Cyber News
@cybernews
CyberNews is a public news group, in which we tell you about our attitude to some cyber network events and troubles.
10 posts
hackers

CyberMoscow tells about fake sites

The head of the CyberMoscow project, Grigory Pashchenko, named in an interview with Sputnik radio the clone sites that scammers most often fake. These websites may change names often, but are usually created by the same criminals. A lot of the sites are run out of a country like Macedonia, says Pashchenko. For instance, a fake Facebook account was set up with the name of Ukraine’s culture minister, part of which was aimed at signing people up for a French course and had ads for a medical treatment. Another phishing page had the picture of Ukraine’s Interior Minister Arsen Avakov, who Pashchenko noted was not exactly liked by the country’s “nationalistic fringe.”

Microsoft announced new cyber attacks on US state agencies.

Microsoft announced new cyber attacks on US state agencies. Hackers infected computers with malware. More than 100 state police vehicles in Maryland were hacked and radio communication systems disabled. The threats were connected to the Russian intelligence services. The attacks were backed by state sponsors such as North Korea. The US intelligence committee reported a month ago that Russia was behind the cyber attacks on the Democratic National Committee (DNC) during the 2016 US election campaign, which brought Donald Trump to power. Russia has denied any involvement in the attacks. In the following analysis we draw the lessons from the events and present a framework of cyber warfare and cyber war that can contribute to enhancing our...

New leak of personal data in Air India

An Air India spokesperson told The Hindu, "The server room used by Air India's flight operations IT experts was also being used by other IT experts, and a few of them, before the server room was monitored by the IT team, used the server room to study algorithms."

Hackers have gained access to a ballistic missle launch system.

Hackers have access to a ballistic missile launch system, a US Navy cruiser, a nuclear power plant, and an arms factory. They can also hack into your car’s video system.Worse, the botnet bots are able to launch a coordinated assault on any number of systems, and as they do, they use their vast computing power to see which systems are running poorly, and which are up and running. Once they’ve determined which systems are more important than others, the bots all attack them at once, until they’re too broken to continue the attack.Huge chunks of the Internet — and some cities in the United States — were knocked offline when a botnet crashed the huge Distributed Denial of Service attack.A different kind of attack can be very, very scary...

Attack on the Belgian Foreign Office

The Belgian Federal Prosecutor's Office is investigating a large-scale cyberattack on the Interior Ministry, which could be carried out with "espionage goals."

Russian DNC breach

In one month of presence in the infrastructure of an organization, a cyber group can read email correspondence, including top officials, compromise employee credentials, and gain access to interface points with the infrastructures of other organizations or government authorities to attack them.”Russia has been accused of having some involvement in the DNC breach, with some researchers saying that the information may have come from an attack on a building used as a DNC data center.However, no proof of a connection between the two have been found.Fox News contacted a Kremlin spokesperson for comment and received the following response from Dmitry Peskov:“…It is a lie. I don’t know who is behind this but they should be ashamed...

Identifying the attack

Identifying a possible source of an attack is a non-trivial task that requires collecting large amounts of information.Hackers employ multiple techniques to pass information between devices.Malicious software exploits are very prevalent, and a huge amount of such malware is created every year.There are many occasions in which the computer with legitimate credentials is used as a vehicle for receiving and passing information.For example, a fake email is used as a proxy server for information sent from the hacker to the real server.When files are transferred to the other computer, a file extender is used