. | . |
US says North Korean malware lurking in computer networks by Staff Writers Washington (AFP) Nov 14, 2017 US authorities said Tuesday malware developed in North Korea is still lurking in many computer networks, giving hackers backdoor access to government, financial, automotive and media organizations. An alert issued by the Department of Homeland Security warned of surreptitious activity by the so-called "Hidden Cobra" hacker group, also known by the name "Lazarus." US officials earlier this year blamed the group for a series of cyberattacks dating back to 2009, saying it was linked to the Pyongyang government. In Tuesday's warning, the DHS Computer Emergency Response Team (CERT) said the hacker could still maintain a presence on victims' networks with the aim of "further network exploitation." The report said some networks could be infected with the Volgmer "backdoor Trojan" or a remote administration tool known as Fallchill, which can give hackers complete control of a system. It said FBI investigators suspect the Fallchill tool has been used since 2016 and Volgmer since 2013. Private security analysts refer to Hidden Cobra as the "Lazarus" group of hackers linked to North Korea and likely behind a series of multimillion-dollar cyber thefts from banks around the world. Some analysts say the Lazarus group may also have been behind the WannaCry ransomware outbreak earlier this year. Hackers in the Hidden Cobra or Lazarus group have been active since 2009 and "have leveraged their capabilities to target and compromise a range of victims," according to a DHS report in June. "Some intrusions have resulted in the exfiltration of data while others have been disruptive in nature." DHS and FBI officials say the group "will continue to use cyber operations to advance their government's military and strategic objectives," according to the DHS report. North Korea has denied orchestrating any cyber attacks, but the latest report comes amid rising tensions with the United States over the communist regime's nuclear testing program.
Moscow, Russia (SPX) Nov 10, 2017 Researchers from MIPT teamed up with their colleagues from the Keldysh Institute of Applied Mathematics of the Russian Academy of Sciences (KIAM RAS) and Lomonosov Moscow State University to develop a mathematical model of information warfare in a society under periodic destabilization. The authors of the paper, which was published in the journal Mathematical Models and Computer Simulation ... read more Related Links Cyberwar - Internet Security News - Systems and Policy Issues
|
|
The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us. |