks

Posted by in category: cybercrime/malcode

Japanese game developer Capcom—creator of classic worldwide hits like Street Fighter, and Resident Evil —has been hit with a ransomware attack to its internal networks, compromising a mass of corporate intel on the company’s internal operations.

Nov 4, 2020

Six Russian GRU Officers Charged in Connection with Worldwide Deployment of Destructive Malware and Other Disruptive Actions in Cyberspace

Posted by in category: cybercrime/malcode

On Oct. 15, 2020, a federal grand jury in Pittsburgh returned an indictment charging six computer hackers, all of whom were residents and nationals of the Russian Federation (Russia) and officers in Unit 74455 of the Russian Main Intelligence Directorate (GRU), a military intelligence agency of the General Staff of the Armed Forces.

These GRU hackers and their co-conspirators engaged in computer intrusions and attacks intended to support Russian government efforts to undermine, retaliate against, or otherwise destabilize: (1) Ukraine; (2) Georgia; (3) elections in France; (4) efforts to hold Russia accountable for its use of a weapons-grade nerve agent, Novichok, on foreign soil; and (5) the 2018 PyeongChang Winter Olympic Games after Russian athletes were banned from participating under their nation’s flag, as a consequence of Russian government-sponsored doping effort.

Their computer attacks used some of the world’s most destructive malware to date, including: KillDisk and Industroyer, which each caused blackouts in Ukraine; NotPetya, which caused nearly $1 billion in losses to the three victims identified in the indictment alone; and Olympic Destroyer, which disrupted thousands of computers used to support the 2018 PyeongChang Winter Olympics. The indictment charges the defendants with conspiracy, computer hacking, wire fraud, aggravated identity theft, and false registration of a domain name.

Nov 4, 2020

Dragon’s cyber hacking operations: State sponsored game-plan

Posted by in categories: biotech/medical, cybercrime/malcode, economics, government, military

In the last few years, countless cyber-attacks were reported globally that were linked to the People’s Republic of China. The Chinese cyber-hackers, who target the foreign networks and websites are sponsored by the Chinese government. They are highly trained and have acquired abilities not only to exploit common vulnerabilities but also to discover and even create new vulnerabilities.

The US National Security Agency’s in-depth report of 23rd October points out that one of the greatest threats to the US National Security Systems, Defence Industrial Base and Department of Defence information networks is the “Chinese state sponsored malicious cyber activity”. The report underlines that the Chinese hackers exploit “computer networks of interest that hold sensitive intellectual property, economic, political, and military information.”

In July 2020, US had ordered the closure of the Chinese consulate in Huston, when it discovered that the Chinese officials there were involved in the intellectual property theft and indicted two Chinese nationals for allegedly hacking hundreds of companies and crucially had attempted to steal coronavirus vaccine research. The United States Department of Justice has charged five Chinese national for their involvement in hacking targets not only in the US governments but also the networks of the Indian and Vietnam government. They also carried out attacks on the UK government network unsuccessfully.

Nov 4, 2020

Israeli innovation plugs into emerging energy-tech sector

Posted by in categories: biotech/medical, cybercrime/malcode, economics

“There are two critical factors in this world: time and energy. Time is the only limited resource and therefore the most important one in our lives. Energy moves everything — our bodies, our lives and even all the digital revolution that is not physical depends on energy to be shared. We have no more time to cure the world and the Covid-19 is an amazing gift to better understand the important and critical things of our lives. It is a very important wake-up call for everyone.”

As more Israeli companies continue to seek solutions to economic and environmental challenges, we’ll see more local investors deploy capital in this space. Lack of acquisitions in this space – as opposed to a vertical like cybersecurity — are one main reason for the initial hesitancy of Israeli VCs.

Regardless of social impact or double bottom line investing, Israel is poised to lead another vertical impacting our global community. This has life-altering ramifications for future generations.

Nov 1, 2020

US Cyber Command exposes new Russian malware

Posted by in category: cybercrime/malcode

Together with CISA and the FBI, US Cyber Command wish Russian state hackers a “Happy Halloween!”

Oct 31, 2020

Quantum-computing pioneer warns of complacency over Internet security

Posted by in categories: cybercrime/malcode, encryption, internet, quantum physics

Quantum computers are now a reality, although they are still too rudimentary to factor numbers of more than two digits. But it is only a matter of time until quantum computers threaten Internet encryption.

Nature caught up with Shor to ask him about the impact of his work — and where Internet security is heading.


Nature talks to Peter Shor 25 years after he showed how to make quantum computations feasible — and how they could endanger our data.

Oct 30, 2020

Officials Warn of Cyberattacks on Hospitals as Virus Cases Spike

Posted by in categories: biotech/medical, cybercrime/malcode

Hundreds of American hospitals are being targeted in cyberattacks by the same Russian hackers who American officials and researchers fear could sow mayhem around next week’s election.

The attacks on American hospitals, clinics and medical complexes are intended to take those facilities offline and hold their data hostage in exchange for multimillion-dollar ransom payments, just as coronavirus cases spike across the United States.

“We expect panic,” one hacker involved in the attacks said in Russian during a private exchange on Monday that was captured by Hold Security, a security company that tracks online criminals.

Oct 30, 2020

Hackers are on the hunt for Oracle servers vulnerable to potent exploit

Posted by in category: cybercrime/malcode

Code-execution bug has severity rating of 9.8 out of 10; little skill needed to exploit.