Articles about apt

Hackers target payment transfer system at Chile's biggest bank, 'take $10m'

Banco de Chile has become the latest victim in a string of cyber attacks targeting the payment transfer systems of banks. The country's largest bank was hit on 24 May and thousands of workstations hobbled. The ransomware attack was well documented locally and the bank has apologised for disruptions, which ran into days. …
John Leyden, 11 Jun 2018
boomerang

Hey, govt hacker bod. Made some really nasty malware? Don't be upset if it returns to bite you

RSA 2018 "You don't launch a cyber weapon, you share it." This was a reminder issued to RSA Conference attendees, in San Francisco on Tuesday, by two security researchers, who warned that advanced malware strains, particularly those developed by government hackers, can be captured and repurposed by cash-strapped miscreants to build a …
Shaun Nichols, 18 Apr 2018
illustration showing russian president vladimir putin winking

GCHQ boss calls out Russia for 'industrial scale disinformation'

GCHQ‬ boss Jeremy Fleming has hailed the success of a cyber-offensive against ISIS last year and warned of the growing threat posed by Russia. During a wide-ranging speech at the CyberUK conference in Manchester on Thursday morning, Fleming said a cyber operation last year had disrupted ISIS's [Daesh] communications. In 2017 …
John Leyden, 12 Apr 2018
Person hides face in shocked anticipation of something horrible. Photo via shutterstock

UK defines Cyber DEFCON 1, 2 and 3, though of course doesn't call it that

The UK government has launched a new cyber attack categorisation that is designed to improve response to incidents – sadly it doesn't go up to 11.* Categorisation into bands ranging from six down towards one (the most severe) will span the full range of incidents from localised attacks against individuals or SMEs up to " …
John Leyden, 12 Apr 2018
A Chinese laundry on the back streets of Shanghai

China ALTERED its public vuln database to conceal spy agency tinkering – research

China has altered public vulnerability data to conceal the influence of its spy agency in the country's national information security bug reporting process. The damning finding from threat intel firm Recorded Future follows months of research examining the publication speed for China’s National Vulnerability Database (CNNVD …
John Leyden, 12 Mar 2018

CryptoLurker hacker crew skulk about like cyberspies, earn $$$

A sophisticated mystery hacker group is using tactics more familiar to the world of cyber espionage to earn millions through mining malware. Kaspersky Lab researchers report that cybercrooks have begun using infection methods and techniques borrowed from targeted attacks in order to install mining software. The most …
John Leyden, 6 Mar 2018
guard dog

GCHQ unit claims it has 'objectively' made the UK a less desirable target to cybercrims

GCHQ's National Cyber Security Centre claims that its strategy of "actively defending" the UK against high-volume commodity attacks is working. The Active Cyber Defence (ACD) programme aims to "protect the majority of people in the UK from the majority of the harm, caused by the majority of the attacks, for the majority of the …
John Leyden, 5 Feb 2018
Putin

Kremlin social media trolls aren't actually that influential, study finds

The effect of Russian trolls influencing opinion through social media is far more minor than commonly supposed, according to a new study. It is believed Kremlin agents orchestrated efforts to manipulate public opinion on the web, often around major political events such as the US presidential election, through dedicated …
John Leyden, 30 Jan 2018
I AM NIKOM / Shutterstock.com

Android snoopware Skygofree can pilfer WhatsApp messages

Mobile malware strain Skygofree may be the most advanced Android-infecting nasties ever, antivirus-flinger Kaspersky Lab has warned. Active since 2014, Skygofree, named after one of the domains used in the campaign, is spread through web pages mimicking leading mobile network operators and geared towards cyber-surveillance. …
John Leyden, 16 Jan 2018

First shots at South Korea could herald malware campaign of Olympic proportions

A malware campaign has been unleashed against organisations involved with next month's Pyeongchang Winter Olympics. An email1 with a malicious Microsoft Word document attached was sent to a number of groups associated with the event, most of them targeting ice hockey organisations. "The attackers originally embedded an …
John Leyden, 8 Jan 2018

Russian hacker clan exposed: They're called MoneyTaker, and they're gonna take your money

Security researchers have lifted the lid on a gang of Russian-speaking cybercrooks, dubbed MoneyTaker. The group has conducted more than 20 successful attacks on financial institutions and legal firms in the USA, UK and Russia in the last two months alone, according to Russian incident response firm Group-IB. MoneyTaker has …
John Leyden, 11 Dec 2017
id4_white_house_648

Former US State Department cyber man: We didn’t see the Russian threat coming

Black Hat Cyber threats have evolved from been a solely technical issues to core issues of government policy, according to a senior US lawyer and former cyber diplomat. Chris Painter, former co-ordinator for cyber issues at the US State Department, told delegates at the Black Hat EU conference that cyber issues have emerged as a core …
John Leyden, 6 Dec 2017
silence

Hackers tiptoe out, launch Silence trojan, quietly raid banks of meeelllions

Cybercrooks are directly attacking banks in multiple countries using a trojan dubbed Silence. At least 10 financial organisations in multiple regions including Russia, Armenia, and Malaysia have been targeted by the so-called Silence crew in a series of ongoing attacks. While stealing funds from its victims, Silence runs …
John Leyden, 2 Nov 2017
malware_security_648

Hackers abusing digital certs smuggle malware past security scanners

Malware writers are widely abusing stolen digital code-signing certificates, according to new research. Malware that is signed with compromised certificates creates a means for hackers to bypass system protection mechanisms based on code signing. The tactic extends far beyond high profile cyber-spying ops, such as the Stuxnet …
John Leyden, 1 Nov 2017
Image by Dr Flash http://www.shutterstock.com/gallery-182053p1.html

Bootkit ransomware baddy hops down BadRabbit hole in Japan

A new strain of ransomware is apparently being used for targeted attacks in Japan. MBR-ONI, a new bootkit ransomware, relies on modified version of a legitimate open-source disk encryption utility called DiskCryptor for its encryption routines – the same tool abused by the Bad Rabbit ransomware last week. While ONI and the …
John Leyden, 31 Oct 2017
bouncer

Mil-spec infosec spinout Cryptonite reveals its network-scrambling tech

Security startup Cryptonite dropped out of stealth ​late last week with a micro-segmentation-based technology designed to prevent​ ​hacker​ ​reconnaissance​ ​and​ ​lateral​ ​movement. CryptoniteNXT​, the firm's network​ ​appliance​, sits between an organisation's perimeter firewall and internal networks, blocking​ ​malicious …
John Leyden, 30 Oct 2017

UK.gov joins Microsoft in fingering North Korea for WannaCry

The UK government has joined Microsoft in blaming North Korea for the WannaCry ransomware attack. Security minister Ben Wallace appeared on BBC Radio4's flagship Today programme on Friday morning to blame North Korea for the infamous ransomware attack that disrupted the operation of one in three NHS Trusts in England as well …
John Leyden, 27 Oct 2017

'We've nothing to hide': Kaspersky Lab offers to open up source code

Russian cybersecurity software flinger Kaspersky Lab has offered to open up its source code for third-party review. The firm's Global Transparency Initiative is in response to moves to ban the use of its technology on US government systems by the Department of Homeland Security over concerns of alleged ties with the Russian …
John Leyden, 23 Oct 2017

Create a news alert about apt, or find more stories about apt.

Biting the hand that feeds IT © 1998–2018