Search results

Iran-linked hackers steal sensitive data from US Navy member, researchers say

by Sean Lyngaas • 7 months ago

The server appears to belong to a hacking outfit that IBM calls ITG18, and which overlaps with groups known as Charming Kitten and Phosphorous.

Russian intelligence-backed hackers go after Armenian embassy website with new code

by Sean Lyngaas • 12 months ago

When subtlety rather than brute force is required, analysts say Moscow calls on Turla.

IBM sounds alarm about more data-wiping malware from Iran

by Sean Lyngaas • 1 year ago

The new research is the latest indication of Iran’s disruptive capabilities in cyberspace.

Investigation finds nothing malicious in email received by UK Labour Party candidate

by Sean Lyngaas • 1 year ago

Ben Bradshaw, who has spoken up about Russian interference in British politics, claimed to have received a malicious email that turned out to be benign.

Improve controls on classified information, inspector general tells U.S. intelligence community

by Shannon Vavra • 1 year ago

The IC has to ramp up how it manages and mitigates "the risk that a trusted privileged user could inappropriately access, modify, destroy, or exfiltrate classified data,” a new report says.

Russian hackers have been mooching off existing OilRig infrastructure

by Shannon Vavra • 1 year ago

Russian-linked hackers known as the Turla group have been piggybacking on Iranian hackers’ tools and infrastructure for years now to run their own attacks.

Yet another hacking group is targeting oil and gas companies, Dragos says

by Sean Lyngaas • 2 years ago

Researchers have dubbed the group Hexane, and they say it has been particularly active in recent months.

Russia’s Turla group goes trolling with code labeled “TrumpTower”

by Sean Lyngaas • 2 years ago

Kaspersky found that the group also referred to 'Rocket Man,' apparently a reference to Kim Jong Un.

What happens when one APT hijacks another’s infrastructure

by Sean Lyngaas • 2 years ago

Servers, domains and other infrastructure are a contested resource like any other on the internet.

How companies – and the hackers themselves – could respond to the OilRig leak

by Sean Lyngaas • 2 years ago

An unknown person or group started doxing the people behind OilRig sometime last month.