Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 89

Mar 1, 2022

Nvidia Hackers Threaten to Release Mining-Limiter Killer

Posted by in category: cybercrime/malcode

But they also request that Nvidia remove the mining performance limiter itself.


Following last week’s purported hack conducted by South-America-based Lapsus$ group, the hackers have now started to release data obtained from the 1 TB-worth of stolen information — and threaten to release a mining performance unlocker should Nvidia not do it first.

Feb 28, 2022

Hackers attack train network to stop Putin’s troops moving to Ukraine

Posted by in categories: cybercrime/malcode, finance, transportation

The hackers claimed that the attack was to “slow down the transfer” of troops moving from Belarus to northern Ukraine, saying that they had put the trains in “manual control” mode which would “significantly slow down the movement of trains, but will not create emergency situations.”

An ideological aversion to high-stakes situations has been expressed by other hacking groups. Anonymous, which has claimed a number of attacks on Russia’s banks and services, the websites of the President of the Russian Federation and Russia’s Ministry of Defence, has said that critical infrastructure is a “no-go” due to the risk of exacerbating the already tumultuous situation in eastern Europe.

Sergei Voitehowich, a former employee of Belarus’s state-owned Belarus Railway company, said that the Cyber Partisans had damaged the train traffic control system and that while it has been restored, other systems were experiencing issues and making it “impossible to buy tickets”, according to Bloomberg.

Feb 28, 2022

How China built a one-of-a-kind cyber-espionage behemoth to last

Posted by in categories: cybercrime/malcode, government

The “most advanced piece of malware” that China-linked hackers have ever been known to use was revealed today. Dubbed Daxin, the stealthy back door was used in espionage operations against governments around the world for a decade before it was caught.

But the newly discovered malware is no one-off. It’s yet another sign that a decade-long quest to become a cyber superpower is paying off for China. While Beijing’s hackers were once known for simple smash-and-grab operations, the country is now among the best in the world thanks to a strategy of tightened control, big spending, and an infrastructure for feeding hacking tools to the government that is unlike anything else in the world.

Feb 27, 2022

War in Ukraine indicates cybersecurity is no longer a choice

Posted by in categories: cybercrime/malcode, military

The publication in the Military-Industrial Kurier (VPK) on February 26, 2013, of an article by the Russian Chief of the General Staff, General Valery Gerasimov, entitled “The Value of Science in Foresight” [in Russian], has been seen by some analysts as a turning point in Russian military doctrine and the beginning of an explicit strategy of hybrid warfare. Indeed, information and cyber operations were an integral feature of Russia’s annexation of the Crimean Peninsula in 2014. Yet, the principal thesis of Gerasimov’s article is that alternative methods of conflict can be found to offset asymmetric disadvantages created by a superior enemy force. Such methods demand the application of the entire military-industrial complex to yield innovations in technology and tactics – the results of which can be seen in the proliferation of APT actors and computational propaganda operations observed by Western countries and their allies.

While we can only hope for a rapid cessation of the fighting in Ukraine, the consequences of Russian military intervention will extend far beyond the battlefield in years to come. Renewed focus and accelerated innovation and adoption of new technologies to protect the data and applications that Western societies depend on is now an imperative, not a choice – this is Gerasimov’s lesson.

The distinctions between war and peace, combatant and civilian, state actor and criminal proxy, are blurred in what has been termed the “fifth domain” of military operations. Collective cybersecurity in response to the increased prospect of cyberattack will demand not only political leadership, international cooperation, and industrial collaboration, but also the active participation of companies and individuals in the manner of civil defense, reminiscent of the Cold War. With the change in the world order brought about by Russia’s military action in Ukraine, we are all now standing on the frontline of cybersecurity.

Feb 27, 2022

NVIDIA Fires Back at Hackers

Posted by in category: cybercrime/malcode

Hackers who infiltrated NVIDIA’s servers & stole over 1 TB of data were hacked themselves as alleged in a new report by underground group.

Feb 25, 2022

New “SockDetour” Fileless, Socketless Backdoor Targets U.S. Defense Contractors

Posted by in category: cybercrime/malcode

Researchers discovered a new stealth malware, dubbed SockDetour, that operates filelessly and socketlessly on compromised systems.

Feb 25, 2022

Russia’s cyberattacks foreshadow the future of war

Posted by in categories: cybercrime/malcode, futurism

Russia ramped up its cyberattacks on Ukraine prior to its physical invasion, potentially foreshadowing how future conflicts will play out.

Feb 25, 2022

Nvidia confirms it’s investigating an “incident,” reportedly a huge cyberattack

Posted by in category: cybercrime/malcode

Maybe that’s why Nvidia pushed back an announcement.

Feb 23, 2022

Devious phishing method bypasses MFA using remote access software

Posted by in category: cybercrime/malcode

The researcher also told BleepingComputer that websites, such as LinkedIn, detect man-in-the-middle (MiTM) attacks and deactivate accounts after successful logins.

To overcome this obstacle, mr.d0x came up with a devious new phishing technique that uses the noVNC remote access software and browsers running in kiosk mode to display email login prompts running on the attacker’s server but shown in the victim’s browser.

VNC is a remote access software that allows remote users to connect to and control a logged-in user’s desktop. Most people connect to a VNC server through dedicated VNC clients that open the remote desktop in a similar manner to Windows Remote Desktop.

Feb 17, 2022

How a Saudi woman’s iPhone revealed hacking around the world

Posted by in categories: cybercrime/malcode, government, law, mobile phones

WASHINGTON, Feb 17 (Reuters) — A single activist helped turn the tide against NSO Group, one of the world’s most sophisticated spyware companies now facing a cascade of legal action and scrutiny in Washington over damaging new allegations that its software was used to hack government officials and dissidents around the world.

It all started with a software glitch on her iPhone.

An unusual error in NSO’s spyware allowed Saudi women’s rights activist Loujain al-Hathloul and privacy researchers to discover a trove of evidence suggesting the Israeli spyware maker had helped hack her iPhone, according to six people involved in the incident. A mysterious fake image file within her phone, mistakenly left behind by the spyware, tipped off security researchers.

Page 89 of 212First8687888990919293Last