The discovery of Russia's devastating SolarWinds spy campaign put the spotlight on the sophisticated supply chain hijacking techniques of Moscow's foreign intelligence hackers. But it's now apparent that, throughout that SolarWinds spying and its fallout, another group of Kremlin hackers has kept up up their usual daily grind, using basic but often effective techniques to pry open practically any vulnerable network they could find across the US and the global internet.
Read MorePresident Joe Biden said he gave Russian President Vladimir Putin a list of 16 critical infrastructure sectors, from energy to water, that should not be the subject of malicious cyber activity during a meeting between the two men in Geneva on Wednesday.
Read MoreCyber security experts at McAfee discovered a security flaw on Peloton’s Bike+ that could leave riders vulnerable to internet hackers, the company announced Tuesday. The issue, according to McAfee, stemmed from a USB port that could allow fraudsters “backdoor access” to the bike’s operating system, as well as the 22-inch touchscreen.
Read MoreMcDonald’s Corp said hackers stole some data from its systems in markets including the U.S., South Korea and Taiwan, in another example of cybercriminals infiltrating high-profile global companies.
Read MoreFor the first two decades of the Internet era, operational technology (OT) in places like factories and power plants remained mostly isolated from IT systems. While the fear of cyber intrusions grew among their counterparts in IT, workers in these physical settings were far more focused on safety precautions to protect people from the machines, products, and chemicals within those spaces.
Read MoreA researcher has uncovered one of the more unusual finds in the annals of malware: booby-trapped files that rat out downloaders and try to prevent unauthorized downloading in the future. The files are available on sites frequented by software pirates.
Vigilante, as SophosLabs Principal Researcher Andrew Brandt is calling the malware, gets installed when victims download and execute what they think is pirated software or games. Behind the scenes, the malware reports the file name that was executed to an attacker-controlled server, along with the IP address of the victims’ computers. As a finishing touch, Vigilante tries to modify the victims’ computers so they can no longer access thepiratebay.com and as many as 1,000 other pirate sites.
Read More