The company said the hacking group it calls Hafnium was able to trick Exchange servers into allowing it to gain access. The hackers then masqueraded as someone who should have access and created a way to control the server remotely so that they could steal data from an organization's network.
Microsoft said the group is based in China but operates from leased virtual private servers in the U.S., which helps it avoid detection.
* * *
Reston, Virginia-based cybersecurity firm Volexity, which Microsoft credits for helping to detect the intrusions, said its network security monitoring service began picking up on a suspiciously large data transfer in late January.
Check out this next:
McAfee: Hackers Targeting Digitally Connected Consumers This Tax Season | Business Wire
Consumers can do their part this tax season to protect their personal information and keep their finances secure:
* * *
McAfee technologies' features and benefits depend on system configuration and may require enabled hardware, software, or service activation. No computer system can be absolutely secure. McAfee® and the McAfee logo are trademarks of McAfee, LLC or its subsidiaries in the United States and other countries. Other marks and brands may be claimed as the property of others.
Hackers Use Search Engine Optimization to Deliver Malware
A new malware loader dubbed "Gootloader" is using search engine optimization techniques to spread ransomware, Trojans and other malware, the security firm Sophos reports.
* * *
Sophos researchers say the Gootloader campaign uses a network of 400 compromised websites, including the site of a neonatal medical practice in Canada.
"None of the site's legitimate content has anything to do with real estate transactions – it's doctors deliver babies – and yet it is the first result to appear in a query about a very narrowly defined type of real estate agreement," the report notes. "Google itself indicates the result is not an ad, and they have known about the site for nearly seven years. To the end user, the entire thing looks on the up-and-up."
Cybersecurity Firm Claims Chinese Hackers Targeted Serum Institute, Bharat Biotech
China's foreign ministry dismissed the allegations, describing Cyfirmia's allegations as "baseless speculation".
People pose in front of a display showing the word 'cyber' in binary code, in this picture illustration taken in Zenica December 27, 2014. Credit: Reuters/Dado Ruvic/Files
Beijing/New Delhi: China on Tuesday rejected an allegation by a cyber intelligence firm that a state-backed hacking group targeted the IT systems of two Indian coronavirus vaccine makers.
Quite a lot has been going on:
Far-Right Platform Gab Has Been Hacked—Including Private Data | WIRED
On Sunday night the WikiLeaks-style group Distributed Denial of Secrets is revealing what it calls GabLeaks, a collection of more than 70 gigabytes of Gab data representing more than 40 million posts. DDoSecrets says a hacktivist who self-identifies as "JaXpArO and My Little Anonymous Revival Project" siphoned that data out of Gab's backend databases in an effort to expose the platform's largely right-wing users.
According to DDoSecrets' Best, the hacker says that they pulled out Gab's data via a SQL injection vulnerability in the site—a common web bug in which a text field on a site doesn't differentiate between a user's input and commands in the site's code, allowing a hacker to reach in and meddle with its backend SQL database.
Backup Vulnerability: 4 Targets Hackers Might Utilize to Infiltrate Your Backup Solution
. @spectralogic updates #partnerprogram to reflect changes within the company. dlvr.it/Rtsmwl https://t.co/Gtt1mXLfve
. @Netrality launches expanded partner program. #datacenters dlvr.it/RtrKXt https://t.co/2qHhnqrF7g
With day one of #CPVirtual in the books, we offer a recap of highlights and look ahead to day two. @Channel_Expo … twitter.com/i/web/status/1…
* * *
Small and Mid-Size Business Security: 4 Steps to Success @EXN_Networks dlvr.it/Rtr1J9 https://t.co/ENfDHBfajN
How hackers crack passwords and how to protect your own
Think of it as a bank robber stealing the vault and cracking it somewhere else vs. trying to crack open the vault at the bank itself.
It's simple math as every combination of letters, numbers and special characters can be tried in milliseconds if there is enough computing power available.
As you add additional characters, the time to crack them goes up because each additional character exponentially increases the number of guesses required.
Hackers try to contaminate Florida town's water supply through computer breach | Reuters
(Reuters) - Hackers broke into the computer system of a facility that treats water for about 15,000 people near Tampa, Florida and sought to add a dangerous level of additive to the water supply, the Pinellas County Sheriff said on Monday.
The attempt on Friday was thwarted. The hackers remotely gained access to a software program, named TeamViewer, on the computer of an employee at the facility for the town of Oldsmar to gain control of other systems, Sheriff Bob Gualtieri said in an interview.
Happening on Twitter
Microsoft is warning users to apply patch it's releasing today for four zero day vulns found in Exchange email serv… https://t.co/bZyUmzEZQA KimZetter (from San Francisco) Tue Mar 02 21:04:29 +0000 2021
Microsoft accuses China over email cyber-attacks https://t.co/4mWDQj7hjD BBCWorld (from London, UK) Wed Mar 03 07:05:33 +0000 2021
Microsoft: China-based hackers found bug to target US firms https://t.co/tJ7XCqpSUj Independent (from London, England) Wed Mar 03 00:25:33 +0000 2021
Microsoft is urging customers to download software patches after state-sponsored hackers based in China broke into… https://t.co/6N8LJkKacY business (from New York and the World) Wed Mar 03 04:25:05 +0000 2021
No comments:
Post a Comment