Transparent Tribe Mounts Ongoing Spy Campaign on Military, Government

Threatpost

Government Malware Vulnerabilities apt crimson RAT Cyberattacks cyberespionage data theft military targets Spear Phishing spy campaign transparent tribe usbwormThe group has added a management console and a USB worming function to its main malware, Crimson RAT.

Gamaredon APT Improves Toolset to Target Ukraine Government, Military

Threatpost

Vitali Kremez, head of SentinelLabs, said in research released on Wednesday that he has been tracking an uptick in Gamaredon cyberattacks on Ukrainian military and security institutions that started in […]. Government Malware analysis apt gamaredon malware implant Microsoft.Vbe.Interop military targets national security russia sentinelabs ukraine

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack

Krebs on Security

as members of the PLA’s 54 th Research Institute, a component of the Chinese military. The government says the men disguised their hacking activity by routing attack traffic through 34 servers located in nearly 20 countries, using encrypted communications channels within Equifax’s network to blend in with normal network activity, and deleting log files daily to remove evidence of their meanderings through the company’s systems. commercial and government interests.

Unsecure Database Exposed US Military Personnel Data: Report

Data Breach Today

military and other government personnel, according to a new report from two independent security researchers Exposed Database Owned by AutoClerk Hotel Reservation Management System An unsecure database belonging to a company that provides hotel reservation management technology exposed about 179 GB of customer data, including travel arrangements and other data for U.S.

A new piece of Ryuk Stealer targets government, military and finance sectors

Security Affairs

A new piece of the Ryuk malware has been improved to steal confidential files related to the military, government, financial statements, and banking. Security experts from MalwareHunterTeam have discovered a new version of the Ryuk Stealer malware that has been enhanced to allow its operators to steal a greater amount of confidential files related to the military, government, financial statements, and banking.

Autoclerk travel reservations platform data leak also impacts US Government and military

Security Affairs

“The data Our team viewed highly sensitive data exposing the personal details of government and military personnel, and their travel arrangements to locations around the world, both past and future.” The list of affected users includes the US government, military, and Department of Homeland Security (DHS). . “For the US government, alarm bells should be ringing. “The greatest risk posed by this leak was to the US government and military.

Germany and the Netherlands agreded to build TEN, the first ever joint military internet

Security Affairs

The governments of Germany and The Netherlands agreed to build the first-ever joint military Internet, so-called TEN (Tactical Edge Networking). Government officials from Germany and the Netherlands signed an agreement for the building of the first-ever joint military Internet, so-called TEN (Tactical Edge Networking). “The name of this new Dutch-German military internet is the Tactical Edge Networking, or TEN, for short.”

Chinese Military Wants to Develop Custom OS

Schneier on Security

Citing security concerns, the Chinese military wants to replace Windows with its own custom operating system : Thanks to the Snowden, Shadow Brokers, and Vault7 leaks, Beijing officials are well aware of the US' hefty arsenal of hacking tools, available for anything from smart TVs to Linux servers, and from routers to common desktop operating systems, such as Windows and Mac.

U.S. Government, Military Personnel Data Leaked By Autoclerk

Threatpost

Government Hacks Autoclerk database government data leaky database personal data travel agency dataThe travel reservation data, along with personal details, of hundreds of thousands was discovered in a database exposed online for all to see.

Maze ransomware operators stole data from US military contractor Westech

Security Affairs

Hackers have stolen confidential documents from the US military contractor Westech, which provides critical support for US Minuteman III nuclear deterrent. “It is unclear if the documents stolen by the criminals include military classified information, but files which have already been leaked online suggest the hackers had access to extremely sensitive data, including payroll and emails.”

Program Looks to Tap Military Vets for Cyber-Jobs

Threatpost

Government Cisco cybersecurity workforce cybervets usa job training Maryland military veterans netapp public private partnership shortage skills gap transitionThe training and job-matching effort is a public-private partnership to address a growing workforce gap.

Military justice

InfoGovNuggets

A Brigadier General in charge defending the accused at Guantanamo was arrested on the order of a military judge. The General’s crime: allowing other civilian defense attorneys to resign after it was discovered the Government had bugged the room where the attorneys met with their clients. Do military judges have more power than either they think they have or that they should? How do you govern without reliable enforcement? A new oxymoron.

Russian military plans to replace Windows with Astra Linux

Security Affairs

Cyber security seems to subvert the globalization concept, governments are working to develop their own technology fearing possible espionage and sabotage activities of foreign states. The Russian military is in the process of replacing the Windows system with the Linux distribution Astra Linux. ” This level of authorization allows the use of the Linux OS in Russian Government offices with the highest standards of data privacy and the highest degree of secrecy.

Global Crime Ring Bilks U.S. Military Members, Vets Out of Millions

Threatpost

Government Hacks Privacy Web Security Bank Accounts benefits portals Department of Justice Fraud global crime ring ID theft Money Laundering theft U.S. Military veterans veterans affairsAn elaborate fraudster ring stole PII then allegedly used DoD and VA benefits portals to steal payments and funds from bank accounts.

The British government aims at improving its offensive cyber capability

Security Affairs

“[offensive cyber capability could] degrade, disrupt and even destroy critical capabilities and infrastructure of those who would do us harm, ranging from strategic to tactical targets” both in isolation or alongside traditional military force.”

Alleged cyber attacks caused fire and explosions at nuclear and military facilities in Iran

Security Affairs

The media reported a fire at the Natanz nuclear enrichment site and an explosion at the Parchin military complex near Tehran, the latter is suspected to be a government center for the production of missiles. The Iranian government is attempting to downplay the incidents, government officials declared that the explosion at the Parchin military complex was caused by a gas leak while the fire at the Natanz plant only impacted a warehouse that was under construction.

Machete cyber-espionage group targets Latin America military

Security Affairs

Security experts from ESET uncovered a cyber-espionage group tracked as Machete that stole sensitive files from the Venezuelan military. Security experts from ESET reported that a cyberespionage group tracked as Machete has stolen sensitive files from the Venezuelan military. The group has been active since 2010 and hit military organizations and other high-profile targets worldwide.

Report: Chinese Hackers Siphon Off ‘Massive’ Amounts of Undersea Military Data

Threatpost

Critical Infrastructure Cryptography Featured Government Hacks China espionage Hackers military contractor military secrets navy sea dragon submarines underseaThe stolen data included "secret plans to develop a supersonic anti-ship missile for use on U.S. submarines by 2020," American officials said.

Their War Too: U.S. Women in the Military During WWII. Part I

Unwritten Record

This year, we are focusing on the role women played in the United States Military during World War II in a two-part blog post. They were recruited for service in the United States military for the first time. They served in each branch of the military in separate units. Another group of women served the military but were not recognized as service members during the war. Government can be seen in the clips below. Benefits of Joining the Military.

Chinese APT Tropic Trooper target air-gapped military Networks in Asia

Security Affairs

Chinese threat actors, tracked as Tropic Trooper and KeyBoy, has been targeting air-gapped military networks in Taiwan and the Philippines. Chinese APT group Tropic Trooper, aka KeyBoy, has been targeting air-gapped military networks in Taiwan and the Philippines, Trend Micro researchers reported. The threat actor targeted government offices, military, healthcare, transportation, and high-tech industries in Taiwan , the Philippines, and Hong Kong.

Military, Government Users Just as Bad About Password Hygiene as Civilians

Dark Reading

New report comes out just as group of US senators chastise Secretary of State Mike Pompeo for not using multifactor authentication

Twitter, Facebook, and Instagram blocked in Turkey as Idlib military crisis escalates

Security Affairs

Network data collected by the NetBlocks internet observatory confirm that Turkey has blocked access to social media as Idlib military crisis escalates. The access was first blocked via national provider Turk Telecom (AS9121), but later other service providers applied the government restrictions. in #Turkey where social media have been blocked for six hours after a military incident in #Idlib , Syria.

Iranian Government Hackers Target US Veterans

Dark Reading

Tortoiseshell' discovered hosting a phony military-hiring website that drops a Trojan backdoor on visitors

U.S. Nuclear Contractor Hit with Maze Ransomware, Data Leaked

Threatpost

Westech International provides maintenance for the Minuteman III nuclear-missile program and runs programs for multiple branches of the military. Government Hacks Malware cyberattack data leak employee information icbm intercontinental ballistic missile maze ransomware military contractor military secrets minuteman iii northrup grubman nuclear arsenal westech international

From China with Love: New York Firm sold millions in PRC Surveillance Gear to US Government, Military

The Security Ledger

government: selling Chinese manufactured cameras and other gear to the U.S. Military, the Department of Energy and other government agencies that it claimed were "Made in the U.S.A". GovernmentA complaint unsealed by the Department of Justice on Thursday alleges a New York firm engineered a years-long scheme to deceive the U.S. Related Stories DoJ Charges Huawei Execs in Broad Indictment Spanning 10 Years of Criminal Activity Episode 165: Oh, Canada!

GoScanSSH Malware Targets SSH Servers, But Avoids Military and.GOV Systems

Threatpost

Researchers identify a new malware family called GoScanSSH that avoids servers linked to government and military IP addresses. . Cloud Security Government Hacks Malware ARM GoScanSSH GoScanSSH Malware SSH SSH Servers x86 x86_64

Equifax Breach: Four Members of Chinese Military Charged with Hacking

Threatpost

Breach Government apache struts flaw breach china hacks Chinese people's liberation army Chinese PLA data breach Equifax Equifax breach hack Hackers personal dataFeds have charged four members of the Chinese People’s Liberation Army (PLA) in connection with the infamous 2017 Equifax breach.

Dutch and British Governments Slam Russia for Cyberattacks

Data Breach Today

Officials Attribute BadRabbit Ransomware, WADA Breach to APT28, aka 'Fancy Bear' The British and Dutch governments have issued a strong rebuke to the Russian government over an ongoing series of "Fancy Bear" hack attacks that they say were launched by Russia's military intelligence agency Russian Main Intelligence Directorate, aka the GRU

Military documents about MQ-9 Reaper drone leaked on dark web

The Security Ledger

Hackers have put up for sale on the dark web sensitive military documents, some associated with the U.S. military’s MQ-9 Reaper drone aircraft, one of its most lethal and technologically advanced drones, security research firm Recorded Future recently discovered. » Related Stories Fitness apps: Good for your health, not so much for military security Evasive new botnet can take over enterprise devices to steal data, spread ransomware U.S.

Texas Government Agencies Hit by Ransomware

Adam Levin

The local governments and agencies from twenty-three Texas towns were hit by a coordinated ransomware campaign last week. . The Texas Department of Information Resources (DIR) became aware of the ransomware campaign after being contacted by the municipal governments of several towns that were unable to access critical files. local governments have increasingly been targeted by ransomware campaigns, including Baltimore, Atlanta and several Florida cities.

OP Glowing Symphony – How US military claims to have disrupted ISIS ‘s propaganda

Security Affairs

US military claims to have disrupted the online propaganda activity of the Islamic State (ISIS) in a hacking operation dating back at least to 2016. The assessment pointed out problems faced by the US cyber units, including the challenges of storing a huge amount of data contained in the hacked ISIS servers and accounts and the difficulty in coordination with other coalition members and US government agencies.

Over 6,000 email accounts belonging to Taiwan government agencies hacked by Chinese hacked

Security Affairs

Chinese hackers have hacked thousands of Taiwan Government email accounts belonging at least 10 Taiwan government agencies, officials said. Chinese hackers have gained access to around 6,000 email accounts belonging to at least 10 Taiwan government agencies, officials said.

Leaky AWS Storage Bucket Spills Military Secrets, Again

Threatpost

Cloud Security Government Privacy Web Security AWS AWS Storage Bucket Chris Vickery Leaky AWS Storage Bucket Linux misconfigured servers National Security Agency NOFORN NSA Red Disk top secret United States Defense DepartmentFor the second time in ten days, researchers at UpGuard released sensitive data belonging to the United States Defense Department that was stored insecurely online.

Details on Uzbekistan Government Malware: SandCat

Schneier on Security

Kaspersky has uncovered an Uzbeki hacking operation, mostly due to incompetence on the part of the government hackers.

LUCKY ELEPHANT campaign targets South Asian governments

Security Affairs

The NETSCOUT Threat Intelligence team uncovered a credential harvesting campaign tracked as LUCKY ELEPHANT targeting mostly South Asian governments. Security experts at NETSCOUT Threat Intelligence team uncovered a credential harvesting campaign, tracked as LUCKY ELEPHANT, targeting mostly South Asian governments. “However, it is clear is that the actors are actively establishing infrastructure and are targeting governments in South Asia.”

APT33 Mounts Focused, Highly Targeted Botnet Attacks Against U.S. Victims

Threatpost

The APT is using small botnets to take espionage aim at military and academic organizations. Government Hacks Malware advanced persistent threat APT33 Attacks Botnets espionage gas highly targeted Irán military targets Oil Trend Micro

Turkish Hackers hit Greek Government websites and local stock exchange

Security Affairs

Both Hatftar and the head of Tripoli’s UN- recognised government, Fayez al-Sarraj, are expected to attend the conference, while representatives of the Greek government have not been invited to the conference. Greek Prime Minister Kyriakos Mitsotakis met with Haftar, the government of Athens encouraged Libyan military commander Khalifa Haftar to be constructive in Berlin. “We

Russian APT groups target European governments ahead of May Elections

Security Affairs

Russian APT groups are targeting European governments for cyber-espionage purposes ahead of the upcoming European elections. According to experts from FireEye, Russia-linked APT28 (aka Fancy Bear , Pawn Storm , Sofacy Group , Sednit , and STRONTIUM ) and Sandworm Team (also TeleBots ) cyberespionage groups are targeting European governments for cyber-espionage purposes ahead of the upcoming European elections.

Forward Progress: Congress Requires DOD to Digitize DD-214 Military Service Records

Archives Blogs

By requiring the Secretary of Defense to provide veterans and former members of the Armed Services with machine readable and electronically transferable military service records by December 31, 2023, the Fiscal Year 2020 (FY 2020) National Defense Authorization Act (NDAA) supports digitization for one set of records important to Armed Service members, historians and the public interest.

US Government is asking allies to ban Huawei equipment

Security Affairs

US Government is inviting its allies to exclude Huawei equipment from critical infrastructure and 5G architectures, reports the Wall Street Journal. The Wall Street Journal reported that the US Government is urging its allies to exclude Huawei from critical infrastructure and 5G architectures. Many countries are going to build 5G infrastructure, but the approach of their governments is completely different.