Espionage

Verizon: Espionage attacks grew threefold in 2013, greater visibility diverts China focus

Verizon: Espionage attacks grew threefold in 2013, greater visibility diverts China focus

By

While China continued to lead cyber espionage activity against organizations, Eastern Europe accounted for more than 20 percent of related incidents, according to an annual data breach report.

Huawei responds to leaks detailing NSA hack of firm's networks

Huawei responds to leaks detailing NSA hack of firm's networks

By

Recent Snowden leaks allege that the NSA targeted Chinese telecom firm Huawei for corporate data, including product source code.

Firm draws link between APT1 espionage group and Siesta campaign

Firm draws link between APT1 espionage group and Siesta campaign

By

On Wednesday, FireEye revealed research linking the Chinese-based attack group APT1 to those behind the Siesta campaign.

Japan vows stronger safeguards after Toshiba breach

By

Proprietary information, including technical data, from Japanese companies was allegedly leaked to rivals.

"Siesta" espionage campaign uncovered by researchers

By

Organizations in the finance, telecommunications, defense, and transportation industries have been targeted by attackers that may be looking to steal valuable information.

Court opinion shows Fla. police tracked hundreds of cell phones without warrants

By

A police department used a "stingray" cell phone tracking device without a judge-issued warrant to pinpoint a suspected criminal's location.

Attackers compromise U.S. veterans site to serve IE zero-day exploit

By

Researchers at FireEye found that the U.S. Veterans of Foreign Wars site was booby trapped to spread a backdoor.

Leaks reveal GCHQ infiltrated and attacked Anonymous

By

A division of the British spy agency deployed a distributed denial-of-service (DDoS) attack to uncover identities of Anonymous members.

Report: Russia copies China's espionage "play book"

By

Researchers have revealed that Russia is behind hundreds cyber espionage campaigns targeting American, European and Asian companies.

Hackers infiltrate European ministry networks at G20 summit

By

Chinese hackers spied on five European ministries' computers by way of a phishing attack at September's G20 Summit, according to new research.

GCHQ used fake LinkedIn, Slashdot pages to spy on Belgacom employees

By

The British intelligence agency used a sophisticated exploitation tool, called "Quantum Insert," to trick telecom workers, a German newspaper revealed.

U.S. enterprises in path of data-hijacking Sazoora campaign, firm finds

By

In recent weeks, a new variant of Sazoora malware has struck around 23,000 machines, with more than 1,800 infections occurring in the U.S.

Huawei chairman: We've received no gov't surveillance requests for company data

By

In a white paper on its security approach, Huawei said that it has never been asked by any government to provide customer data or access to its technology.

Foreign attackers email phishy invoices to Mandiant CEO

By

Kevin Mandia, CEO of Mandiant, told a foreign policy outlet that a hacking group in China sent him phishing emails.

Hackers leveraging IE zero-day used watering hole attacks to compromise users

Hackers leveraging IE zero-day used watering hole attacks to compromise users

By

At least three major media sites in Japan were infected, so that visitors' running vulnerable versions of IE would be exploited, FireEye researchers found.

"Hackers for hire" group Hidden Lynx on mission to collect corporate data

By

Researchers at Symantec linked the group's activities to attacks on Google and Bit9.

Belgium's largest telecom co. victim to years-long espionage campaign

By

The country is investigating how Belgacom's networks were hacked, but has yet to confirm the believed culprit.

Study: State-sponsored attacks worsen, but security pros unequipped to spot threat

By

A security firm polled nearly 200 senior security professionals at the Black Hat conference in Las Vegas to get their perspective on advanced attacks.

APT12 group latches to G20 Summit buzz to infiltrate organizations

By

APT12, the espionage group believed to be behind attacks on The New York Times, is piggy-backing on international interest in the G20 summit to penetrate victims' networks via malicious emails.

Poison Ivy discovered in ongoing espionage efforts

By

Along with a report on the latest Poison Ivy-related APT threats, FireEye also released a free package of tools to help organizations identify targeted attacks where the remote access trojan is leveraged.

Espionage group that planted malware at New York Times is back

By

According to FireEye, China-based espionage group "APT12" has infiltrated the networks of several organizations, as recently as June, with new malware variants that are difficult to detect.

Lawmakers draft bill that would increase enforcement against U.S. trade secret theft

By

Sens. Sheldon Whitehouse, D-R.I., and Lindsey Graham, R-S.C., have drafted a bill to amend the Economic Espionage Act.

Blue Coat may be selling monitoring technology to additional repressive regimes

By

According to a Citizen Lab report, security firm Blue Coat also may have violated U.S. sanctions that bar the sale of technologies to countries with a history of human rights grievances, such as Iran, Syria and Sudan.

McAfee finds patterns in years-long espionage campaign seeking South Korean military secrets

By

Malware has been searching for documents containing key military terms in South Korean networks since 2009, and the Dark Seoul incident perpetrators are likely responsible.

Remote access trojan targets Middle East-based energy and government sectors

By

Attackers are using malware, called "njRAT," to hijack victims' computers and spread to others in the organization.

Research sheds light on "Dark Seoul" sabotage gang

By

The group has targeted corporations in South Korea, and some in the U.S., since 2009, according to Symantec researchers.

Malicious email that recipient is on "Prism watchlist" linked to just-uncovered espionage campaign

By

According to the 9b+ security research blog, the email targeted a member of the Tibetan Youth Congress in India.

Buggy Word programs still exploit of choice for persistent data-stealing groups

Buggy Word programs still exploit of choice for persistent data-stealing groups

By

A group delivering a malicious toolkit, called NetTraveler, has used two commonly exploited vulnerabilities in Microsoft Word to steal data from more than 300 victims.

Happy Hour Hot Links: Week of 5/20

By

Every Friday, after the SC Magazine news team has taken a few spins around the interwebs, we post some security-related links that we found interesting. We hope you do too.

Commission offers suggestions for stemming online spy threat from China

Commission offers suggestions for stemming online spy threat from China

By

The 100-page report mostly addresses alleged Chinese cyber espionage operations, and suggests it's time for U.S. government agencies and corporations to consider more proactive approaches, possibly including hack-backs.

Sign up to our newsletters

POLL