Friday, July 31, 2020

Hackers Are Targeting the Remote Workers Who Keep Your Lights On

Hackers Are Targeting the Remote Workers Who Keep Your Lights On

In July alone, hackers took over the twitter accounts of U.S. politicians, stole terrabytes of coronavirus research and even infiltrated the U.K.’s Premier League soccer clubs. Can they cut off your electricity, too?

Even before the pandemic, hackers succeeded in infiltrating some energy infrastructure. In 2016, an Iran-based hacker gained remote access to an electric dam in New York for weeks. Earlier this year, ransomware shut down a natural gas facility for two days.

logo
Publisher: Claims Journal
Date: 2020-07-30T17:08:04 00:00
Twitter: @cjournal
Reference: (Read more) Visit Source



Check out this next:

China-Backed Hackers ‘Targeted’ COVID-19 Vaccine Firm Moderna, Reuters Reports

Last week, the U.S. Justice Department made public an indictment of two Chinese nationals accused of spying on the United States, including three unnamed U.S.-based targets involved in medical research to fight the novel coronavirus.

The indictment said the Chinese hackers “conducted reconnaissance” against the computer network of a Massachusetts biotech firm known to be working on a coronavirus vaccine in January.

Moderna, which is based in Massachusetts and announced its COVID-19 vaccine candidate in January, confirmed to Reuters that the company had been in contact with the FBI and was made aware of the suspected “information reconnaissance activities” by the hacking group mentioned in last week’s indictment.

Publisher: Insurance Journal
Date: 2020-07-31T11:55:26 00:00
Twitter: @ijournal
Reference: (Read more) Visit Source



BDA breach – hackers likely stole members' bank and contacts details – Dentistry Online

The British Dental Association (BDA) has confirmed its servers were illegally hacked this week – warning members to be extra vigilant.

The organisation concluded hackers likely secured access to users' names, contact details, transaction histories, bank details, logs of correspondence and notes of cases.

It says the association does not store card details. But it does hold members’ account numbers and sort codes in order to collect direct debit payments.

logo
Publisher: Dentistry.co.uk
Date: 2020-07-31T12:57:25 01:00
Twitter: @dentistry
Reference: (Read more) Visit Source



China is suspected of hacking the Vatican. Here's why - CNN

(CNN) When you think about cyber espionage, the Vatican doesn't come to mind as an obvious target. It's a tiny country whose leader has more moral authority than worldly power.

Publisher: CNN
Date: 2020-07-29T17:10:21Z
Author: _____
Reference: (Read more) Visit Source



Other things to check out:

First use of new EU sanctions against Russia, China hackers

The EU asset-freezes and visa bans , imposed Thursday (30 July), targeted four officers from Russia's military intelligence service, the General Staff of the Armed Forces of the Russian Federation (GRU), as well as the GRU's Moscow-based tech branch, the Main Centre for Special Technologies (GTST).

* * *

It said the GTST attacked several EU companies with "ransomware" in 2017 "blocking access to data [and] resulting ... in significant economic loss".

Publisher: EUobserver
Twitter: @euobs
Reference: (Read more) Visit Source



Hackers Have Been Using Dogecoin to Deploy Malware for 6 Months & No One Noticed

A new study indicates that hackers are actively relying on the Dogecoin ( DOGE ) blockchain to expand a malware payload named "Doki."

* * *

"The attacker controls which address the malware will contact by transferring a specific amount of Dogecoin from his or her wallet. Since only the attacker has control over the wallet, only he can control when and how much dogecoin to transfer, and thus switch the domain accordingly."

Intezer says that using Dogecoin to deploy a crypto-unrelated malware may be "quite resilient" to both law enforcement and security products. That's why Doki has managed to stay undetected for over six months, despite having been uploaded to the VirusTotal database in January.

Publisher: Cointelegraph
Twitter: @cointelegraph
Reference: (Read more) Visit Source



Hacker gang behind Garmin attack doesn't have a history of stealing user data | ZDNet

Everything you need to know about ransomware: how it started, why it's booming, how to protect against it, and what to do if your PC's infected.

The attack caused a five-day outage for the company, during which time, users feared that the hackers might have also stolen their personal details along with geolocation history from the Garmin's servers.

However, three cyber-security firms who spoke with ZDNet this week have said that the hacker group suspected of being behind the Garmin hack is one of the rare groups who don't engage in this particular practice and has no history of stealing customer data before encrypting files.

Publisher: ZDNet
Author: Catalin Cimpanu
Twitter: @ZDNet
Reference: (Read more) Visit Source



North Korea's Lazarus brings state-sponsored hacking approach to ransomware | Ars Technica

Lazarus—the North Korean state hacking group behind the WannaCry worm , the theft of $81 million from a Bangladesh bank , and the attacks on Sony Pictures —is looking to expand into the ransomware craze, according to researchers from Kaspersky Lab.

Further Reading New ransomware rakes in $4 million by adopting a "big game hunting" strategy

In short, VHD is no Ryuk or WastedLocker . Both are known as "big game hunters" because they target networks belonging to organizations with deep pockets and, after gaining entry, strike only after doing days or weeks of painstaking surveillance.

Publisher: Ars Technica
Author:
Twitter: @arstechnica
Reference: (Read more) Visit Source



Happening on Twitter

No comments:

Post a Comment