article thumbnail

U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack

Krebs on Security

as members of the PLA’s 54 th Research Institute, a component of the Chinese military. Attorney General Bill Barr said at a press conference today that the Justice Department doesn’t normally charge members of another country’s military with crimes (this is only the second time the agency has indicted Chinese military hackers).

Military 230
article thumbnail

A brief history of cryptography: Sending secret messages throughout time

IBM Big Data Hub

Most cryptosystems begin with an unencrypted message known as plaintext, which is then encrypted into an indecipherable code known as ciphertext using one or more encryption keys. 650 BC: Ancient Spartans used an early transposition cipher to scramble the order of the letters in their military communications.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

InvisiMole group targets military sector and diplomatic missions in Eastern Europe

Security Affairs

Security researchers at ESET recently uncovered a campaign carried out by the InvisiMole group that has been targeting a small number of high-profile organizations in the military sector and diplomatic missions in Eastern Europe. ” reads the analysis published by ESET. Pierluigi Paganini. SecurityAffairs – hacking, InvisiMole).

article thumbnail

GCHQ implements World War II cipher machines in encryption app CyberChef

Security Affairs

UK intelligence agency GCHQ released emulators for World War II cipher machines (Enigma, Typex and The Bombe) that can be executed in the encryption app CyberChef. The post GCHQ implements World War II cipher machines in encryption app CyberChef appeared first on Security Affairs. Pierluigi Paganini.

article thumbnail

Phishing attacks using the topic “Azovstal” targets entities in Ukraine

Security Affairs

The analysis of encryption techniques employed in the attack allowed the government experts to associate the campaign with the cybercrime group Trickbot. The alert published by the Ukraine CERT-UA includes Indicators of Compromise (IoCs) for this campaign and recommendations.

article thumbnail

Dark Pink APT targets Govt entities in South Asia

Security Affairs

The group focuses on military and government organizations to steal sensitive information, including confidential data and intellectual property. “The ISO file also contains a decoy Word document that has an XOR-encrypted section. ” reads the analysis published by EclecticIQ. ” concludes the report.

article thumbnail

SolarWinds hackers stole some of Mimecast source code

Security Affairs

Back in December, the SolarWinds supply chain attack made the headlines when a Russian cyber espionage group tampered with updates for SolarWinds’ Orion Network Management products that the IT company provides to government agencies, military, and intelligence offices. Upgraded encryption algorithm strength for all stored credentials.