LONDON/WASHINGTON, Jan 6 (Reuters) - A Russian hacking team known as Cold River targeted three nuclear research laboratories in the United States this past summer, according to internet records reviewed by Reuters and five cyber security experts.
Reuters was unable to determine why the labs were targeted or if any attempted intrusion was successful. A BNL spokesperson declined to comment. LLNL did not respond to a request for comment. An ANL spokesperson referred questions to the U.S. Department of Energy, which declined to comment.
Russian hackers reportedly targeted US nuclear sites after Ukraine invasion | The Times of Israel
A team of Russian hackers targeted three nuclear research labs in the US last summer, according to a Friday Reuters report.
The news agency was unable to determine why those three labs were targeted, nor whether the hacking attempts had been successful. None of the labs or government offices involved responded to requests for comment on the story.
Rackspace says hackers accessed customer data during ransomware attack • TechCrunch
Cloud computing giant Rackspace has confirmed hackers accessed customer data during last month’s ransomware attack.
Rackspace said about 30,000 customers used its hosted Exchange service — which it will now discontinue — at the time of the ransomware attack.
Hackers Behind Ransomware Attack on Rackspace Accessed Customer Data | PCMag
The company’s forensic investigation found that the group used a previously unknown attack method in Microsoft Exchange Server to gain access to Rackspace’s Hosted Exchange systems.
Sign up for SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox.
Rackspace: Hackers Obtained Customer Data In Ransomware Attack | CRN
Car hackers discover vulnerabilities that could let them hijack millions of vehicles - CyberScoop
The vulnerabilities could let attackers remotely track, stop or control a car — even an entire fleet of emergency vehicles. Another could give hackers access to some 15.5 million automobiles, allowing them to send commands to control braking systems.
In total, a group of ethical car hackers discovered at least 20 vulnerabilities within the application programming interfaces, or APIs, that automakers rely on so technology inside cars can interact. The vulnerabilities affected Ford, Toyota, Mercedes, BMW, Porsche, Ferrari and others.
Turla, a Russian Espionage Group, Piggybacked on Other Hackers' USB Infections | WIRED
The Russian cyberespionage group known as Turla became infamous in 2008 as the hackers behind agent.btz, a virulent piece of malware that spread through US Department of Defense systems, gaining widespread access via infected USB drives plugged in by unsuspecting Pentagon staffers.
That hijacking technique appears designed to let Turla stay undetected, hiding inside other hackers' footprints while combing through a vast collection of networks.
Hackers Using CAPTCHA Bypass Tactics in Freejacking Campaign on GitHub
A South Africa-based threat actor known as Automated Libra has been observed employing CAPTCHA bypass techniques to create GitHub accounts in a programmatic fashion as part of a freejacking campaign dubbed PURPLEURCHIN.
The group "primarily targets cloud platforms offering limited-time trials of cloud resources in order to perform their crypto mining operations," Palo Alto Networks Unit 42 researchers William Gamazo and Nathaniel Quist said .
EXCLUSIVE: A Russian hacking team known as Cold River targeted three nuclear research laboratories in the United St… https://t.co/6AI1qzlMEQ Reuters (from Around the world) Fri Jan 06 15:01:42 +0000 2023
Exclusive interview podcast with Ms. Jennifer Sharp who produced "Anecdotals" Must see documentary for those who h… https://t.co/lZ2ZBwjs5k P_McCulloughMD (from Dallas Texas USA) Sun Jan 01 03:59:18 +0000 2023
Read more, on Korinets and "one of the most important hacking groups you've never heard of," in our exclusive here:… https://t.co/PXF0OQgeXm pearswick (from London) Fri Jan 06 19:11:03 +0000 2023
https://sypuber.page.link/reddcct
REDACTED ID. Click here.
No comments:
Post a Comment