Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 135

Dec 10, 2020

Automatic bug repair

Posted by in category: cybercrime/malcode

Circa 2015


At the Association for Computing Machinery’s Programming Language Design and Implementation conference this month, MIT researchers presented a new system that repairs dangerous software bugs by automatically importing functionality from other, more secure applications.

Remarkably, the system, dubbed CodePhage, doesn’t require access to the source code of the applications whose functionality it’s borrowing. Instead, it analyzes the applications’ execution and characterizes the types of security checks they perform. As a consequence, it can import checks from applications written in programming languages other than the one in which the program it’s repairing was written.

Continue reading “Automatic bug repair” »

Dec 9, 2020

Cybersecurity giant FireEye says it was hacked by govt-backed spies who stole its crown-jewels hacking tools

Posted by in category: cybercrime/malcode

Not a great look.

Dec 8, 2020

Hackers Breached Israeli Water Reservoir HMI System

Posted by in categories: cybercrime/malcode, cyborgs, internet

Hackers with possible links to Iran appear to have breached an unprotected human-machine interface system at an Israeli water reservoir that connected directly to the internet and lacked security protocols, according to industrial cybersecurity firm Otorio.

See Also: Live Webinar | Securing Mobile Endpoints to Protect IP in the Pharma Industry

The security firm reports that the alleged Iranian hacking group, referred to as “Unidentified TEAM,” published a video of the attack on an unnamed reclaimed Israeli water reservoir human-machine interface (HMI) system, which did not require any authentication to access and modify the system. This allowed the threat actors to tamper with the water pressure, change temperatures and more.

Dec 8, 2020

Norway says Russian groups ‘likely’ behind Parliament cyber attack

Posted by in category: cybercrime/malcode

Norway’s domestic security agency has said that Russian hackers linked to the country’s military intelligence service were “likely” behind a cyber attack against the Norwegian parliament this year.

The network operation behind the attack was part of “a broader national and international campaign that lasts at least since 2019” the Norwegian Police Security Service (PST) said in a statement.

Dec 8, 2020

Spies with Russia’s foreign intelligence service believed to have hacked a top American cybersecurity firm and stolen its sensitive tools

Posted by in category: cybercrime/malcode

The Russians stole hacking tools that FireEye uses to detect weaknesses in its customers’ networks, according to a person familiar with the matter.

Dec 8, 2020

FireEye, a Top Cybersecurity Firm, Says It Was Hacked by a Nation-State

Posted by in category: cybercrime/malcode

The Silicon Valley company said hackers — almost certainly Russian — made off with tools that could be used to mount new attacks around the world.

Dec 8, 2020

Cybersecurity firm FireEye says it was hacked by a nation-state

Posted by in categories: cybercrime/malcode, government

FireEye, normally the first company that cyberattack victims will call, has now admitted it too has fallen victim to hackers, which the company called a “sophisticated threat actor” that was likely backed by a nation-state.

In a blog post confirming the breach, the company’s chief executive Kevin Mandia said the nation-backed hackers have “top-tier offensive capabilities,” but did not attribute blame or say which government was behind the attack.

Mandia, who founded Mandiant, the incident response firm acquired by FireEye in 2014, said the hackers used a “novel combination of techniques not witnessed by us or our partners in the past” to steal hacking tools used typically by red teams, which are tasked with launching authorized but offensive hacking campaigns against customers in order to find weaknesses or vulnerabilities before malicious hackers do.

Nov 29, 2020

Elon Musk’s Starlink May Potentially Revolutionize Healthcare

Posted by in categories: biotech/medical, cybercrime/malcode, education, Elon Musk, finance, internet, satellites

Global #connectivity lets for #digitalidentity for billions of people worldwide, giving them access to #telehealth, #education, #careers, #entertainment and #finance services, as well as raising #cybersecurity and #dataprivacy concernsRe-sharing. Starlink can help telemedicine become more reliable and available to people in need. Especially those in rurual or far flung locations.


Video Source/Credit: SpaceX Youtube Channel

Continue reading “Elon Musk’s Starlink May Potentially Revolutionize Healthcare” »

Nov 26, 2020

US Fertility says patient data was stolen in a ransomware attack

Posted by in categories: biotech/medical, cybercrime/malcode

The company has 55 fertility clinics across the U.S.

Nov 24, 2020

China’s State-Sponsored Hacking Hits Companies Around the World

Posted by in categories: cybercrime/malcode, government

The group uses tools outside of the country for this attack campaign, as well as custom malware, including custom malware – including backdoor. Hartip – that Symantec has never used. Compromised computers at the time of the attack included domain controllers and file servers, and there is evidence that files are being filtered by some compromised computers. Attackers frequently used DLL side loading in this campaign and took advantage of the patched Zerologon vulnerability in August 2020.

Symantec first addressed this campaign when suspicious DLL-side loading activity on one the customers networks triggered a warning from Cloud Analytics technology available in Symantec Endpoint Security Complete (SESC).

The campaign is spread across the world, with a large number of regions detected as the victims of the attack. The common link between all the organisations that were attacked were their links to japan or japan based organisations. In the map you can clearly see that there was a reportedly Chinese-government-linked group attacking companies within China’s borders but, like many of the companies targeted in this campaign, the target in that instance is a subsidiary of a Japanese organization.