Archive for the ‘Cyber Espionage’ Category

Italian charged with hiring ‚Äúdark web hitman‚ÄĚ to murder his ex-girlfriend

In a brief yet¬†fascinating press release, Europol just announced the arrest of an Italian man who is accused of ‚Äúhiring a hitman on the dark web‚ÄĚ. According to Europol: The hitman, hired through an internet assassination website hosted on the Tor network, was paid about ‚ā¨10,000 worth in Bitcoins to kill the ex-girlfriend of the […]

Leave a Comment

FCC Boots Chinese Telecom Companies, Citing Security

he Federal Communications Commission‚Äôs (FCC) Public Safety and Homeland Security Bureau on March 12 identified five Chinese companies they said posed a threat to U.S. national security. These companies are: Huawei Technologies Co., ZTE Corp., Hytera Communications Corp., Hangzhou Hikvision Digital Technology Co. and Dahua Technology Co. The declaration, according to the FCC, is in accordance […]

Leave a Comment

Chinese cyberspies go after telco providers, 5G secrets

A Chinese cyber-espionage group has shifted operations from targeting Vatican officials and Catholic organizations to telecom providers across Asia, Europe, and the US. The group, known in the cybersecurity community as Mustang Panda or RedDelta, has been targeting employees of telecom companies since last fall, as a gateway inside organizations, with the end goal of stealing 5G-related information. […]

Leave a Comment

Microsoft releases open-source CodeQL queries to assess Solorigate compromise

Microsoft announced the release of open-source CodeQL queries that it experts used during its investigation into the SolarWinds supply-chain attack In early 2021, the US agencies FBI, CISA, ODNI, and the NSA released a¬†joint statement¬†that blames Russia for the¬†SolarWinds¬†supply chain attack. The four agencies were part of the task force Cyber Unified Coordination Group (UCG) […]

Leave a Comment

NSA Equation Group tool was used by Chinese hackers years before it was leaked online

The Chinese APT group had access to an NSA Equation Group, NSA hacking tool and used it years before it was leaked online by Shadow Brokers group. Check Point Research team¬†discovered that China-linked¬†APT31¬†group (aka¬†Zirconium.) used a tool dubbed Jian, which is a clone of¬†NSA Equation Group¬†‚Äės ‚ÄúEpMe‚ÄĚ hacking tool years before it was leaked online […]

Leave a Comment

Chinese Supply-Chain Attack on Computer Systems

Bloomberg News has a¬†major story¬†about the Chinese hacking computer motherboards made by Supermicro, Levono, and others. It‚Äôs been going on since at least 2008. The US government has known about it for almost as long, and has tried to keep the attack secret: China‚Äôs exploitation of products made by Supermicro, as the U.S. company is […]

Leave a Comment

Cyber Espionage Report

Leave a Comment

Suspected Russian hackers spied on U.S. Treasury emails

Hackers believed to be working for Russia have been monitoring internal email traffic at the U.S. Treasury Department and an agency that decides internet and telecommunications policy, according to people familiar with the matter. Three of the people familiar with the investigation said Russia is currently believed to be behind the attack. Two of the […]

Leave a Comment

FBI: Hackers stole source code from US government agencies and private companies

FBI blames intrusions on improperly configured SonarQube source code management tools. FBI officials say that threat actors have abused these misconfigurations to access SonarQube instances, pivot to the connected source code repositories, and then access and steal proprietary or private/sensitive applications. Officials provided two examples of past incidents: “In August 2020, unknown threat actors leaked […]

Leave a Comment

Elite CIA unit that developed hacking tools failed to secure its own systems, allowing massive leak, an internal report found

The publication of ‚ÄėVault 7‚Äô cyber tools by WikiLeaks marked the largest data loss in agency history, a task force concluded. The theft of top-secret computer hacking tools from the CIA in 2016 was the result of a workplace culture in which the agency‚Äôs elite computer hackers ‚Äúprioritized building cyber weapons at the expense of […]

Leave a Comment

Lamphone attack lets threat actors recover conversations from your light bulb | ZDNet

Academics record light variations in a light bulb to recover the sound waves (speech, conversations, songs) from a room 25 meters (80 feet) away. Source: Lamphone attack lets threat actors recover conversations from your light bulb | ZDNet Download a Security Risk Assessment steps paper! Download a vCISO template Subscribe to DISC InfoSec blog by […]

Leave a Comment

Western intelligence hacked Russia’s Google Yandex to spy on accounts

Exclusive: Western intelligence hacked ‘Russia’s Google’ Yandex to spy on accounts – sources Source: Western intelligence hacked ‘Russia’s Google’ Yandex to spy on accounts Enter your email address: Delivered by FeedBurner

Leave a Comment

China, Leverage, and Values

If there is a new tech cold war, it is one with shots fired over a decade ago, largely by China. The questions going forward are about both leverage and values. Source: China, Leverage, and Values 5G is a war the US is about to lose warns DoD more on Cyber War …   Jack […]

Leave a Comment

Chinese hacking group backdoors products from three Asian gaming companies | ZDNet

ESET suspects that tens or hundreds of thousands of users have been infected already. Source: Chinese hacking group backdoors products from three Asian gaming companies | ZDNet Cyber Security Espionage Titles

Leave a Comment