Posts filtered by tags: Sandworm[x]


Google Sees Rise in State-Sponsored Hackers Posing as Journalists

Government-backed hackers are increasingly posing members of the press in attempts to spread malicious email attachments and disinformation among newsreaders, according to Google’s own elite team of hackers.Read more...
Tags: Google, Security, Science, Malware, Phishing, Sandworm

Identifying vulnerabilities and protecting you from phishing

Google’s Threat Analysis Group (TAG) works to counter targeted and government-backed hacking against Google and the people who use our products. Following our November update, today we’re sharing the latest insights to fight phishing, and for security teams, providing more details about our work identifying attacks against zero-day vulnerabilities.  Protecting you from phishing We have a long-standing policy to send you a warning if we detect that your account is a target of government-backe...
Tags: Firefox, Google, North Korea, Iran, Sandworm, Toni Gidwani, Threat Analysis Group, Threat Analysis Group TAG

Protecting users from government-backed hacking and disinformation

Google's Threat Analysis Group (TAG) works to counter targeted and government-backed hacking against Google and our users. This is an area we have invested in deeply for over a decade. Our daily work involves detecting and defeating threats, and warning targeted users and customers about the world’s most sophisticated adversaries, spanning the full range of Google products including Gmail, Drive and YouTube.In the past, we’ve posted on issues like phishing campaigns, vulnerabilities and disinfor...
Tags: Google, South Korea, Youtube, Russia, Africa, Ukraine, South Africa, Play Store, Papua, West Papua, Safety And Security, Sandworm, Shane Huntley, Gmail Drive, Google Play Protect, Threat Analysis Group

My review of Sandworm: an essential guide to the new, reckless world of "cyberwarfare"

For years, I've followed Andy Greenberg's excellent reporting on "Sandworm," a set of infrastructure-targeted cyberattacks against Ukraine widely presumed to be of Russian origin, some of which escaped their targeted zone and damaged systems around the world. Greenberg has turned that work into a book-length cyber-whodunit, Sandworm, that comes out today. I reviewed it for the LA Times, where I described it as: "a tour through a realm that is both invisible and critical to the daily lives o...
Tags: Security, Post, News, Russia, Ukraine, Hungary, Crimea, Infosec, State Department, Iot, Stuxnet, Usaid, Caribbean, Dad, Cory Doctorow, Sandworm

Attribution is hard: the incredible skullduggery used to try to blame the 2018 Olympic cyberattack on North Korea

Wired has published another long excerpt from Sandworm, reporter Andy Greenberg's (previously) forthcoming book on the advanced Russian hacking team who took the US-Israeli Stuxnet program to the next level, attacking Ukrainian power infrastructure, literally blowing up key components of the country's power grid by attacking the embedded code in their microcontrollers. Earlier installments focused on the escaped Notpetya worm, which jumped from its Ukrainian targets and shut down major part...
Tags: Google, Security, South Korea, Post, News, North Korea, Russia, Lgbt, US, Ukraine, Olympics, Infosec, Kremlin, Kiev, Sandworm, Andy Greenberg

Someone is targeting "critical infrastructure" safety systems in networked attacks

The Triton malware was first identified 16 months ago by researchers from Fireeye: it targets Triconex control systems from Schneider Electric, and was linked by Fireeye to the Central Scientific Research Institute of Chemistry and Mechanics in Moscow. Now, Fireeye has published a report on a second instance of Triton being used in the field, this time to attack the safety instrumented systems (SIS) that use software and hardware to prevent power plants, refineries, and other large installa...
Tags: Post, News, Fireeye, Triton, Sandworm, Schneider Electric, Sis, Triconex, Dan Goodin Ars Technica, Infrastructure Attacks

Two Russia-backed hacker groups target Europe ahead of elections, FireEye reports

Security services firm FireEye says two hacker groups known to be sponsored by the Russian government of Vladimir Putin are waging cyber-attacks currently against European government systems. FireEye says these internet-based digital attacks are focused on the member states of NATO, the European security alliance that both Putin and Trump disparage. The two hacking groups are believed to be coordinating their efforts, but they're using different tools, FireEye reports, adding it noticed a “s...
Tags: Europe, Post, Politics, Technology, News, Putin, Vladimir Putin, Russia, Nbc News, Tech, Eu, Nato, Hackers, Fireeye, Gru, Trump

The true story of Notpetya: a Russian cyberweapon that escaped and did $10B in worldwide damage

Andy Greenberg (previously) is a veteran Wired security reporter who has chronicled the frightening and chaotic world of cyberwar since its earliest days; in a forthcoming book called "Sandworm," Greenberg tells the fascinating and terrible tale of Notpetya (previously), a Russian cyberweapon (built on leaked NSA cyberweapons!) that disguised itself as criminal ransomware, but which was designed to identify and destroy key Ukrainian computer systems and networks. (more…)
Tags: Security, Post, News, Nsa, Russia, Ukraine, Infosec, Maersk, Cyberwar, Sandworm, Andy Greenberg, Blowback, NotPetya, Sandworm Greenberg

Russia's new cyberweapon Quote: “It’s the culmination of over a decade of theory and attack scenarios,” Caltagirone warned. “It’s a game changer.” “The same Russian group that targeted U.S. [industrial control] systems in 2014 turned out the lights in Ukraine in 2015,” said John Hultquist, who analyzed both incidents while at iSight Partners, a cyber-intelligence firm now owned by FireEye, where he is director of intelligence analy...
Tags: Putin, Russia, Ukraine, Fireeye, Weapon, General Discussion, Trump, Sandworm, Hultquist, Caltagirone, John Hultquist

Des hackers provoquent un blackout en Ukraine

Des pirates informatiques ont réussi à provoquer une coupure de courant générale dans l’ouest de l’Ukraine, plongeant des milliers d’habitants dans le noir. Pour arriver à leurs fins, les hackers ont déployé des méthodes classiques, mais redoutables : phishing, malware, cheval de Troie et portes dérobées. C’est sans doute une première. Des pirates informatiques ont […]
Tags: Ukraine, Malware, Hackers, Sécurité, Piratage, Attaque Informatique, Black Energy, Cyberattaque, Sandworm