Tag Archives: joint

Hacker codenamed ‘Alf’ from Home and Away stole secret data on Joint Strike Fighter jets and surveillance planes

Updated

October 12, 2017 13:23:49

Alastair MacGibbon speaks about defence subcontractor hacking (Image: Reuters/US Marine Corps)Video: Alastair MacGibbon speaks about defence subcontractor hacking (Image: Reuters/US Marine Corps)

(ABC News)

A mystery hacker who was given the alias of an Australian soap opera character has stolen sensitive information about Australia’s warplanes and navy ships from a Defence subcontractor.

About 30 gigabytes of data was stolen, including information on Australia’s $17 billion Joint Strike Fighter program, and $4 billion P-8 surveillance plane project.

As first reported by ZDNet, the hacker infiltrated the system July 2016 and authorities were only alerted

Read more at: http://www.abc.net.au/news/2017-10-11/hacker-stole-data-from-defence-subcontractor/9040906

Evil twins NemucodAES and Kovter spreading in joint malware campaign

Evil twins NemucodAES and Kovter spreading in joint malware campaign

Two types of malware, NemucodAES and Kovter, have been bundled together by hackers in email attachments and sent to victims via a spam campaign, according to a security researcher.

Brad Duncan, writing on the Sans ISC InfoSec Forums blog, said that over the last two weeks he had noticed a significant increase in malicious spam (malspam) with attached zip archives disguised as delivery notices from the United Parcel Service (UPS). These zip archives contain JavaScript files designed to download and install NemucodAES ransomware and Kovter malware on a victim’s Windows computer.

He said that while malspam with zip archives containing JavaScript files are easy for most organisations to detect, an ongoing concern here is that the Nemucod ransomware currently pushed by this malspam is a new variant called NemucodAES. This new variant is written in JavaScript and PHP and uses AES and RSA to

Read more at: https://www.scmagazineuk.com/news/evil-twins-nemucodaes-and-kovter-spreading-in-joint-malware-campaign/article/675341/

Joint Cyber Operation Takes Down Avalanche Criminal Network

It was a highly secure infrastructure of servers that allegedly offered cyber criminals an unfettered platform from which to conduct malware campaigns and “money mule” money laundering schemes, targeting victims in the U.S. and around the world.

But the Avalanche network, which was specifically designed to thwart detection by law enforcement, turned out to be not so impenetrable after all. And late last week, the FBI took part in a successful multi-national operation to dismantle Avalanche, alongside our law enforcement partners representing 40 countries and with the cooperation of private sector partners. The investigation involved arrests and searches in four countries, the seizing of servers, and the unprecedented effort to sinkhole more than 800,000 malicious domains associated with the network.

It’s estimated that Avalanche was responsible for as many as 500,000 malware-infected computers worldwide on a daily basis and dollar losses at least in the hundreds of millions as a result of that malware.

“Cyber criminals can victimize millions of

Read more at: https://www.fbi.gov/news/stories/joint-cyber-operation-takes-down-avalanche-criminal-network