Maxim Tucker reports: China staged a huge cyberattack on Ukraine’s military and nuclear facilities in the build-up to Russia’s invasion, according to intelligence memos obtained by The Times. More than 600 websites belonging to the defence ministry in Kyiv and other institutions suffered thousands of hacking attempts which were co-ordinated by the Chinese government, according to…
Category: Of Note
Lapsus$: Two UK teenagers charged with hacking for notorious gang
Joe Tidy reports: Two teenagers from the UK have been charged by police over hacking for a notorious cyber-crime gang. A 16 and 17-year-old will appear at Highbury Corner Magistrates’ Court on Friday. The boys have been charged with multiple cyber-offences and remain in police custody. The teens were arrested as part of an international…
Solar Winds can’t dodge investor suit over massive cyberattack
Stephen Paulsen reports: An Austin-based tech company may be liable to investors after it suffered a major security breach that caused its stock price to plummet, a federal judge ruled. Although that company, SolarWinds, was itself a victim of the breach, the company may had acted recklessly in protecting its software, U.S. District Judge Robert Pitman…
AcidRain | A Modem Wiper Rains Down on Europe
Juan Andres Guerrero-Saade reports: Executive Summary On Thursday, February 24th, 2022, a cyber attack rendered Viasat KA-SAT modems inoperable in Ukraine. Spillover from this attack rendered 5,800 Enercon wind turbines in Germany unable to communicate for remote monitoring or control. Viasat’s statement on Wednesday, March 30th, 2022 provides a somewhat plausible but incomplete description of…
‘I can fight with a keyboard’: How one Ukrainian IT specialist exposed a notorious Russian ransomware gang
Sean Lyngaas reports: As Russian artillery began raining down on his homeland last month, one Ukrainian computer researcher decided to fight back the best way he knew how — by sabotaging one of the most formidable ransomware gangs in Russia. Four days into Russia’s invasion, the researcher began publishing the biggest leak ever of files and data from…
Hackers Gaining Power of Subpoena Via Fake “Emergency Data Requests”
Brian Krebs reports: There is a terrifying and highly effective “method” that criminal hackers are now using to harvest sensitive customer data from Internet service providers, phone companies and social media firms. It involves compromising email accounts and websites tied to police departments and government agencies, and then sending unauthorized demands for subscriber data while…