10 Oct 2019

Many in Utilities Sector Expect Attacks on Critical Infrastructure: Survey

In the past 12 months, 56% of utility companies around the world suffered at least one cyberattack resulting in the loss of private data or downtime affecting their operational technology (OT) systems, a recent survey by Siemens and Ponemon Institute found. More than half are anticipating a cyberattack targeting critical

Read More
07 Oct 2019

Iran Caught Targeting US Presidential Campaign Accounts

Iranian hackers recently targeted a US presidential campaign as well as various government officials (including former officials) and journalists, an investigation by Microsoft found. Between August and September of this year, a total of 241 user accounts were attacked by the infamous Iranian state-backed hacking group known as APT 25,

Read More
07 Oct 2019

FBI investigating alleged hacking attempt into mobile voting app during 2018 midterms

Last week, the US attorney for the Southern District of West Virginia announced that during the 2018 US midterm elections, threat actors may have attempted to hack into Voatz, an experimental mobile voting app used by the state. The FBI has launched an investigation into the incident, but according to

Read More
26 Sep 2019

Organizations Warned of Dual Threat Posed by RDP and Disruptive Ransomware

Two separate reports shed light on the rise of ransomware attacks targeting organizations via Remote Desktop Protocol (RDP) instances. A paper[pdf] by the Institute for Critical Infrastructure Technology (ICIT) states that RDP/ransomware campaigns are increasingly disrupting business operations and pose “an existential threat to critical infrastructure operators.” ICIT notes that

Read More
24 Sep 2019

More US Utility Firms Targeted in Evolving LookBack Spearphishing Campaign

Researchers with Proofpoint have updated their analysis of a recent spearphishing campaign going after US utility companies. The campaign was initially discovered in July of this year, when three firms were targeted with malicious phishing messages distributing a new kind of remote access trojan (RAT) dubbed LookBack. As it turns

Read More
23 Sep 2019

Windows 7 Voting Systems to Get Free Security Updates Through 2020 Elections

Even though Windows 7 will reach end-of-life on January 14th, 2020, Microsoft will continue to provide security updates for US voting systems running this operating system. The extended support will cover voting systems used for the 2020 US presidential election as well as local US elections and national elections in

Read More
10 Sep 2019

Cyber-security incident at US power grid entity linked to unpatched firewalls

In March of this year, a cyber incident affected firewalls at multiple power generation sites across the US. According to a recent report by the North American Electric Reliability Corporation (NERC), the attack was less serious than initially thought, and did not significantly impact electricity supply. The attackers exploited “a

Read More
04 Sep 2019

Revealed: How a secret Dutch mole aided the U.S.-Israeli Stuxnet cyberattack on Iran

The notorious Stuxnet malware attack that targeted Iranian nuclear facilities was deployed by “an inside mole recruited by Dutch intelligence agents at the behest of the CIA and the Israeli intelligence agency, the Mossad,” according to a new report by Yahoo News based on information provided by anonymous sources. The

Read More
23 Aug 2019

Employees connect nuclear plant to the internet so they can mine cryptocurrency

Earlier this year, several employees at a nuclear power plant in southern Ukraine connected part of the internal network to the Internet in order to mine cryptocurrency, authorities said. The Ukrainian Secret Service (SBU) is investigating the incident to check if attackers may have used the Internet-facing mining rigs (computers

Read More
08 Aug 2019

A Secure Network Is Not Enough, Cyber Wargames Show

A series of cyber war games organized by the US Defense department has revealed unexpected ways in which threat actors could sabotage military operations, even if military networks are well protected. The vulnerabilities stem from the military’s reliance on private contractors and civilian infrastructure. For instance, military operations could be

Read More