Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 141

Oct 16, 2020

U.S. Cyber Command Says it Nuked Trickbot, but Microsoft and Chums Claim Credit

Posted by in categories: cybercrime/malcode, law

In the dog days of last week, a shadowy group of secret sources in U.S. Cyber Command whispered to reporters that they’d disrupted a huge, ransomware-spewing botnet. Trickbot, closely related to Emotet and Ryuk, is believed to be managed by Russian criminals.

But today, Microsoft and friends are saying the disruption was actually down to them—awks. The consortium of industry players has developed a new legal mechanism to remove the botnet’s servers from the net and they say it’s working.

Continue reading “U.S. Cyber Command Says it Nuked Trickbot, but Microsoft and Chums Claim Credit” »

Oct 9, 2020

CLEANN: A framework to shield embedded neural networks from online Trojan attacks

Posted by in categories: cybercrime/malcode, information science, robotics/AI

With artificial intelligence (AI) tools and machine learning algorithms now making their way into a wide variety of settings, assessing their security and ensuring that they are protected against cyberattacks is of utmost importance. As most AI algorithms and models are trained on large online datasets and third-party databases, they are vulnerable to a variety of attacks, including neural Trojan attacks.

A neural Trojan attack occurs when an attacker inserts what is known as a hidden Trojan trigger or backdoor inside an AI model during its training. This trigger allows the attacker to hijack the model’s prediction at a later stage, causing it to classify data incorrectly. Detecting these attacks and mitigating their impact can be very challenging, as a targeted model typically performs well and in alignment with a developer’s expectations until the Trojan backdoor is activated.

Researchers at University of California, San Diego have recently created CLEANN, an end-to-end framework designed to protect embedded from Trojan attacks. This framework, presented in a paper pre-published on arXiv and set to be presented at the 2020 IEEE/ACM International Conference on Computer-Aided Design, was found to perform better than previously developed Trojan shields and detection methods.

Oct 9, 2020

The University Where US Intelligence Personnel Study

Posted by in categories: cybercrime/malcode, military

Ira Pastor, ideaXme life sciences ambassador interviews Brian Holmes Ph.D., Dean of The National Intelligence University, Anthony G. Oettinger School of Science and Technology Intelligence.

Ira Pastor comments:

Continue reading “The University Where US Intelligence Personnel Study” »

Oct 8, 2020

Suspected Chinese Hackers Unleash Malware That Can Survive OS Reinstalls

Posted by in category: cybercrime/malcode

“This attack demonstrates that, albeit rarely, in exceptional cases, actors are willing to go to great lengths in order to gain the highest level of persistence on a victim’s machine,” said Kaspersky Lab researcher Mark Lechtik in a statement.

The company discovered the UEFI-based malware on machines belonging to two victims. It works to create a Trojan file called “IntelUpdate.exe” in the Startup Folder, which will reinstall itself even if the user finds it and deletes it.

Oct 7, 2020

New HEH botnet can wipe routers and IoT devices

Posted by in category: cybercrime/malcode

The disk-wiping feature is present in the code but has not been used yet.

Oct 4, 2020

Russian state hackers appear to have breached a federal agency

Posted by in category: cybercrime/malcode

Evidence suggests Russia’s state-backed Fancy Bear group was behind a hack targeting a US federal agency.

Oct 2, 2020

Elon Musk: The Rise Of Starlink

Posted by in categories: alien life, cybercrime/malcode, Elon Musk, mobile phones, satellites

Might as well make it a movie!


This is the first time ever in my life that I felt frightened while writing a story on Medium. Then, I proofread it and I started sweating all of sudden. Find out for yourself and let me know how you feel! Anyway, recently, I wrote how Elon Musk’s Starlink could potentially take over the whole telecommunications industry, how it can eventually change the digital landscape, and how it can connect our blueprint to the universe. Today, I’m writing how Starlink, along with the right planning, execution, and zero technological compromises, can create not just a new technology, but a whole new way of living.

Imagine wandering the Sahara desert on a weekend trip and suddenly, you feel the urge to capture the moment. So, you pick up your iPhone and take a panoramic picture. Then, imagine sharing that same picture to your friends, to your family, right in that exact moment. Your family decides to FaceTime you and you talk to them for an entire hour while blindly walking around the Sahara desert, drenching in sweat. That’s what it’s like to be Starlink connected. There are no limits to what Starlink can do. Online, wherever you go.

Continue reading “Elon Musk: The Rise Of Starlink” »

Sep 29, 2020

“Joker”—the malware that signs you up for pricey services—floods Android markets

Posted by in categories: cybercrime/malcode, robotics/AI

O,.o.


Dozens of malicious apps, some available in Play, found in the past couple months.

Sep 24, 2020

Ripjar, founded by GCHQ alums, raises $36.8M for AI that detects financial crime

Posted by in categories: business, cybercrime/malcode, finance, government, privacy, robotics/AI

Financial crime as a wider category of cybercrime continues to be one of the most potent of online threats, covering nefarious activities as diverse as fraud, money laundering and funding terrorism. Today, one of the startups that has been building data intelligence solutions to help combat that is announcing a fundraise to continue fueling its growth.

Ripjar, a U.K. company founded by five data scientists who previously worked together in British intelligence at the Government Communications Headquarters (GCHQ, the U.K.’s equivalent of the NSA), has raised $36.8 million (£28 million) in a Series B, money that it plans to use to continue expanding the scope of its AI platform — which it calls Labyrinth — and scaling the business.

Labyrinth, as Ripjar describes it, works with both structured and unstructured data, using natural language processing and an API-based platform that lets organizations incorporate any data source they would like to analyse and monitor for activity. It automatically and in real time checks these against other data sources like sanctions lists, politically exposed persons (PEPs) lists and transaction alerts.

Sep 24, 2020

China attacked Indian satellite communications: US Report

Posted by in categories: cybercrime/malcode, satellites

Computer network attack against Indian satellite communications in 2017” is one among a slew of counter-space activities carried out by China since 2007, listed in a new report by US-based China Aerospace Studies Institute (CASI), which provides China’s space narrative among other things.

Isro, while conceding that cyber-attacks are a constant threat, maintains that its systems has not been compromised so far.

The 142-page report notes that between 2012 and 2018, China carried out multiple cyber-attacks, but elaborates on the result only in one case.