Two Persons on the U.S Secret Service Most Wanted Cybercriminals List Run a Managed Android Malware Enterprise Including a Black Energy DDoS Botnet – An OSINT Analysis

Dear blog readers,This is Dancho. In this post I’ll provide actionable intelligence on two individuals on the U.S Secret Service’s Most Wanted Cybercriminals list in particular – Oleksandr Vitalyevich Ieremenko including Danil Potekhin f… Continue reading Two Persons on the U.S Secret Service Most Wanted Cybercriminals List Run a Managed Android Malware Enterprise Including a Black Energy DDoS Botnet – An OSINT Analysis

State Department to double cyber defense aid to Ukraine

The State Department will double the cyber defense aid it pledged to Ukraine last year to $10 million in an effort to bolster the security of an ally in the crosshairs of alleged Russian hackers, according to department spokesperson. Wess Mitchell, the assistant secretary of State for European and Eurasian Affairs, made the announcement Wednesday after meeting with Ukrainian President Petro Poroshenko, State Department Spokeswoman Heather Nauert said. “The threat from Russia is real,” Nauert tweeted. “Our commitment to Ukraine is unbending.” A different department spokesperson declined to comment when CyberScoop asked how the new money will be used. The two countries held their first bilateral cybersecurity dialogue in Kiev in September, at which the United States announced $5 million in new cybersecurity assistance to “strengthen Ukraine’s ability to prevent, mitigate, and respond to cyberattacks.” The Ukrainian power grid has been a ripe target for hackers, who carried out advanced […]

The post State Department to double cyber defense aid to Ukraine appeared first on Cyberscoop.

Continue reading State Department to double cyber defense aid to Ukraine

An old foe’s footprints muddle the mystery around group responsible for energy sector hacks

Though leading cybersecurity firms are closing in on the hackers responsible for a recent email phishing campaign and watering hole scheme designed to target U.S. energy companies, the available evidence points to an amorphous group that hasn’t been active for three years. It’s yet another mystery within an already complex case. The leading suspect behind this incident, according to cybersecurity experts and former U.S. intelligence officials, is a group associated with past operations tied to Russia. Known as “Energetic Bear,” “Koala Team” or “Crouching Yeti” to the information security community, the unit has a long history of targeting the energy sector and exploiting outdated vulnerabilities in Microsoft Word and Adobe Flash. “Koala Team is a prolific cyber espionage actor that has affected a comprehensive set of verticals using a combination of opportunistic and targeted tactics since at least 2011,” Cristiana Brafman Kittner, a senior analyst with U.S. cybersecurity firm FireEye, told CyberScoop. […]

The post An old foe’s footprints muddle the mystery around group responsible for energy sector hacks appeared first on Cyberscoop.

Continue reading An old foe’s footprints muddle the mystery around group responsible for energy sector hacks

The Malware Used Against The Ukrainian Power Grid Is More Dangerous Than Anyone Thought

Researchers have discovered a new powerful—and dangerous—malware that targets industrial control systems. Continue reading The Malware Used Against The Ukrainian Power Grid Is More Dangerous Than Anyone Thought