article thumbnail

NotPetya and Olympic Destroyer Malware: 6 Russian Officers Charged

SecureWorld News

But the GRU members being charged in this case started with other strains of malware and a narrow target: Ukraine's power grid. In what is commonly referred to as the most destructive and costly cyber attack ever, the conspirators unleashed the 'NotPetya' malware. The GRU's Olympic Destroyer malware. and a large U.S.

Malware 65
article thumbnail

North Korean Hacking Group Lazarus Linked to New Campaign

SecureWorld News

The operation took place between August and November 2022 and targeted organizations in medical research, healthcare, chemical engineering, energy, defense, and a leading research university. WithSecure linked the operation to Lazarus based on TTP overlaps, infrastructure overlaps, time-zone analysis, and employed malware strains.

Groups 88
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Read This If You Do Business in China

SecureWorld News

But the bank left out a critical detail about the software: it included malware.". Now, the Federal Bureau of Investigations (FBI) is jumping on the concerns surrounding this Chinese malware whack-a-mole. Trustwave called the backdoor GoldenSpy, issuing a warning about the threat. The companies received an uninstaller for the backdoor.

Malware 52
article thumbnail

Grand Jury: Chinese Hackers Stole Ebola Virus Research

SecureWorld News

was a computer hacker who, as part of his job duties at Hainan Xiandun, created malware, hacked into computer systems operated by foreign governments, companies, and universities, and supervised other Hainan Xiandun hackers.". specialty chemical formulas. The indictment alleges that Wu Shurong (???) autonomous vehicles.

article thumbnail

CIOs Discover That Dumb Technology Can’t Always Be Upgraded

The Accidental Successful CIO

Problems include confusion about how controls work, software bugs leading to physical accidents and, most worryingly, cyberattacks on infrastructure like chemical plants or power stations that could cause catastrophes. Dealing With The Old And The New. utilities to Volkswagen AG engineers who fraudulently passed U.S.

System 130
article thumbnail

The Rise of eBooks: Why Books are Declining?

Kitaboo

The Environmental Impact of Books: Books are made from paper, and producing paper requires a lot of water, energy, chemicals, and land. The Security and Privacy of eBooks: eBooks can be vulnerable to hacking, piracy, or malware attacks. These factors can discourage people from buying or borrowing books.

eBook 78
article thumbnail

Top 10 Most-Destructive Computer Viruses

Galido

Computer viruses have come a long way from the early days of personal computers, when teenage hackers competed for bragging rights, creating malware designed for mischief or random mayhem. As the stakes have grown, so too has the potential damage and destruction brought on by malware. Cyber Command. military strategy.

Malware 60