Cyber Espionage News, Articles and Updates

Russians suspected of cybercampaign against journalism site

Russians suspected of cybercampaign against journalism site

By

A UK-based investigative journalism site has come under cyberattack, purportedly from Russia, for its articles critical of Russia's involvement in the shooting down of Malaysian Airlines Flight 17 and corruption.

70% of IDTMs want UK gov to do more so young people enter tech field

70% of IDTMs want UK gov to do more so young people enter tech field

Nearly a quarter (23 percent) of UK IT decision makers believe STEM and the need for young IT talent are one of the main technology issues for enterprises in 2017.

Cross border computer probes gets nod in Switzerland

Cross border computer probes gets nod in Switzerland

By

The Swiss intelligence service received permission to begin tapping phones and monitoring emails following a vote in the nation's parliament and approval by a public referendum.

Clapper: Russia has a long history of trying to interfere with elections

Clapper: Russia has a long history of trying to interfere with elections

By

Director of National Intelligence James Clapper said there have been previous instances of Russian attempts to influence U.S. elections going back to the 1960s.

NSA and Cyber Command urged to split, A.I. to become part of U.S. cyber strategy

NSA and Cyber Command urged to split, A.I. to become part of U.S. cyber strategy

By

President Obama may be urged to split the joint leadership of the NSA and U.S. Cyber Command in favor of two distinct forces for cyberespionage and cyberwarfare.

ACLU campaign pushes Obama to pardon Snowden

ACLU campaign pushes Obama to pardon Snowden

By

On the eve of the release of "Snowden," the ACLU's Ben Wizner said the civil rights organization had joined forces with Amnesty International and Human Rights Watch to persuade President Obama to pardon the whistleblower.

WADA confirms Fancy Bear behind attack on anti-doping database

WADA confirms Fancy Bear behind attack on anti-doping database

By

The Russian espionage group Tsar Team, aka Fancy Bear, got into the ADAMS system through an account created by the International Olympic Committee for the 2016 Rio Games.

CIA's Brennan warns against Russian cyber intrigue

CIA's Brennan warns against Russian cyber intrigue

By

CIA Director John Brennan warned against Russian hacking skills calling them "exceptionally capable and sophisticated."

Former head of DGSE confirmed French campaigns against internat'l targets

Former head of DGSE confirmed French campaigns against internat'l targets

By

France's former head of external intelligence service discussed a French cyber campaign that targeted Iran, Canada, Spain, Greece, Norway, and other nations.

Guccifer 2.0 again denies Russian connection, mocks reports linking hacker to APT groups

Guccifer 2.0 again denies Russian connection, mocks reports linking hacker to APT groups

By

An individual who self-identified as Guccifer 2.0 continues to deny reports by security firms that link the purported hacker or hacking group to Russian advanced persistent threat (APT) groups.

U.S. investigating intrusions, Clinton implies Russians hackers could tilt Trump victory

U.S. investigating intrusions, Clinton implies Russians hackers could tilt Trump victory

By

As the November election nears, Democratic presidential nominee Hillary Clinton Monday accused the Kremlin of wanting to interfere with the U.S. election.

What's behind backdoor #3? Mac version of Mokes malware follows Linux, Windows variants

What's behind backdoor #3? Mac version of Mokes malware follows Linux, Windows variants

By

Kaspersky Lab today released an analysis of a newly discovered version of Mokes - a malicious, cross-platform backdoor with spying functionality - this one targeting Apple's OS X operating system.

NSA documents detail Agency's actions during the Iraq War

NSA documents detail Agency's actions during the Iraq War

By

A recently declassified group of 45 messages from NSA Director Michael Hayden to his workers reveal the daily ins and outs of the agency while it supported the Iraq War.

Circumstantial evidence in election board hacks suggests state-sponsored activity

Circumstantial evidence in election board hacks suggests state-sponsored activity

By

ThreatConnect researchers have found an "infrastructure nexus" between recent attacks on election boards and a spearphishing campaign against three governments that "fits a known Russian targeting focus and modus operandi."

AgentTesla campaign engages in cybersquatting to host and deliver spyware

AgentTesla campaign engages in cybersquatting to host and deliver spyware

By

Researchers recently discovered a new spyware campaign that used cybersquatting techniques to distribute the AgentTesla keylogger via a domain whose name was strikingly similar to the consulting firm Diode Technologies.

Creating a buzz: USBee software causes air-gapped computers to leak data via USB connections

Creating a buzz: USBee software causes air-gapped computers to leak data via USB connections

By

Researchers at Israel's Ben-Gurion University have created a software program that causes air-gapped computers to leak data via radio-frequency electromagnetic emissions generated through USB-connected devices.

Cozy Bear suspected of hacking Russia-focused think tanks in D.C.

Cozy Bear suspected of hacking Russia-focused think tanks in D.C.

By

The same cybergang that launched attacks against the Pentagon, State Department and DNC is also believed to have targeted Russia-focused think tanks in the U.S.

Spyware that Vietnam Airlines posed as McAfee antivirus

Spyware that Vietnam Airlines posed as McAfee antivirus

By

A Malwarebytes analysis of the espionage toolkit that recently infected Vietnam Airlines revealed a modular variant of the Korplug remote access trojan (RAT) that in this case disguises itself as a McAfee antivirus program.

The media becomes the story as hackers focus efforts on news organizations

The media becomes the story as hackers focus efforts on news organizations

By

Updated! News reports yesterday that the New York Times and other news organizations were attacked by hackers should not only come as no surprise, but industry insiders believe news organizations should prepare to be struck again in the future.

FBI investigating possible Russian hack of NY Times

FBI investigating possible Russian hack of NY Times

By

The FBI is investigating the possible hack by Russian intelligence agencies of the New York Times and other news organizations.

NSA helped Belgium during investigation, led to arrest of Paris attacker

NSA helped Belgium during investigation, led to arrest of Paris attacker

By

Belgian security officials reportedly turned to the National Security Agency (NSA) during an investigation that led to an accused Paris terrorist.

Industry pros react to Cisco, Fortinet advisories after possible Snowden NSA leak

Industry pros react to Cisco, Fortinet advisories after possible Snowden NSA leak

By

Snowden documents were published Friday, strengthening evidence that code leaked by the Shadow Brokers contains zero-day exploits used by the NSA.

Advanced persistent threats are APT to be deceptive, devious

Advanced persistent threats are APT to be deceptive, devious

By

Brian Laing, VP of business development and products at APT defense firm Lastline, spoke to SCMagazine.com at Black Hat about the evolution of advanced persistent threats and some of their more devious tactics.

China launches first quantum satellite, aimed at creating "hack-proof" quantum communications

China launches first quantum satellite, aimed at creating "hack-proof" quantum communications

By

China launched an orbital carrier rocket early Tuesday morning carrying the 'Micius' satellite, believed to be the world's first quantum satellite.

Guccifer 2.0 publishes new DCCC docs about Florida districting plans

Guccifer 2.0 publishes new DCCC docs about Florida districting plans

By

The persona known as Guccifer 2.0 published DCCC documents related to Florida primaries that provide detail into a re-districting effort that the hacker says shows congressional primaries are "becoming a farce."

Shakti info stealer designed for corporate espionage

Shakti info stealer designed for corporate espionage

By

Researchers spotted a new information stealing trojan, dubbed Shakti, that may be of Indian origin and is designed for corporate espionage.

DiskFiltration attack uses acoustics to infiltrate air-gapped computers

DiskFiltration attack uses acoustics to infiltrate air-gapped computers

By

A team of researchers developed a new method to leak information from air-gapped computers using intrinsic covert noises emitted from the device's hard drive.

US government accuses Hinkley point partner of nuclear espionage

US government accuses Hinkley point partner of nuclear espionage

Major partners in the controversial nuclear power plant at Hinkley Point have been accused in American courts of attempting to steal US nuclear technology.

US government accuses Hinkley point partner of nuclear espionage

US government accuses Hinkley point partner of nuclear espionage

Major partners in the controversial nuclear power plant at Hinkley Point have been accused in American courts of attempting to steal US nuclear technology.

Email accounts of Hillary Clinton and 100+ Democratic officials hacked

Email accounts of Hillary Clinton and 100+ Democratic officials hacked

By

As the FBI investigation into the hack of the Democratic National Committee broadens, it is being reported that the private email accounts of Hillary Clinton and more than 100 Democratic officials also have been breached.

RECENT COMMENTS

Sign up to our newsletters

FOLLOW US