Remove Malware Remove Network Remove Pharmaceuticals Remove Programming
article thumbnail

NotPetya and Olympic Destroyer Malware: 6 Russian Officers Charged

SecureWorld News

The NotPetya cyberattack crashed networks around the globe, doing billions in damage. But the GRU members being charged in this case started with other strains of malware and a narrow target: Ukraine's power grid. The GRU's Olympic Destroyer malware. We'll include details on the malware variants being used, as well.

Malware 60
article thumbnail

Read This If You Do Business in China

SecureWorld News

But the bank left out a critical detail about the software: it included malware.". Now, the Federal Bureau of Investigations (FBI) is jumping on the concerns surrounding this Chinese malware whack-a-mole. Since at least March 2019, Baiwang released software updates which installed a driver automatically along with the main tax program.

Malware 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Snitch to Rich? U.S. Offering $10M for Info on Russian Hackers

SecureWorld News

The Department of State's Rewards for Justice (RFJ) program is seeking information on six officers of the Main Intelligence Directorate of the General Staff of the Armed Forces of the Russian Federation (GRU). pharmaceutical manufacturer. critical infrastructure in violation of the Computer Fraud and Abuse Act (CFAA).". organizations.

Malware 69
article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

They also had a piece of malware called killdisk position on the systems so that when the systems rebooted, it would kick off deleting all the files and deleting all the systems. It was a masterful piece of malware, carefully crafted to achieve a specific goal. They spent that time researching and understanding the environment.

System 52
article thumbnail

The Hacker Mind Podcast: Hacking Behavioral Biometrics

ForAllSecure

Now we're actually talking about models and and these models can be different kinds of models right you have gradient boosting we have RNNs we have deep neural networks we have all kinds of different things, and that's where I like to kind of like draw the line. Such as training systems to automatically detect malware.

article thumbnail

Searching for Susy Thunder

The Verge

Her backstage conquests had given her a taste for quaaludes and pharmaceutical-grade cocaine; they’d also given her the ability to sneak in anywhere. Susan found her way into the hacker underground through the phone network. They might be tempted by a USB stick labeled “salary information” and install malware on their laptop.

System 97