Tag Archive for: attempted

Chinese hackers attempted stealing Russian defence data: Report


Beijing [China], May 20 (ANI): Chinese hackers, reportedly sent emails with malware links to scientists and engineers at several of Russia’s military research and development institutes on March 23 in order to purportedly obtain critical data on the country’s security systems.

The emails, which were supposedly sent by Russia’s Ministry of Health and contained seemingly tantalizing information about a “list of persons under U.S. sanctions for invading Ukraine” were actually sent by state-sponsored hackers in China seeking to entice their Russian targets to download and open a document with malware, New York Times reported citing a report by Israeli-American cybersecurity firm Check Point.

Check Point’s research showed that despite the countries’ deepening ties, China appeared to view Russia as a legitimate target for the theft of sensitive military technological information, the report said.

The report provides new evidence of Chinese efforts to spy on Russia, pointing to the complexity of the relations between the two countries that have drawn closer in solidarity against the US.

It also underscores the sprawling, and increasingly sophisticated, tactics China’s cyber spies have used to collect information on an ever-expanding array of targets, including countries it considers friends, like Russia, the New York Times reported.

The Chinese espionage operation began as early as July 2021, before Russia invaded Ukraine, the Check Point report said. The March emails revealed that China’s hackers had quickly exploited narratives about the war in Ukraine for their purposes.

“This is a very sophisticated attack,” Itay Cohen, the head of cyber research at Check Point was quoted as saying. He added that it demonstrated capabilities “usually reserved for state-backed intelligence services.” The hackers used methods and codes similar to those used in previous attacks attributed to hacking groups affiliated with the Chinese state, he said.

The Chinese campaign targeted Russian institutes that research airborne satellite communications, radar and electronic warfare, Check Point said in its report.

Under China’s authoritarian leader, Xi Jinping, Beijing has refined its approach to cyberspying,…

Source…

Exposing the Russian spies who attempted to hack a Kansas nuclear plant | KCUR 89.3


Three young Russian spies, Pavel, Mikhail and Marat, working from computers in a 27-story skyscraper at 12 Prospekt Vernadskogo in Moscow, over five years targeted the Wolf Creek nuclear power plant in Burlington, Kansas.

They were on a sophisticated cyber reconnaissance mission to learn about the inner workings of the plant to prepare for a possible precision electronic assault by the Russians.

That is the story that broke March 24, when the U.S. Department of Justice suddenly and somewhat mysteriously unsealed an indictment against the hapless trio. The indictment was filed under seal on Aug. 26, 2021, in the U.S. District Court in Kansas City, Kansas, and lay gathering dust for seven months.

Context matters, and in this case it explains why the Sunflower State and its lone nuclear plant have been woven into a saga laced with John le Carré spy novel overtones.

The bloody context is the devastating war Russia launched weeks ago against Ukraine. It also includes the remarkably successful psychological warfare ops that the Biden administration and its Western European allies have thrown at Russian President Vladimir Putin and his war machine.

James Lewis, a nuclear cybersecurity expert, said that the DOJ indictment probably was unsealed in Kansas now because the Biden administration has fresh intelligence about the Russians and it wants those overseeing America’s critical infrastructure to be on heightened alert.

“Maybe the Russians are giving more consideration to a cyberattack than in the past. It is driven by what the Russians are up to,” said Lewis, director of the Strategic Technology Program of the Center for Strategic & International Studies in Washington.

Wolf Creek, completed in 1985, is located about 100 miles southwest of Kansas City. Evergy, formerly Kansas City Power & Light, owns 94% of Wolf Creek and the balance is owned by the Kansas Electric Power Cooperative.

A nuclear plant by a cooling pond

U.S. Nuclear Regulatory Commission

/

The Wolf Creek nuclear power plant near Burlington, Kansas.

Evergy declined to discuss the Russian cybersecurity attack on Wolf Creek. Their statement…

Source…

Healthcare OT Facilities Remain Exposed As Industry Experienced 68 Attempted Ransomware Attacks In Q3


Healthcare OT Facilities Remain Exposed As Industry Experienced 68 Attempted Ransomware Attacks In Q3

Source…

Ohio election security tested after attempted hack in Lake County


YOUNGSTOWN, Ohio (WKBN) – An attempt at hacking into one of Ohio’s 88 boards of elections failed.

Mahoning County Elections Board Director Tom McCabe said it’s because of the security measures put in place by the Secretary of State.

Last week, we learned a worker in Lake County plugged their own personal computer into the government system last spring in an apparent attempt to gain access to election information. McCabe said their systems are very secure.

“None of our voting equipment is connected to the internet. They’re not connected to any local network whatsoever. They are all independent standing machines and what we actually count the votes on here is an internal network,” McCabe said.

Both the Secretary of State and the FBI are now investigating the hacking attempt.

Source…