Tallinn Manual author: Petya malware attack likely war crime

If Russia was indeed behind the recent destructive malware attack known as Petya, then it should be considered a war crime, according to the lead author of the definitive guide to international law in cyber conflict. Even though no one was injured or killed, they very easily could have been; the attackers appear to have targeted civilian infrastructure including hospitals and power companies; and they did so with an indiscriminate weapon, argues Prof. Michael Schmitt of the U.S. Naval War College, and lead author of the Tallinn Manual, in an article posted on the European Journal of International Law. But the reasoning only holds if Moscow was behind the attack — because Russia is already engaged in an armed conflict, albeit undeclared, with Ukraine, the nation originally targeted by the malware. Petya on its own isn’t be a big enough attack to count as a “use of force” in international law. “A threshold question is, ‘Is the […]

The post Tallinn Manual author: Petya malware attack likely war crime appeared first on Cyberscoop.

Continue reading Tallinn Manual author: Petya malware attack likely war crime

Monitor Your Network for NotPetya in Real Time

With the QRadar NotPetya Content Pack, security analysts can monitor their networks for indicators of NotPetya ransomware in real time.

The post Monitor Your Network for NotPetya in Real Time appeared first on Security Intelligence.

Continue reading Monitor Your Network for NotPetya in Real Time

A week in security (July 10 – July 16)

A compilation of security news and blog posts from the 10th of July to the 16th. We go over our PowerShell, an overview of the Petya ransomware family, and more.

Categories:

Tags:

(Read more…)

The post A week in security (July 10 – July 16) appeared first on Malwarebytes Labs.

Continue reading A week in security (July 10 – July 16)

Half-Year Roundup: The Top Five Data Breaches of 2017 — So Far

Organizations around the world and across industries have had to deal with more than their fair share of devastating data breaches so far in 2017.

The post Half-Year Roundup: The Top Five Data Breaches of 2017 — So Far appeared first on Security Intelligence.

Continue reading Half-Year Roundup: The Top Five Data Breaches of 2017 — So Far

July 11, 2017 – Hack Naked News #132

Solving artificial stupidity, Petya’s decryption key is released, sleeping with the enemy, burned laptops for DEF CON, and more. Jason Wood of Paladin Security joins us to discuss the FTC shutting down a loan application firm on this episode of Hack Naked News! Full Show Notes Visit http://hacknaked.tv to get all the latest episodes!

The post July 11, 2017 – Hack Naked News #132 appeared first on Security Weekly.

Continue reading July 11, 2017 – Hack Naked News #132

July 11, 2017 – Hack Naked News #132

Solving artificial stupidity, Petya’s decryption key is released, sleeping with the enemy, burned laptops for DEF CON, and more. Jason Wood of Paladin Security joins us to discuss the FTC shutting down a loan application firm on this episode of Hack Naked News! Full Show Notes Visit http://hacknaked.tv to get all the latest episodes!

The post July 11, 2017 – Hack Naked News #132 appeared first on Security Weekly.

Continue reading July 11, 2017 – Hack Naked News #132

Petya ransomware developer releases master decryption key, giving hope for victims

The original developer of the Petya ransomware has released a master decryption key that works for all prevision versions of its enciphering creation.
But before you get too excited, it doesn’t work for NotPetya…
David Bisson reports.
Continue reading Petya ransomware developer releases master decryption key, giving hope for victims