Keyword: cybersecurity
-
The FBI has unveiled details of a massive international cyberattack orchestrated by the Chinese hacker group Mustang Panda, which used the PlugX malware to compromise thousands of computers in at least 170 countries. According to the Justice Department, the group—described as “PRC state-sponsored hackers”—is funded by the Chinese government and has primarily targeted European government devices. Since 2014, Mustang Panda has utilized PlugX malware to infiltrate government and business systems across the U.S., Europe, and Asia. The malware, initially designed to exploit Windows-based devices, was modified in 2020 to spread via USB flash drives. Thousands of devices, including many home...
-
NEW YORK, Jan 15 (Reuters) - Colonial Pipeline's main U.S. gasoline artery is expected to remain shut through Friday as the company continues to search for the source of a suspected leak in Paulding County, Georgia, the company said in a statement on Wednesday. Line 1, one of two mainlines on the more than 5,500-mile Colonial system, was shut on Monday night after Colonial received reports of a gasoline release. The pipeline moves gasoline from Texas to North Carolina and was earlier expected to resume service on Tuesday night, according to market sources. "Colonial continues on-site work to identify the...
-
Outgoing FBI Director Christopher Wray revealed during an interview on Sunday, a week before he steps down, that China has penetrated America’s water treatment plants, electric grid, and other critical civilian infrastructure, and is lying “in wait” for an opportunity to cyberattack at a time and place of its choosing. Asked on CBS’s 60 Minutes about Chinese penetration of U.S. cyber and infrastructure, Wray said China’s cyber program is the largest in the world and has stolen more of Americans’ personal and corporate data than every nation combined. Then, he added: But even beyond the cyber theft. There’s another part...
-
A US Army soldier has been arrested in Texas after being indicted on two counts of unlawful transfer of confidential phone records information. While the indictment doesn't specify any hacking activity or victims' names, Cameron John Wagenius, 20, is suspected of being a cybercriminal known as Kiberphant0m, who claimed to have breached at least 15 telecommunications firms including AT&T and Verizon, according to KrebsOnSecurity. Wagenius is allegedly an associate of Connor Riley Moucka, one of the men accused of compromising multiple organizations' Snowflake-hosted environments, stealing sensitive customer data housed in the cloud storage service, and then extorting victims for millions...
-
WASHINGTON, Dec 30 (Reuters) - Chinese state-sponsored hackers breached the U.S. Treasury Department's computer security guardrails this month and stole documents in what Treasury called a "major incident," according to a letter to lawmakers, opens new tab that Treasury officials provided to Reuters on Monday. The hackers compromised third-party cybersecurity service provider BeyondTrust and were able to access unclassified documents, the letter said. According to the letter, hackers "gained access to a key used by the vendor to secure a cloud-based service used to remotely provide technical support for Treasury Departmental Offices (DO) end users. With access to the stolen...
-
The US Treasury says Chinese hackers stole major documents in a computer breach. The hackers compromised third-party cybersecurity service provider BeyondTrust and were able to access unclassified documents, the letter said.
-
A major Russian telecommunications company appears to have begun providing an Internet connection to North Korea. The new link supplements one from China and will provide back-up to Pyongyang at a time the US government is reportedly attacking its Internet infrastructure and pressuring China to end all business with North Korea. The connection, from TransTeleCom, began appearing in Internet routing databases at 09:08 UTC on Sunday, or around 17:38 Pyongyang time on Sunday evening. Internet routing databases map the thousands of connections between telecom providers and enable computers to figure out the best route to a destination. Until now, Internet...
-
Chinese state-sponsored hackers broke into the US Treasury Department earlier this month and stole documents from its workstations, according to a letter to lawmakers that was provided to Reuters on Monday. The hackers compromised a third-party cybersecurity service provider and were able to access unclassified documents, the letter said, calling it a "major incident." According to the letter, hackers "gained access to a key used by the vendor to secure a cloud-based service used to remotely provide technical support for Treasury Departmental Offices (DO) end users. With access to the stolen key, the threat actor was able override the service’s...
-
With everything going on in the world, I wanted to reach out to see what other Freepers are doing online to protect yourselves, whether its subscribing to a monitoring service for activity under your name, using VPN (which one & why), password managers, multi-factor authentication etc. What else should a person consider?
-
“Operation Destabilise has exposed billion-dollar money laundering networks operating in a way previously unknown to international law enforcement or regulators. “For the first time, we have been able to map out a link between Russian elites, crypto-rich cyber criminals, and drugs gangs on the streets of the UK. The thread that tied them together – the combined force of Smart and TGR – was invisible until now. “The NCA and partners have disrupted this criminal service at every level. We have identified and acted against the Russians pulling the strings at the very top, removing the air of legitimacy that...
-
The story is about how older hackers from Russia in their 40's who have been hacking for years and know all the tricks unite with younger hackers, ENglish speaking, who are doing the hacking into corps. and elsewhere.
-
We already knew that a weaponized Deep State Blob was jumping over the Constitutional guardrails to monitor Americans. Whether it was the State Department’s Global Engagement Center or Big Finance giddily handing over MAGA customer information without a court order, the Deep State has waded through Americans’ smartphones and social media at will to categorize, target, and silence Americans. This behavior is shameful, and after January 20, 2025, hopefully, investigations will be announced for at least the worst of the worst of the Deep State Offenders. Because of this unlawful behavior, the $106 billion per year spent on the National...
-
NEW YORK, July 13 (Reuters) - A former CIA software engineer was convicted on Wednesday of leaking classified information to WikiLeaks from the spy agency, in one of the biggest such thefts in CIA history.
-
A major cyberattack on big US telecom companies has led officials to recommend that people use encrypted messaging apps. Microsoft named the attack "Salt Typhoon," and it's affecting companies like AT&T, Verizon, and Lumen Technologies. Officials haven't released a timeline for when everything will be fixed, but they did say that a lot of different types of information were accessed in the breach. The FBI and the Cybersecurity and Infrastructure Security Agency (CISA) advised using encrypted messaging apps like Signal or iMessage to reduce the chances of messages being intercepted. This essentially means to stop using SMS because it's not...
-
Kash Patel, President-elect Donald Trump’s nominee to be the next director of the FBI, was recently targeted by an Iranian hacking campaign. According to the Washington Examiner, multiple sources claim that the FBI had informed both Patel and President-elect Trump of the cyberattack. The Trump transition team issued a statement that did not confirm such a hacking attempt, but nevertheless condemned Iran and praised Patel’s past work on counter-terrorism. “Kash Patel was a key part of the first Trump administration’s efforts against the terrorist Iranian regime and will implement President Trump’s policies to protect America from adversaries as the FBI...
-
UnitedHealthcare CEO Brian Thompson was one of several senior executives at the company under investigation by the Department of Justice when he was gunned down outside a Manhattan hotel on Wednesday. Thompson — who was killed in what police called a targeted shooting outside the Hilton hotel in Midtown — exercised stock options and sold shares worth $15.1 million on Feb. 16, less than two weeks before news of the federal antitrust probe went public, according to a Crain’s New York Business report from April. ... Earlier this year, UnitedHealth was hit by one of the largest healthcare data breaches...
-
It's being called the largest ever breach of protected patient health information by a government-regulated medical company in America's history. Change Healthcare, owned by UnitedHealth Group, fell victim to a cyberattack eight months ago, but revealed on Thursday that 100 million people had been impacted. That surpassed the previous recordholder for worst breach of US patient data: a 2015 episode at Anthem Inc. that compromised 78.8 million individuals. The first official report by Change Healthcare, which manages revenue and payments for medical providers, estimated in July that only 500 people had been compromised. Now, the scope of the February 21...
-
China has emerged as the most prolific intelligence threat to U.S. having engaged in corporate espionage, intellectual-property theft, and personnel information breaches going back decades. A naturalized U.S. citizen who immigrated from China has been sentenced to four years in prison after conspiring to act as a agent of the Chinese government, highlighting the broad reach of Beijing’s security service and strategy of co-opting immigrants for intelligence gathering, according to the Justice Department. The plea agreement and court filings announced Monday show China’s Ministry of State Security – the Communist-run country's intelligence service – used operative Peng Li as a...
-
WASHINGTON — The Pentagon has long pushed back against the establishment of a new military service dedicated to cyberspace, but with President-elect Donald Trump on his way back to the White House, a separate cyber force has a real shot at becoming a reality, according to experts and to lawmakers who support the move.“This change in administration potentially could give more impetus to the creation of a separate cyber service,” Quentin Hodgson, formerly the Pentagon’s director of Cyber Plans, told Breaking Defense. “[Trump] did that with the Space Force. It was something that the Department of Defense didn’t want, but...
-
Multiple U.S. broadband providers, including Verizon, AT&T, and Lumen Technologies, have been breached by a Chinese hacking group tracked as Salt Typhoon, the Wall Street Journal reports. The purpose of the attack appears to be intelligence collection as the hackers might have had access to systems used by the U.S. federal government for court-authorized network wiretapping requests. It is unclear when the intrusion occurred, but WSJ cites people familiar with the matter, saying that "for months or longer, the hackers might have held access to network infrastructure used to cooperate with lawful U.S. requests for communications data." Salt Typhoon is...
|
|
|