Blog

Archive for the ‘government’ category: Page 102

Dec 21, 2020

Big tech companies including Intel, Nvidia, and Cisco were all infected during the SolarWinds hack

Posted by in categories: cybercrime/malcode, government

There are many reasons why hackers might want to get into a big tech company’s systems.


Big tech companies like Intel and Nvidia had their computers hacked, along with the departments of the US federal government, in the SolarWinds hack.

Dec 20, 2020

Canada launches strategy to become global hydrogen leader

Posted by in categories: economics, energy, government

The Canadian government has launched a strategy that sees low-carbon and zero-emission hydrogen fuel technology as a key part of the nation’s path to net-zero carbon emissions by 2050. The strategy is underpinned by a federal investment of CAD1.5 billion (USD1.2 billion) in a Low-carbon and Zero-emissions Fuels Fund to increase the production and use of low-carbon fuels, including hydrogen.

“Hydrogen’s moment has come. The economic and environmental opportunities for our workers and communities are real. There is global momentum, and Canada is harnessing it,” Minister of Natural Resources Seamus O’Regan said as he a launched the strategy on 16 December.

Hydrogen Strategy for Canada is designed to spur investment and partnerships to establish Canada as a global supplier of hydrogen and to increase domestic production. This will transform the Canadian energy sector, NRCan — the federal department of natural resources — said.

Dec 19, 2020

Bill Gates Invests in Hydrogen-Powered Airplane Startup

Posted by in categories: energy, government, transportation

The money will go towards fuel cells powerful enough to fly a passenger plane.

Dec 19, 2020

How Russian hackers infiltrated the US government for months without being spotted

Posted by in category: government

And why it could take months more to discover how many other governments and companies have been breached.

By

Dec 18, 2020

Microsoft says it found malicious software in its systems

Posted by in categories: cybercrime/malcode, government

SAN FRANCISCO (Reuters)-Microsoft Corp said on Thursday it found malicious software in its systems related to a massive hacking campaign disclosed by U.S. officials this week, adding a top technology target to a growing list of attacked government agencies.

The Redmond, Washington company is a user of Orion, the widely deployed networking management software from SolarWinds Corp which was used in the suspected Russian attacks on vital U.S. agencies and others.

Microsoft also had its own products leveraged to attack victims, said people familiar with the matter. The U.S. National Security Agency issued a rare “cybersecurity advisory” Thursday detailing how certain Microsoft Azure cloud services may have been compromised by hackers and directing users to lock down their systems.

Dec 17, 2020

Report: Hackers target City of Austin networks

Posted by in categories: cybercrime/malcode, government, transportation

According to a report from the Intercept, “state-sponsored hackers believed to be from Russia have breached the city network.” City officials told KVUE they are aware of the hacking group but cannot comment on an ongoing investigation.

The breach is believed to have started in October as part of a series of hacks allegedly carried out by the group Berserk Bear, as reportedly revealed by Microsoft Threat Intelligence Center documents obtained by the Intercept.

According to an October CISA alert, a Russian state-sponsored actor was targeting federal, state, territorial and tribal government networks and aviation networks. CISA urged entities to perform a full password reset and systematically rebuild the network. A statement following the alert named Berserk Bear as the actor, with Texas included in a map of compromised targets.

Dec 17, 2020

Microsoft president sounds alarm on ‘ongoing’ SolarWinds hack, identifies 40 more precise targets

Posted by in categories: cybercrime/malcode, government

Microsoft wants you to know this hack is even bigger than you think.


Microsoft president Brad Smith warned that the wide-ranging hack of the SolarWinds’ Orion IT software is “ongoing,” and that investigations reveal “an attack that is remarkable for its scope, sophistication and impact.” The breach targeted several US government agencies and is believed to have been carried out by Russian nation-state hackers.

Smith characterized the hack as “a moment of reckoning” and laid out in no uncertain terms just how large and how dangerous Microsoft believes the hack to be. It “represents an act of recklessness that created a serious technological vulnerability for the United States and the world,” Smith argues.

Continue reading “Microsoft president sounds alarm on ‘ongoing’ SolarWinds hack, identifies 40 more precise targets” »

Dec 17, 2020

FireEye, Microsoft find ‘killswitch’ to hamper SolarWinds-related malware

Posted by in categories: cybercrime/malcode, government

As the U.S. government works to contain a sprawling hacking campaign that relies on software in technology from SolarWinds, a federal contractor, technology firms are disabling some of the hackers’ key infrastructure.

Cybersecurity giant FireEye on Wednesday said that it had worked with Microsoft and the domain registrar GoDaddy to take over one of the domains that attackers had used to send malicious code to victim machines. The move is no panacea for stopping the suspected state-sponsored hacking campaign, though it could help stem the tide of victims, which reportedly includes the departments of Treasury and Homeland Security.

The seized domain, known as a “killswitch,” will “affect new and previous” infections of the malicious code coming from that particular domain, FireEye said in a statement that was first reported by independent journalist Brian Krebs. “Depending on the IP address returned when the malware resolves avsvmcloud[.]com, under certain conditions, the malware would terminate itself and prevent further execution.”

Dec 17, 2020

Operation SignSight: Supply‑chain attack against a certification authority in Southeast Asia

Posted by in category: government

ESET researchers have uncovered a supply-chain attack on the website of a government in Southeast Asia.

Just a few weeks after the supply-chain attack on the Able Desktop software, another similar attack occurred on the website of the Vietnam Government Certification Authority (VGCA): ca.gov.vn. The attackers modified two of the software installers available for download on this website and added a backdoor in order to compromise users of the legitimate application.

Dec 17, 2020

Suspected Russian Cyberattack Began With Ubiquitous Software Company

Posted by in categories: cybercrime/malcode, government

The widespread and monthslong hack of the U.S. government and some of America’s biggest corporations was enabled by an unlikely source: a little-known Austin, Texas, software company called SolarWinds Corp. that until this week was a household name only to computer network administrators.

Security investigators say the company that boasts more than 400 of the Fortune 500 corporations and many government agencies as clients provided the perfect delivery mechanism for a carefully executed intrusion attributed to Russia’s foreign-intelligence service.


SolarWinds provides the tools many companies use to manage their computer networks. That’s what made the hack of U.S. government agencies and some of America’s biggest corporations so pernicious.

Continue reading “Suspected Russian Cyberattack Began With Ubiquitous Software Company” »