The US government has announced that it has taken down a botnet operated by Russia’s GRU military intelligence unit. The botnet was used for various malicious activities including phishing, data theft, and spying against American and foreign governments. The attack targeted over 1,000 home and small business routers that had been infected with the Moobot malware, a variant of Mirai. Non-GRU cybercriminals initially installed Moobot on the routers using default administrator passwords. Once the routers were infected, the GRU used the botnet to install their own scripts and files for cyber espionage purposes. The US government was able to neutralize the botnet by copying and deleting the malicious files and blocking remote management access to the routers. This is the second state-sponsored botnet that the US government claims to have disrupted in recent months, the first belonging to China’s Volt Typhoon. However, experts believe that the attackers will likely continue their activities with new schemes. Fancy Bear, the hacking group believed to be behind the botnet, has a history of targeting US elections.
Feds wield tech smarts, shut down Russia’s GRU botnet in chase
Latest from Blog
Beware Vanilla Tempest hackers target healthcare sectors, Microsoft alerts
TLDR: Vanilla Tempest, a ransomware group, is targeting healthcare organizations in the US using a new ransomware strain called “INC.” The attackers use tools like Supper backdoor, AnyDesk, and MEGA to further
Internet baffled by mysterious ‘Noise Storms’ stumping experts
TLDR: Internet intelligence firm GreyNoise has been tracking large waves of “Noise Storms” containing spoofed internet traffic since January 2020 The purpose and origin of these noise storms, suspected to be covert
Top 20 Linux Admin Tools for 2024
TLDR: Top Linux Admin Tools in 2024 Key points: Linux admin tools streamline system configurations, performance monitoring, and security management. Popular Linux admin tools include Webmin, Puppet, Zabbix, Nagios, and Ansible. Summary
Evergy chooses OneLayer Bridge for private LTE network management and security
TLDR: Evergy has selected OneLayer Bridge for private LTE network management and security in a multi-year deal. The platform will help manage and secure thousands of devices on Evergy’s private LTE network,
Bogus job tempts aerospace, energy workers
TLDR: A North Korean cyberespionage group is posing as job recruiters to target employees in aerospace and energy sectors. Mandiant reports that the group uses fake job descriptions stored in malicious archives
Picus Security Secures $45M for Enhanced Exposure Management Solutions
TLDR: Picus Security has received a $45M investment from Riverwood Capital to enhance its exposure management platform. The investment will help Picus expand its capabilities in attack surface management, automated penetration testing,
Secure solar power with effective cybersecurity for renewable energy success
TLDR: Solar energy systems are vulnerable to outside attacks through inverters, microgrids, and DoS attacks. Cybersecurity professionals can protect solar energy by teaching security, updating software, and setting up a strong firewall.
Health sector cyberattacks Critics slam federal response as weak and disjointed
TLDR: Health care is the most frequent target for ransomware attacks. Federal response to cyberattacks in the health industry is criticized as feeble and fractured. Health care industry faced numerous cyberattacks, including
Beware: UNC2970 Hackers Weapons in Job Seekers’ PDFs
TLDR: UNC2970 hackers are targeting job seekers with weaponized PDF files. They use sophisticated phishing tactics to deliver malware to victims. In a recent report, cybersecurity analysts at Google Mandiant have identified
Cyber insurance changes shape of security for good and bad
TLDR: Key Points: Cyber-insurance landscape is shifting to encourage greater cyber resiliency Rising costs of cyberattacks are prompting insurers to re-examine underwriting How Cyber-Insurance Shifts Affect the Security Landscape The article discusses