Categories » Persistent Threats

Report Says Cyberattacks Originated Inside Iran

A security firm identified Iranian hackers as the source of coordinated attacks against more than 50 targets in 16 countries, many of them corporate and government entities. Continue reading

Critical networks in US, 15 other nations, completely owned, possibly by Iran

Operation Cleaver gets near-complete control of airlines, gas producers, defense. Continue reading

Bits Blog: Symantec Discovers ‘Regin’ Spy Code Lurking on Computer Networks

The security company indicated that a powerful program that could only have been created by a “nation state” has been finding its way into computer systems for six years.



Continue reading

Researchers Uncover Government Spy Tool Used to Hack Telecoms and Belgian Cryptographer

Piecing together new information from various researchers, it’s clear the ‘Regin” malware is one of the most sophisticated nation-state spy tools ever found. The post Researchers Uncover Government Spy Tool Used to Hack Telecoms and Belgian Cryptograph… Continue reading

Highly Advanced Backdoor Trojan Cased High-profile Targets for Years

“Backdoor Regin” bears a resemblance to Stuxnet, was developed by a wealthy nation. Continue reading

NSA Director: China Can Damage US Power Grid

NSA Director: China can damage US power grid

More Than 800,000 Postal Service Employees Victims Of Data Breach

USPS customers were affected as well. The FBI is leading an investigation into the hack, but it’s unclear who might be responsible for it. Continue reading

This System Will Self Destruct: Crimeware Gets Powerful New Functions

Refurbished BlackEnergy does Windows and Linux—even Cisco routers. Continue reading

How Attackers Can Use Radio Signals and Mobile Phones to Steal Protected Data

Radio-frequency hack developed by researchers in Israel would let attackers steal data remotely from even air-gapped computers not connected to the internet. The post How Attackers Can Use Radio Signals and Mobile Phones to Steal Protected Data appeare… Continue reading

WW2 Technology ‘Plan B’ for GPS

World War Two tech to back up GPS Continue reading

U.S. Nuclear Regulator Hacked Three Times in Three Years- 19 August 2014

19 August 2014- ThreatPost U.S. Nuclear Regulator Hacked Three Times in Three Years

Hackers Penetrated Systems of Key Defense Contractors- 18 September 2014

18 September 2014- Help Net Security Hackers penetrated systems of key defense contractors

North Korea Cyber Warfare Capabilities Exposed- 2 September 2014

2 September 2014- ZDNet North Korea cyber warfare capabilities exposed

Iran’s Emergence as a Cyber Power- 20 August 2014

20 August 2014- Strategic Studies Institute Iran’s Emergence as a Cyber Power

Hackers Stole Security Check Info on at Least 25,000 DHS Employees- 30 August 2014

30 August 2014- Ars Technica Hackers stole security check info on at least 25,000 DHS employees

Hackers Launch All-Out Assault on Norway’s Oil and Gas Industry- 31 August 2014

31 August 2014- Vice Motherboard Hackers Launch All-Out Assault on Norway’s Oil and Gas Industry

The Long Game: How Hackers Spent Months Pulling Bank Data from JPMorgan- 29 August 2014

29 August 2014- Ars Technica The long game: How hackers spent months pulling bank data from JPMorgan

Community Health Says Data Stolen in Cyber Attack from China-18 August 2014

18 August 2014- Reuters Community Health says data stolen in cyber attack from China

Background Check Firm Hit by Breach- 7 August 2014

7 August 2014 Background Check Firm Hit by Breach

Chinese Hackers Extending Reach to Smaller U.S. Agencies, Officials Say- 15 July 2014

15 July 2014- New York Times Chinese Hackers Extending Reach to Smaller U.S. Agencies, Officials Say