Remove Chemicals Remove Malware Remove Network Remove Security
article thumbnail

NotPetya and Olympic Destroyer Malware: 6 Russian Officers Charged

SecureWorld News

The NotPetya cyberattack crashed networks around the globe, doing billions in damage. But the GRU members being charged in this case started with other strains of malware and a narrow target: Ukraine's power grid. The GRU's Olympic Destroyer malware. We'll include details on the malware variants being used, as well.

Malware 60
article thumbnail

North Korean Hacking Group Lazarus Linked to New Campaign

SecureWorld News

The operation took place between August and November 2022 and targeted organizations in medical research, healthcare, chemical engineering, energy, defense, and a leading research university. WithSecure linked the operation to Lazarus based on TTP overlaps, infrastructure overlaps, time-zone analysis, and employed malware strains.

Groups 81
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Grand Jury: Chinese Hackers Stole Ebola Virus Research

SecureWorld News

Department of Justice says it was a government-run front company and the hackers were part of China’s Ministry of State Security (MSS). Security researchers referred to the group as Advanced Persistent Threat (APT) 40 and a variety of other nicknames, including: BRONZE. specialty chemical formulas. Who was this company?

article thumbnail

Read This If You Do Business in China

SecureWorld News

But the bank left out a critical detail about the software: it included malware.". Now, the Federal Bureau of Investigations (FBI) is jumping on the concerns surrounding this Chinese malware whack-a-mole. Recommend developing a network baseline to allow for the identification of anomalous account activity.

Malware 52
article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

They also had a piece of malware called killdisk position on the systems so that when the systems rebooted, it would kick off deleting all the files and deleting all the systems. In a moment I’ll introduce you to someone who is trying to do that--bring ICS equipment to security conferences. When they did that.

System 52
article thumbnail

Top 10 Most-Destructive Computer Viruses

Galido

Computer viruses have come a long way from the early days of personal computers, when teenage hackers competed for bragging rights, creating malware designed for mischief or random mayhem. As the stakes have grown, so too has the potential damage and destruction brought on by malware. Cyber Command. military strategy.

Malware 60
article thumbnail

GeekWire Awards 2020 revealed: Big winners, celebrities and surprises power virtual event

GeekWire

Department of Energy’s broad network of government-funded research institutions across the country, PNNL’s research on national security and energy is worthy of recognition. PNNL’s VaporID project aims to advance detection of nuclear explosions and malware. Part of the U.S.