Military

now browsing by tag

 
 

Hackers #targeting #NATO and #U.S. military #cyber-experts

Source: National Cyber Security – Produced By Gregory Evans

Hackers #targeting #NATO and #U.S. military #cyber-experts

Hackers backed by the military intelligence agency of Russia are apparently targeting security researchers with their latest campaign, which uses a document advertising a cybersecurity conference in Washington D.C. as the lure.

Security researchers are being sent a document titled ‘Conference_on_Cyber_Conflict.doc’, containing information about the upcoming 2017 International Conference on Cyber Conflict U.S. (CyCon U.S.). While the conference is real, the document is not, reports ZD Net.

The real conference is being hosted by the US Army and NATO Cooperative Cyber Defence Centre of Excellence and will run from November 7 through 8 this year at the Ronald Reagan Building in Washington D.C. CyCon U.S. is a collaborative effort between the Army Cyber Institute at the United States Military Academy and the NATO Cooperative Cyber Defence Centre of Excellence.

APT28 or Fancy Bear linked to Russia
Over the weekend, security researchers at Cisco Talos revealed that an operation called Group 74, or APT28 aka Fancy Bear (that was also responsible for the DNC hack last year), has “weaponized” a real Word document titled “Conference_on_Cyber_Conflict.doc” with malware.

The hackers used a variant of a malware called Setuploader, commonly used in espionage. “This is clearly an attempt to exploit the credibility of Army Cyber Institute and NATO CCDCOE in order to target high-ranking officials and experts of cybersecurity,” said a CCDCOE spokesperson.

Setuploader has the ability to take screenshots, extract data, execute code and download additional fake files, and more, according to the researchers. This points to the hackers wanting to steal information with the goal of espionage. One thing is different about this particular document – It doesn’t contain an Office exploit or a zero-day.

Instead, it uses a malicious Visual Basic for Applications (VBA) macro, designed to run code within the selected application — in this case, Microsoft Word. This shows the extent that some groups will go to in extracting information from a particular group, in this case, cybersecurity experts.

The Sunday report comes just a few days after Proofpoint’s report had suggested APT28 was actively leveraging a security exploit that was patched by Adobe last week, in hopes of infecting as many targets in government departments and aerospace companies as it could before the breach was discovered.

 

The post Hackers #targeting #NATO and #U.S. military #cyber-experts appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Hacker who Infiltrated American Military Systems gets Sentenced

Source: National Cyber Security – Produced By Gregory Evans

Suttong Coldfield based Sean Caffrey pleaded guilty to a crime within the purview of Computer Misuse Act during June while facing Birmingham Crown Court following which the jury sentenced him with imprisonment for 18 months along with an 18-month suspension. Caffrey, aged 25, a British resident and PC-hacker acquired illegitimate…

The post Hacker who Infiltrated American Military Systems gets Sentenced appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

UK university hackers read up on secret military tech

Source: National Cyber Security – Produced By Gregory Evans

UK university cyberattacks have doubled in the last two years alone, with hackers found to be focusing on critical information connected to national security. Areas including research pertaining to missiles, scientific developments and medical advances are among the areas that cyber adversaries have shown an acute interest in. This information…

The post UK university hackers read up on secret military tech appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Security lapse exposed thousands of military contractor files

Source: National Cyber Security – Produced By Gregory Evans

Thousands of files containing the private info of US military and intelligence personnel have been exposed online. The documents (which included a mixture of resumes and job applications) were found on a public Amazon Web Services server by cybersecurity firm UpGuard. A research analyst for the company traced the files…

The post Security lapse exposed thousands of military contractor files appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

British Hacker Pleads Guilty to Hacking US Military Satellite Phone And Messaging System

Source: National Cyber Security – Produced By Gregory Evans

British Hacker Pleads Guilty to Hacking US Military Satellite Phone And Messaging System

A 25-year-old broke into a DoD satellite communication system and doxed around 800 Department of Defense employees. A British man has pleaded guilty to hacking into a US Department of Defense system stealing data from around 30,000 satellite phones, UK authorities announced on Thursday. Sean Caffrey, a 25-year-old from the…

The post British Hacker Pleads Guilty to Hacking US Military Satellite Phone And Messaging System appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Crooks stealing military ID’s to commit online romance scams

To Purchase This Product/Services, Go To The Store Link Above Or Go To http://www.become007.com/store/ Thieves are taking “catfishing” to a new low by stealing military ID’s to commit online romance scams. ‘Dean McGuire’ is 42 and lives in Miami Beach. On a social media site, …

The post Crooks stealing military ID’s to commit online romance scams appeared first on Become007.com.

View full post on Become007.com

What to Do When ‘Your’ Spouse is a Military Romance Scam

Source: National Cyber Security – Produced By Gregory Evans

What to Do When ‘Your’ Spouse is a Military Romance Scam

Finding a military romance scam is common, I told the woman named Carol who had messaged me early on a recent Sunday morning; many service members have their photos stolen. Read More….

The post What to Do When ‘Your’ Spouse is a Military Romance Scam appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Hacking Attacks Raise Fears As U.S. Military Increasingly Outsources IT

375_250-army_emr

Source: National Cyber Security – Produced By Gregory Evans

Hacking Attacks Raise Fears As U.S. Military Increasingly Outsources IT

Security must extend to affiliated entities to ensure protection of sensitive data.
The Navy recently revealed personal data belonging to 134,386 current and former sailors had been compromised. While the details are still unclear, the Navy is reporting a laptop

The post Hacking Attacks Raise Fears As U.S. Military Increasingly Outsources IT appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Lawmakers Push to Make US Cyber Command a Top Military Command

cyber-operations-centerOfficials and business leaders in Maryland are backing a proposal to elevate U.S. Cyber Command to a unified combatant command — one of 10 charged with carrying out missions around the world — a move they hope will bring prestige and more jobs to the state. Rep. C.A. Dutch Ruppersberger praised the idea on the […] View full post on AmIHackerProof.com | Can You Be Hacked?

U.S. military claims to be dropping ‘cyber bombs’ on ISIS

Source: National Cyber Security – Produced By Gregory Evans

America’s military forces are dropping “cyber bombs” on Islamic State terrorist groups for the first time, Deputy Defense Secretary Robert Work told reporters accompanying him on a military flight on Tuesday. The ISIS internet attacks, whatever the particulars really may be, are part of a stepped-up coordinated effort to put increasing pressure on the militant organization. “Those guys are under enormous pressure. Every time we have gone after one of their defended positions over the last six months, we have defeated them. They have left, they have retreated,” Work told reporters on a military plane en route to a Colorado air base. He said U.S. and coalition forces were putting pressure on Islamic State from all directions, using every possible military capability, including cyber attacks, to defeat the group. And that’s all the detail we have, which isn’t much. Source:https://boingboing.net/2016/04/13/u-s-military-claims-to-be-dro.html Related Post All US military bases will fail in EMP false flag … Putting Cyber Insurance on the political agenda A website to protect yourself from cyber criminals Shredding can help curb identity theft jQuery(document).ready(function( $ ){ jQuery(‘.yuzo_related_post .yuzo_wraps’).equalizer({ columns : ‘> div’ }); }); The post U.S. military claims to be dropping ‘cyber bombs’ on ISIS appeared first on […]

The post U.S. military claims to be dropping ‘cyber bombs’ on ISIS appeared first on National Cyber Security.

View full post on National Cyber Security