Tag Archive for: attempts

So. California Counties Fight Millions of Hacking Attempts


(MCT) — Imagine a wall around your house.

Now imagine someone trying to breach it 411,000 times a day.

That’s what Riverside County’s government deals with 24/7 while protecting a $6.9 billion budget and a mountain of sensitive data from hackers. San Bernardino County, which has a $7.6 billion budget, is also inundated by cyber intruders, although officials there were reluctant to put a figure on the volume of attacks their county faces.


“This is a way of life now where people are trying to find vulnerabilities and exploit those vulnerabilities,” said Tony Coulson, a professor of information and decision science at Cal State San Bernardino and director of its Cybersecurity Center.

“It is better than robbing a bank … You can steal 100 credit cards, put them on the dark web and sell them for hundreds of dollars each and probably never get caught.”

In a presentation to Riverside County supervisors in September, Anthony Chogyoji, the county’s chief information security officer, said the county’s cybersecurity center watches for threats around the clock. County spokesperson Brooke Federico declined to reveal the center’s location.

“In 2020 alone, (the county’s IT infrastructure) prevented over 150 million cyber attacks on our network and stopped over 40 million spam, phishing and infected emails from reaching our 23,000 employees,” Chogyogi said in a brief video aired at a Board of Supervisors meeting.

In San Bernardino County, “cyberattacks occur consistently throughout the day – every second of a day, which are typically unsuccessful attempts,” Robert Pittman, the county’s chief information security officer, said via email.

There’s no shortage of money or data in county government.

Besides overseeing billions in federal and state funding and local tax revenue, Riverside and San Bernardino counties handle everything from building permits and marriage licenses to applications for public benefits, medical records and voter registration data in a region of 4.5 million people.

Large-scale cyberattacks, like the one that temporarily shut down a southeastern U.S. oil pipeline in May, make…

Source…

Office workers urged to beware cloud-based hacking attempts



Office workers need to be extra cautious when using cloud-connected equipment, as that is the time when they’re most vulnerable to cyberattacks, a new report has found. Pin The report from …

Source…

Iranian hackers charged with cybercrimes in connection with attempts to influence 2020 US Presidential Election



Jessica Haworth

19 November 2021 at 13:22 UTC

Updated: 19 November 2021 at 13:31 UTC

Pair were affiliated with group that tried to secure a win for Donald Trump

Iranian hackers charged with cybercrimes in connection with attempts to influence 2020 US Presidential Election

Two Iranian nationals have been charged in connection with a disinformation campaign intended to threaten the integrity of the 2020 US Presidential election.

A statement released by the US Department of Justice (DoJ) yesterday (November 18) stated that the men were charged for their involvement in “a cyber-enabled campaign to intimidate and influence American voters, and otherwise undermine voter confidence and sow discord”.

Seyyed Mohammad Hosein Musa Kazemi (سید محمد حسین موسی کاظمی), also known as Mohammad Hosein Musa Kazem and Hosein Zamani, 24, and Sajjad Kashian (سجاد کاشیان), also known as Kiarash Nabavi, 27, are described as computer hackers who worked as contractors for an Iran-based company formerly known as Eeleyanet Gostar, and now known as Emennet Pasargad.

Eeleyanet Gostar purported to provide cybersecurity services within Iran with customers including the Iranian government, the statement alleges.

Accusations

The defendants are accused of obtaining confidential US voter information from at least one state election website; sending threatening email messages to intimidate and interfere with voters; and creating and disseminating a video containing disinformation about purported election infrastructure vulnerabilities.

The pair are also accused of attempting to access several US states’ voting-related websites, and successfully gaining unauthorized access to a US media company’s computer network that could have enabled them to disseminate false claims after the election.

US attorney Damian Williams for the Southern District of New Yorks commented: “Working with others, Kazemi and Kashian accessed voter information from at least one state’s voter database, threatened US voters via email, and even disseminated a fictitious video that purported to depict actors fabricating overseas ballots.”

BACKGROUND Spoiling the ballot: Cyber issues cast cloud over US presidential election

The…

Source…

Purdue researchers create ‘self-aware’ algorithm to ward off hacking attempts


WEST LAFAYETTE, Ind. — It sounds like a scene from a spy thriller. An attacker gets through the IT defenses of a nuclear power plant and feeds it fake, realistic data, tricking its computer systems and personnel into thinking operations are normal. The attacker then disrupts the function of key plant machinery, causing it to misperform or break down. By the time system operators realize they’ve been duped, it’s too late, with catastrophic results.

The scenario isn’t fictional; it happened in 2010, when the Stuxnet virus was used to damage nuclear centrifuges in Iran. And as ransomware and other cyberattacks around the world increase, system operators worry more about these sophisticated “false data injection” strikes. In the wrong hands, the computer models and data analytics – based on artificial intelligence – that ensure smooth operation of today’s electric grids, manufacturing facilities, and power plants could be turned against themselves.

abdel-kahlik-groupPurdue researchers have developed a novel self-cognizant and healing technology for industrial control systems against both internal and external threats. The project is led by Hany Abdel-Khalik (center) with Yeni Li, a nuclear engineering postdoctoral associate (right) leading the anomaly detection work and third-year nuclear engineering Ph.D. student, Arvind Sundaram, the covert cognizance algorithms implementation. (Purdue University photo/Vincent Walter)
Download image

Purdue University’s Hany Abdel-Khalik has come up with a powerful response: to make the computer models that run these cyberphysical systems both self-aware and self-healing. Using the background noise within these systems’ data streams, Abdel-Khalik and his students embed invisible, ever-changing, one-time-use signals that turn passive components into active watchers. Even if an attacker is armed with a perfect duplicate of a system’s model, any attempt to introduce falsified data will be immediately detected and rejected by the system itself, requiring no human response.

“We call it covert cognizance,” said Abdel-Khalik, an associate professor…

Source…