sábado, 30 septiembre 2023
Visitas totales a la web: 88993314

El portal de los profesionales de seguridad y emergencias

Nº 1 del mundo en español en seguridad global

Soluciones de seguridad global

Russian hacker group Evil Corp targets US workers at home

BBC News

A Russian hacking group is launching ransomware attacks against a number of US companies, targeting employees who are working from home due to Covid-19.

Evil Corp hackers have tried to access at least 31 organisations’ networks in order to cripple systems and demand millions of dollars in ransom.

The group’s two alleged leaders were indicted by the US Justice Department in December 2019.

There are concerns that US voting systems could also be targeted.

Last year, US authorities filed charges against Evil Corp’s alleged leaders Maksim Yakubets and Igor Turashev, accusing them of using malware to steal millions of dollars from groups including schools and religious organisations in over 40 countries.Advertisement

Officials announced a $5m reward for information leading to their arrest, which they said was the largest amount ever offered for a cyber criminal. Both men are still at large.

Maksim Yakubets and Igor Turashev
Image caption Maksim Yakubets (L) and Igor Turashev are accused of running Evil Corp

The threat comes as the majority of Americans have been working from home due to the coronavirus pandemic – 62% according to a Gallup poll.

The US presidential election is also just months away, and federal and local officials have been working to put measures in place to protect voter records as well as manage safe voting practices amid the pandemic.

What do we know about the attack?

Symantec Corporation, a firm that monitors corporate and government networks released a notice warning of the threat it identified on Thursday night.

The attacks used what Symantec described as a relatively new type of ransomware called WastedLocker, which has been attributed to Evil Corp. Ransomware are computer viruses that threaten to delete files unless the ransom is paid. The WastedLocker ransomware virus demands ransoms of $500,000 to $1m to unlock computer files it seizes.

Symantec said the «vast majority of targets are major corporations, including many household names», and eight targets were Fortune 500 companies. All are US-owned but one, which is a US-based subsidiary.

Most targeted companies were in the manufacturing, information technology and media sectors.

Media captionTechnology explained: what is ransomware?

Symantec said the hackers had breached the networks of these companies and were «laying the groundwork» for future ransomware attacks that would let them block access to data and demand millions of dollars.

Symantec technical director Eric Chien told the New York Times the hackers take advantage of employees now using virtual private networks (VPNs) to access work systems.

They use VPNs to identify which company a user works for, and then infect the user’s computer when they visit a public or commercial site. When the user next connects to their employer’s system, the hackers can attack.

What’s the context?

There have been a number of recent cyber-attacks on local governments across the US.

Cities and towns in Louisiana, Oregon, Maryland, Georgia, Texas and Florida were hit by ransomware attacks last year.

The Department of Homeland Security is looking into safeguarding voter registration databases ahead of November 3’s general election. In February, the agency’s head of cyber-security said this was a key election security concern.

These attacks by foreign cyber-criminals are far from a new threat.

During the impeachment inquiry last year, former White House security adviser and Russia expert Fiona Hill testified that «Russia’s security services and their proxies have geared up to repeat their interference in the 2020 election».

In 2018, the justice department charged 12 Russian intelligence officers with hacking Democratic officials in the 2016 US elections, using spear phishing emails and malicious software.

The hackers also stole data on half a million voters from a state election board site. Moscow has said there is no evidence linking the 12 to military intelligence or hacking.

Fuentebbc.com
Fecha de publicaciónjunio 26, 2020

BELT.ES no se hace responsable de las opiniones de los artículos reproducidos en nuestra Revista de Prensa, ni hace necesariamente suyas las opiniones y criterios expresados. La difusión de la información reproducida se realiza sin fines comerciales. 

Listado de Expertos

Recomendado

Profesión militar: Obediencia debida frente a la obligación de disentir

Con ocasión de la realización de estudios en el Instituto Universitario Gutiérrez Mellado tuve la ocasión de leer y analizar una serie de documentos de opinión que trataban en profundidad las diferentes facetas presentes en el campo de las relaciones cívico-militares; temas que , habitualmente, no han estado presentes en los diferentes cursos y actividades formativas en la enseñanza militar, ni, por supuesto, en la civil.

El amor de Macarena Olona por la Guardia Civil empieza por su pareja, un joven oficial condecorado

El padre de su hijo llegó a la Benemérita como militar de carrera y, los que le...

La artillería ‘made in USA’ comprada por Marruecos que deja fuera de juego a España

El país magrebí sigue reforzando sus fuerzas armadas a golpe de talonario, y no lo hace de...

Últimas noticias

Vae Victis!

Así se forjó el mundo a través de estas veinte batallas y derrotas

BOMBEROS FORESTALES SIN MEDIOS ANTE LA CAMPAÑA DE INCENDIOS: «VAMOS CON MIEDO»

Ya ha pasado un año, pero a los bomberos de Zamora todavía les tiembla la voz cuando recuerdan el verano de 2022. La virulencia de las llamas dejó 267.946,58 hectáreas calcinadas a lo largo del territorio en 12 meses, convirtiendo a 2022 en el año con más superficie afectada por el fuego de los últimos diez años, más del doble de la media anual registrada en España según los datos avanzados por el Ministerio para la Transición Ecológica y Reto Demográfico.

CORONACIÓN, «GLOBAL BRITAIN» Y SEGURIDAD (2ª parte)

El doble propósito de esta segunda parte del artículo titulado “Coronación, ‘Global Britain’ y seguridad”, es, por una parte, resaltar el papel fundamental de la seguridad para el normal desarrollo de todo evento de masas, y por otra parte, tratar de describir la planificación, aplicación y evaluación del dispositivo de seguridad realizado para la coronación del rey Carlos III del Reino Unido.

Grandes talentos españoles en el nuevo vídeo de seguridad a bordo de Iberia

Un tripulante de cabina de pasajeros (TCP) situado en un extremo del pasillo del avión, hace una demostración a los pasajeros de distintos elementos de seguridad a bordo mientras por la megafonía se escucha una locución que acompaña sus gestos con instrucciones en dos idiomas. Este pequeño ritual previo al despegue se repite miles de veces cada día en todo el mundo, forma parte ya del imaginario colectivo y es consustancial al hecho de viajar en avión. Ahora, ha sido recreado en clave promocional por un video que acaba de ser presentado en sociedad por Iberia y Turespaña como parte de una campaña impulsada por ambas instituciones para promocionar distintos destinos de nuestro país.

Executive Protection in the Age of Technology: Addressing the Risks

Executive protection (EP), in its original form, is purely physical. Over the years, however, it has evolved dramatically. Today’s understanding that prevention is the primary key has forever changed the traditional approach. As technology advances, the line between physical security and cybersecurity is becoming more blurred, exposing executives to numerous cyber threats that can result in physical vulnerabilities. And the risk of cyber threats can range from hacking of personal devices to surveillance via bugs in homes, vehicles, and offices.