Earlier this week, The Ukrainian Computer Emergency Response Team and the Slovak Internet security company ESET warned that well-known Russian thieves GRU Sandworm were targeting Ukraine’s most powerful electronic devices through the Industroyer criminal program, also known as Crash Override. A few days later, the U.S. Department of Homeland Security, the Cybersecurity and Infrastructure Security Agency, NSA, and the FBI jointly issued a proposal regarding a new unspecified control device, called Pipedream, which appeared to be unused. against intentions but that industrial workers should ban.
Russia’s war in Ukraine has led to massive data loss which detectives, criminals, terrorists, and civilians seeking to help Ukraine seize and release information about the Russian military, the government, and other Russian organizations. And in contrast to the controversy, WIRED also looked at the actual consequences of code-breaking leaks in the main picture of cybercrime.
In addition, DuckDuckGo has finally released its own version of the secret browser, and WhatsApp is growing to offer Slack’s social networking system called Communities.
And there is more! We have written all the articles that we did not disclose or explain in detail this week. Click on the headings to read all the articles. And stay safe out there.
Blockchain analytics researchers in Elliptical and Chainalysis said Thursday that it followed a massive cryptocurrency robbery last month from the Ronin network bridge to North Korea Lazarus to crack down on the group. The U.S. Treasury government also announced increased sanctions on North Korea, Lazarus, and its affiliates. The attackers stole a large amount of Ethereum ether and other USDC stablecoin which was $ 540 million at the time. (The value of the stolen money has risen to $ 600 million.) Lazarus’ hackers have been involved in cybercrime, cybercrime, corruption, and frequent profits to secure the Kingdom of Hermit.
The NSO, the most powerful and widely used spy software in Israel, Pegasus, was declared “insignificant” in British courts this week. The review, known as “clear,” came from the third Berkeley Research Group, which has been overseeing the NSO fund. As a staggering number of autocrats and governmental authorities have purchased NSO weapons to fight against freedom fighters, protesters, journalists, and other vulnerable people, the spy software developer has been criticized (repeatedly) by technical giants in an attempt to curb its reach. Supervising those who are being monitored by big business and how you can spy on human rights meet. Reuters said this week, for example, that EU officials had been monitoring last year by unspecified Israeli spy programs.
T-Mobile confirmed that it was hacked last year (which amounted to about $ 1 million) after embezzling 30 million customer notifications to sell 6 bitcoins, or about $ 270,000 at the time. Recent court documents show that the telecom hired a third-party company to respond, and the company paid the victims about $ 200,000 to cover the risk in anticipation of the crisis. Paying swindlers through third parties is a well-known but counter-intuitive way to deal with the dangers of ransomware and digital seizure. One of the reasons it is not stopped is that it often does not work well, as was the case with T-Mobile data, which the attackers continued to sell.
In a report this week, researchers at Cisco Talos said that a new type of malware program called “ZingoStealer” is spreading rapidly on the Telegram program. An online terrorist group known as Haskers Ganghe is distributing the freeware program to other terrorists or anyone else who wants it, investigators said. The group, which can be based in Eastern Europe, often shares updates with the Telegraph and Discord weapons and a cybercriminal “group”.
Some of the Best WIRED Stories