article thumbnail

Latest on the SVR’s SolarWinds Hack

Schneier on Security

The New York Times has an in-depth article on the latest information about the SolarWinds hack (not a great name, since it’s much more far-reaching than that). There is also no indication yet that any human intelligence alerted the United States to the hacking.

Hacking 323
article thumbnail

Ghost Blogging Platform Hacked To Mine Cryptocurrency

Adam Levin

. “The mining attempt… quickly overloaded most of our systems which alerted us to the issue immediately,” the company announced May 3, adding that “[t]here is no direct evidence that private customer data, passwords or other information has been compromised. .

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

On the Twitter Hack

Schneier on Security

Twitter was hacked this week. Someone compromised the entire Twitter network, probably by stealing the log-in credentials of one of Twitter's system administrators. Maybe this hack will serve as a wake-up call. Not a few people's Twitter accounts, but all of Twitter. The FBI is investigating.

Hacking 312
article thumbnail

Nitrogen shelling malware from hacked sites

Malwarebytes

The threat actors seem to have a preference for hosting their payloads on compromised WordPress sites, many of which are already hacked with malicious PHP shell scripts. Malicious ads The ads are displayed via Google searches for popular search terms related to programs used by IT and system administrators.

Malware 79
article thumbnail

Chinese Hackers Stole an NSA Windows Exploit in 2014

Schneier on Security

Check Point has evidence that (probably government affiliated) Chinese hackers stole and cloned an NSA Windows hacking tool years before (probably government affiliated) Russian hackers stole and then published the same tool. This allows someone with a foothold on a machine to commandeer the whole box.

article thumbnail

SolarWinds Detected Six Months Earlier

Schneier on Security

The software, used by system administrators to manage and configure networks, was communicating externally with an unfamiliar system on the internet. The DOJ asked the security firm Mandiant to help determine whether the server had been hacked.

article thumbnail

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

The Last Watchdog

Related: We’re in the midst of ‘cyber Pearl Harbor’ Peel back the layers of just about any sophisticated, multi-staged network breach and you’ll invariably find memory hacking at the core. Here’s what I took away from our discussion: Transient hacks. This quickly gets intricately technical.

Hacking 212