Archive for the ‘cybercrime/malcode’ category: Page 8

Mar 3, 2022

The Growing Threat of Ransomware

Posted by in category: cybercrime/malcode

Guest contributor, Brian Wallace writes about the rising threat from cyber attackers who in 2021 have cost organizations over $20 billion.

Mar 2, 2022

NATO cybersecurity center finishes tests of quantum-proof network

Posted by in categories: cybercrime/malcode, quantum physics

The trial started in March 2021 and was completed in early 2022.

Mar 2, 2022

Nvidia Hack Continues with Release of DLSS Source Code

Posted by in category: cybercrime/malcode

The hackers who struck Nvidia last week have released source code related to DLSS into the wild.

Mar 2, 2022

Nvidia hack reportedly leaks six next-gen GeForce GPU names

Posted by in categories: cryptocurrencies, cybercrime/malcode

But no other genuine details have so far made it out of the stolen data folder.

The reported Nvidia hack has allegedly thrown up the codenames of a bunch of next-gen GPUs, which have now been leaked out to the press. The most pertinent ones for us would be the Lovelace GeForce GPUs, of which there are six listed, but here are also listings for the server-based Hopper and Blackwell GPUs. This looks to have come from an initial leak of some of the stolen documents, supplied to Videocardz.

The green team is allegedly being held to ransom over the Ethereum hash rate limiter attached to its most recent graphics card release after hacking group, Lapsus$, made off with around 1TB of sensitive data.

Continue reading “Nvidia hack reportedly leaks six next-gen GeForce GPU names” »

Mar 2, 2022

Second New ‘IsaacWiper’ Data Wiper Targets Ukraine After Russian Invasion

Posted by in categories: cybercrime/malcode, finance, mobile phones

A new, third, data wiper malware — dubbed “IsaacWiper” — is now targeting Ukrainian governmental systems.

Teabot android banking malware spreads again through google play store apps.

Mar 2, 2022

TeaBot Android Banking Malware Spreads Again Through Google Play Store Apps

Posted by in categories: cybercrime/malcode, finance, mobile phones

An Android banking trojan designed to steal credentials and SMS messages has been observed once again sneaking past Google Play Store protections to target users of more than 400 banking and financial apps, including those from Russia, China, and the U.S.

Mar 1, 2022

Nvidia Hackers Threaten to Release Mining-Limiter Killer

Posted by in category: cybercrime/malcode

But they also request that Nvidia remove the mining performance limiter itself.

Following last week’s purported hack conducted by South-America-based Lapsus$ group, the hackers have now started to release data obtained from the 1 TB-worth of stolen information — and threaten to release a mining performance unlocker should Nvidia not do it first.

Feb 28, 2022

Hackers attack train network to stop Putin’s troops moving to Ukraine

Posted by in categories: cybercrime/malcode, finance, transportation

The hackers claimed that the attack was to “slow down the transfer” of troops moving from Belarus to northern Ukraine, saying that they had put the trains in “manual control” mode which would “significantly slow down the movement of trains, but will not create emergency situations.”

An ideological aversion to high-stakes situations has been expressed by other hacking groups. Anonymous, which has claimed a number of attacks on Russia’s banks and services, the websites of the President of the Russian Federation and Russia’s Ministry of Defence, has said that critical infrastructure is a “no-go” due to the risk of exacerbating the already tumultuous situation in eastern Europe.

Sergei Voitehowich, a former employee of Belarus’s state-owned Belarus Railway company, said that the Cyber Partisans had damaged the train traffic control system and that while it has been restored, other systems were experiencing issues and making it “impossible to buy tickets”, according to Bloomberg.

Continue reading “Hackers attack train network to stop Putin’s troops moving to Ukraine” »

Feb 28, 2022

How China built a one-of-a-kind cyber-espionage behemoth to last

Posted by in categories: cybercrime/malcode, government

The “most advanced piece of malware” that China-linked hackers have ever been known to use was revealed today. Dubbed Daxin, the stealthy back door was used in espionage operations against governments around the world for a decade before it was caught.

But the newly discovered malware is no one-off. It’s yet another sign that a decade-long quest to become a cyber superpower is paying off for China. While Beijing’s hackers were once known for simple smash-and-grab operations, the country is now among the best in the world thanks to a strategy of tightened control, big spending, and an infrastructure for feeding hacking tools to the government that is unlike anything else in the world.

Feb 27, 2022

War in Ukraine indicates cybersecurity is no longer a choice

Posted by in categories: cybercrime/malcode, military

The publication in the Military-Industrial Kurier (VPK) on February 26, 2013, of an article by the Russian Chief of the General Staff, General Valery Gerasimov, entitled “The Value of Science in Foresight” [in Russian], has been seen by some analysts as a turning point in Russian military doctrine and the beginning of an explicit strategy of hybrid warfare. Indeed, information and cyber operations were an integral feature of Russia’s annexation of the Crimean Peninsula in 2014. Yet, the principal thesis of Gerasimov’s article is that alternative methods of conflict can be found to offset asymmetric disadvantages created by a superior enemy force. Such methods demand the application of the entire military-industrial complex to yield innovations in technology and tactics – the results of which can be seen in the proliferation of APT actors and computational propaganda operations observed by Western countries and their allies.

While we can only hope for a rapid cessation of the fighting in Ukraine, the consequences of Russian military intervention will extend far beyond the battlefield in years to come. Renewed focus and accelerated innovation and adoption of new technologies to protect the data and applications that Western societies depend on is now an imperative, not a choice – this is Gerasimov’s lesson.

The distinctions between war and peace, combatant and civilian, state actor and criminal proxy, are blurred in what has been termed the “fifth domain” of military operations. Collective cybersecurity in response to the increased prospect of cyberattack will demand not only political leadership, international cooperation, and industrial collaboration, but also the active participation of companies and individuals in the manner of civil defense, reminiscent of the Cold War. With the change in the world order brought about by Russia’s military action in Ukraine, we are all now standing on the frontline of cybersecurity.

Continue reading “War in Ukraine indicates cybersecurity is no longer a choice” »

Page 8 of 131First56789101112Last