Cyberattack

Cyberattack / News Briefs

Australia’s First Online Census Halted Due to Multiple DDoS Attacks

The Australian Bureau of Statistics reports deliberate and "malicious" attacks from offshore, designed to sabotage nation's first online 2016 Census.

FBI Withheld Warning Democratic National Committee of Suspected Russian Role in Hack

Russian hackers believed to be affiliated with the Russian government continued to have access to Democratic Party computers for months during the critical phase in the U.S. presidential campaign, the sources have said.

U.S. Issues Cyber Incident Coordination Policy

White House has issued new directive spelling out how the Federal government will coordinate its incident response activities in the event of a large-scale cyber incident.

Pro-Trump Russians Accused for Democratic National Committee Email Hack, FBI Investigating

"DNC Hack Prompts Allegations of Russian Involvement," Damian Paletta and Devlin Barrett reported in the Wall Street Journal today: "U.S. authorities said they are still investigating who perpetrated the hack, but cybersecurity experts said the email release resembled past examples of political interference that other countries have tied to Russia."

US Congress Website Recovers from a Crippling 3-Day DNS Attack

A number of websites owned and operated by the United States Congress are recovering from a three-day DNS attack.

Average DDoS Attacks Now Large Enough to Take Most Organizations Completely Offline

Arbor Networks today released its Global DDoS Attack Data for the first half of 2016 affirming continued escalation in both the size and frequency of denial-of-service (DDoS) attacks.

Pokemon Go Server Outage, Hacking Group Claims Credit

OurMine claims credit for DDoS attack on Pokemon Go servers: Several news outlets have reported the hacking group OurMine - also notorious for compromising social media accounts of various celebrities - on Monday took responsibility of hacking the game servers.

Reprot Suggests China Hacked High-Level Officials at Federal Deposit Insurance Corporation

The former chairman, chief of staff and general counsel of the agency were all infiltrated.

Sophisticated Maleware Found Aimed to Target Energy Companies

"The threat uses sophisticated techniques to evade detection and prepares the ground for more malware components," Lucian Constantin reporting in CIO: "Security researchers have discovered a new malware threat that goes to great lengths to remain undetected while targeting energy companies."

EU Launches First European Public-Private Partnership on Cybersecurity, Plans $2B Investment

The European Commission has launched a new public-private partnership on cybersecurity expected to trigger €1.8 billion ($2B) of investment by 2020.

Documentary Balmes Israel for Stuxnet Malware Failure

Oscar-winning documentarian Alex Gibney's "Zero Days" -- coming out on Friday -- investigates the story of the classified Stuxnet attack on Iran by the US and Israel.

Google’s Project Zero Team Discovers Critical Vulnerabilities in Symantec and Norton

"These vulnerabilities are as bad as it gets," says Google's Information Security Engineer, Tavis Ormandy, in reference to multiple critical vulnerabilities discovered affecting Symantec, a popular vendor in the enterprise security market.

US Ramping Up to Defeat Terrorism Online

Obama administration is ramping up its efforts to fight terrorism -- "How the US is working to defeat ISIS online" Kristina Wong reprots today in the Hill: "Driving the effort is the recently set up Global Engagement Center, housed at the State Department but led by retired Navy SEAL Cmdr. Michael Lumpkin, a former top Pentagon official."

NASCAR Team Pays Ransomware Fee to Recover Its Critical Files

NASCAR team Circle Sport-Leavine Family Racing (CSLFR) disclosed today a ransomware infection incident that took place in April and nearly caused losing access to critical files worth about $2 million.

Nearly 1 Million IP Addresses Used by Attackers on a Single Target

According to a recent report by Akamai, an analysis of massive Account Takeover (ATO) attack campaigns, targeting two of its customers, revealed 1,127,818 different IPs were involved in the attacks.