Showing posts with label hackers. Show all posts
Showing posts with label hackers. Show all posts

Wednesday, November 17, 2021

US Issues Warning That The Iranian Government-Sponsored Hackers Are Targeting Key US Infrastructure

CNN: US warns that Iranian government-sponsored hackers are targeting key US infrastructure 

Washington (CNN)Iranian government-sponsored hackers are actively targeting a "broad range of victims" across multiple US sectors, including transportation and health care, and in some cases have deployed ransomware against those victims, US federal agencies and their counterparts from the United Kingdom and Australia warned on Wednesday. 

It's a rare case of the US government publicly linking Iran with ransomware, which is typically used by cybercriminals rather than governments. And it's a reminder that America's ransomware problem is not limited to Russia. 

The Iranian hackers are exploiting known flaws in software made by Microsoft and California-based vendor Fortinet to access systems and at times lock them up with ransomware, according to the advisory from the FBI, US Cybersecurity and Infrastructure Security Agency, Australian Cyber Security Centre and the UK's National Cyber Security Centre.  

Read more .....  

WNU Editor: Here is another interesting BBC report on hackers .... Evil Corp: 'My hunt for the world's most wanted hackers' (BBC).

Tuesday, May 18, 2021

Hackers Behind Colonial Pipeline Have Made $90 Million In Bitcoin From 47 Victims In The Past Nine Months

 

CNBC: Hackers behind Colonial Pipeline attack reportedly received $90 million in bitcoin before shutting down 

 * DarkSide, the hacker group behind the Colonial ransomware attack, received $90 million in bitcoin ransom payments, according to blockchain sleuths Elliptic. 

* The cybercriminal gang shut down last week after losing access to its servers and as its cryptocurrency wallets were emptied. 

 * Elliptic said DarkSide’s bitcoin wallet contained $5.3 million worth of the digital currency before its funds were drained. 

LONDON — DarkSide, the hacker group behind the recent Colonial Pipeline ransomware attack, received a total of $90 million in bitcoin ransom payments before shutting down last week, according to new research. 

Colonial Pipeline was hit with a devastating cyberattack earlier this month that forced the company to shut down approximately 5,500 miles of pipeline in the United States, crippling gas delivery systems in Southeastern states. The FBI blamed the attack on DarkSide, a cybercriminal gang believed to be based in Eastern Europe, and Colonial reportedly paid a $5 million ransom to the group. 

DarkSide operates what’s known as a “ransomware as a service” business model, meaning the hackers develop and market ransomware tools and sell them to other criminals who then carry out attacks. Ransomware is a type of malicious software that’s designed to block access to a computer system. Hackers demand a ransom payment — typically cryptocurrency — in return for restoring access.  

Read more ....

WNU Editor: This is just one group .... and they are probably just the tip of the iceberg.

Update: So much for paying these hackers off. Problems at Colonial Pipeline continue .... Colonial Pipeline Admits Shippers' Comms System Is "Experiencing Network Issues" (Zero Hedge).

Wednesday, February 24, 2021

Details of Bombardier’s jet used for Saab’s GlobalEye surveillance system posted on dark web

The SAAB GlobalEye spy plane, pictured, uses the body of a Bombardier Global 6000 business jet for its base 


 * Details from the hack appear to have been released on the darkweb site CL0P^_- LEAKS 
 * Forensic analysis revealed that personal and other confidential information relating to employees, customers and suppliers was compromised 
 * The Clop site was launched in March 2020 to publish data stolen from non-paying victims held hostage using the ransomware
 * Companies that recently appeared to fall victim to Clop ransomware include the law firm Jones Day, which represents former President Donald Trump 
 * Financial cyber-crime gang FIN11 is believed to be behind the series of recent Clop ransom campaigns 
 * Some of the documents leaked appear to show specifications for the GlobalEye radar and mission system 

Details for a military spy plane appear to been leaked on the dark web by hackers as it is believed manufacturer Bombardier refused to pay a ransom.

Canadian business jet manufacturer Bombardier, whose Global 6000 jet is used for Saab's GlobalEye spy plane system, announced on Tuesday that it recently suffered 'a limited cybersecurity breach.' 

The leak, posted to the darkweb site CL0P^_- LEAKS, appears to show specifications and mechanics for the GlobalEye airborne early warning and control platform developed by the Swedish defense company Saab. 

Read more .... 


WNU Editor: Bombardier is saying that this was a 'limited cyber security breach'. I am not sure about that. It looks like these hackers had access to a lot of stuff. Who knows what else they may have taken.

Tuesday, July 21, 2020

U.S. Charges Chinese Hackers For Trying To Steal Covid-19 Research And Other Sensitive Government Information

The government said the plot, said to have begun in 2009, was not only carried out for financial gain but also for the benefit of the Chinese government

Daily Mail: Two Chinese hackers, 34 and 33, are charged with trying to steal US coronavirus vaccine research and 'hundreds of millions of dollars' worth of other sensitive government information

* Li Xiaoyu, 34, and Dong Jiazhi, 31, allegedly stole 'hundreds of millions of dollars' worth of trade secrets and sensitive government information
* The decade-long scheme reportedly involved the hacking of hundreds of government organizations and private companies, including COVID-19 labs
* The government said the plot was not only carried out for financial gain but also for the direct benefit of the Chinese government
* They allegedly breached defense contractors and stole sensitive military including about military satellite programs and communications systems
* The indictment says the two men were assisted by an unnamed Chinese intelligence officer who is known to the grand jury
* It's unclear if Li or Dong successfully obtained information on vaccine research

The Department of Justice announced Tuesday it has charged two Chinese hackers with trying to steal US COVID-19 research as well as other sensitive government information.

Chinese Nationals Li Xiaoyu, 34, and Dong Jiazhi, 31, allegedly stole 'hundreds of millions of dollars' worth of trade secrets, intellectual property, and other valuable business information in a sophisticated, decade-long scheme.

They're accused of hacking hundreds of companies, government organizations, dissidents, human rights activists and private companies, including those engaged in COVID-19 vaccine research.

Read more ....

More News On The U.S. Charging Chinese Hackers For Trying To Steal Covid-19 Research And Other Sensitive Government Information

US accuses Chinese hackers in targeting of COVID-19 research -- AP
U.S. accuses Chinese nationals of hacking spree for COVID-19 data, defense secrets -- Reuters
US charges Chinese Covid-19 research 'cyber-spies' -- BBC
Chinese hackers tried to steal COVID research, hacked hundreds of companies: US -- AFP
US accuses China of hacking coronavirus researchers, others -- Al Jazeera

Friday, August 30, 2019

Are The Pentagon's Computer Networks Secure?

Reina Staley, co-founder of the Defense Digital Service, and Jack Cable, right, discuss culture at the Wall Street Journal's Future of Everything conference in May. (DDS)

Fifth Domain: How one teenager took out a secure Pentagon file sharing site

By last October, the Pentagon’s Vulnerability Disclosure Program had processed thousands of loopholes in the Department of Defense’s websites.

Then it received a report from Jack Cable.

On Oct. 25, Cable, who worked for the Defense Digital Service and was a freshman at Stanford University, reported a problem to the department through the Pentagon’s HackerOne vulnerability disclosure page.

Typically, vulnerabilities sent to the DoD through a disclosure program operated by HackerOne, an ethical hacking company that manages reporting programs for various organizations, require a simple reconfiguration or software patch. Of the 16 problems reported to the DoD on the average day, 11 tend to require action by the Pentagon, Kris Johnson, director of the Vulnerability Disclosure Program (VDP) at the DoD’s Cyber Crime Center (DC3), told Fifth Domain in an exclusive interview.

Read more ....

WNU Editor: File sharing platforms are always vulnerable, and this Pentagon platform has been around since 2001. A lot has happened since then, and kudos to this teenager for spotting it and pointing it out. On a side note, the Pentagon’s Vulnerability Disclosure Program has definitely been a success.

Saturday, August 17, 2019

Hackers Find Serious Vulnerabilities In The Software Of The F-15 Fighter Jet

An F-15C Eagle takes off from Kadena Air Base, Japan, Jan. 9, 2019. (U.S. Air Force/Airman 1st Class Matthew Seefeldt)

Newsweek: Ethical Hackers Sabotage F-15 Fighter Jet, Expose Serious Vulnerabilities

A team of hackers given unprecedented access to a flight system used in F-15 fighter jets reportedly confirmed the existence of serious cybersecurity bugs.

Researchers discovered vulnerabilities that, if exploited, could be used to shut down the Trusted Aircraft Information Download Station (TADS)—a $20,000 device that collects data from video cameras and sensors while jets are in flight, The Washington Post first reported.

Key technical details remain unknown, but it was confirmed that the tests took place during the Def Con conference, held in Las Vegas between August 8 and August 11.

The ethical hackers were brought there by Synack, a cyber company that partners with the Department of Defense on a "Hack the Pentagon" bug-hunting program. The new demo was the first time that researchers had been allowed physical access to the F-15 system.

Read more ....

WNU editor: It took this team only two days to find all of these vulnerabilities.

More News On Hackers Finding Serious Vulnerabilities In The Software Of The F-15 Fighter Jet

Hackers Find Serious Vulnerabilities in an F-15 Fighter Jet System -- Military.com
Team of Hackers Finds Several Serious Vulnerabilities in US F-15 Fighter Jets -- Sputnik
How to Kill an F-15 Eagle in Battle: Hackers? -- David Axe, National Interest

Monday, May 13, 2019

This Is How Hackers From Countries Like North Korea Steal Money From Banks

The Bank of Mexico logo is seen on the facade its building in downtown Mexico City, Mexico, June 22, 2017. REUTERS/Edgard Garrido/File Photo

Wired: How Hackers Pulled Off a $20 Million Mexican Bank Heist

In January 2018 a group of hackers, now thought to be working for the North Korean state-sponsored group Lazarus, attempted to steal $110 million from the Mexican commercial bank Bancomext. That effort failed. But just a few months later, a smaller yet still elaborate series of attacks allowed hackers to siphon off 300 to 400 million pesos, or roughly $15 to $20 million from Mexican banks. Here's how they did it.

Read more ....

WNU Editor:  I suspect that stories like this one are just the tip of the iceberg, and that most financial institutions keep stories like this one unreported.

Monday, April 1, 2019

Former NSA Hackers Helped UAE To Spy On Al Jazeera And BBC

IN THE NEWSA UAE-backed spying mission targeted the host of an Al Jazeera program called “The Opposite Direction,” which gave voice to pressing issues of the day. Here, the company’s Doha headquarters.Photo by Reuters/Naseem Zeitoon

Joel Schectman & Christopher Bing, Reuters: American hackers helped UAE spy on Al Jazeera chairman, BBC host

A group of American hackers who once worked for U.S. intelligence agencies helped the United Arab Emirates spy on a BBC host, the chairman of Al Jazeera and other prominent Arab media figures during a tense 2017 confrontation pitting the UAE and its allies against the Gulf state of Qatar.

The American operatives worked for Project Raven, a secret Emirati intelligence program that spied on dissidents, militants and political opponents of the UAE monarchy. A Reuters investigation in January revealed Project Raven’s existence and inner workings, including the fact that it surveilled a British activist and several unnamed U.S. journalists.

Read more ....

WNU Editor: The UAE hired the best. 

Tuesday, February 19, 2019

Report: The Best Hackers In The World Are From Russia

Russian Military Woos Young Computer Programmers. © RIA Novosti. Mikhail Fomitchev

NBC: Russian hackers 8 times faster than Chinese, Iranians, North Koreans, says report

A new report from cybersecurity firm CrowdStrike says hackers tied to Russian intelligence are quicker than North Koreans, Chinese, Iranians and criminals.

WASHINGTON — Experts have long said that the Russians are the most sophisticated among the many nation-state adversaries that are regularly hacking government and private computers in the United States.

Now, a leading cyber security firm has found a way to quantify that.

In its latest threat report, CrowdStrike — the company that discovered that the Russians had hacked he Democratic National Committee — finds that Russian intelligence hackers are quicker and more nimble than the North Koreans, the Chinese, the Iranians and sophisticated criminals.

CrowdStrike measured what it calls "breakout time" — the speed at which a hacking group can break into a network and start stealing data. That speed is important because intrusions are being detected and stopped faster than ever before. The faster the hackers can smash and grab, the more data they can steal.

Read more ....

WNU Editor: The company behind this report is CrowdStrike, a company that has its own share of critics .... More Doubts That Russian Intelligence Was Involved In Last Year's DNC Hack (August 11, 2017). As to what nation-state has the best hackers? The answer is an easy one. It is the U.S. intelligence community.

Wednesday, January 30, 2019

The U.A.E. Hired Ex-NSA Operatives To Establish Its Own Surveillance Network

U.S. CYBERWARRIORSBefore joining Project Raven in the UAE, many of the operatives worked for the U.S. National Security Agency. Its headquarters in Fort Meade, Maryland, is pictured above.Handout photo from NSA

Reuters: Inside the UAE’s secret hacking team of American mercenaries

Ex-NSA operatives reveal how they helped spy on targets for the Arab monarchy — dissidents, rival leaders and journalists.

Two weeks after leaving her position as an intelligence analyst for the U.S. National Security Agency in 2014, Lori Stroud was in the Middle East working as a hacker for an Arab monarchy.

She had joined Project Raven, a clandestine team that included more than a dozen former U.S. intelligence operatives recruited to help the United Arab Emirates engage in surveillance of other governments, militants and human rights activists critical of the monarchy.

Stroud and her team, working from a converted mansion in Abu Dhabi known internally as “the Villa,” would use methods learned from a decade in the U.S intelligence community to help the UAE hack into the phones and computers of its enemies.

Read more ....

Update: UAE 'used spying tool' to target Qatar's emir, other rivals (Al Jazeera)

WNU Editor: I am willing to bet that every country in the Middle East has done the same thing.

Wednesday, July 11, 2018

U.S. Military Drone Documents Found For Sale On The Dark Web

An MQ-9 Reaper, armed with GBU-12 Paveway II laser guided munitions and AGM-114 Hellfire missiles, piloted by Col. Lex Turner flies a combat mission over southern Afghanistan. (U.S. Air Force Photo / Lt. Col. Leslie Pratt)

Wall Street Journal: Stolen U.S. Military Drone Documents Found for Sale on Dark Web, Researchers Say

Discovery comes amid heightened concern about how U.S. military secrets may be insufficiently protected from hackers.

An unidentified hacker tried to sell purported U.S. military documents containing information about combat drones last month, a cybersecurity research firm said, after they were allegedly stolen from an Air Force officer’s computer.

The hacker sought buyers for maintenance documents about the MQ-9 Reaper drone, a remotely controlled aerial vehicle used by the Pentagon and other parts of the government to conduct offensive strikes or reconnaissance and surveillance operations.

Discovery of the attempted sale of the stolen documents comes amid heightened concern about how U.S. military secrets may be insufficiently protected from hackers. Military officials said last month that the Defense Department’s inspector general was investigating a major security breach after Chinese hackers allegedly stole data pertaining to submarine warfare, including plans to build a supersonic antiship missile.

Read more ....

More News On U.S. Military Drone Documents Found For Sale On The Dark Web

US Reaper drone data leaked on dark web, researchers say -- CNN
Mystery hacker trying to sell stolen US military documents, cybersecurity researchers say -- FOX News
Researchers find stolen military secrets for sale on the dark web -- CNET
A hacker stole instructions for Reaper drones and is selling them on the dark web -- VICE News
A hacker was caught selling a stolen Air Force drone manual for $200 on the dark web -- The Verge
A Hacker Sold U.S. Military Drone Documents On The Dark Web For Just $200 -- Forbes

Wednesday, May 23, 2018

Report: North Korea Has Become A World Leader In Hacking

NextGov: North Korea’s Hackers—Many Living Abroad—Have Nabbed It $650 Million

The North Korean government has rapidly become a world leader in hacking.

North Korea has gradually become a hacking superpower, and has earned a pretty penny in the process.

Agents acting on behalf of the ruling regime have stolen about $650 million through cyberattacks, according to research from Simon Choi, a consultant to South Korea’s CIA-esque National Intelligence Service. And that’s “just a portion” of their overall activity, he says, speaking to Patrick Winn of Public Radio International.

Read more ....

WNU Editor: I suspect that this is just the tip of the iceberg on what North Korea is doing in cyberspace.

Friday, March 23, 2018

U.S. Charges 9 Iranians In Massive Hacking Scheme



Reuters: U.S. charges, sanctions Iranians for global cyber attacks on behalf of Tehran

WASHINGTON (Reuters) - The United States on Friday charged and sanctioned nine Iranians and an Iranian company for attempting to hack into hundreds of universities worldwide, dozens of companies and parts of the U.S. government, including its main energy regulator, on behalf of Tehran’s government.

The cyber attacks, beginning in at least 2013, pilfered more than 31 terabytes of academic data and intellectual property from 144 U.S. universities and 176 universities in 21 other countries, the U.S. Department of Justice said, describing the campaign as one of the largest state-sponsored hacks ever prosecuted.

The U.S. Treasury Department said that it was placing sanctions on the nine people and the Mabna Institute, a company U.S. prosecutors characterized as designed to help Iranian research organizations steal information.

Read more ....

More News On The U.S. Charging 9 Iranians And An Iranian Company In A Massive Hacking Scheme

Nine Iranians Charged With Conducting Massive Cyber Theft Campaign on Behalf of the Islamic Revolutionary Guard Corps -- US Department of Justice
US charges 9 Iranians in massive hacking scheme -- AP
Nine Iranians are charged with stealing $3.4bn of data from hundreds of US universities, governments and private companies as part of global cyber attack -- Daily Mail
US Charges 9 Iranians in Huge Theft of Intellectual Property -- New York Times
Trump administration hits Iranian hacker network with sanctions, indictments in vast global campaign -- Washington Post
US disrupts 'massive and brazen' Iranian hacking scheme, DOJ says -- CNN
US charges Iranians in massive hacking scheme -- Phys.Org
What Did Iran Hack? US Files Charges Against Nine Iranians for Massive Cyberattack on American Systems -- Newsweek
US accuses Iran of hacking more than 300 universities -- Financial Times
DOJ Indicts 9 Iranians For Brazen Cyberattacks Against 144 US Universities -- WIRED

Is Lone DNC Hacker’ Guccifer 2.0 A Russian GRU Intelligence Agent?


Spencer Ackerman & Kevin Poulsen, Daily Beast: EXCLUSIVE: ‘Lone DNC Hacker’ Guccifer 2.0 Slipped Up and Revealed He Was a Russian Intelligence Officer

Robert Mueller’s team has taken over the investigation of Guccifer 2.0, who communicated with (and was defended by) longtime Trump adviser Roger Stone.

Guccifer 2.0, the “lone hacker” who took credit for providing WikiLeaks with stolen emails from the Democratic National Committee, was in fact an officer of Russia’s military intelligence directorate (GRU), The Daily Beast has learned. It’s an attribution that resulted from a fleeting but critical slip-up in GRU tradecraft.

That forensic determination has substantial implications for the criminal probe into potential collusion between President Donald Trump and Russia. The Daily Beast has learned that the special counsel in that investigation, Robert Mueller, has taken over the probe into Guccifer and brought the FBI agents who worked to track the persona onto his team.

Read more ....

WNU Editor: The hack of the DNC server .... and the subsequent release of documents coupled with the release of John Podesta's emails .... is IMHO one of the main reasons why Hillary Clinton lost the campaign. The revelation that the primaries were rigged to help her win hurt her standing among the Bernie Sanders supporters, and my gut tells me that it helped to suppress that vote on election day. But is Guccifer 2.0 a GRU Intelligence agent? Spencer Ackerman & Kevin Poulsen are reporting  that because of one IP address and some other intel the U.S. intelligence community has come to the consensus that there is a very good chance that Russian military intelligence was involved in the DNC hack. One IP address linked to a website on a social media platform???? As for the rest of the article .... a lot of speculation and anonymous sources.

Friday, March 2, 2018

Could North Korean Hackers Shut Down The U.S. Power Grid

Reuters

Kevin Poulsen, Daily Beast: North Korean Hackers May Be Developing Malware That Could Shut Down the U.S. Power Grid

More than half of security vulnerabilities tested in U.S. industrial systems could lead to “severe operational impact.”

Inside the modern power plants, transmission facilities, and electrical substations that make up a power grid, nearly everything is controlled by computers, and those systems haven’t gotten more secure since Russian government hackers triggered an electrical outage in Ukraine over a year ago. Now there are indications that North Korea may be working to follow Russia’s lead, and sizing up the U.S. as a target.

Those are some of the takeaways from new research by the Maryland-based cybersecurity firm Dragos, which specializes in industrial-control systems like those in the electrical grid and on factory floors. The company analyzed 163 new security vulnerabilities that surfaced last year in industrial-control components, and found that 61 percent of them would likely cause “severe operational impact” if exploited in a cyberattack.

Read more ....

WNU Editor: Hackers shutting down the power grid is a story that makes the rounds in the news every few months. This one is no exception .... accept that it involves North Korea.

Friday, December 8, 2017

This Is How North Korea Recruits Its Army Of Young Hackers

North Korean leader Kim Jong Un at the Sci-Tech Complex, in this undated photo released by North Korea's Korean Central News Agency (KCNA), October 28, 2015.Reuters/KCNA

NBC: How North Korea recruits its army of young hackers

SEOUL, South Korea — Teenage math whiz Ri Jong Yol was a solid candidate to join Kim Jong Un's army of elite hackers.

He had just won silver for the third year in a row at the world's premier high school mathematics championship, the International Mathematical Olympiad, which was held in Hong Kong in 2016.

But the night before he was supposed to return to North Korea with his team, the 18-year-old walked off the campus of the Hong Kong University of Science and Technology and defected.

According to Kim Heung Kwang, a former science professor who also escaped from North Korea, Ri is now studying at a university in Seoul. Little else is known about him.

Read more ....

WNU Editor: This story reminds me on how the Soviet Union recruited young people to do specific jobs or activities, and the "carrot" was that if you do not accept their offer, you would have to do military service. Not surprising .... when faced with doing what you love vs. military service .... most decided to focus on what they were good at. In my case .... it was playing chess.

Tuesday, November 28, 2017

U.S. Indicts Three Chinese Hackers For Conducting Cyber Attacks Against American Companies

Washington Free Beacon: U.S. Indicts Three Chinese Hackers Linked to Security Firm

Boyusec hackers stole hundreds of gigabytes of energy and GPS technology

The Justice Department charged three Chinese hackers on Monday with conducting cyber attacks against U.S. and international financial and technology firms and stealing confidential business information.

The three hackers, Chinese nationals Wu Yingzhuo, Dong Hao, and Xia Lei, all worked for a Chinese cyber security firm called Boyusec that the Pentagon has linked to the Ministry of State Security, the civilian intelligence service.

The three men were charged with coordinated cyber attacks against computer networks at Moody's Analytics, Siemans AG, and Trimble Inc.

Read more ....

WNU Editor: When I read stories like this one .... I cannot help but believe that it is just the tip of the iceberg.

Wednesday, October 11, 2017

Top Secret F-35, P-8, C-130 And Navy Ship Data Has Been Stolen In An Australian Defence Contractor Hack


ABC News Online: Hacker codenamed 'Alf' from Home and Away stole secret data on Joint Strike Fighter jets and surveillance planes

A mystery hacker who was given the alias of an Australian soap opera character has stolen sensitive information about Australia's warplanes and navy ships from a Defence subcontractor.

About 30 gigabytes of data was stolen, including information on Australia's $17 billion Joint Strike Fighter program, and $4 billion P-8 surveillance plane project.

As first reported by ZDNet, the hacker infiltrated the system July 2016 and authorities were only alerted in November.

Read more ....

WNU Editor: The defense minister is now saying that this theft is not a big deal .... Defence contractor did not lose classified info: Pyne (ITNews).

More News On Reports That Top Secret Data On Australian Military Projects Was Stolen

Secret F-35, P-8, C-130 data stolen in Australian defence contractor hack -- ZDNet
Hacker codenamed in honour of 'Alf' from Home and Away stole sensitive data about Australian military projects -- Sydney Morning Herald
Secret files on jets and navy ships stolen in 'extensive and extreme' hack -- The Guardian
Australia jet and navy data stolen in 'extensive' hack -- BBC News
A hacker stole secrets about fighter jets, bomb kits and more from an Australian defence contractor -- International Business Times
F-35 stealth fighter data stolen in Australia defence hack -- Daily Mail
PM 'should demand answers' on defence info hack -- The Australian

Israel Claims Kaspersky Software Is Being Used By Russian Hackers

A general view shows the headquarters of the anti-virus firm Kaspersky Lab in Moscow, Russia. Photo: Reuters

New York Times: How Israel Caught Russian Hackers Scouring the World for U.S. Secrets

It was a case of spies watching spies watching spies: Israeli intelligence officers looked on in real time as Russian government hackers searched computers around the world for the code names of American intelligence programs.

What gave the Russian hacking, detected more than two years ago, such global reach was its improvised search tool — antivirus software made by a Russian company, Kaspersky Lab, that is used by 400 million people worldwide, including by officials at some two dozen American government agencies.

The Israeli officials who had hacked into Kaspersky’s own network alerted the United States to the broad Russian intrusion, which has not been previously reported, leading to a decision just last month to order Kaspersky software removed from government computers.

Read more ....

WNU Editor: Germany's BSI federal cyber agency says it has no evidence to back media reports that Russian hackers used Kaspersky Lab antivirus software to spy on U.S. authorities .... Germany: 'No Evidence' Kaspersky Software Used by Russians for Hacks (US News and World Report/Reuters).

More News On Israeli Claims Kaspersky Software Is Being Used By Russian Hackers

Israel hacked Kaspersky, then tipped the NSA that its tools had been breached -- Washington Post
Israeli spies found Russians using Kaspersky software for hacks: media -- Reuters
Spy vs spy vs spy as Israel watches Russian hackers: NYT -- AFP
Israeli spies 'watched Russian agents breach Kaspersky software' -- BBC
Kaspersky software 'used by Russian state hackers to trawl for US secrets' -- The Telegraph
Israel hacked Kaspersky Lab, tipped off US about Russian hackers, report says -- FOX News
House committee plans multiple hearings on Kaspersky -- The Hill
Israel hacked Kaspersky, then tipped off the NSA about what it found: the US agency’s cyber toolkit -- SCMP
How Kaspersky AV reportedly was caught helping Russian hackers steal NSA secrets -- Ars Technica

Thursday, October 5, 2017

Report: Russian Hackers Stole NSA Secrets On U.S. Cyber Defense



Wall Street Journal: Russian Hackers Stole NSA Data on U.S. Cyber Defense

The breach, considered the most serious in years, could enable Russia to evade NSA surveillance and more easily infiltrate U.S. networks.

WASHINGTON—Hackers working for the Russian government stole details of how the U.S. penetrates foreign computer networks and defends against cyberattacks after a National Security Agency contractor removed the highly classified material and put it on his home computer, according to multiple people with knowledge of the matter.

The hackers appear to have targeted the contractor after identifying the files through the contractor’s use of a popular antivirus software made by Russia-based Kaspersky Lab, these people said.

The theft, which hasn’t been disclosed, is considered by experts to be one of the most significant security breaches in recent years. It offers a rare glimpse into how the intelligence community thinks Russian intelligence exploits a widely available commercial software product to spy on the U.S.

Read more ....

WNU Editor: I do not know if these allegations from the U.S. are true or not .... but these accusations will certainly mean the end of Kaspersky as we know it. Too bad .... I always found their anti-virus software to be very good.

More News On Reports That Russian Hackers Stole NSA Secrets On U.S. Cyber Defense

Russian hackers stole U.S. cyber secrets from NSA: media reports -- Reuters
Russian government hackers used antivirus software to steal U.S. cyber capabilities -- Washington Post
Russian hackers allegedly used popular antivirus software to steal NSA secrets -- ABC News
Russian Hackers Stole NSA Tools From Contractor Who Used Kaspersky Software -- NBC
Russian hackers stole NSA tools using Kaspersky antivirus: report -- The Hill
Kaspersky Under Scrutiny In New Revelations About NSA Security Breach -- Gizmodo
Russian Hackers Said to Steal Cyber Programs From NSA Contractor -- Bloomberg
Russian hackers reportedly stole NSA cyber defense material -- Endgadget

Russia reportedly stole NSA secrets with help of Kaspersky—what we know now -- Ars Technica