The U.S. Department of Energy has been requested by Republican House committee leaders to provide documents and information regarding Russian state-sponsored hacking group Cold River's attempted cyberattacks against Argonne National Library, Brookhaven National Library, and Lawrence Livermore National Library last summer, reports FedScoop.
Cold River was reported by Reuters to have facilitated the cyberattack attempts through fraudulent login pages that sought to exfiltrate the credentials of nuclear scientists involved in the U.S. nuclear weapons program.
Information provided by the Energy Department would be leveraged to identify the incidents' impact, as well as examine the measures implemented by the department to maintain sensitive scientific research and development security at its National Laboratories, wrote House Oversight and Accountability Committee Chairman James Comer, R-Ky., and House Science Committee Chairman Frank Lucas, R-Okla., in a letter to Energy Secretary Jennifer Granholm.
"Although it is unclear whether the attempted intrusions were successful, it is alarming that a hostile foreign adversary targeted government labs working on scientific research critical to the national security and competitiveness of the United States," the lawmakers wrote.
SiliconAngle reports that mounting security alert fatigue has prompted Torq to introduce its new HyperSOC system based on its Hyperautomation Platform using artificial intelligence to enable security operation center response automation, management, and monitoring in a bid to bolster the investigation and remediation of cybersecurity threats.
Moldovan botnet operator Alexander Lefterov, also known as Alipatime, Alipako, and Uptime, has been indicted by the U.S. Department of Justice for his involvement in widespread attacks against U.S.-based computers, BleepingComputer reports.
CyberScoop reports that over 100 Ukrainian local government and police documents uploaded to VirusTotal in February were discovered to have been infected with the OfflRouter malware, which dates back to 2015 and could only spread through already compromised files and removable media devices.