APT Group Targeting Military Refines Its Tactics
Data Breach Today
AUGUST 21, 2020
Data Breach Today
AUGUST 21, 2020
AUGUST 20, 2020
The group has added a management console and a USB worming function to its main malware, Crimson RAT. Government Malware Vulnerabilities apt crimson RAT Cyberattacks cyberespionage data theft military targets Spear Phishing spy campaign transparent tribe usbworm
Data Breach Today
MARCH 4, 2020
Defense Department Says No Data Was Compromised Australia reportedly took a sensitive military recruiting database offline for 10 days in February following concerns it may have been compromised. The Defense Department says there's no evidence data was stolen
WIRED Threat Level
OCTOBER 14, 2020
Despite the operation's short-term effects, it sets new precedents for the scope of Cyber Command's mission. Security Security / Cyberattacks and Hacks
Krebs on Security
FEBRUARY 10, 2020
as members of the PLA’s 54 th Research Institute, a component of the Chinese military. Attorney General Bill Barr said at a press conference today that the Justice Department doesn’t normally charge members of another country’s military with crimes (this is only the second time the agency has indicted Chinese military hackers). “Some might wonder what good it does when these hackers are seemingly beyond our reach,” Bowdich said. The U.S.
OCTOBER 22, 2020
The Council of the European Union announced sanctions imposed on Russian military intelligence officers for 2015 Bundestag hack. “This cyber-attack targeted the parliament’s information system and affected its ability to operate for several days.
Data Breach Today
NOVEMBER 8, 2019
Prosecutors Allege Firm Sold Chinese Surveillance Tech That Contained Vulnerabilities Federal prosecutors have charged a Long Island company, along with seven of its employees, with selling vulnerability-laden Chinese technology to the U.S. military and other agencies for a decade and passing the gear off as American made
OCTOBER 22, 2018
The NATO military command center should be fully operational in 2023, every member states will contribute with its cyber capabilities to the military hub. The new NATO military command center should be fully operational in 2023, among its tasks the defense of the critical infrastructure of member states and the ability to carry out cyber attacks according to rules of engagement still to be defined. “While NATO does not have its own cyber weapons, the U.S.-led
JUNE 6, 2020
Hackers have stolen confidential documents from the US military contractor Westech, which provides critical support for US Minuteman III nuclear deterrent. “It is unclear if the documents stolen by the criminals include military classified information, but files which have already been leaked online suggest the hackers had access to extremely sensitive data, including payroll and emails.”
Schneier on Security
JANUARY 29, 2018
Over this weekend, someone realized that it could be used to locate secret military bases: just look for repeated fitness activity in the middle of nowhere. datacollection geolocation military secrecyIn November, the company Strava released an anonymous data-visualization map showing all the fitness activity by everyone using the app.
AUGUST 14, 2020
China-linked threat actor tracked as CactusPete was employing an updated backdoor in recent attacks targeting military and financial organizations in Eastern Europe. The post Chinese APT CactusPete targets military and financial orgs in Eastern Europe appeared first on Security Affairs.
Schneier on Security
JUNE 6, 2019
Citing security concerns, the Chinese military wants to replace Windows with its own custom operating system : Thanks to the Snowden, Shadow Brokers, and Vault7 leaks, Beijing officials are well aware of the US' hefty arsenal of hacking tools, available for anything from smart TVs to Linux servers, and from routers to common desktop operating systems, such as Windows and Mac. It's unclear exactly how custom this new OS will be. Or it could be something completely new.
JUNE 30, 2019
The governments of Germany and The Netherlands agreed to build the first-ever joint military Internet, so-called TEN (Tactical Edge Networking). Government officials from Germany and the Netherlands signed an agreement for the building of the first-ever joint military Internet, so-called TEN (Tactical Edge Networking). “The name of this new Dutch-German military internet is the Tactical Edge Networking, or TEN, for short.” SecurityAffairs – TEN, military).
Schneier on Security
AUGUST 3, 2018
Interesting commentary : The military is an impossible place for hackers thanks to antiquated career management, forced time away from technical positions, lack of mission, non-technical mid- and senior-level leadership, and staggering pay gaps, among other issues. The model the author uses is military doctors. cybersecurity hacking military
FEBRUARY 5, 2020
The Gamaredon advanced persistent threat (APT) group has been supercharging its operations lately, improving its toolset and ramping up attacks on Ukrainian national security targets. Vitali Kremez, head of SentinelLabs, said in research released on Wednesday that he has been tracking an uptick in Gamaredon cyberattacks on Ukrainian military and security institutions that started in […].
MARCH 12, 2020
For some great background information, be sure to visit our previous blog – Their War Too: Women in the Military During WWII. American citizens surged to enlist in all branches of the US Military and women wanted to serve their country too. With the WAAC in place, the War Department announced that it would follow Army policy, and admit black women with a 10-percent quota. The WAAC however was the only branch to allow black women from its inception.
MAY 15, 2020
Chinese threat actors, tracked as Tropic Trooper and KeyBoy, has been targeting air-gapped military networks in Taiwan and the Philippines. Chinese APT group Tropic Trooper, aka KeyBoy, has been targeting air-gapped military networks in Taiwan and the Philippines, Trend Micro researchers reported. The threat actor targeted government offices, military, healthcare, transportation, and high-tech industries in Taiwan , the Philippines, and Hong Kong.
FEBRUARY 28, 2020
Network data collected by the NetBlocks internet observatory confirm that Turkey has blocked access to social media as Idlib military crisis escalates. “Although no broadcast ban has yet been issued to the public, it is understood that the measures are intended to protect details surrounding troop and equipment deployments.” It's 5:30 a.m. in #Turkey where social media have been blocked for six hours after a military incident in #Idlib , Syria.
MAY 31, 2019
The Russian military is in the process of replacing the Windows system with the Linux distribution Astra Linux. It provides data protectionup to the level of “top secret” in Russian classified information grade.” “It has been officially certified by Russian Defense Ministry, Federal Service for Technical and Export Control and Federal Security Service.”
AUGUST 5, 2019
Security experts from ESET uncovered a cyber-espionage group tracked as Machete that stole sensitive files from the Venezuelan military. Security experts from ESET reported that a cyberespionage group tracked as Machete has stolen sensitive files from the Venezuelan military. The group has been active since 2010 and hit military organizations and other high-profile targets worldwide.
NOVEMBER 6, 2017
A Brigadier General in charge defending the accused at Guantanamo was arrested on the order of a military judge. The General’s crime: allowing other civilian defense attorneys to resign after it was discovered the Government had bugged the room where the attorneys met with their clients. Do military judges have more power than either they think they have or that they should? A new oxymoron.
JULY 3, 2020
The media reported a fire at the Natanz nuclear enrichment site and an explosion at the Parchin military complex near Tehran, the latter is suspected to be a government center for the production of missiles. The Iranian government is attempting to downplay the incidents, government officials declared that the explosion at the Parchin military complex was caused by a gas leak while the fire at the Natanz plant only impacted a warehouse that was under construction.
FEBRUARY 10, 2020
The United States Department of Justice charged 4 Chinese military hackers with hacking into credit reporting agency Equifax. The United States Department of Justice officially charged 4 members of the China’s PLA’s 54th Research Institute, a division of the Chinese military, with hacking into credit reporting agency Equifax. The four members of the Chinese military unit are Wu Zhiyong (???),
OCTOBER 22, 2019
“The data Our team viewed highly sensitive data exposing the personal details of government and military personnel, and their travel arrangements to locations around the world, both past and future.” The list of affected users includes the US government, military, and Department of Homeland Security (DHS). . One of the platforms exposed in the database was a contractor of the US government, military, and DHS.
MARCH 22, 2018
This year, we are focusing on the role women played in the United States Military during World War II in a two-part blog post. It is true that millions of women were hired to work in factories and thousands were hired to work on farms through the Women’s Land Army program, but their options did not end there. The size of the global conflict was unprecedented and once the United States entered the war, its citizens had to mobilize quickly. It’s Your War, Too.
JULY 9, 2018
The fitness app Polar Flow exposes the whereabouts of some of its high-profile users, including “spies” and those with sensitive positions in the military. Hacks Mobile Security Privacy Fitness tracker geolocation data IoT military personnel polar polar fitness Polar Flow spies
JANUARY 26, 2020
A new piece of the Ryuk malware has been improved to steal confidential files related to the military, government, financial statements, and banking. Security experts from MalwareHunterTeam have discovered a new version of the Ryuk Stealer malware that has been enhanced to allow its operators to steal a greater amount of confidential files related to the military, government, financial statements, and banking.
FEBRUARY 11, 2019
But it can't operate in a bubble, a new Washington Post study indicates
OCTOBER 13, 2020
Britain’s most senior cyber general declared that the UK has implemented an advanced offensive cyberwar capability that could destroy its enemies. Sanders explained that its cyber army was supported by the GCHQ intelligence agency to deliver offensive cyber capabilities.
JUNE 18, 2020
Security researchers at ESET recently uncovered a campaign carried out by the InvisiMole group that has been targeting a small number of high-profile organizations in the military sector and diplomatic missions in Eastern Europe. It is used in cases where the attackers haven’t managed to obtain administrative privileges on the system. The post InvisiMole group targets military sector and diplomatic missions in Eastern Europe appeared first on Security Affairs.
JUNE 17, 2020
Experts uncovered a new cyber-espionage campaign, dubbed “ Operation In(ter)receptio n,” aimed at aerospace and military organizations in Europe and the Middle East. Security experts from ESET uncovered a new sophisticated cyber-espionage campaign, dubbed “ Operation In(ter)recepti on ,” aimed at aerospace and military organizations in Europe and the Middle East.
OCTOBER 21, 2020
Another state, Sweden, announced the ban of Chinese tech companies Huawei and ZTE from building its 5G network infrastructure. The decision is the result of assessments made by the Swedish military and security service.
WIRED Threat Level
NOVEMBER 26, 2017
Opinion: The Pentagon collects so much surveillance footage that humans can’t watch all of it. It’s time to deploy AI. Security Opinion
Information Management Resources
MAY 28, 2019
military plans to analyze 350 billion social-media posts from around the world to help it track how popular movements evolve. The U.S. Social media Internet Data management
JANUARY 22, 2020
US military claims to have disrupted the online propaganda activity of the Islamic State (ISIS) in a hacking operation dating back at least to 2016. According to the documents, the US Cyber Command “successfully contested ISIS in the information domain,” its operations had a significant impact on online radicalization and recruitment of the terrorist organization. It was initially approved for a 30-day period in late 2016, but it was later extended.
The Security Ledger
JULY 12, 2018
Hackers have put up for sale on the dark web sensitive military documents, some associated with the U.S. military’s MQ-9 Reaper drone aircraft, one of its most lethal and technologically advanced drones, security research firm Recorded Future recently discovered. » Related Stories Fitness apps: Good for your health, not so much for military security Evasive new botnet can take over enterprise devices to steal data, spread ransomware U.S.
MAY 2, 2018
In part I of this two-part series, we discussed the role women played in the military during World War II by highlighting those who served in the Women’s Army Corps (WAC), the Coast Guard Women’s Reserve (SPARS), and the Women Air Force Service Pilots (WASP) during World War II. Like their female counterparts servicing in other branches of the military, the primary function of the Marine Corps Women’s Reserve was to release men for combat duty.
DECEMBER 10, 2019
City IT staff has been working to restore the network, but some services are still down. In response to the incident, the city was forced to disconnect most of its systems, the attack impacted emails, telephone lines, and online payment services. Last week, a shooting at Naval Air Station Pensacola in Florida left three sailors dead, the FBI suspects it “was an act of terrorism.”
SEPTEMBER 1, 2020
French President Emmanuel Macron announced that France won’t ban the Chinese giant Huawei from its upcoming 5G telecommunication networks. It’s normal that … we want a European solution” because of the importance of “the security of our communication,” Macron told reporters.
AUGUST 5, 2020
It can reveal details about the number of users in a location, user and supply movements, daily routines (user and organizational), and can expose otherwise unknown associations between users and locations.”