Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 145

Aug 14, 2020

For six months, security researchers have secretly distributed an Emotet vaccine across the world

Posted by in categories: biotech/medical, cybercrime/malcode

Binary Defense researchers have identified a bug in the Emotet malware and have been using it to prevent the malware from making new victims.

Catalin Cimpanu

Aug 14, 2020

Vatican allegedly hacked by Chinese state-backed cyber gang’ ahead of talks intended to improve relations between the two sides

Posted by in categories: cybercrime/malcode, futurism

The Vatican and the Catholic Diocese of Hong Kong have been the targets of alleged Chinese state-backed hackers, it has emerged, just weeks before talks intended to improve relations between the two sides.

According to the U.S.-based cyber attack monitoring group Recorded Future, RedDelta, allegedly backed by the Chinese state, began attacking the Vatican in May ahead of upcoming talks in September to renew a landmark 2018 deal that helped thaw diplomatic relations.

Recorded Future said that the Hong Kong Study Mission to China — a key link between the Vatican and China — and the Pontifical Institute for Foreign Missions also were targeted.

Aug 14, 2020

Exclusive: China-backed hackers ‘targeted COVID-19 vaccine firm Moderna’

Posted by in categories: biotech/medical, cybercrime/malcode, government

WASHINGTON (Reuters) — Chinese government-linked hackers targeted biotech company Moderna Inc, a U.S.-based coronavirus vaccine research developer, this year in a bid to steal data, according to a U.S. security official tracking Chinese hacking.

China on Friday rejected the accusation that hackers linked to it had targeted Moderna.

Last week, the U.S. Justice Department made public an indictment of two Chinese nationals accused of spying on the United States, including three unnamed U.S.-based targets involved in medical research to fight the novel coronavirus.

Aug 14, 2020

Chinese Scientists Figured Out How to Beam Quantum Messages From Satellites

Posted by in categories: cybercrime/malcode, encryption, quantum physics, satellites

Safe Messaging

Cybersecurity experts have long warned that quantum computers, whenever it is that they become useful, will render useless most conventional forms of encryption. This new satellite experiment, which is described in research published in the journal Nature, suggests that it may be possible to send secure messages yet.

“A remarkable feature of the entanglement-based quantum cryptography as we demonstrated here is that such security is ensured even if the satellite is controlled by an adversary,” University of Science and Technology physicist Jian-Wei Pan told Space.com.

Aug 13, 2020

FBI and NSA expose new Linux malware Drovorub, used by Russian state hackers

Posted by in categories: cybercrime/malcode, military, privacy

The FBI and NSA issue joint security alert containing technical details about new Linux malware developed by Russia’s military hackers.

Aug 13, 2020

North Korean Hacking Group Attacks Israeli Defense Industry

Posted by in category: cybercrime/malcode

Israel says the attack was thwarted, but a cybersecurity firm says it was successful. Some officials fear that classified data stolen by North Korea could be shared with Iran.

Aug 8, 2020

Omniviolence Is Coming and the World Isn’t Ready

Posted by in categories: bioengineering, biological, cybercrime/malcode, drones, internet, law enforcement, nanotechnology, robotics/AI

The terrorist or psychopath of the future, however, will have not just the Internet or drones—called “slaughterbots” in this video from the Future of Life Institute—but also synthetic biology, nanotechnology, and advanced AI systems at their disposal. These tools make wreaking havoc across international borders trivial, which raises the question: Will emerging technologies make the state system obsolete? It’s hard to see why not. What justifies the existence of the state, English philosopher Thomas Hobbes argued, is a “social contract.” People give up certain freedoms in exchange for state-provided security, whereby the state acts as a neutral “referee” that can intervene when people get into disputes, punish people who steal and murder, and enforce contracts signed by parties with competing interests.

The trouble is that if anyone anywhere can attack anyone anywhere else, then states will become—and are becoming—unable to satisfy their primary duty as referee.

Continue reading “Omniviolence Is Coming and the World Isn’t Ready” »

Aug 8, 2020

30-year-old file format behind MacOS hack

Posted by in categories: cybercrime/malcode, privacy

A security expert revealed this week that an exploit commonly used against Windows users who own Microsoft Office can sneak into MacOS systems as well.

A former NSA security specialist who addressed the Black Hat security conference this week summarized his research into the new use for a very old exploit.

Patrick Wardle explained that the exploit capitalizes on the use of macros in Microsoft Office. Hackers have long used the approach to trick users into granting permission to activate the macros, which in turn surreptitiously launch .

Aug 8, 2020

The Feds Want These Teams to Hack a Satellite—From Home

Posted by in category: cybercrime/malcode

Meet the hackers who, this weekend, will try to commandeer an actual orbiter as part of a Defcon contest hosted by the Air Force and the Defense Digital Service.

Aug 6, 2020

Hacking group has hit Taiwan’s prized semiconductor industry, Taiwanese firm says

Posted by in categories: cybercrime/malcode, mobile phones

Taiwan’s semiconductor industry, a centerpiece of the global supply chain for smartphones and computing equipment, was the focus of a hacking campaign targeting corporate data over the last two years, Taiwan-based security firm CyCraft Technology claimed Thursday.

The hackers went after at least seven vendors in the semiconductor industry in 2018 and 2019, quietly scouring networks for source code and chip-related software, CyCraft said. Analysts say the campaign, which reportedly hit a sprawling campus of computing firms in northwest Taiwan, shows how the tech sector’s most prized data is sought out by well-resourced hacking groups.

“They’re choosing the victims very precisely,” C.K. Chen, senior researcher at CyCraft, said of the hackers. “They attack the top vendor in a market segment, and then attack their subsidiaries, their competitors, their partners and their supply chain vendors.”