Site iconSite icon ForkLog

Espionage Against Uyghurs on Facebook, Ransomware Attacks, and Other Cybersecurity News

Espionage Against Uyghurs on Facebook, Ransomware Attacks, and Other Cybersecurity News

This week in cybersecurity: the most important news.

  • Russian hackers suspected of carrying out a cyberattack on German MPs.
  • Researchers gained access to servers of the group linked to SolarWinds attacks.
  • Ransomware attacks hit several major companies.
  • In the State Duma, authorities said that if Twitter is blocked on Russian soil, they would heed the ‘sad experience’ of Telegram.

Twitter began removing prohibited content after Roskomnadzor’s demands, but the risk of blocking remains

After Roskomnadzor began slowing Twitter’s operation on the territory of the Russian Federation, the social network began removing prohibited content.

The agency called the pace of removing prohibited content unsatisfactory.

Alexander Khinshtein, head of the State Duma Committee on Information Policy, stated that in the event of the service being blocked, authorities would take into account the ‘sad experience’ of Telegram.

Since the unsuccessful attempt to block Telegram, much has changed — in particular, the so-called sovereign Internet law has come into force.

«Today the state has enough technical mechanisms to effectively block internet resources that violate Russian law. Access to VPNs can be restricted just as easily today. And in a chain reaction, that is how it will happen — further blocks of access to these VPNs», — said Khinshtein.

Earlier, Roskomnadzor began slowing Twitter’s operation on March 10 and gave the social network a month to remove prohibited content. Otherwise, the agency threatened to block the service in Russia.

A number of politicians, journalists and activists are prepared to sue Roskomnadzor if the agency blocks Twitter.

Bundestag deputies targeted in hack attack; Russian-linked hackers suspected

Computers of at least seven members of the German Bundestag were attacked by hackers. The attack is attributed to the Ghostwriter group, linked to Russia, according to Spiegel.

The attackers used phishing to breach the systems. It is not yet clear whether data were stolen.

Britons lost more than £479m ($655m) to cybercrime in 2020

In 2020, residents of the United Kingdom lost £479 million (more than $655 million at the time) due to cybercrime, according to the Financial Times, citing UK Finance.

The pandemic spurred a rise in fraud; for example, attackers frequently gained access to users’ devices via emails or messages linking to fake vaccination-site pages.

Babuk ransomware operators stole over 700 GB of data from a US military contractor

The hackers attacked American company PDI Group, a producer of military systems and equipment.

The hackers said they obtained access to a large volume of confidential information, including documents and personal data of employees and clients. At least some of the data has been published on the dark web, the attackers claim.

Facebook blocked a Chinese hacker group monitoring Uyghurs

Facebook announced the takedown of Chinese hackers who used the platform to disseminate malware and to break into activists, journalists, and dissidents among Uyghurs in Xinjiang, China, many of whom live in Turkey, Kazakhstan, the United States, Syria, Australia, Canada and elsewhere.

They created accounts posing as “journalists, students, human-rights advocates, or members of the Uyghur community” to gain the trust of targets and trick them into clicking malicious links.

Microsoft Exchange servers attacked by another ransomware

Black Kingdom ransomware joined attacks on Microsoft Exchange servers, exploiting the recently discovered vulnerabilities.

Experts noted that Black Kingdom initially did not encrypt files. However, later several companies observed changes in the attacks and operators fixed their mistake.

Experts gained access to servers of the group tied to the SolarWinds attack

Swiss cybersecurity company PRODAFT said it gained access to the servers used by the SolarWinds-affiliated hackers.

Experts managed to breach the attackers’ computer infrastructure. According to them, the group, which PRODAFT named SilverFish, attacked at least 4,720 victims.

According to researchers, beyond the SolarWinds software vulnerability, the hackers used other methods to attack.

PRODAFT does not link the hackers to any particular country, though notes the group exhibits traits of state-sponsored actors — for example, a lack of monetary motivation and targeting critical infrastructure.

According to the report, the servers used by the hackers were located in Russia and Ukraine, and the group’s members largely wrote comments in Russian slang, though SilverFish did not target organizations in those countries, as well as in Georgia and Uzbekistan.

As reported, the SolarWinds-based breach is considered one of the largest attacks on U.S. government systems in years. For more on the incident, read ForkLog’s exclusive.

Insurance giant CNA hit by a new ransomware variant

Insurance company CNA was hit by a new variant of the Phoenix CryptoLocker ransomware, according to Bleeping Computer.

The attackers encrypted 15,000 devices on CNA’s network, as well as computers of remote employees connected to the corporate VPN during the attack.

The operation is believed to be carried out by the Evil Corp group.

Also on ForkLog:

What to read this weekend?

Read how governments worldwide used the pandemic to tighten surveillance on citizens and curb freedom of the internet in Freedom House’s analysis.

Subscribe to ForkLog news on Telegram: ForkLog Feed — full news stream, ForkLog — the most important news, infographics and opinions

Exit mobile version