Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 83

Dec 25, 2020

SolarWinds Hack Infected Critical Infrastructure, Including Power Industry

Posted by in categories: cybercrime/malcode, energy

The companies involved used compromised software, but it’s not clear if hackers entered their networks. Finding out could be difficult.

Dec 24, 2020

Emotet Returns to Hit 100K Mailboxes Per Day

Posted by in categories: cybercrime/malcode, finance

Just in time for the Christmas holiday, Emotet is sending the gift of Trickbot.

After a lull of nearly two months, the Emotet botnet has returned with updated payloads and a campaign that is hitting 100, 000 targets per day.

Emotet started life as a banking trojan in 2014 and has continually evolved to become a full-service threat-delivery mechanism. It can install a collection of malware on victim machines, including information stealers, email harvesters, self-propagation mechanisms and ransomware. It was last seen in volume in October, targeting volunteers for the Democratic National Committee (DNC); and before that, it became active in July after a five-month hiatus, dropping the Trickbot trojan. Before that, in February, it was seen in a campaign that sent SMS messages purporting to be from victims’ banks.

Dec 23, 2020

How the SolarWinds hackers are targeting cloud services in unprecedented cyberattack

Posted by in category: cybercrime/malcode

[Editor’s Note: Independent security consultant Christopher Budd worked previously in Microsoft’s Security Response Center for 10 years.]

Analysis: To understand where the SolarWinds attackers are going next, and how to defend against them, look to the clouds.

The SolarWinds supply chain attacks are unprecedented in many ways. The attacks are sophisticated in execution, broad in scope, and incredibly potent in their effectiveness. But perhaps most notable is the unprecedented manner in which the SolarWinds attackers seem to be seeking access to cloud-based services as one of their key objectives.

Dec 23, 2020

Covid-19 Vaccines Are Coming—So Are Hackers

Posted by in categories: biotech/medical, cybercrime/malcode

Covid-19 vaccines are coming—so are hackers.


As drugmakers distribute Covid-19 vaccines, cybersecurity experts are warning against the growing threat of tampering and theft by organized crime networks. WSJ explains how hackers are targeting the vaccine rollout during the pandemic. Illustration: George Downs.

Continue reading “Covid-19 Vaccines Are Coming—So Are Hackers” »

Dec 22, 2020

SolarWinds victims revealed after cracking the Sunburst malware DGA

Posted by in category: cybercrime/malcode

Security researchers have shared lists of organizations where threat actors deployed Sunburst/Solarigate malware, after ongoing investigations of the SolarWinds supply chain attack.

One of these lists—shared by cybersecurity firm Truesec —includes high-profile tech companies such as Intel, Nvidia, Cisco, Cox Communications, and Belkin, to name just a few.

Mediatek, the world’s second-largest provider of fabless semiconductors, might have also been specifically targeted in this campaign but TrueSec hasn’t yet fully confirmed the breach at this point.

Dec 21, 2020

Big tech companies including Intel, Nvidia, and Cisco were all infected during the SolarWinds hack

Posted by in categories: cybercrime/malcode, government

There are many reasons why hackers might want to get into a big tech company’s systems.


Big tech companies like Intel and Nvidia had their computers hacked, along with the departments of the US federal government, in the SolarWinds hack.

Dec 21, 2020

New SUPERNOVA backdoor found in SolarWinds cyberattack analysis

Posted by in categories: cosmology, cybercrime/malcode

While analyzing artifacts from the SolarWinds Orion supply-chain attack, security researchers discovered another backdoor that is likely from a second threat actor.

Named SUPERNOVA, the malware is a webshell planted in the code of the Orion network and applications monitoring platform and enabled adversaries to run arbitrary code on machines running the trojanized version of the software.

Dec 20, 2020

US cyber-attack: Around 50 firms ‘genuinely impacted’

Posted by in category: cybercrime/malcode

The expert whose company uncovered the hack also backs US officials’ view that Russia was behind it.

Dec 20, 2020

White House acknowledges reports of cyberattack on U.S. Treasury

Posted by in category: cybercrime/malcode

The Washington Post linked the hack, which occurred over the weekend, to a group working for the Russian foreign intelligence service.

The FBI is currently investigating the group, known among private-sector cybersecurity firms as APT29 or Cozy Bear. The hackers are also believed to have breached the State Department, Joint Chiefs of Staff and the White House networks during the Obama administration.

The latest revelation comes less than a month after President Donald Trump fired Christopher Krebs, the nation’s top cybersecurity official.

Dec 19, 2020

How the Russian hacking group Cozy Bear, suspected in the SolarWinds breach, plays the long game

Posted by in category: cybercrime/malcode

Security experts have a lurking concern that if history is any guide, the hackers reportedly behind the SolarWinds breach aren’t done yet.

Page 83 of 170First8081828384858687Last