Archive for the ‘cybercrime/malcode’ category: Page 88

Nov 9, 2020

FBI: Hackers stole source code from US government agencies and private companies

Posted by in categories: cybercrime/malcode, government

FBI blames intrusions on improperly configured SonarQube source code management tools.

Nov 8, 2020

Gitpaste-12 Worm Targets Linux Servers, IoT Devices

Posted by in category: cybercrime/malcode

The newly discovered malware uses GitHub and Pastebin to house component code, and harbors 12 different initial attack vectors.

Nov 7, 2020

Capcom hit by ransomware attack, is reportedly being extorted for $11 million

Posted by in category: cybercrime/malcode

Ryu kidding?

Earlier this week it emerged that third-party giant Capcom’s internal systems had been hacked, though the company claimed that no customer data was affected. It has now emerged that the publisher was targeted by the Ragnar Locker ransomware, software designed to exfiltrate information from internal networks before encrypting the lot: at which point the victim is locked-out, contacted, and extorted.

Bleeping Computer broke the story, and managed to access the Ragnar Locker sample (a ‘proof’ provided to the victim by the hackers), which contains the ransom note allegedly delivered to Capcom. It reads as follows.

Continue reading “Capcom hit by ransomware attack, is reportedly being extorted for $11 million” »

Nov 7, 2020

Hacker group uses Solaris zero-day to breach corporate networks

Posted by in category: cybercrime/malcode

The zero-day appears to have been bought off a black-market website for $3,000.

Nov 6, 2020

Linux version of RansomEXX ransomware discovered

Posted by in category: cybercrime/malcode

This marks the first time a major Windows ransomware strain has been ported to Linux to aid hackers in their targeted intrusions.

Nov 5, 2020

Ransomware Hackers Just Slammed Capcom’s Corporate Networks

Posted by in category: cybercrime/malcode

Japanese game developer Capcom—creator of classic worldwide hits like Street Fighter, and Resident Evil —has been hit with a ransomware attack to its internal networks, compromising a mass of corporate intel on the company’s internal operations.

Nov 4, 2020

Six Russian GRU Officers Charged in Connection with Worldwide Deployment of Destructive Malware and Other Disruptive Actions in Cyberspace

Posted by in category: cybercrime/malcode

On Oct. 15, 2020, a federal grand jury in Pittsburgh returned an indictment charging six computer hackers, all of whom were residents and nationals of the Russian Federation (Russia) and officers in Unit 74455 of the Russian Main Intelligence Directorate (GRU), a military intelligence agency of the General Staff of the Armed Forces.

These GRU hackers and their co-conspirators engaged in computer intrusions and attacks intended to support Russian government efforts to undermine, retaliate against, or otherwise destabilize: (1) Ukraine; (2) Georgia; (3) elections in France; (4) efforts to hold Russia accountable for its use of a weapons-grade nerve agent, Novichok, on foreign soil; and (5) the 2018 PyeongChang Winter Olympic Games after Russian athletes were banned from participating under their nation’s flag, as a consequence of Russian government-sponsored doping effort.

Their computer attacks used some of the world’s most destructive malware to date, including: KillDisk and Industroyer, which each caused blackouts in Ukraine; NotPetya, which caused nearly $1 billion in losses to the three victims identified in the indictment alone; and Olympic Destroyer, which disrupted thousands of computers used to support the 2018 PyeongChang Winter Olympics. The indictment charges the defendants with conspiracy, computer hacking, wire fraud, aggravated identity theft, and false registration of a domain name.

Nov 4, 2020

Dragon’s cyber hacking operations: State sponsored game-plan

Posted by in categories: biotech/medical, cybercrime/malcode, economics, government, military

In the last few years, countless cyber-attacks were reported globally that were linked to the People’s Republic of China. The Chinese cyber-hackers, who target the foreign networks and websites are sponsored by the Chinese government. They are highly trained and have acquired abilities not only to exploit common vulnerabilities but also to discover and even create new vulnerabilities.

The US National Security Agency’s in-depth report of 23rd October points out that one of the greatest threats to the US National Security Systems, Defence Industrial Base and Department of Defence information networks is the “Chinese state sponsored malicious cyber activity”. The report underlines that the Chinese hackers exploit “computer networks of interest that hold sensitive intellectual property, economic, political, and military information.”

In July 2020, US had ordered the closure of the Chinese consulate in Huston, when it discovered that the Chinese officials there were involved in the intellectual property theft and indicted two Chinese nationals for allegedly hacking hundreds of companies and crucially had attempted to steal coronavirus vaccine research. The United States Department of Justice has charged five Chinese national for their involvement in hacking targets not only in the US governments but also the networks of the Indian and Vietnam government. They also carried out attacks on the UK government network unsuccessfully.

Nov 4, 2020

Israeli innovation plugs into emerging energy-tech sector

Posted by in categories: biotech/medical, cybercrime/malcode, economics

“There are two critical factors in this world: time and energy. Time is the only limited resource and therefore the most important one in our lives. Energy moves everything — our bodies, our lives and even all the digital revolution that is not physical depends on energy to be shared. We have no more time to cure the world and the Covid-19 is an amazing gift to better understand the important and critical things of our lives. It is a very important wake-up call for everyone.”

As more Israeli companies continue to seek solutions to economic and environmental challenges, we’ll see more local investors deploy capital in this space. Lack of acquisitions in this space – as opposed to a vertical like cybersecurity — are one main reason for the initial hesitancy of Israeli VCs.

Regardless of social impact or double bottom line investing, Israel is poised to lead another vertical impacting our global community. This has life-altering ramifications for future generations.

Nov 1, 2020

US Cyber Command exposes new Russian malware

Posted by in category: cybercrime/malcode

Together with CISA and the FBI, US Cyber Command wish Russian state hackers a “Happy Halloween!”

Page 88 of 170First8586878889909192Last