In an interview with the West Block’s Mercedes Stephenson, the new head of the Canadian Centre for Cyber Security warned there are many more countries prepared to take advantage of cyber as a tool both to steal secrets and to manipulate societies that would have been out of reach just years ago.
The malicious chips, which were not part of the original server motherboards designed by the U.S-based company Super Micro, had been inserted during the manufacturing process in China
The Trump administration has authorized the use of “offensive cyber operations” as part of a new national cyber strategy that aims at deterring attacks on the U.S. most critical networks, preventing interferences on future elections (in order to avoid a 2016 DNC hack) and face a wide array of intrusions, ranging from criminal activity to cyber espionage.
Kremlin-connected cyber criminals are capable of turning off our electric power from afar, while power plant employees watch helplessly. In the last two weeks, the federal Department of Homeland Security held four briefings warning that Russian hackers are already practicing how to throw the switch and cause a blackout in the U.S. We’d have no lights, no gas at the pump, no life support in hospitals, no mass transit, no food supply.
Yet nearly all Washington pols are ignoring the danger. To the public, “power” means electricity. But to self-absorbed politicians, “power” means elections, votes, and protecting their seats. That disconnect explains why they’re in a frenzy over Russians hacking into campaign email accounts and tweeting unflattering things about Hillary Clinton, instead of dealing with the far larger peril of Russians hacking into the electric grid.
Russian hackers managed to infiltrate the control rooms of US utility companies — where they could have easily “thrown switches” and caused power outages, according federal officials.
Members of the notorious cyber espionage group “Dragonfly” or “Energetic Bear” were reportedly behind the hack, which first came to light earlier this year.
Department of Homeland Security officials told the Wall Street Journal on Monday that the group gained access to a series of highly-secured, “air-gapped” networks owned by the electric utilities in the spring of 2016 — and were likely still trying to access them today.
NICOLE CAMARILLO WAS touring the Army base at Fort Meade, Maryland, in early 2017 when a young captain—I’ll call him Matt, due to the sensitivity of his position—crossed her path.
I’ve got to talk to that kid, Camarillo remembers thinking. Just weeks before, she’d seen Matt deliver a presentation on a tool he was developing to counter enemy drone strikes in the Middle East. The technology, he explained, was being developed on a “shoestring budget.”
It is “only a matter of time” until a commercial aircraft is hacked, the Department of Homeland Security and other US government agencies have warned. Most planes lack cybersecurity protections to prevent such a hack.
Motherboard obtained internal DHS documents through a Freedom of Information Act request which detail vulnerabilities with commercial aircraft and risk assessments. A number of the documents are still being “withheld pursuant to exemption” of the FOIA.
The release includes a January presentation from Pacific Northwest National Laboratory (PNNL), part of the Department of Energy, outlining the group’s efforts to hack an aircraft via its wifi service as a security test.
The event, which passed almost unnoticed on this side of the Atlantic, was the remarkable disclosure by the head of the Government Communications Headquarters (GCHQ) that Britain had launched its first-ever military-style cyber campaign against the Islamic State.
ST. PETERSBURG, RUSSIA — Vitaly Bespalov, a 23-year-old journalism school graduate, had no idea what to expect when he arrived at a nondescript four-story business center in St. Petersburg to interview for a job.
Everything about the building at Savushkina 55 seemed odd. Security was heavy and the windows were tinted. Guards dressed in camouflage demanded his passport and his home address before letting him into the building. And, as he negotiated his entry, Bespalov noticed a woman enter the lobby in a rage.
“She was yelling something about how she refused to be part of this,” says Bespalov. “Everything about the place was strange.”
The latest warning of Russian intrusions is another sign that cyber-space is becoming one of the focal points for growing tension between Russia and the West.
But so far, much of the talk about cyber-war remains hypothetical rather than real.
It is true that Britain’s National Cyber Security Centre (NCSC) is on high alert for the possibility of some kind of Russian activity. More people and resources have been devoted to monitoring and investigation.
There has also been outreach to companies to warn them on what to look out for and what to do.
Russian hackers attempted to penetrate the U.S. civilian aviation industry early in 2017 as part of the broad assault on the nation’s sensitive infrastructure.
The attack had limited impact and the industry has taken steps to prevent a repeat of the intrusion, Jeff Troy, executive director of the Aviation Information Sharing and Analysis Center, said Friday. Troy wouldn’t elaborate on the nature of the breach and declined to identify specific companies or the work that was involved.
Any lingering notion that the Trump administration is in bed with the Russians was nuked this week as the administration leveled a series of accusations and sanctions against Vladimir Putin’s regime. On Thursday, for the first time publicly, the U.S. blamed the Russian government for a years-long cyber attack campaign targeting the U.S. power grid.
North Korea is stepping up its cyber capabilities to target international aerospace and defence industries through a shadowy and sophisticated hackers group called Reaper, a new report revealed on Tuesday.
The group, also known as APT37, was identified in research by American private security company FireEye, which tracks cyber-attackers around the world.
They reported that it is using malware to infiltrate computer networks and now represents “an advanced persistent threat” that has dramatically increased the reach of North Korea’s already formidable cyber operations
The indictment of 13 Russians charged with attempting to manipulate American voters using social media shines a fascinating light on a sophisticated, relentless operation to exploit the internet for political gain. Here’s how US investigators say the Russians did it.
It was 2014, and in a building in St Petersburg, the Russian Internet Research Agency (IRA) was already hard at work building its arsenal to take on US politics.
According to US prosecutors, the IRA had gathered stolen identities of real Americans, and a formidable encyclopaedia of what “works” on social media when it comes to riling up Americans talking about politics. Two members of the agency were said to have travelled to the US to gather more intelligence, a fact-finding tour taking in nine states, according to investigators.
WASHINGTON (AP) — Russian cyberspies pursuing the secrets of military drones and other sensitive U.S. defense technology tricked key contract workers into exposing their email to theft, an Associated Press investigation has found.
What ultimately may have been stolen is uncertain, but the hackers clearly exploited a national vulnerability in cybersecurity: poorly protected email and barely any direct notification to victims.
The hackers known as Fancy Bear, who also intruded in the U.S. election, went after at least 87 people working on militarized drones, missiles, rockets, stealth fighter jets, cloud-computing platforms or other sensitive activities, the AP found.