Firmware Bugs Plague Server Supply Chain, 7 Vendors Impacted

Lenovo, Acer and five additional server manufacturers are hit with supply-chain bugs buried in motherboard firmware. Continue reading Firmware Bugs Plague Server Supply Chain, 7 Vendors Impacted

Zebrocy’s Multilanguage Malware Salad

Zebrocy is Russian speaking APT that presents a strange set of stripes. Essentially, at our SAS2019 presentation, we publicly provided original insights on Zebrocy and their characteristics for the first time, based on five years of research and private reports on this group. Continue reading Zebrocy’s Multilanguage Malware Salad

World’s most dangerous laptop has been sold for $1.3 million

By Uzair Amir
The laptop is a Samsung model now known as ‘Persistence of Chaos’ due to dangerous malware infection. A few days ago it was reported that a laptop (2008 Samsung 10.2-inch – NC10-14GB netbook) infected with some of the more dangerous… Continue reading World’s most dangerous laptop has been sold for $1.3 million

World’s most dangerous laptop ‘Persistence of Chaos’ is up for auction

By Ryan De Souza
The ‘Persistence of Chaos’ laptop is infected with some of the most dangerous malware including WannaCry. A Samsung’s 11-year old Notebook called the Persistence of Chaos is dubbed the most dangerous PC in the world because… Continue reading World’s most dangerous laptop ‘Persistence of Chaos’ is up for auction

Computer Infected with 6 High-Profile Viruses Surpasses $1M in Auction

A Windows laptop infected with six high-profile computer viruses has surpassed a value of one million dollars in public auction bids. For a project called “The Persistence of Chaos,” contemporary internet artist Guo O. Dong and security fir… Continue reading Computer Infected with 6 High-Profile Viruses Surpasses $1M in Auction

GreyEnergy malware has ‘massive amounts of junk code’ meant to confuse researchers

The investigation of the network of hackers generally associated with the seminal 2015 cyberattack on the Ukrainian power grid continues. A researcher has reverse-engineered malware used by a subgroup of those attackers and found “massive amounts of junk code” meant to throw analysts off the trace. “The threat actors’ broad use of anti-forensic techniques underlines their attempt to be stealthy and ensure that the infection would go unnoticed,” Alessandro Di Pinto, a researcher at industrial cybersecurity company Nozomi Networks, wrote in a paper published Tuesday. The malware Di Pinto analyzed is the handiwork of GreyEnergy, a likely derivative of the hacking group known as BlackEnergy, which Western governments have attributed to Russian military intelligence. (Both the groups and the malware they deployed have been referred to as BlackEnergy and GreyEnergy.) BlackEnergy was behind the first known cyberattack to cause a blackout when 225,000 people lost power in Ukraine in 2015. […]

The post GreyEnergy malware has ‘massive amounts of junk code’ meant to confuse researchers appeared first on CyberScoop.

Continue reading GreyEnergy malware has ‘massive amounts of junk code’ meant to confuse researchers

Triton, BlackEnergy, WannaCry – Has Your Behavior Changed?

Hopefully the title of this blog has gotten your attention. In one of my prior blogs, ICS Cybersecurity: Visibility, Protective Controls, Continuous Monitoring – Wash, Rinse, Repeat, we talked about how the malicious threat landscape for industri… Continue reading Triton, BlackEnergy, WannaCry – Has Your Behavior Changed?