Was fanny.bmp the recon part of StuXNet’s operation? (since it was before StuXnet & is nearly identical in parts of code to StuXNet) [closed]

Introduction
Stuxnet for those who don’t know: is a worm that exploited 0days, which – for the sole purpose to disrupt Iran’s Nuclear power program.
Few, don’t know about another malware, which appeared way earlier than StuXNet. – Fanny.bm… Continue reading Was fanny.bmp the recon part of StuXNet’s operation? (since it was before StuXnet & is nearly identical in parts of code to StuXNet) [closed]

Countries that retaliate too much against cyberattacks make things worse for themselves

During the opening ceremonies of the 2018 Winter Olympics, held in PyeongChang, South Korea, Russian hackers launched a cyberattack that disrupted television and internet systems at the games. The incident was resolved quickly, but because Russia used … Continue reading Countries that retaliate too much against cyberattacks make things worse for themselves

Review: The Perfect Weapon

John Maggio, an award-winning producer, director, and writer, known for The Newspaperman: The Life and Times of Ben Bradlee (2017), Panic (2018), The Italian Americans (2015) and others, based this documentary on the homonymous best-selling book by Dav… Continue reading Review: The Perfect Weapon

From Triton to Stuxnet: Preparing for OT Incident Response

Lesley Carhart, with Dragos, gives Threatpost a behind-the-scenes look at how industrial companies are faring during the COVID-19 pandemic – and how they can prepare for future threats. Continue reading From Triton to Stuxnet: Preparing for OT Incident Response

Book Review: Crime Dot Com, From Viruses to Vote Rigging, How Hacking Went Global

I had the great delight of reading Geoff White’s new book, “Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global”, I thoroughly recommend it. The book is superbly researched and written, the author’s storytelling style not only lifts th… Continue reading Book Review: Crime Dot Com, From Viruses to Vote Rigging, How Hacking Went Global

New Global Threat Landscape Report Reveals ‘Unprecedented’ Cyberattacks

Fortinet’s recently released Global Threat Landscape Report shows how the perimeter is extending to the home in the first half of 2020 – and what that means for cybercrime. Continue reading New Global Threat Landscape Report Reveals ‘Unprecedented’ Cyberattacks

Old vulnerabilities die hard: researchers uncover 20-year-old code in Windows Print Spooler

Every Microsoft Windows operating system has a file that manages commands to print documents. It is ubiquitous to the point of going unnoticed. But when researchers from security firm SafeBreach took a closer look at the file, which is called a Print Spooler Service, they noticed that some of the code is two decades old. A denial of service vulnerability the researchers reported earlier this year, which crashes the spooler service, worked not on only Windows 10, the latest operating system, but also on Windows 2000. It’s a glaring example of the old code that is bequeathed to popular software programs we take for granted. But the researchers weren’t done dissecting the spooler service. “We got intrigued, so we continued to dive in,” said Peleg Hadar, senior security researcher at SafeBreach Labs. They found another bug in the spooler service that could allow an attacker to gain system privileges on […]

The post Old vulnerabilities die hard: researchers uncover 20-year-old code in Windows Print Spooler appeared first on CyberScoop.

Continue reading Old vulnerabilities die hard: researchers uncover 20-year-old code in Windows Print Spooler

Israeli official confirms attempted cyberattack on water systems

Israel last month thwarted a cyberattack on control systems at water facilities, a senior government official said Thursday while warning of the dangers of escalating conflicts in cyberspace. The “synchronized and organized attack” on civilian infrastructure was aimed at disrupting the industrial computers that underpin Israeli water facilities, said Yigal Unna, head of Israel’s National Cyber Directorate, in the most extensive public comments from an Israeli official yet on the incident. “Serious damage” could have been done to those systems if Israeli authorities hadn’t foiled the attack, Unna claimed. “We’re now in the middle of preparing for the next phase [of attacks] to come — because it will come eventually,” he said in a speech streamed at the CybertechLive Asia conference. Public details on the attack are scarce, as Israeli officials have not released forensic data in connection with the incident. The Israeli cyber directorate issued a terse statement in late April about attempted breaches […]

The post Israeli official confirms attempted cyberattack on water systems appeared first on CyberScoop.

Continue reading Israeli official confirms attempted cyberattack on water systems