Showing only posts tagged espionage. Show all posts.

Pegasus spyware inquiry targeted by disinformation campaign, say experts

Source

European parliament is investigating powerful surveillance tool used by governments around the world Victims of spyware and a group of security experts have privately warned that a European parliament investigatory committee risks being thrown off course by an alleged “disinformation campaign”. The warning, contained in a letter to MEPs …

Security Vulnerabilities in Covert CIA Websites

Source

Back in 2018, we learned that covert system of websites that the CIA used for communications was compromised by —at least—China and Iran, and that the blunder caused a bunch of arrests, imprisonments, and executions. We’re now learning that the CIA is still “using an irresponsibly secured …

Cold War Bugging of Soviet Facilities

Source

Found documents in Poland detail US spying operations against the former Soviet Union. The file details a number of bugs found at Soviet diplomatic facilities in Washington, D.C., New York, and San Francisco, as well as in a Russian government-owned vacation compound, apartments used by Russia personnel, and …

China lured graduate jobseekers into digital espionage

Source

Enlarge (credit: FT montage | Getty Images | Dreamstime ) Chinese university students have been lured to work at a secretive technology company that masked the true nature of their jobs: researching Western targets for spying and translating hacked documents as part of Beijing’s industrial-scale intelligence regime. The Financial Times has …

Microsoft Issues Report of Russian Cyberattacks against Ukraine

Source

Microsoft has a comprehensive report on the dozens of cyberattacks — and even more espionage operations — Russia has conducted against Ukraine as part of this war: At least six Russian Advanced Persistent Threat (APT) actors and other unattributed threats, have conducted destructive attacks, espionage operations, or both, while Russian military …

US Critical Infrastructure Companies Will Have to Report When They Are Hacked

Source

This will be law soon: Companies critical to U.S. national interests will now have to report when they’re hacked or they pay ransomware, according to new rules approved by Congress. [...] The reporting requirement legislation was approved by the House and the Senate on Thursday and is expected …

Amy Zegart on Spycraft in the Internet Age

Source

Amy Zegart has a new book: Spies, Lies, and Algorithms: The History and Future of American Intelligence. Wired has an excerpt : In short, data volume and accessibility are revolutionizing sensemaking. The intelligence playing field is leveling­ — and not in a good way. Intelligence collectors are everywhere, and government spy …

Using Foreign Nationals to Bypass US Surveillance Restrictions

Source

Remember when the US and Australian police surreptitiously owned and operated the encrypted cell phone app ANOM? They arrested 800 people in 2021 based on that operation. New documents received by Motherboard show that over 100 of those phones were shipped to users in the US, far more than …

No 10 accused of failing to act against states accused of NSO spyware abuses

Source

Group of 10 MPs and peers say Boris Johnson’s government has prioritised trade over national security Boris Johnson’s government has been accused by MPs of prioritising trade agreements over national security in its handling of surveillance abuses on British soil by governments using spyware made by the …

Hacking of activists is latest in long line of cyber-attacks on Palestinians

Source

Analysis: while identity of hackers is not known in this case, Palestinians have long been spied on by Israeli military The disclosure that Palestinian human rights defenders were reportedly hacked using NSO’s Pegasus spyware will come as little surprise to two groups of people: Palestinians themselves and the …

Nation-State Attacker of Telecommunications Networks

Source

Someone has been hacking telecommunications networks around the world: LightBasin (aka UNC1945) is an activity cluster that has been consistently targeting the telecommunications sector at a global scale since at least 2016, leveraging custom tools and an in-depth knowledge of telecommunications network architectures. Recent findings highlight this cluster’s …

At least 13 phone firms hit by suspected Chinese hackers since 2019, say experts

Source

LightBasin hackers were able to obtain subscriber information and call metadata, says CrowdStrike At least 13 phone companies around the world have been compromised since 2019 by sophisticated hackers who are believed to come from China, a cybersecurity expert group has said. The roaming hackers – known as LightBasin – were …

‘The walls are closing in on me’: the hacking of Princess Haya

Source

Court judgments reveal how Sheikh Mohammed’s use of Pegasus spyware against his ex-wife was uncovered Dubai ruler hacked ex-wife using NSO Pegasus spyware, high court judge finds Eleven court judgments, covering 181 pages, plus hundreds of other pages of legal documents have revealed an extraordinary spying scandal: state-sponsored …

How NSO became the company whose software can spy on the world

Source

The Pegasus project has raised new concerns about the Israeli firm, which is a world leader in the niche surveillance market In 2019, when NSO Group was facing intense scrutiny, new investors in the Israeli surveillance company were on a PR offensive to reassure human rights groups. In an …

For UK foreign secretary, simply having a mobile represents a security risk – analysis

Source

Analysis: UK prides itself on GCHQ’s cyber capability – so availability of Raab’s number will have been embarrassing for him Dominic Raab’s mobile number freely available online for last decade Finding Dominic Raab’s mobile phone online is more than just embarrassing for the foreign secretary: it …

Biden Administration Imposes Sanctions on Russia for SolarWinds

Source

On April 15, the Biden administration both formally attributed the SolarWinds espionage campaign to the Russian Foreign Intelligence Service (SVR), and imposed a series of sanctions designed to punish the country for the attack and deter future attacks. I will leave it to those with experience in foreign relations …

The FBI Is Now Securing Networks Without Their Owners’ Permission

Source

In January, we learned about a Chinese espionage campaign that exploited four zero-days in Microsoft Exchange. One of the characteristics of the campaign, in the later days when the Chinese probably realized that the vulnerabilities would soon be fixed, was to install a web shell in compromised networks that …

Global cyber-espionage campaign linked to Russian spying tools

Source

Kaspersky investigators uncover evidence that may support US claims Moscow was behind attack A Moscow-based cybersecurity company has reported that some of the malicious code employed against the US government in a cyber-attack last month overlaps with code previously used by suspected Russian hackers. The findings by Kaspersky investigators …

Feds Pinpoint Russia as ‘Likely’ Culprit Behind SolarWinds Attack

Source

The widespread compromise affecting key government agencies is ongoing, according to the U.S. government. [...]

« newer articles | page 2