recentpopularlog in


« earlier   
RT : In the 1980s, most jumped air gaps. You can learn from history.
malware  from twitter
6 days ago by mpasternacki
Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors | US-CERT
I heard about this last year but now they're blaming Russia directly and admitting that power plants were compromised. On the same day as that report about Saudi chemical plants. Not so good. They used supply chain attacks here, as well as watering holes and such basic stuff as phishing emails.
industrial_control_systems  power_plants  malware  security 
8 days ago by jcretan
A Cyberattack in Saudi Arabia Had a Deadly Goal. Experts Fear Another Try. - The New York Times
Saudi chemical company nearly had a huge explosion. A bug in the malware prevented it. It was supposed to be an airgapped control system.
malware  industrial_control_systems  chemical_industry  Saudi_Arabia  iran 
8 days ago by jcretan
Malware attack on 400k PCs caused by backdoored BitTorrent app | Ars Technica
Not only was it distributed by the official update mechanism, it was a signed binary using a stolen cert
signed_binaries  malware  supply_chain_attack 
9 days ago by jcretan
Russian pleads guilty to aiding massive hacks in US • Daily Beast
Kevin Poulsen:
<p>Jurijs Martisevs, a 36-year-old Moscovite arrested on a trip to Latvia, helped run a service called Scan4you that filled a crucial niche in the underground economy. Before deploying a piece of malware, hackers need to know it won't be immediately detected and quarantined by the dozens of consumer and commercial security products on the market. That’s where Scan4you comes in. For fifteen cents a pop, a hacker could upload their pre-launch code to Scan4you, which would then automatically check it against 30 different security scanners and report back the results.

Armed with that information, a hacker can make iterative changes to their code until the detection rate is sufficiently low, or even zero. Scan4you was the most successful of a slew of similar offerings advertised on underground forums, and operated from at least 2009 until the arrest of Martisevs and a co-defendant last year.

"Throughout its lifetime, the service has had thousands of users,” reads a statement of facts agreed to by Martisevs, “and has received and scanned millions of malicious files.”

According to Martisevs' plea documents, Scan4you's customers included some serious players, including the perpetrators of a national retail breach in November 2013. The retailer is unnamed, but the timing and description coincides with that month’s massive Target hack. The hackers submitted variations of their credit card stealing code to Scan4you four times over the course of two weeks before finally deploying the malware on Black Friday weekend. The Target breach ultimately netted thieves some 40 million credit and debit cards, and resulted in a $10 million consumer class action against Target.

Ruslans Bondars, Martisevs' co-defendant, was allegedly the creator and technical brains behind Scan4you. Bondars is a Latvian national extradited along with Martisevs. He’s in custody pending a May trial date.</p>

The Feds may have the full database of malware, and even customer details. That would be a hell of a thing.
Security  malware  hacking  trial 
11 days ago by charlesarthur
BAD TRAFFIC: Sandvine’s PacketLogic Devices Used to Deploy Government Spyware in Turkey and Redirect Egyptian Users to Affiliate Ads?
This report describes our investigation into the apparent use of Sandvine/Procera Networks Deep Packet Inspection (DPI) devices to deliver nation-state malware in Turkey and indirectly into Syria, and to covertly raise money through affiliate ads and cryptocurrency mining in Egypt.
infrastructure  malware  security  hacking  espionage  egypt  IFTTT  surveillance  turkey  (popular 
11 days ago by gyaresu
Slingshot APT
Sophisticated malware found hidden for six years
malware  badtech  via:hackernews  nsa  government  mikrotik 
11 days ago by nelson

Copy this bookmark:

to read