cyberwar   2509

« earlier    

NotPetya story
Details of how a Russian cyberwarfare attack on Ukraine ended up crippling Maersk for weeks
maersk  russia  politics  ukraine  security  badtech  cyberwar 
28 days ago by nelson
Russia's Cyberwar on Ukraine Is a Blueprint For What's to Come | WIRED
The clocks read zero when the lights went out. It was a Saturday night last December, and Oleksii Yasinsky was sitting on the couch with his wife and teenage son in the living room of their Kiev apartment.
cyberwar  russia  security 
5 weeks ago by jeffhammond
China's long game to dominate nuclear power relies on the UK | Environment | The Guardian
While Germany and other western countries have turned their backs on nuclear, the UK is strongly committed to new nuclear to meet its carbon goals and this means, despite security concerns, the government needs Chinese involvement. [...] But the company is open about the bigger prize – the UK as a springboard for exporting Chinese nuclear technology to other countries.
UK  Brexit  China  energy  policy  national  security  espionage  cyberwar  nuclear  FDI  freetradedeal  tradedeal 
8 weeks ago by asterisk2a
Fake news and botnets: how Russia weaponised the web | Technology | The Guardian
Once there was a fox that wanted to eat a turtle, but whenever he tried to, it withdrew into its shell. He bit it and he shook it, but he wasn’t getting anywhere. One day he had an idea: he made the turtle an offer to buy its shell. But the turtle was clever and knew it would be eaten without this protection, so it refused. Time passed, until one day there appeared a television hanging in a tree, displaying images of flocks of happy, naked turtles – flying! The turtle was amazed. Oh! They can fly! But wouldn’t it be dangerous to give up your shell? Hark, the voice on television was announcing that the fox had become a vegetarian. “If I could only take off my shell, my life would be so much easier,” thought the turtle. “If the turtle would only give up its shell, it would be so much easier to eat,” thought the fox – and paid for more broadcasts advertising flying turtles. One morning, when the sky seemed bigger and brighter than usual, the turtle removed its shell. What it fatally failed to understand was that the aim of information warfare is to induce an adversary to let down its guard.

(In 1998, Sergei P Rastorguev, a Russian military analyst, published Philosophy of Information Warfare, which included a lengthy version of this anecdote)
botnet  russia  estonia  cyberwar  information-warfare  Rastorguev  disinfo  infrastructure  2007  2017  Gerasimov 
11 weeks ago by zzkt
The biggest digital heist in history isn’t over yet • Bloomberg
Charlie Devereux , Franz Wild , and Edward Robinson:
<p>Before WannaCry, before the Sony Pictures hack, and before the breaches that opened up Equifax and Yahoo!, there was a nasty bit of malware known as Carbanak. Unlike those spectacular attacks, this malware wasn’t created by people interested in paralyzing institutions for ransom, publishing embarrassing emails, or taking personal data. The Carbanak guys just wanted loot, and lots of it.

Since late 2013, this band of cybercriminals has penetrated the digital inner sanctums of more than 100 banks in 40 nations, including Germany, Russia, Ukraine, and the U.S., and stolen about $1.2 billion, according to Europol, the European Union’s law enforcement agency. The string of thefts, collectively dubbed Carbanak—a mashup of a hacking program and the word “bank”—is believed to be the biggest digital bank heist ever. In a series of exclusive interviews with Bloomberg Businessweek, law enforcement officials and computer-crime experts provided revelations about their three-year pursuit of the gang and the mechanics of a caper that’s become the stuff of legend in the digital underworld.

Besides forcing ATMs to cough up money, the thieves inflated account balances and shuttled millions of dollars around the globe. Deploying the same espionage methods used by intelligence agencies, they appropriated the identities of network administrators and executives and plumbed files for sensitive information about security and account management practices. The gang operated through remotely accessed computers and hid their tracks in a sea of internet addresses. “Carbanak is the first time we saw such novel methods used to penetrate big financial institutions and their networks,” says James Chappell, co-founder and chief innovation officer of Digital Shadows Ltd., a London intelligence firm that works with the Bank of England and other lending institutions. “It’s the breadth of the attacks, that’s what’s truly different about this one.”</p>


Sounds a bit like a nation-state player who decided to mint it.
security  cyberwar  crime  hacking 
12 weeks ago by charlesarthur
The Biggest Digital Heist in History Isn’t Over Yet - Bloomberg
Carbanak’s suspected ringleader is under arrest, but $1.2 billion remains missing, and his malware attacks live on.
crime  cyberwar  law  money  security 
12 weeks ago by basemaly
Exclusive: FBI seizes control of Russian botnet • Daily Beast
Kevin Poulsen:
<p>FBI agents armed with a court order have seized control of a key server in the Kremlin’s global botnet of 500,000 hacked routers, The Daily Beast has learned. The move positions the bureau to build a comprehensive list of victims of the attack, and short-circuits Moscow’s ability to reinfect its targets.

The FBI counter-operation goes after  “VPN Filter,” a piece of sophisticated malware linked to the same Russian hacking group, known as Fancy Bear, that breached the Democratic National Committee and the Hillary Clinton campaign during the 2016 election. On Wednesday security researchers at Cisco and Symantec separately provided new details on the malware, which has turned up in 54 countries including the United States.

VPN Filter uses known vulnerabilities to infect home office routers made by Linksys, MikroTik, NETGEAR, and TP-Link. Once in place, the malware reports back to a command-and-control infrastructure that can install purpose-built plug-ins, according to the researchers. One plug-in lets the hackers eavesdrop on the victim’s Internet traffic to steal website credentials; another targets a protocol used in industrial control networks, such as those in the electric grid. A third lets the attacker cripple any or all of the infected devices at will.

The FBI has been investigating the botnet since at least August, according to court records, when agents in Pittsburgh interviewed a local resident whose home router had been infected with the Russian malware. “She voluntarily relinquished her router to the agents,” wrote FBI agent Michael McKeown, in an affidavit filed in federal court. “In addition, the victim allowed the FBI to utilize a network tap on her home network that allowed the FBI to observe the network traffic leaving the home router.”</p>


That was quick.
cyberwar  russia  fbi  botnet 
may 2018 by charlesarthur
FBI siezes Russian botnet
Report that Fancy Bear's botnet of compromised consumer routers has been taken over by the US
cyberwarfare  cyberwar  badtech  russia  politics  fbi  botnet 
may 2018 by nelson

« earlier    

related tags

&  (cyber-fiction)  2007  2016  2017  60minutes  @thegrugq  a  about  aitel  algorithm  algorithms  an  and  angela  angelamerkel  antivirus  assange  automated  badtech  baltic  bangladesch  banken  between  bias  bitcoin  botnet  bots  brexit  bridging  business  cable  canada  capability  catalunya  censorship  china  cis3360  cis4615  coin  cold  coldwar  coldwar20  collaborative  collusion  combined  computer  continent  control  crime  crs  ctf  culture  cyber-security  cyber  cyberattacks  cybercrime  cybersecurity  cyberwarfare  damage  darpa  data  deception  development  disinfo  diversity  dnc  dod  donaldtrump  economic  edition  edition:  election  election2016  elections  emerging  energy  enforcement  espionage  estonia  ethics  eu  eua  europe  european  evidence  exposed  facebook  fake_news  fbi  fdi  feed  finance  finland  for  foreign-policy  foreignpolicy  fp  freetradedeal  gaps  geopolitics  gerasimov  germany  git:  grid  guide  hacker  hacking  harbinger  history  how  hybridwarfare  in  information-warfare  information  infowar  infowars  infrastructure  intelligence  interference  internet  internet_censorship  investigations:  iran  iraq  israel  it  jammin  kaspersky  know  lasc  latvia  lauschangriff  law  leak  learning  lies  machine  maersk  malware  massveillance  maxboot  media  merkel  military  money  national  nato  netpolicynotes  network:  news  newswire  newyork  nordkorea  notpetya  nsa  nuclear  nuclearweapons  obama  obfuscation:  of  organization  own  persuasion  phishing  policy  politics  populism  power  powerful  preso  privacy  professionals  propoganda  prosecutors  protest  rastorguev  referendum  report  rise  rootkits:  russia  russianhackers  sanctions  sean_brooks  second  secrets  security  server  shoreditchmurdermystery  smarter  social  social_media  socialmedia  socialnetwork  software  solutions  space  spacenews  spending  spying  stealing  strategy  stuxnet  surveillance  sweden  swift  techniques  technology  than  the  to  tools  tradedeal  training  trolling  trump  twitter  uk  ukraine  union  us:  usa  user’s  version  virus  vonderleyen  vulnerability  wannacry  wapo  war  warfare  we  web  what  wikileaks  with  worm  worm:  wurm  youtube   

Copy this bookmark:



description:


tags: