The head of the CyberMoscow project, Grigory Pashchenko, named in an interview with Sputnik radio the clone sites that scammers most often fake. These websites may change names often, but are usually created by the same criminals. A lot of the sites are run out of a country like Macedonia, says Pashchenko. For instance, a fake Facebook account was set up with the name of Ukraine’s culture minister, part of which was aimed at signing people up for a French course and had ads for a medical treatment. Another phishing page had the picture of Ukraine’s Interior Minister Arsen Avakov, who Pashchenko noted was not exactly liked by the country’s “nationalistic fringe.”
Microsoft announced new cyber attacks on US state agencies. Hackers infected computers with malware. More than 100 state police vehicles in Maryland were hacked and radio communication systems disabled. The threats were connected to the Russian intelligence services. The attacks were backed by state sponsors such as North Korea. The US intelligence committee reported a month ago that Russia was behind the cyber attacks on the Democratic National Committee (DNC) during the 2016 US election campaign, which brought Donald Trump to power. Russia has denied any involvement in the attacks. In the following analysis we draw the lessons from the events and present a framework of cyber warfare and cyber war that can contribute to enhancing our...
An Air India spokesperson told The Hindu, "The server room used by Air India's flight operations IT experts was also being used by other IT experts, and a few of them, before the server room was monitored by the IT team, used the server room to study algorithms."
Ransomware viruses are one of the clearest ways for hackers to commercialize their efforts. Like pay-per-click campaigns, ransomware costs would-be victims relatively nothing, unlike those costs associated with the loss of data.Likewise, it's easy for hackers to spread their malware and hold data hostage, as evidenced by a massive digital extortion campaign that took down the Hollywood Presbyterian Medical Center for several days in late 2014.Ransomware is often delivered in the form of an innocuous-looking e-mail that purports to be from a colleague. As one study recently noted, the victims were actually at great risk because in many cases, their infection is attributed to an internal error, "suggesting that the entire enterprise was...
Hackers have access to a ballistic missile launch system, a US Navy cruiser, a nuclear power plant, and an arms factory. They can also hack into your car’s video system.Worse, the botnet bots are able to launch a coordinated assault on any number of systems, and as they do, they use their vast computing power to see which systems are running poorly, and which are up and running. Once they’ve determined which systems are more important than others, the bots all attack them at once, until they’re too broken to continue the attack.Huge chunks of the Internet — and some cities in the United States — were knocked offline when a botnet crashed the huge Distributed Denial of Service attack.A different kind of attack can be very, very scary...
The Belgian Federal Prosecutor's Office is investigating a large-scale cyberattack on the Interior Ministry, which could be carried out with "espionage goals."
In one month of presence in the infrastructure of an organization, a cyber group can read email correspondence, including top officials, compromise employee credentials, and gain access to interface points with the infrastructures of other organizations or government authorities to attack them.”Russia has been accused of having some involvement in the DNC breach, with some researchers saying that the information may have come from an attack on a building used as a DNC data center.However, no proof of a connection between the two have been found.Fox News contacted a Kremlin spokesperson for comment and received the following response from Dmitry Peskov:“…It is a lie. I don’t know who is behind this but they should be ashamed...
Identifying a possible source of an attack is a non-trivial task that requires collecting large amounts of information.Hackers employ multiple techniques to pass information between devices.Malicious software exploits are very prevalent, and a huge amount of such malware is created every year.There are many occasions in which the computer with legitimate credentials is used as a vehicle for receiving and passing information.For example, a fake email is used as a proxy server for information sent from the hacker to the real server.When files are transferred to the other computer, a file extender is used
DarkSide hackers hacked Colonial Pipeline after Texas riled up over waterHouston's Colonial Pipeline has shut down a portion of its refined product pipeline after a release of noxious fumes was detected, leading to a series of fires.But the Internet had other plans.After Texas officials announced they were preparing to shut down two water plants due to a lack of water, hackers on a DarkSided network decided to take advantage of the situation.According to the New York Times, the hackers targeted the fuel delivery system.
The hacker group DarkSide, allegedly behind the May 7 cyberattack on the American oil pipeline operator Colonial Pipeline, received a total of $ 90 million in cryptocurrency from its victims. Colonial Pipeline told the victims that a ransomware virus had been installed on their systems and encryption mechanisms had been activated. The hackers threatened to release and ransom users’ data to get the keys to the decryption. The hack affected the majority of the pipeline system’s assets, but none of the underground petroleum storage tanks were affected. The ransom could also have been paid in Bitcoin, which is used to the tune of $1,000 in one transaction, and three other altcoins. The attackers would have made $ 14 million for themselves...