Showing only posts tagged hacking. Show all posts.

North Korean hackers return, target infosec researchers in new operation

Source

Enlarge In January, Google and Microsoft outed what they said was North Korean government-sponsored hackers targeting security researchers. The hackers spent weeks using fake Twitter profiles—purportedly belonging to vulnerability researchers—before unleashing an Internet Explorer zero-day and a malicious Visual Studio Project, both of which installed custom malware …

Hackers backdoor PHP source code after breaching internal git server

Source

Enlarge (credit: BeeBright / Getty Images / iStockphoto ) A hacker compromised the server used to distribute the PHP programming language and added a backdoor to source code that would have made websites vulnerable to complete takeover, members of the open source project said. Two updates pushed to the PHP Git server …

Hacking Weapons Systems

Source

Lukasz Olejnik has a good essay on hacking weapons systems. Basically, there is no reason to believe that software in weapons systems is any more vulnerability free than any other software. So now the question is whether the software can be accessed over the Internet. Increasingly, it is. This …

Hackers access security cameras inside Cloudflare, jails, and hospitals

Source

Enlarge (credit: Getty Images) Hackers say they broke into the network of Silicon Valley startup Verkada and gained access to live video feeds from more than 150,000 surveillance cameras the company manages for Cloudflare, Tesla, and a host of other organizations. The group published videos and images they …

Chinese Hackers Stole an NSA Windows Exploit in 2014

Source

Check Point has evidence that (probably government affiliated) Chinese hackers stole and cloned an NSA Windows hacking tool years before (probably government affiliated) Russian hackers stole and then published the same tool. Here’s the timeline : The timeline basically seems to be, according to Check Point: 2013: NSA’s …

Donald Trump is one of 15,000 Gab users whose account just got hacked

Source

Enlarge (credit: Gab.com ) The founder of the far-right social media platform Gab said that the private account of former President Donald Trump was among the data stolen and publicly released by hackers who recently breached the site. In a statement on Sunday, founder Andrew Torba used a transphobic …

Trump’s is one of 15,000 Gab accounts that just got hacked

Source

Enlarge (credit: Gab.com ) The founder of the far-right social media platform Gab said that the private account of former President Donald Trump was among the data stolen and publicly released by hackers who recently breached the site. In a statement on Sunday, founder Andrew Torba used a transphobic …

National Security Risks of Late-Stage Capitalism

Source

Early in 2020, cyberspace attackers apparently working for the Russian government compromised a piece of widely used network management software made by a company called SolarWinds. The hack gave the attackers access to the computer networks of some 18,000 of SolarWinds’s customers, including US government agencies such …

Hackers tied to Russia’s GRU targeted the US grid for years

Source

Enlarge (credit: Yuri Smityuk | Getty Images) For all the nation-state hacker groups that have targeted the United States power grid —and even successfully breached American electric utilities —only the Russian military intelligence group known as Sandworm has been brazen enough to trigger actual blackouts, shutting the lights off in …

France ties Russia’s Sandworm to a multiyear hacking spree

Source

Enlarge / The logo of the French national cybersecurity agency Agence Nationale de la securite des systemes d'information(ANSSI) taken at ANSSI headquarters in Paris. (credit: Eric Piermont | AFP | Getty Images ) The Russian military hackers known as Sandworm, responsible for everything from blackouts in Ukraine to NotPetya, the most destructive …

A Windows Defender vulnerability lurked undetected for 12 years

Source

Enlarge (credit: Drew Angerer | Getty Images ) Just because a vulnerability is old doesn't mean it's not useful. Whether it's Adobe Flash hacking or the EternalBlue exploit for Windows, some methods are just too good for attackers to abandon, even if they're years past their prime. But a critical 12-year-old …

Microsoft is seeing a big spike in Web shell use

Source

Enlarge (credit: Getty Images) Security personnel at Microsoft are seeing a big increase in the use of Web shells, the light-weight programs that hackers install so they can burrow further into compromised websites. The average number of Web shells installed from August, 2020 to January of this year was …

Fears over DNA privacy as 23andMe goes public in deal with Richard Branson

Source

Genetic testing company with 10 million customers’ data has ‘huge cybersecurity implications’ The genetic testing company 23andMe will go public through a partnership with a firm backed by the billionaire Richard Branson, in a deal that has raised fresh privacy questions about the information of millions of customers. Launched …

Another SolarWinds Orion Hack

Source

At the same time the Russians were using a backdoored SolarWinds update to attack networks worldwide, another threat actor — believed to be Chinese in origin — was using an already existing vulnerability in Orion to penetrate networks : Two people briefed on the case said FBI investigators recently found that the …

More SolarWinds News

Source

Microsoft analyzed details of the SolarWinds attack: Microsoft and FireEye only detected the Sunburst or Solorigate malware in December, but Crowdstrike reported this month that another related piece of malware, Sunspot, was deployed in September 2019, at the time hackers breached SolarWinds’ internal network. Other related malware includes Teardrop …

Including Hackers in NATO Wargames

Source

This essay makes the point that actual computer hackers would be a useful addition to NATO wargames: The international information security community is filled with smart people who are not in a military structure, many of whom would be excited to pose as independent actors in any upcoming wargames …

Sophisticated Watering Hole Attack

Source

Google’s Project Zero has exposed a sophisticated watering-hole attack targeting both Windows and Android: Some of the exploits were zero-days, meaning they targeted vulnerabilities that at the time were unknown to Google, Microsoft, and most outside researchers (both companies have since patched the security flaws). The hackers delivered …

« newer articles | page 10 | older articles »